watchdog: BUG: soft lockup - CPU#0 stuck for 24s! [udevd:4759] Modules linked in: irq event stamp: 73202 hardirqs last enabled at (73201): [] seqcount_lockdep_reader_access+0x1f4/0x2bc include/linux/seqlock.h:105 hardirqs last disabled at (73202): [] enter_el1_irq_or_nmi+0x10/0x1c arch/arm64/kernel/entry-common.c:227 softirqs last enabled at (72600): [] local_bh_enable+0x10/0x34 include/linux/bottom_half.h:31 softirqs last disabled at (72598): [] local_bh_disable+0x10/0x34 include/linux/bottom_half.h:18 CPU: 0 PID: 4759 Comm: udevd Not tainted 5.15.189-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : tomoyo_encode2 security/tomoyo/realpath.c:51 [inline] pc : tomoyo_encode+0x2b0/0x4a4 security/tomoyo/realpath.c:80 lr : tomoyo_encode2 security/tomoyo/realpath.c:50 [inline] lr : tomoyo_encode+0x39c/0x4a4 security/tomoyo/realpath.c:80 sp : ffff80001f6d7350 x29: ffff80001f6d7370 x28: 1fffe0001da52520 x27: 000000000000005c x26: dfff800000000000 x25: 000000000000001b x24: ffff0000ed292905 x23: 000000000000002f x22: ffff0000ed292905 x21: ffff0000ed292900 x20: ffff0000e8b8cfe2 x19: ffff0000e8b8cfe2 x18: 0000000000000000 x17: 0000000000000000 x16: ffff8000111bc798 x15: 000000000000000b x14: 00000000111b85b8 x13: 000000008436ce69 x12: 0000000000ff0100 x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000002 x8 : 0000000000000000 x7 : 0000000000000000 x6 : 000000000000003f x5 : 0000000000000040 x4 : 0000000000000000 x3 : 0000000000000010 x2 : 0000000000000d40 x1 : 000000000000000e x0 : 000000000000005e Call trace: tomoyo_encode2 security/tomoyo/realpath.c:51 [inline] tomoyo_encode+0x2b0/0x4a4 security/tomoyo/realpath.c:80 tomoyo_realpath_from_path+0x4bc/0x510 security/tomoyo/realpath.c:288 tomoyo_get_realpath security/tomoyo/file.c:151 [inline] tomoyo_check_open_permission+0x168/0x2fc security/tomoyo/file.c:771 tomoyo_file_open+0x130/0x1b0 security/tomoyo/tomoyo.c:311 security_file_open+0x6c/0xac security/security.c:1668 do_dentry_open+0x29c/0xebc fs/open.c:813 vfs_open+0x7c/0x90 fs/open.c:956 do_open fs/namei.c:3608 [inline] path_openat+0x1f80/0x26e4 fs/namei.c:3742 do_filp_open+0x164/0x330 fs/namei.c:3769 do_sys_openat2+0x128/0x3d8 fs/open.c:1253 do_sys_open fs/open.c:1269 [inline] __do_sys_openat fs/open.c:1285 [inline] __se_sys_openat fs/open.c:1280 [inline] __arm64_sys_openat+0x120/0x154 fs/open.c:1280 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:52 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x58/0x14c arch/arm64/kernel/syscall.c:181 el0_svc+0x78/0x1e0 arch/arm64/kernel/entry-common.c:608 el0t_64_sync_handler+0xcc/0xe4 arch/arm64/kernel/entry-common.c:626 el0t_64_sync+0x1a0/0x1a4 arch/arm64/kernel/entry.S:584