watchdog: BUG: soft lockup - CPU#1 stuck for 23s! [kworker/1:0:21] Modules linked in: irq event stamp: 301176 hardirqs last enabled at (301175): [] __exit_to_kernel_mode arch/arm64/kernel/entry-common.c:81 [inline] hardirqs last enabled at (301175): [] exit_to_kernel_mode+0x100/0x178 arch/arm64/kernel/entry-common.c:91 hardirqs last disabled at (301176): [] enter_el1_irq_or_nmi+0x10/0x1c arch/arm64/kernel/entry-common.c:227 softirqs last enabled at (293908): [] softirq_handle_end kernel/softirq.c:401 [inline] softirqs last enabled at (293908): [] handle_softirqs+0xb88/0xdbc kernel/softirq.c:586 softirqs last disabled at (293849): [] __do_softirq kernel/softirq.c:592 [inline] softirqs last disabled at (293849): [] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] softirqs last disabled at (293849): [] invoke_softirq kernel/softirq.c:439 [inline] softirqs last disabled at (293849): [] __irq_exit_rcu+0x268/0x4d8 kernel/softirq.c:641 CPU: 1 PID: 21 Comm: kworker/1:0 Not tainted 5.15.165-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 Workqueue: events bpf_map_free_deferred pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : csd_lock_wait kernel/smp.c:440 [inline] pc : smp_call_function_single+0x268/0x4f8 kernel/smp.c:758 lr : csd_lock_wait kernel/smp.c:440 [inline] lr : smp_call_function_single+0x280/0x4f8 kernel/smp.c:758 sp : ffff800018bd7900 x29: ffff800018bd79b0 x28: 1fffe00018150369 x27: dfff800000000000 x26: ffff70000317af24 x25: ffff800018bd7958 x24: ffff800018bd7948 x23: ffff800018bd7940 x22: ffff0000c0a81b48 x21: 0000000000000011 x20: ffff800018bd7948 x19: 0000000000000000 x18: 1fffe000368faf8e x17: 1fffe000368faf8e x16: ffff800011aafe2c x15: ffff800014b4ef00 x14: 1ffff0000295606a x13: 0000000000000000 x12: 0000000000000001 x11: 0000000000000001 x10: 0000000000000000 x9 : 0000000000000000 x8 : 0000000000000011 x7 : 0000000000000011 x6 : 0000000000000000 x5 : ffff800018bd7960 x4 : ffff8000141c0380 x3 : ffff80000840d968 x2 : 0000000000000000 x1 : 0000000000000004 x0 : 0000000000000001 Call trace: __cmpwait_case_32 arch/arm64/include/asm/cmpxchg.h:252 [inline] __cmpwait arch/arm64/include/asm/cmpxchg.h:278 [inline] csd_lock_wait kernel/smp.c:440 [inline] smp_call_function_single+0x268/0x4f8 kernel/smp.c:758 rcu_barrier+0x210/0x4b0 kernel/rcu/tree.c:4078 htab_map_free+0x38/0x518 kernel/bpf/hashtab.c:1470 bpf_map_free_deferred+0x2cc/0x430 kernel/bpf/syscall.c:479 process_one_work+0x790/0x11b8 kernel/workqueue.c:2310 worker_thread+0x910/0x1034 kernel/workqueue.c:2457 kthread+0x37c/0x45c kernel/kthread.c:334 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:870