watchdog: BUG: soft lockup - CPU#1 stuck for 23s! [syz.4.197:5153] Modules linked in: irq event stamp: 196510 hardirqs last enabled at (196509): [] __exit_to_kernel_mode arch/arm64/kernel/entry-common.c:81 [inline] hardirqs last enabled at (196509): [] exit_to_kernel_mode+0x100/0x178 arch/arm64/kernel/entry-common.c:91 hardirqs last disabled at (196510): [] enter_el1_irq_or_nmi+0x10/0x1c arch/arm64/kernel/entry-common.c:227 softirqs last enabled at (192036): [] softirq_handle_end kernel/softirq.c:401 [inline] softirqs last enabled at (192036): [] handle_softirqs+0xb88/0xdbc kernel/softirq.c:586 softirqs last disabled at (191935): [] __do_softirq kernel/softirq.c:592 [inline] softirqs last disabled at (191935): [] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] softirqs last disabled at (191935): [] invoke_softirq kernel/softirq.c:439 [inline] softirqs last disabled at (191935): [] __irq_exit_rcu+0x268/0x4d8 kernel/softirq.c:641 CPU: 1 PID: 5153 Comm: syz.4.197 Not tainted 5.15.165-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : csd_lock_wait kernel/smp.c:440 [inline] pc : smp_call_function_single+0x268/0x4f8 kernel/smp.c:758 lr : csd_lock_wait kernel/smp.c:440 [inline] lr : smp_call_function_single+0x280/0x4f8 kernel/smp.c:758 sp : ffff80001cdb74c0 x29: ffff80001cdb7560 x28: 1fffe000198726d1 x27: dfff800000000000 x26: ffff7000039b6e9c x25: ffff80001cdb7518 x24: ffff80001cdb7508 x23: ffff80001cdb7500 x22: ffff0000cc393688 x21: 0000000000000011 x20: ffff80001cdb7508 x19: 0000000000000000 x18: 1fffe000368fab8e x17: 1fffe000368fab8e x16: ffff800011abc7d0 x15: ffff800014b5ef00 x14: 1ffff0000295806a x13: 0000000000000000 x12: 0000000000000001 x11: 0000000000000001 x10: 0000000000000000 x9 : 0000000000000000 x8 : 0000000000000011 x7 : 0000000000000011 x6 : 0000000000000000 x5 : ffff80001cdb7520 x4 : ffff8000141c2180 x3 : ffff80000840d968 x2 : 0000000000000000 x1 : 0000000000000004 x0 : 0000000000000001 Call trace: __cmpwait_case_32 arch/arm64/include/asm/cmpxchg.h:252 [inline] __cmpwait arch/arm64/include/asm/cmpxchg.h:278 [inline] csd_lock_wait kernel/smp.c:440 [inline] smp_call_function_single+0x268/0x4f8 kernel/smp.c:758 rcu_barrier+0x210/0x4b0 kernel/rcu/tree.c:4078 netdev_wait_allrefs net/core/dev.c:10552 [inline] netdev_run_todo+0x67c/0xae0 net/core/dev.c:10641 rtnl_unlock+0x14/0x20 net/core/rtnetlink.c:112 tun_detach drivers/net/tun.c:705 [inline] tun_chr_close+0x148/0x20c drivers/net/tun.c:3440 __fput+0x1c4/0x800 fs/file_table.c:280 ____fput+0x20/0x30 fs/file_table.c:308 task_work_run+0x130/0x1e4 kernel/task_work.c:188 exit_task_work include/linux/task_work.h:33 [inline] do_exit+0x670/0x20bc kernel/exit.c:874 do_group_exit+0x110/0x268 kernel/exit.c:996 get_signal+0x634/0x1550 kernel/signal.c:2897 do_signal arch/arm64/kernel/signal.c:890 [inline] do_notify_resume+0x3d0/0x32b8 arch/arm64/kernel/signal.c:943 prepare_exit_to_user_mode arch/arm64/kernel/entry-common.c:133 [inline] exit_to_user_mode arch/arm64/kernel/entry-common.c:138 [inline] el0_svc+0xfc/0x1f0 arch/arm64/kernel/entry-common.c:609 el0t_64_sync_handler+0x84/0xe4 arch/arm64/kernel/entry-common.c:626 el0t_64_sync+0x1a0/0x1a4 arch/arm64/kernel/entry.S:584