watchdog: BUG: soft lockup - CPU#0 stuck for 22s! [syz.4.1671:8488] Modules linked in: irq event stamp: 5930 hardirqs last enabled at (5929): [] __exit_to_kernel_mode arch/arm64/kernel/entry-common.c:84 [inline] hardirqs last enabled at (5929): [] exit_to_kernel_mode+0xe8/0x118 arch/arm64/kernel/entry-common.c:94 hardirqs last disabled at (5930): [] __el1_irq arch/arm64/kernel/entry-common.c:468 [inline] hardirqs last disabled at (5930): [] el1_interrupt+0x24/0x68 arch/arm64/kernel/entry-common.c:486 softirqs last enabled at (1308): [] softirq_handle_end kernel/softirq.c:414 [inline] softirqs last enabled at (1308): [] handle_softirqs+0xb84/0xd58 kernel/softirq.c:599 softirqs last disabled at (1261): [] __do_softirq+0x14/0x20 kernel/softirq.c:605 CPU: 0 PID: 8488 Comm: syz.4.1671 Not tainted 6.1.116-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : csd_lock_wait kernel/smp.c:424 [inline] pc : smp_call_function_many_cond+0x20f8/0x32b8 kernel/smp.c:998 lr : csd_lock_wait kernel/smp.c:424 [inline] lr : smp_call_function_many_cond+0x2110/0x32b8 kernel/smp.c:998 sp : ffff8000214b7200 x29: ffff8000214b7560 x28: 1fffe000367a1630 x27: ffff8000159e1138 x26: ffff8000214b7368 x25: ffff0001b3d2f7c8 x24: 0000000000000001 x23: dfff800000000000 x22: ffff0001b3d0b188 x21: 0000000000000011 x20: ffff8000214b7360 x19: ffff0001b3d0b180 x18: 1fffe0003679ed76 x17: ffff8000159dd000 x16: ffff800008305dfc x15: 0000000000000002 x14: 0000000000000406 x13: ffff0000da48b780 x12: 0000000000040000 x11: 000000000003ffff x10: ffff80002657e000 x9 : 0000000000000000 x8 : 0000000000000011 x7 : 0000000000000000 x6 : 0000000000000000 x5 : 0000000000000000 x4 : ffff800008b3b0a8 x3 : ffff80000844f7a8 x2 : 0000000000000000 x1 : 0000000000000004 x0 : 0000000000000001 Call trace: __cmpwait_case_32 arch/arm64/include/asm/cmpxchg.h:252 [inline] __cmpwait arch/arm64/include/asm/cmpxchg.h:278 [inline] csd_lock_wait kernel/smp.c:424 [inline] smp_call_function_many_cond+0x20f8/0x32b8 kernel/smp.c:998 on_each_cpu_cond_mask+0x5c/0xc4 kernel/smp.c:1166 on_each_cpu_cond include/linux/smp.h:105 [inline] invalidate_bh_lrus+0x34/0x40 fs/buffer.c:1412 kill_bdev block/bdev.c:75 [inline] set_blocksize+0x270/0x2e8 block/bdev.c:152 sb_set_blocksize+0x54/0x108 block/bdev.c:161 fat_fill_super+0x1dcc/0x3e78 fs/fat/inode.c:1682 vfat_fill_super+0x40/0x54 fs/fat/namei_vfat.c:1200 mount_bdev+0x274/0x370 fs/super.c:1443 vfat_mount+0x44/0x58 fs/fat/namei_vfat.c:1207 legacy_get_tree+0xd4/0x16c fs/fs_context.c:632 vfs_get_tree+0x90/0x274 fs/super.c:1573 do_new_mount+0x278/0x8fc fs/namespace.c:3056 path_mount+0x590/0xe5c fs/namespace.c:3386 do_mount fs/namespace.c:3399 [inline] __do_sys_mount fs/namespace.c:3607 [inline] __se_sys_mount fs/namespace.c:3584 [inline] __arm64_sys_mount+0x45c/0x594 fs/namespace.c:3584 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x98/0x2c0 arch/arm64/kernel/syscall.c:52 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:140 do_el0_svc+0x64/0x218 arch/arm64/kernel/syscall.c:204 el0_svc+0x58/0x168 arch/arm64/kernel/entry-common.c:637 el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:655 el0t_64_sync+0x18c/0x190 arch/arm64/kernel/entry.S:585