watchdog: BUG: soft lockup - CPU#1 stuck for 22s! [kworker/1:3:5570] Modules linked in: irq event stamp: 864395 hardirqs last enabled at (864394): [] __exit_to_kernel_mode arch/arm64/kernel/entry-common.c:84 [inline] hardirqs last enabled at (864394): [] exit_to_kernel_mode+0xdc/0x10c arch/arm64/kernel/entry-common.c:94 hardirqs last disabled at (864395): [] __el1_irq arch/arm64/kernel/entry-common.c:499 [inline] hardirqs last disabled at (864395): [] el1_interrupt+0x24/0x68 arch/arm64/kernel/entry-common.c:517 softirqs last enabled at (116054): [] softirq_handle_end kernel/softirq.c:399 [inline] softirqs last enabled at (116054): [] __do_softirq+0xac0/0xd54 kernel/softirq.c:582 softirqs last disabled at (116059): [] ____do_softirq+0x14/0x20 arch/arm64/kernel/irq.c:80 CPU: 1 PID: 5570 Comm: kworker/1:3 Not tainted 6.5.0-rc7-syzkaller-gfe4469582053 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023 Workqueue: rcu_gp wait_rcu_exp_gp pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : preempt_count arch/arm64/include/asm/preempt.h:13 [inline] pc : check_kcov_mode kernel/kcov.c:173 [inline] pc : write_comp_data kernel/kcov.c:236 [inline] pc : __sanitizer_cov_trace_cmp4+0x14/0x98 kernel/kcov.c:278 lr : taprio_dequeue_tc_priority+0x210/0x64c net/sched/sch_taprio.c:803 sp : ffff800080017c40 x29: ffff800080017ca0 x28: 0000000000000001 x27: 0000000000000000 x26: ffff0000cb408b6e x25: ffff0000cb408b70 x24: ffff0000d9696394 x23: ffff0000cb408448 x22: 0000000000000008 x21: 1fffe0001b2d2c72 x20: 0000000000000010 x19: dfff800000000000 x18: 1fffe0003683f1c6 x17: ffff80012620c000 x16: ffff800080516e6c x15: 0000000000000102 x14: ffff80008e0a05e8 x13: dfff800000000000 x12: 000000007e7cdaf7 x11: 0000000000000102 x10: 0000000000000100 x9 : 0000000000000102 x8 : ffff0000d5533780 x7 : ffff800088a8f76c x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000008a27 x2 : ffff0000d3aa1c00 x1 : 0000000000000010 x0 : 0000000000000008 Call trace: preempt_count arch/arm64/include/asm/preempt.h:13 [inline] check_kcov_mode kernel/kcov.c:173 [inline] write_comp_data kernel/kcov.c:236 [inline] __sanitizer_cov_trace_cmp4+0x14/0x98 kernel/kcov.c:278 taprio_dequeue+0x174/0x508 dequeue_skb net/sched/sch_generic.c:292 [inline] qdisc_restart net/sched/sch_generic.c:397 [inline] __qdisc_run+0x1fc/0x2358 net/sched/sch_generic.c:415 qdisc_run+0xc4/0x23c include/net/pkt_sched.h:125 net_tx_action+0x6f8/0x8ac net/core/dev.c:5049 __do_softirq+0x2d0/0xd54 kernel/softirq.c:553 ____do_softirq+0x14/0x20 arch/arm64/kernel/irq.c:80 call_on_irq_stack+0x24/0x4c arch/arm64/kernel/entry.S:882 do_softirq_own_stack+0x20/0x2c arch/arm64/kernel/irq.c:85 invoke_softirq kernel/softirq.c:434 [inline] __irq_exit_rcu+0x200/0x494 kernel/softirq.c:632 irq_exit_rcu+0x14/0x84 kernel/softirq.c:644 __el1_irq arch/arm64/kernel/entry-common.c:503 [inline] el1_interrupt+0x38/0x68 arch/arm64/kernel/entry-common.c:517 el1h_64_irq_handler+0x18/0x24 arch/arm64/kernel/entry-common.c:522 el1h_64_irq+0x64/0x68 arch/arm64/kernel/entry.S:587 __daif_local_irq_enable arch/arm64/include/asm/irqflags.h:33 [inline] arch_local_irq_enable arch/arm64/include/asm/irqflags.h:55 [inline] __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:159 [inline] _raw_spin_unlock_irq+0x34/0x80 kernel/locking/spinlock.c:202 process_one_work+0x6b4/0x1480 kernel/workqueue.c:2572 worker_thread+0x8e0/0xfe8 kernel/workqueue.c:2751 kthread+0x288/0x310 kernel/kthread.c:389 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:853