watchdog: BUG: soft lockup - CPU#0 stuck for 22s! [syz-executor:5612] Modules linked in: irq event stamp: 248814 hardirqs last enabled at (248813): [] put_cpu_partial+0x188/0x218 mm/slub.c:2584 hardirqs last disabled at (248814): [] enter_el1_irq_or_nmi+0x10/0x1c arch/arm64/kernel/entry-common.c:227 softirqs last enabled at (248328): [] softirq_handle_end kernel/softirq.c:401 [inline] softirqs last enabled at (248328): [] handle_softirqs+0xb88/0xdbc kernel/softirq.c:586 softirqs last disabled at (248185): [] __do_softirq kernel/softirq.c:592 [inline] softirqs last disabled at (248185): [] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] softirqs last disabled at (248185): [] invoke_softirq kernel/softirq.c:439 [inline] softirqs last disabled at (248185): [] __irq_exit_rcu+0x268/0x4d8 kernel/softirq.c:641 CPU: 0 PID: 5612 Comm: syz-executor Not tainted 5.15.167-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : put_cpu_partial+0x198/0x218 mm/slub.c:2586 lr : put_cpu_partial+0x188/0x218 mm/slub.c:2584 sp : ffff800020d775a0 x29: ffff800020d775a0 x28: 00000000800c000b x27: 00000000000c000c x26: 0000000000000000 x25: fffffc0003ba6600 x24: ffff800014a2bdf0 x23: ffff800014ac0ff8 x22: 0000000000000000 x21: 0000000000000000 x20: 0000000000000000 x19: ffff0000c0848480 x18: ffff800020d777e8 x17: 0000000000000000 x16: ffff8000082ec9a8 x15: 0000000000000000 x14: 1ffff0000295806a x13: dfff800000000000 x12: 0000000000000003 x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000080 x8 : 00000000000000c0 x7 : 0000000000000000 x6 : 0000000000000000 x5 : 0000000000000080 x4 : 0000000000000000 x3 : ffff80000804605c x2 : 0000000000000001 x1 : ffff800011c1ad00 x0 : ffff80019f77b000 Call trace: arch_local_irq_restore arch/arm64/include/asm/irqflags.h:122 [inline] put_cpu_partial+0x198/0x218 mm/slub.c:2584 __slab_free+0x178/0x248 mm/slub.c:3368 do_slab_free mm/slub.c:3487 [inline] ___cache_free+0x170/0x1b8 mm/slub.c:3506 qlink_free+0x5c/0xac mm/kasan/quarantine.c:157 qlist_free_all+0x40/0xa8 mm/kasan/quarantine.c:176 kasan_quarantine_reduce+0x124/0x130 mm/kasan/quarantine.c:283 __kasan_slab_alloc+0x34/0xcc mm/kasan/common.c:444 kasan_slab_alloc include/linux/kasan.h:254 [inline] slab_post_alloc_hook+0x74/0x3f4 mm/slab.h:519 slab_alloc_node mm/slub.c:3220 [inline] slab_alloc mm/slub.c:3228 [inline] kmem_cache_alloc+0x1dc/0x45c mm/slub.c:3233 __d_alloc+0x3c/0x6a8 fs/dcache.c:1749 d_alloc_pseudo+0x28/0x8c fs/dcache.c:1878 alloc_file_pseudo+0x110/0x278 fs/file_table.c:225 sock_alloc_file+0xb8/0x230 net/socket.c:462 sock_map_fd net/socket.c:486 [inline] __sys_socket+0x1c4/0x310 net/socket.c:1583 __do_sys_socket net/socket.c:1588 [inline] __se_sys_socket net/socket.c:1586 [inline] __arm64_sys_socket+0x7c/0x94 net/socket.c:1586 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:52 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x58/0x14c arch/arm64/kernel/syscall.c:181 el0_svc+0x7c/0x1f0 arch/arm64/kernel/entry-common.c:608 el0t_64_sync_handler+0x84/0xe4 arch/arm64/kernel/entry-common.c:626 el0t_64_sync+0x1a0/0x1a4 arch/arm64/kernel/entry.S:584