watchdog: BUG: soft lockup - CPU#1 stuck for 22s! [kworker/1:10:5145] Modules linked in: irq event stamp: 28392 hardirqs last enabled at (28391): [] __exit_to_kernel_mode arch/arm64/kernel/entry-common.c:81 [inline] hardirqs last enabled at (28391): [] exit_to_kernel_mode+0x100/0x178 arch/arm64/kernel/entry-common.c:91 hardirqs last disabled at (28392): [] enter_el1_irq_or_nmi+0x10/0x1c arch/arm64/kernel/entry-common.c:227 softirqs last enabled at (23812): [] softirq_handle_end kernel/softirq.c:401 [inline] softirqs last enabled at (23812): [] handle_softirqs+0xb88/0xdbc kernel/softirq.c:586 softirqs last disabled at (23745): [] __do_softirq kernel/softirq.c:592 [inline] softirqs last disabled at (23745): [] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] softirqs last disabled at (23745): [] invoke_softirq kernel/softirq.c:439 [inline] softirqs last disabled at (23745): [] __irq_exit_rcu+0x268/0x4d8 kernel/softirq.c:641 CPU: 1 PID: 5145 Comm: kworker/1:10 Not tainted 5.15.167-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 Workqueue: events fqdir_free_fn pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : csd_lock_wait kernel/smp.c:440 [inline] pc : smp_call_function_single+0x268/0x4f8 kernel/smp.c:758 lr : csd_lock_wait kernel/smp.c:440 [inline] lr : smp_call_function_single+0x280/0x4f8 kernel/smp.c:758 sp : ffff80001ffb79a0 x29: ffff80001ffb7a50 x28: 1fffe00018ee26d1 x27: dfff800000000000 x26: ffff700003ff6f38 x25: ffff80001ffb79f8 x24: ffff80001ffb79e8 x23: ffff80001ffb79e0 x22: ffff0000c7713688 x21: 0000000000000011 x20: ffff80001ffb79e8 x19: 0000000000000000 x18: 1fffe00036835d8e x17: 1fffe00036835d8e x16: ffff800011ac23e0 x15: ffff800014b5ef40 x14: 1ffff0000295806a x13: 0000000000000000 x12: 0000000000000001 x11: 0000000000000001 x10: 0000000000000000 x9 : 0000000000000000 x8 : 0000000000000011 x7 : 0000000000000011 x6 : 0000000000000000 x5 : ffff80001ffb7a00 x4 : ffff8000141cf6e0 x3 : ffff80000840eb14 x2 : 0000000000000000 x1 : 0000000000000004 x0 : 0000000000000001 Call trace: __cmpwait_case_32 arch/arm64/include/asm/cmpxchg.h:252 [inline] __cmpwait arch/arm64/include/asm/cmpxchg.h:278 [inline] csd_lock_wait kernel/smp.c:440 [inline] smp_call_function_single+0x268/0x4f8 kernel/smp.c:758 rcu_barrier+0x210/0x4b0 kernel/rcu/tree.c:4078 fqdir_free_fn+0x50/0x18c net/ipv4/inet_fragment.c:163 process_one_work+0x790/0x11b8 kernel/workqueue.c:2310 worker_thread+0x910/0x1034 kernel/workqueue.c:2457 kthread+0x37c/0x45c kernel/kthread.c:334 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:870