watchdog: BUG: soft lockup - CPU#0 stuck for 23s! [aoe_tx0:2471] Modules linked in: irq event stamp: 69977215 hardirqs last enabled at (69977214): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:151 [inline] hardirqs last enabled at (69977214): [] _raw_spin_unlock_irqrestore+0x38/0x98 kernel/locking/spinlock.c:194 hardirqs last disabled at (69977215): [] enter_from_kernel_mode+0x14/0x34 arch/arm64/kernel/entry-common.c:42 softirqs last enabled at (1192): [] local_bh_enable+0x10/0x34 include/linux/bottom_half.h:32 softirqs last disabled at (1196): [] local_bh_disable+0x10/0x34 include/linux/bottom_half.h:19 CPU: 0 UID: 0 PID: 2471 Comm: aoe_tx0 Tainted: G L syzkaller #0 PREEMPT Tainted: [L]=SOFTLOCKUP Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/03/2025 pstate: 83400005 (Nzcv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--) pc : __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:152 [inline] pc : _raw_spin_unlock_irqrestore+0x44/0x98 kernel/locking/spinlock.c:194 lr : __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:151 [inline] lr : _raw_spin_unlock_irqrestore+0x38/0x98 kernel/locking/spinlock.c:194 sp : ffff8000a26e7700 x29: ffff8000a26e7700 x28: ffff0001059bd7f0 x27: 0000000000000000 x26: ffff0001059bd780 x25: ffff0000cedbe238 x24: dfff800000000000 x23: 0000000000000003 x22: 0000000000000000 x21: ffff8000914d0520 x20: ffff80009794d920 x19: 0000000000000000 x18: 1fffe0003377d090 x17: ffff800093599000 x16: ffff800080538fe4 x15: 0000000000000001 x14: 1ffff00012f29b24 x13: 0000000000000000 x12: 0000000000000000 x11: ffff800093398d48 x10: 0000000000000003 x9 : 0000000000000000 x8 : 00000000000000c0 x7 : ffff800083bc4030 x6 : 0000000000000000 x5 : 0000000000000001 x4 : 0000000000000001 x3 : 0000000000000010 x2 : 0000000000000002 x1 : ffff80008ee5c0d2 x0 : ffff80010c42d000 Call trace: __daif_local_irq_restore arch/arm64/include/asm/irqflags.h:175 [inline] (P) arch_local_irq_restore arch/arm64/include/asm/irqflags.h:195 [inline] (P) __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:151 [inline] (P) _raw_spin_unlock_irqrestore+0x44/0x98 kernel/locking/spinlock.c:194 (P) spin_unlock_irqrestore include/linux/spinlock.h:406 [inline] uart_port_unlock_irqrestore include/linux/serial_core.h:788 [inline] uart_port_unlock_deref+0x108/0x2ec drivers/tty/serial/serial_core.c:91 uart_write_room+0xa4/0x15c drivers/tty/serial/serial_core.c:647 tty_write_room+0x6c/0x8c drivers/tty/tty_ioctl.c:69 handle_tx+0x128/0x5fc drivers/net/caif/caif_serial.c:212 caif_xmit+0x108/0x150 drivers/net/caif/caif_serial.c:268 __netdev_start_xmit include/linux/netdevice.h:5273 [inline] netdev_start_xmit include/linux/netdevice.h:5282 [inline] xmit_one net/core/dev.c:3853 [inline] dev_hard_start_xmit+0x298/0x890 net/core/dev.c:3869 __dev_queue_xmit+0x1070/0x2a78 net/core/dev.c:4819 dev_queue_xmit include/linux/netdevice.h:3381 [inline] tx+0x9c/0x1cc drivers/block/aoe/aoenet.c:62 kthread+0x164/0x354 drivers/block/aoe/aoecmd.c:1241 kthread+0x5fc/0x75c kernel/kthread.c:463 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:844 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 7792 Comm: syz-executor Tainted: G L syzkaller #0 PREEMPT Tainted: [L]=SOFTLOCKUP Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/03/2025 pstate: 23400005 (nzCv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--) pc : memory_is_poisoned_n mm/kasan/generic.c:141 [inline] pc : memory_is_poisoned mm/kasan/generic.c:172 [inline] pc : check_region_inline mm/kasan/generic.c:191 [inline] pc : kasan_check_range+0x3c/0x2a4 mm/kasan/generic.c:200 lr : __kasan_check_write+0x20/0x30 mm/kasan/shadow.c:37 sp : ffff8000a5947140 x29: ffff8000a5947140 x28: 1fffffbff88410b3 x27: fffffdffc4208598 x26: ffff0000f4a74500 x25: 0000000000000001 x24: fffffdffc42085b0 x23: dfff800000000000 x22: fffffdffc4208588 x21: 0000000000000000 x20: 05ffc00000000004 x19: fffffdffc4208580 x18: 00000000ffffffff x17: ffff0001fea8d870 x16: ffff800082e5ee8c x15: 0000000000000001 x14: 1fffffbff88410b0 x13: 0000000000000000 x12: 0000000000000000 x11: ffff7fbff88410b1 x10: fffffffffffffff8 x9 : ffff000000000000 x8 : fffffdffc42085b4 x7 : ffff800080d58d78 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff800080b975cc x2 : 0000000000000001 x1 : 0000000000000004 x0 : fffffdffc42085b0 Call trace: check_region_inline mm/kasan/generic.c:188 [inline] (P) kasan_check_range+0x3c/0x2a4 mm/kasan/generic.c:200 (P) __kasan_check_write+0x20/0x30 mm/kasan/shadow.c:37 instrument_atomic_read_write include/linux/instrumented.h:96 [inline] atomic_add_negative include/linux/atomic/atomic-instrumented.h:1420 [inline] __folio_remove_rmap mm/rmap.c:1668 [inline] folio_remove_rmap_ptes+0x290/0xce0 mm/rmap.c:1779 zap_present_folio_ptes mm/memory.c:1650 [inline] zap_present_ptes mm/memory.c:1708 [inline] do_zap_pte_range mm/memory.c:1810 [inline] zap_pte_range mm/memory.c:1854 [inline] zap_pmd_range mm/memory.c:1946 [inline] zap_pud_range mm/memory.c:1975 [inline] zap_p4d_range mm/memory.c:1996 [inline] unmap_page_range+0x12f8/0x30f8 mm/memory.c:2017 unmap_single_vma mm/memory.c:2059 [inline] unmap_vmas+0x264/0x3d4 mm/memory.c:2101 exit_mmap+0x1b0/0xaac mm/mmap.c:1277 __mmput+0xec/0x3fc kernel/fork.c:1173 mmput+0x70/0xac kernel/fork.c:1196 exit_mm+0x13c/0x200 kernel/exit.c:581 do_exit+0x4c4/0x1a1c kernel/exit.c:959 do_group_exit+0x194/0x22c kernel/exit.c:1112 get_signal+0x11dc/0x12f8 kernel/signal.c:3034 arch_do_signal_or_restart+0x268/0x46d4 arch/arm64/kernel/signal.c:1619 __exit_to_user_mode_loop kernel/entry/common.c:41 [inline] exit_to_user_mode_loop+0x88/0x18c kernel/entry/common.c:75 __exit_to_user_mode_prepare include/linux/irq-entry-common.h:226 [inline] exit_to_user_mode_prepare_legacy include/linux/irq-entry-common.h:242 [inline] arm64_exit_to_user_mode arch/arm64/kernel/entry-common.c:81 [inline] el0_svc+0x17c/0x26c arch/arm64/kernel/entry-common.c:725 el0t_64_sync_handler+0x84/0x12c arch/arm64/kernel/entry-common.c:743 el0t_64_sync+0x198/0x19c arch/arm64/kernel/entry.S:596