watchdog: BUG: soft lockup - CPU#0 stuck for 22s! [kworker/0:7:4081] Modules linked in: irq event stamp: 185412 hardirqs last enabled at (185411): [] __exit_to_kernel_mode arch/arm64/kernel/entry-common.c:81 [inline] hardirqs last enabled at (185411): [] exit_to_kernel_mode+0x100/0x178 arch/arm64/kernel/entry-common.c:91 hardirqs last disabled at (185412): [] enter_el1_irq_or_nmi+0x10/0x1c arch/arm64/kernel/entry-common.c:227 softirqs last enabled at (181168): [] softirq_handle_end kernel/softirq.c:401 [inline] softirqs last enabled at (181168): [] handle_softirqs+0xb88/0xdbc kernel/softirq.c:586 softirqs last disabled at (181083): [] __do_softirq kernel/softirq.c:592 [inline] softirqs last disabled at (181083): [] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] softirqs last disabled at (181083): [] invoke_softirq kernel/softirq.c:439 [inline] softirqs last disabled at (181083): [] __irq_exit_rcu+0x268/0x4d8 kernel/softirq.c:641 CPU: 0 PID: 4081 Comm: kworker/0:7 Not tainted 5.15.167-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 Workqueue: events bpf_map_free_deferred pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : csd_lock_wait kernel/smp.c:440 [inline] pc : smp_call_function_single+0x268/0x4f8 kernel/smp.c:758 lr : csd_lock_wait kernel/smp.c:440 [inline] lr : smp_call_function_single+0x280/0x4f8 kernel/smp.c:758 sp : ffff800020587900 x29: ffff8000205879b0 x28: 1fffe00018eba6d1 x27: dfff800000000000 x26: ffff7000040b0f24 x25: ffff800020587958 x24: ffff800020587948 x23: ffff800020587940 x22: ffff0000c75d3688 x21: 0000000000000011 x20: ffff800020587948 x19: 0000000000000000 x18: 1fffff7ffdfe1b56 x17: 1fffff7ffdfe1b56 x16: ffff800011ac23e0 x15: ffff800014b5ef40 x14: 1ffff0000295806a x13: 0000000000000000 x12: 0000000000000001 x11: 0000000000000001 x10: 0000000000000000 x9 : 0000000000000000 x8 : 0000000000000011 x7 : 0000000000000011 x6 : 0000000000000000 x5 : ffff800020587960 x4 : ffff8000141cf6e0 x3 : ffff80000840eb14 x2 : 0000000000000000 x1 : 0000000000000004 x0 : 0000000000000001 Call trace: __cmpwait_case_32 arch/arm64/include/asm/cmpxchg.h:252 [inline] __cmpwait arch/arm64/include/asm/cmpxchg.h:278 [inline] csd_lock_wait kernel/smp.c:440 [inline] smp_call_function_single+0x268/0x4f8 kernel/smp.c:758 rcu_barrier+0x210/0x4b0 kernel/rcu/tree.c:4078 htab_map_free+0x38/0x518 kernel/bpf/hashtab.c:1470 bpf_map_free_deferred+0x2cc/0x430 kernel/bpf/syscall.c:479 process_one_work+0x790/0x11b8 kernel/workqueue.c:2310 worker_thread+0x910/0x1034 kernel/workqueue.c:2457 kthread+0x37c/0x45c kernel/kthread.c:334 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:870