watchdog: BUG: soft lockup - CPU#0 stuck for 21s! [syz.0.389:8183] Modules linked in: irq event stamp: 150 hardirqs last enabled at (149): [] seqcount_lockdep_reader_access+0x80/0x104 include/linux/seqlock.h:74 hardirqs last disabled at (150): [] __el1_irq arch/arm64/kernel/entry-common.c:533 [inline] hardirqs last disabled at (150): [] el1_interrupt+0x24/0x68 arch/arm64/kernel/entry-common.c:551 softirqs last enabled at (130): [] softirq_handle_end kernel/softirq.c:400 [inline] softirqs last enabled at (130): [] handle_softirqs+0xa3c/0xbfc kernel/softirq.c:582 softirqs last disabled at (125): [] __do_softirq+0x14/0x20 kernel/softirq.c:588 CPU: 0 UID: 0 PID: 8183 Comm: syz.0.389 Not tainted 6.11.0-rc5-syzkaller-gdf54f4a16f82 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : seqcount_lockdep_reader_access+0xe4/0x104 include/linux/seqlock.h:75 lr : seqcount_lockdep_reader_access+0xe0/0x104 include/linux/seqlock.h:74 sp : ffff800099db78f0 x29: ffff800099db78f0 x28: 1ffff00011ee0ed7 x27: dfff800000000000 x26: ffff80008f707000 x25: 000000000000049b x24: ffff800099db7a00 x23: ffff80008f707000 x22: ffff80008f707680 x21: 0000000000000000 x20: ffff80008f707688 x19: 00000000000000c0 x18: 000000007d15bb78 x17: 00000000c97a7b36 x16: ffff800080345a84 x15: 000000000000000c x14: ffff80008f510510 x13: dfff800000000000 x12: 0000000000000003 x11: 0000000000040000 x10: 000000000000050a x9 : ffff8000a4e3b000 x8 : 000000000000050b x7 : ffff80008045a98c x6 : 0000000000000000 x5 : 0000000000000001 x4 : 0000000000000001 x3 : 0000000000000000 x2 : ffff0000d7b1bc80 x1 : 0000000000000080 x0 : 0000000000000000 Call trace: __daif_local_irq_restore arch/arm64/include/asm/irqflags.h:175 [inline] arch_local_irq_restore arch/arm64/include/asm/irqflags.h:195 [inline] seqcount_lockdep_reader_access+0xe4/0x104 include/linux/seqlock.h:74 timekeeping_debug_get_ns kernel/time/timekeeping.c:256 [inline] timekeeping_get_ns+0x5c/0x3a0 kernel/time/timekeeping.c:401 ktime_get_real_ts64 kernel/time/timekeeping.c:829 [inline] do_adjtimex+0x3e8/0xaec kernel/time/timekeeping.c:2583 posix_clock_realtime_adj+0x20/0x30 kernel/time/posix-timers.c:151 do_clock_adjtime kernel/time/posix-timers.c:1159 [inline] __do_sys_clock_adjtime kernel/time/posix-timers.c:1171 [inline] __se_sys_clock_adjtime kernel/time/posix-timers.c:1162 [inline] __arm64_sys_clock_adjtime+0x29c/0x440 kernel/time/posix-timers.c:1162 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:712 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:730 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 729 Comm: kworker/u8:8 Not tainted 6.11.0-rc5-syzkaller-gdf54f4a16f82 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 Workqueue: events_unbound toggle_allocation_gate pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : csd_lock_wait kernel/smp.c:312 [inline] pc : smp_call_function_many_cond+0x17e0/0x2f30 kernel/smp.c:856 lr : csd_lock_wait kernel/smp.c:312 [inline] lr : smp_call_function_many_cond+0x17f8/0x2f30 kernel/smp.c:856 sp : ffff800099c877a0 x29: ffff800099c878d0 x28: 1fffe000367a14e8 x27: 0000000000000008 x26: ffffffffffffffff x25: dfff800000000000 x24: 1fffe000367a14e9 x23: ffff0001b3cec988 x22: 0000000000000000 x21: 0000000000000011 x20: ffff0001b3d0a740 x19: ffff0001b3d0a748 x18: 1fffe0003679e7e6 x17: ffff80008f50d000 x16: ffff80008301a844 x15: 0000000000000001 x14: 1fffe0003679d931 x13: 0000000000000000 x12: 0000000000000000 x11: ffff60003679d932 x10: 0000000000ff0100 x9 : 0000000000000000 x8 : 0000000000000011 x7 : ffff80008006427c x6 : 0000000000000000 x5 : 0000000000000001 x4 : 0000000000000000 x3 : ffff8000804b6bc4 x2 : 0000000000000000 x1 : 0000000000000004 x0 : 0000000000000001 Call trace: __cmpwait_case_32 arch/arm64/include/asm/cmpxchg.h:231 [inline] __cmpwait arch/arm64/include/asm/cmpxchg.h:257 [inline] csd_lock_wait kernel/smp.c:312 [inline] smp_call_function_many_cond+0x17e0/0x2f30 kernel/smp.c:856 smp_call_function_many kernel/smp.c:880 [inline] smp_call_function kernel/smp.c:902 [inline] kick_all_cpus_sync+0x40/0xa0 kernel/smp.c:1047 arch_jump_label_transform_apply+0x14/0x20 arch/arm64/kernel/jump_label.c:34 __jump_label_update+0x30c/0x334 kernel/jump_label.c:501 jump_label_update+0x30c/0x3bc kernel/jump_label.c:900 static_key_enable_cpuslocked+0x140/0x230 kernel/jump_label.c:210 static_key_enable+0x24/0x38 kernel/jump_label.c:223 toggle_allocation_gate+0xb8/0x24c mm/kfence/core.c:833 process_one_work+0x79c/0x15b8 kernel/workqueue.c:3231 process_scheduled_works kernel/workqueue.c:3312 [inline] worker_thread+0x978/0xec4 kernel/workqueue.c:3389 kthread+0x288/0x310 kernel/kthread.c:389 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:860