watchdog: BUG: soft lockup - CPU#1 stuck for 22s! [syz.7.813:10690] Modules linked in: irq event stamp: 72878 hardirqs last enabled at (72877): [] __exit_to_kernel_mode arch/arm64/kernel/entry-common.c:85 [inline] hardirqs last enabled at (72877): [] exit_to_kernel_mode+0xdc/0x10c arch/arm64/kernel/entry-common.c:95 hardirqs last disabled at (72878): [] __el1_irq arch/arm64/kernel/entry-common.c:557 [inline] hardirqs last disabled at (72878): [] el1_interrupt+0x24/0x68 arch/arm64/kernel/entry-common.c:575 softirqs last enabled at (72876): [] softirq_handle_end kernel/softirq.c:407 [inline] softirqs last enabled at (72876): [] handle_softirqs+0xb44/0xd34 kernel/softirq.c:589 softirqs last disabled at (72765): [] __do_softirq+0x14/0x20 kernel/softirq.c:595 CPU: 1 UID: 0 PID: 10690 Comm: syz.7.813 Not tainted 6.14.0-rc7-syzkaller-ga2392f333575 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : csd_lock_wait kernel/smp.c:340 [inline] pc : smp_call_function_many_cond+0x19b4/0x3298 kernel/smp.c:885 lr : csd_lock_wait kernel/smp.c:340 [inline] lr : smp_call_function_many_cond+0x19cc/0x3298 kernel/smp.c:885 sp : ffff80009bdc74f0 x29: ffff80009bdc7630 x28: 1fffe000366f8d21 x27: dfff800000000000 x26: ffff0001b37a8d08 x25: 0000000000000000 x24: 0000000000000008 x23: ffffffffffffffff x22: 1fffe000366f8d20 x21: 0000000000000011 x20: ffff0001b37c6908 x19: ffff0001b37c6900 x18: ffff80009d38d079 x17: 00000000000000ac x16: ffff8000832b7b9c x15: 0000000000000001 x14: 1fffe000366f51a1 x13: 0000000000000000 x12: 0000000000000000 x11: 0000000000080000 x10: 000000000007ffff x9 : 0000000000000000 x8 : 0000000000000011 x7 : ffff80008015bafc x6 : 0000000000000000 x5 : 0000000000000001 x4 : 0000000000000000 x3 : ffff8000805f0650 x2 : 0000000000000000 x1 : 0000000000000004 x0 : 0000000000000001 Call trace: __cmpwait_case_32 arch/arm64/include/asm/cmpxchg.h:231 [inline] (P) __cmpwait arch/arm64/include/asm/cmpxchg.h:257 [inline] (P) csd_lock_wait kernel/smp.c:340 [inline] (P) smp_call_function_many_cond+0x19b4/0x3298 kernel/smp.c:885 (P) smp_call_function_many kernel/smp.c:909 [inline] smp_call_function kernel/smp.c:931 [inline] kick_all_cpus_sync+0x40/0xa0 kernel/smp.c:1076 flush_icache_range arch/arm64/include/asm/cacheflush.h:103 [inline] __text_poke+0xd4/0xf4 arch/arm64/kernel/patching.c:130 aarch64_insn_copy+0x3c/0x50 arch/arm64/kernel/patching.c:161 bpf_arch_text_copy+0x34/0x54 arch/arm64/net/bpf_jit_comp.c:1969 bpf_jit_binary_pack_finalize+0x54/0xf0 kernel/bpf/core.c:1186 bpf_int_jit_compile+0xe20/0x16fc arch/arm64/net/bpf_jit_comp.c:1912 bpf_prog_select_runtime+0x3c4/0x694 kernel/bpf/core.c:2428 bpf_migrate_filter net/core/filter.c:1307 [inline] bpf_prepare_filter+0xdf0/0x1068 net/core/filter.c:1355 bpf_prog_create_from_user+0x328/0x47c net/core/filter.c:1449 seccomp_prepare_filter kernel/seccomp.c:693 [inline] seccomp_prepare_user_filter kernel/seccomp.c:730 [inline] seccomp_set_mode_filter kernel/seccomp.c:1965 [inline] do_seccomp+0xa1c/0x10c0 kernel/seccomp.c:2085 __do_sys_seccomp kernel/seccomp.c:2104 [inline] __se_sys_seccomp kernel/seccomp.c:2101 [inline] __arm64_sys_seccomp+0x7c/0x90 kernel/seccomp.c:2101 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:744 el0t_64_sync_handler+0x84/0x108 arch/arm64/kernel/entry-common.c:762 el0t_64_sync+0x198/0x19c arch/arm64/kernel/entry.S:600 Sending NMI from CPU 1 to CPUs 0: