watchdog: BUG: soft lockup - CPU#0 stuck for 22s! [kworker/0:3:3605] Modules linked in: irq event stamp: 88546 hardirqs last enabled at (88545): [] __exit_to_kernel_mode arch/arm64/kernel/entry-common.c:81 [inline] hardirqs last enabled at (88545): [] exit_to_kernel_mode+0x100/0x178 arch/arm64/kernel/entry-common.c:91 hardirqs last disabled at (88546): [] enter_el1_irq_or_nmi+0x10/0x1c arch/arm64/kernel/entry-common.c:227 softirqs last enabled at (84304): [] softirq_handle_end kernel/softirq.c:401 [inline] softirqs last enabled at (84304): [] handle_softirqs+0xb88/0xdbc kernel/softirq.c:586 softirqs last disabled at (84283): [] __do_softirq kernel/softirq.c:592 [inline] softirqs last disabled at (84283): [] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] softirqs last disabled at (84283): [] invoke_softirq kernel/softirq.c:439 [inline] softirqs last disabled at (84283): [] __irq_exit_rcu+0x268/0x4d8 kernel/softirq.c:641 CPU: 0 PID: 3605 Comm: kworker/0:3 Not tainted 5.15.167-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 Workqueue: events bpf_map_free_deferred pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : csd_lock_wait kernel/smp.c:440 [inline] pc : smp_call_function_single+0x268/0x4f8 kernel/smp.c:758 lr : csd_lock_wait kernel/smp.c:440 [inline] lr : smp_call_function_single+0x280/0x4f8 kernel/smp.c:758 sp : ffff800022bc7900 x29: ffff800022bc79b0 x28: 1fffe0001a90c369 x27: dfff800000000000 x26: ffff700004578f24 x25: ffff800022bc7958 x24: ffff800022bc7948 x23: ffff800022bc7940 x22: ffff0000d4861b48 x21: 0000000000000011 x20: ffff800022bc7948 x19: 0000000000000000 x18: ffff800022bc7700 x17: 1fffff7ffdfd75b6 x16: ffff800011ac23e0 x15: 0000000000023ddd x14: ffff80001713e500 x13: 0000000000000000 x12: 0000000000000001 x11: 0000000000000001 x10: 0000000000000000 x9 : 0000000000000000 x8 : 0000000000000011 x7 : 0000000000000011 x6 : 0000000000000000 x5 : ffff800022bc7960 x4 : ffff8000141cf6e0 x3 : ffff80000840eb14 x2 : 0000000000000000 x1 : 0000000000000004 x0 : 0000000000000001 Call trace: __cmpwait_case_32 arch/arm64/include/asm/cmpxchg.h:252 [inline] __cmpwait arch/arm64/include/asm/cmpxchg.h:278 [inline] csd_lock_wait kernel/smp.c:440 [inline] smp_call_function_single+0x268/0x4f8 kernel/smp.c:758 rcu_barrier+0x210/0x4b0 kernel/rcu/tree.c:4078 htab_map_free+0x38/0x518 kernel/bpf/hashtab.c:1470 bpf_map_free_deferred+0x2cc/0x430 kernel/bpf/syscall.c:479 process_one_work+0x790/0x11b8 kernel/workqueue.c:2310 worker_thread+0x910/0x1034 kernel/workqueue.c:2457 kthread+0x37c/0x45c kernel/kthread.c:334 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:870