watchdog: BUG: soft lockup - CPU#1 stuck for 23s! [kworker/u8:9:4346]
Modules linked in:
irq event stamp: 2390488
hardirqs last  enabled at (2390487): [<ffff80008b7c5e8c>] __exit_to_kernel_mode arch/arm64/kernel/entry-common.c:85 [inline]
hardirqs last  enabled at (2390487): [<ffff80008b7c5e8c>] exit_to_kernel_mode+0xdc/0x10c arch/arm64/kernel/entry-common.c:95
hardirqs last disabled at (2390488): [<ffff80008b7c3904>] __el1_irq arch/arm64/kernel/entry-common.c:557 [inline]
hardirqs last disabled at (2390488): [<ffff80008b7c3904>] el1_interrupt+0x24/0x68 arch/arm64/kernel/entry-common.c:575
softirqs last  enabled at (2390478): [<ffff800080311b48>] softirq_handle_end kernel/softirq.c:407 [inline]
softirqs last  enabled at (2390478): [<ffff800080311b48>] handle_softirqs+0xb44/0xd34 kernel/softirq.c:589
softirqs last disabled at (2390361): [<ffff800080020dbc>] __do_softirq+0x14/0x20 kernel/softirq.c:595
CPU: 1 UID: 0 PID: 4346 Comm: kworker/u8:9 Not tainted 6.14.0-rc4-syzkaller-ge056da87c780 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024
Workqueue: events_unbound toggle_allocation_gate
pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : csd_lock_wait kernel/smp.c:340 [inline]
pc : smp_call_function_many_cond+0x19b4/0x3298 kernel/smp.c:885
lr : csd_lock_wait kernel/smp.c:340 [inline]
lr : smp_call_function_many_cond+0x19cc/0x3298 kernel/smp.c:885
sp : ffff8000a1ee76f0
x29: ffff8000a1ee7830 x28: 1fffe000366f8d21 x27: dfff800000000000
x26: ffff0001b37a8d08 x25: 0000000000000000 x24: 0000000000000008
x23: ffffffffffffffff x22: 1fffe000366f8d20 x21: 0000000000000011
x20: ffff0001b37c6908 x19: ffff0001b37c6900 x18: 1fffe000366f6086
x17: ffff80008fbbd000 x16: ffff8000832b5180 x15: 0000000000000001
x14: 1fffe000366f51a1 x13: 0000000000000000 x12: 0000000000000000
x11: ffff6000366f51a2 x10: 0000000000ff0100 x9 : 0000000000000000
x8 : 0000000000000011 x7 : ffff80008015b660 x6 : 0000000000000000
x5 : 0000000000000001 x4 : 0000000000000000 x3 : ffff8000805edea8
x2 : 0000000000000000 x1 : 0000000000000004 x0 : 0000000000000001
Call trace:
 __cmpwait_case_32 arch/arm64/include/asm/cmpxchg.h:231 [inline] (P)
 __cmpwait arch/arm64/include/asm/cmpxchg.h:257 [inline] (P)
 csd_lock_wait kernel/smp.c:340 [inline] (P)
 smp_call_function_many_cond+0x19b4/0x3298 kernel/smp.c:885 (P)
 smp_call_function_many kernel/smp.c:909 [inline]
 smp_call_function kernel/smp.c:931 [inline]
 kick_all_cpus_sync+0x40/0xa0 kernel/smp.c:1076
 arch_jump_label_transform_apply+0x14/0x20 arch/arm64/kernel/jump_label.c:34
 __jump_label_update+0x30c/0x334 kernel/jump_label.c:521
 jump_label_update+0x30c/0x3bc kernel/jump_label.c:920
 static_key_enable_cpuslocked+0x140/0x230 kernel/jump_label.c:210
 static_key_enable+0x24/0x38 kernel/jump_label.c:223
 toggle_allocation_gate+0xc4/0x264 mm/kfence/core.c:850
 process_one_work+0x810/0x1638 kernel/workqueue.c:3236
 process_scheduled_works kernel/workqueue.c:3317 [inline]
 worker_thread+0x97c/0xeec kernel/workqueue.c:3398
 kthread+0x65c/0x7b0 kernel/kthread.c:464
 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:862