watchdog: BUG: soft lockup - CPU#1 stuck for 225s! [kworker/u8:0:11] CPU#1 Utilization every 22s during lockup: #1: 100% system, 1% softirq, 1% hardirq, 0% idle #2: 100% system, 0% softirq, 1% hardirq, 0% idle #3: 100% system, 1% softirq, 1% hardirq, 0% idle #4: 100% system, 1% softirq, 1% hardirq, 0% idle #5: 100% system, 1% softirq, 1% hardirq, 0% idle Modules linked in: irq event stamp: 228058 hardirqs last enabled at (228057): [] irqentry_exit+0x3b/0x90 kernel/entry/common.c:357 hardirqs last disabled at (228058): [] sysvec_apic_timer_interrupt+0xe/0xb0 arch/x86/kernel/apic/apic.c:1043 softirqs last enabled at (228054): [] softirq_handle_end kernel/softirq.c:400 [inline] softirqs last enabled at (228054): [] handle_softirqs+0x5be/0x8f0 kernel/softirq.c:582 softirqs last disabled at (228041): [] __do_softirq kernel/softirq.c:588 [inline] softirqs last disabled at (228041): [] invoke_softirq kernel/softirq.c:428 [inline] softirqs last disabled at (228041): [] __irq_exit_rcu kernel/softirq.c:637 [inline] softirqs last disabled at (228041): [] irq_exit_rcu+0xbb/0x120 kernel/softirq.c:649 CPU: 1 PID: 11 Comm: kworker/u8:0 Not tainted 6.9.0-syzkaller-10215-g72ece20127a3 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 Workqueue: events_unbound toggle_allocation_gate RIP: 0010:csd_lock_wait kernel/smp.c:311 [inline] RIP: 0010:smp_call_function_many_cond+0x4e7/0x1420 kernel/smp.c:855 Code: 0c 00 85 ed 74 4d 48 b8 00 00 00 00 00 fc ff df 4d 89 f4 4c 89 f5 49 c1 ec 03 83 e5 07 49 01 c4 83 c5 03 e8 bb 39 0c 00 f3 90 <41> 0f b6 04 24 40 38 c5 7c 08 84 c0 0f 85 f7 0c 00 00 8b 43 08 31 RSP: 0018:ffffc90000107908 EFLAGS: 00000293 RAX: 0000000000000000 RBX: ffff8880b92464c0 RCX: ffffffff8182fbcb RDX: ffff8880172bbc00 RSI: ffffffff8182fba5 RDI: 0000000000000005 RBP: 0000000000000003 R08: 0000000000000005 R09: 0000000000000000 R10: 0000000000000001 R11: 0000000000000006 R12: ffffed1017248c99 R13: 0000000000000001 R14: ffff8880b92464c8 R15: ffff8880b933fdc0 FS: 0000000000000000(0000) GS:ffff8880b9300000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f35446d7080 CR3: 000000000d97a000 CR4: 0000000000350ef0 Call Trace: on_each_cpu_cond_mask+0x40/0x90 kernel/smp.c:1023 on_each_cpu include/linux/smp.h:71 [inline] text_poke_sync arch/x86/kernel/alternative.c:2069 [inline] text_poke_bp_batch+0x22b/0x760 arch/x86/kernel/alternative.c:2279 text_poke_flush arch/x86/kernel/alternative.c:2470 [inline] text_poke_flush arch/x86/kernel/alternative.c:2467 [inline] text_poke_finish+0x30/0x40 arch/x86/kernel/alternative.c:2477 arch_jump_label_transform_apply+0x1c/0x30 arch/x86/kernel/jump_label.c:146 jump_label_update+0x1d7/0x400 kernel/jump_label.c:882 static_key_enable_cpuslocked+0x1b7/0x270 kernel/jump_label.c:205 static_key_enable+0x1a/0x20 kernel/jump_label.c:218 toggle_allocation_gate mm/kfence/core.c:826 [inline] toggle_allocation_gate+0xf8/0x250 mm/kfence/core.c:818 process_one_work+0x9fe/0x1b60 kernel/workqueue.c:3231 process_scheduled_works kernel/workqueue.c:3312 [inline] worker_thread+0x6c8/0xf70 kernel/workqueue.c:3393 kthread+0x2c4/0x3a0 kernel/kthread.c:389 ret_from_fork+0x48/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244