watchdog: BUG: soft lockup - CPU#0 stuck for 23s! [kworker/u4:3:55]
Modules linked in:
irq event stamp: 1239132
hardirqs last  enabled at (1239131): [<ffff80001232f4d8>] __exit_to_kernel_mode arch/arm64/kernel/entry-common.c:84 [inline]
hardirqs last  enabled at (1239131): [<ffff80001232f4d8>] exit_to_kernel_mode+0xe8/0x118 arch/arm64/kernel/entry-common.c:94
hardirqs last disabled at (1239132): [<ffff80001232d1b4>] __el1_irq arch/arm64/kernel/entry-common.c:468 [inline]
hardirqs last disabled at (1239132): [<ffff80001232d1b4>] el1_interrupt+0x24/0x68 arch/arm64/kernel/entry-common.c:486
softirqs last  enabled at (1234712): [<ffff8000081c2418>] softirq_handle_end kernel/softirq.c:421 [inline]
softirqs last  enabled at (1234712): [<ffff8000081c2418>] handle_softirqs+0xb84/0xd58 kernel/softirq.c:606
softirqs last disabled at (1234649): [<ffff800008020174>] __do_softirq+0x14/0x20 kernel/softirq.c:612
CPU: 0 PID: 55 Comm: kworker/u4:3 Not tainted 6.1.128-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024
Workqueue: events_unbound toggle_allocation_gate
pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : csd_lock_wait kernel/smp.c:424 [inline]
pc : smp_call_function_many_cond+0x20f8/0x32b8 kernel/smp.c:998
lr : csd_lock_wait kernel/smp.c:424 [inline]
lr : smp_call_function_many_cond+0x2110/0x32b8 kernel/smp.c:998
sp : ffff80001d807520
x29: ffff80001d807890 x28: 1fffe0003679e830 x27: ffff800015a91148
x26: ffff80001d807688 x25: ffff0001b3d187c8 x24: 0000000000000001
x23: dfff800000000000 x22: ffff0001b3cf4188 x21: 0000000000000011
x20: ffff80001d807680 x19: ffff0001b3cf4180 x18: 1fffe0003679bf76
x17: ffff80019e2fc000 x16: ffff8000123313e4 x15: 0000000000000000
x14: 1ffff00002b520b2 x13: dfff800000000000 x12: 0000000000000001
x11: 0000000000ff0100 x10: 0000000000000000 x9 : 0000000000000000
x8 : 0000000000000011 x7 : 0000000000000000 x6 : 0000000000000000
x5 : 0000000000000080 x4 : 0000000000000000 x3 : ffff80000844af80
x2 : 0000000000000000 x1 : 0000000000000004 x0 : 0000000000000001
Call trace:
 __cmpwait_case_32 arch/arm64/include/asm/cmpxchg.h:252 [inline]
 __cmpwait arch/arm64/include/asm/cmpxchg.h:278 [inline]
 csd_lock_wait kernel/smp.c:424 [inline]
 smp_call_function_many_cond+0x20f8/0x32b8 kernel/smp.c:998
 smp_call_function_many kernel/smp.c:1022 [inline]
 smp_call_function kernel/smp.c:1044 [inline]
 kick_all_cpus_sync+0x40/0xa0 kernel/smp.c:1190
 arch_jump_label_transform_apply+0x14/0x20 arch/arm64/kernel/jump_label.c:34
 __jump_label_update+0x30c/0x334 kernel/jump_label.c:518
 jump_label_update+0x30c/0x3bc kernel/jump_label.c:864
 static_key_enable_cpuslocked+0x140/0x230 kernel/jump_label.c:207
 static_key_enable+0x24/0x38 kernel/jump_label.c:220
 toggle_allocation_gate+0xcc/0x448 mm/kfence/core.c:804
 process_one_work+0x7ac/0x1404 kernel/workqueue.c:2292
 worker_thread+0x8e4/0xfec kernel/workqueue.c:2439
 kthread+0x250/0x2d8 kernel/kthread.c:376
 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:864