watchdog: BUG: soft lockup - CPU#0 stuck for 22s! [syz-executor:5394]
Modules linked in:
irq event stamp: 493394
hardirqs last  enabled at (493393): [<ffff800011b4d490>] __exit_to_kernel_mode arch/arm64/kernel/entry-common.c:81 [inline]
hardirqs last  enabled at (493393): [<ffff800011b4d490>] exit_to_kernel_mode+0x100/0x178 arch/arm64/kernel/entry-common.c:91
hardirqs last disabled at (493394): [<ffff800011b4d6d8>] enter_el1_irq_or_nmi+0x10/0x1c arch/arm64/kernel/entry-common.c:227
softirqs last  enabled at (488662): [<ffff8000081b6920>] softirq_handle_end kernel/softirq.c:401 [inline]
softirqs last  enabled at (488662): [<ffff8000081b6920>] handle_softirqs+0xb88/0xdbc kernel/softirq.c:586
softirqs last disabled at (488625): [<ffff8000081b6fb8>] __do_softirq kernel/softirq.c:592 [inline]
softirqs last disabled at (488625): [<ffff8000081b6fb8>] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline]
softirqs last disabled at (488625): [<ffff8000081b6fb8>] invoke_softirq kernel/softirq.c:439 [inline]
softirqs last disabled at (488625): [<ffff8000081b6fb8>] __irq_exit_rcu+0x268/0x4d8 kernel/softirq.c:641
CPU: 0 PID: 5394 Comm: syz-executor Not tainted 5.15.177-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024
pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : csd_lock_wait kernel/smp.c:440 [inline]
pc : smp_call_function_many_cond+0xa38/0x1044 kernel/smp.c:969
lr : csd_lock_wait kernel/smp.c:440 [inline]
lr : smp_call_function_many_cond+0xa50/0x1044 kernel/smp.c:969
sp : ffff800020d37620
x29: ffff800020d37670 x28: 0000000000000001 x27: dfff800000000000
x26: 0000000000000011 x25: ffff0001b4189940 x24: ffff800014b71008
x23: 1fffe00036831328 x22: ffff0001b41af0c8 x21: ffff800014d5e640
x20: 0000000000000001 x19: ffff0001b4189948 x18: 0000000000000000
x17: 0000000000000000 x16: ffff8000082ec940 x15: 0000000000000406
x14: ffff0000ce600000 x13: 0000000000ff0100 x12: 0000000000000001
x11: 0000000000000001 x10: 0000000000000000 x9 : 0000000000000000
x8 : 0000000000000011 x7 : 0000000000000000 x6 : 0000000000000000
x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80000840f128
x2 : 0000000000000000 x1 : 0000000000000004 x0 : 0000000000000001
Call trace:
 __cmpwait_case_32 arch/arm64/include/asm/cmpxchg.h:252 [inline]
 __cmpwait arch/arm64/include/asm/cmpxchg.h:278 [inline]
 csd_lock_wait kernel/smp.c:440 [inline]
 smp_call_function_many_cond+0xa38/0x1044 kernel/smp.c:969
 on_each_cpu_cond_mask+0x5c/0xc4 kernel/smp.c:1135
 on_each_cpu_cond include/linux/smp.h:105 [inline]
 invalidate_bh_lrus+0x34/0x40 fs/buffer.c:1426
 kill_bdev block/bdev.c:76 [inline]
 blkdev_flush_mapping+0x164/0x324 block/bdev.c:659
 blkdev_put_whole block/bdev.c:690 [inline]
 blkdev_put+0x498/0x6b0 block/bdev.c:954
 kill_block_super+0x98/0xdc fs/super.c:1430
 kill_f2fs_super+0x268/0x338 fs/f2fs/super.c:4538
 deactivate_locked_super+0xb8/0x13c fs/super.c:335
 deactivate_super+0x108/0x128 fs/super.c:366
 cleanup_mnt+0x3c0/0x474 fs/namespace.c:1143
 __cleanup_mnt+0x20/0x30 fs/namespace.c:1150
 task_work_run+0x130/0x1e4 kernel/task_work.c:188
 tracehook_notify_resume include/linux/tracehook.h:189 [inline]
 do_notify_resume+0x262c/0x32b8 arch/arm64/kernel/signal.c:946
 prepare_exit_to_user_mode arch/arm64/kernel/entry-common.c:133 [inline]
 exit_to_user_mode arch/arm64/kernel/entry-common.c:138 [inline]
 el0_svc+0xfc/0x1f0 arch/arm64/kernel/entry-common.c:609
 el0t_64_sync_handler+0x84/0xe4 arch/arm64/kernel/entry-common.c:626
 el0t_64_sync+0x1a0/0x1a4 arch/arm64/kernel/entry.S:584