watchdog: BUG: soft lockup - CPU#0 stuck for 78s! [dhcpcd-run-hook:8831] Modules linked in: irq event stamp: 910 hardirqs last enabled at (909): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:151 [inline] hardirqs last enabled at (909): [] _raw_spin_unlock_irqrestore+0x38/0x98 kernel/locking/spinlock.c:194 hardirqs last disabled at (910): [] enter_from_kernel_mode+0x14/0x34 arch/arm64/kernel/entry-common.c:42 softirqs last enabled at (196): [] local_bh_enable+0x10/0x34 include/linux/bottom_half.h:32 softirqs last disabled at (194): [] local_bh_disable+0x10/0x34 include/linux/bottom_half.h:19 CPU: 0 UID: 0 PID: 8831 Comm: dhcpcd-run-hook Not tainted syzkaller #0 PREEMPT Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/03/2025 pstate: 83400005 (Nzcv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--) pc : __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:152 [inline] pc : _raw_spin_unlock_irqrestore+0x44/0x98 kernel/locking/spinlock.c:194 lr : __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:151 [inline] lr : _raw_spin_unlock_irqrestore+0x38/0x98 kernel/locking/spinlock.c:194 sp : ffff80009ee473e0 x29: ffff80009ee473e0 x28: ffff0000ef01b240 x27: dfff800000000000 x26: ffff8000978bf1d0 x25: 0000000000000001 x24: 0000000000000002 x23: 0000000000000000 x22: ffff0000ef01b000 x21: dfff800000000000 x20: ffff8000978bf1d8 x19: 0000000000000000 x18: 1fffe0003377d090 x17: ffff0001fea8d870 x16: ffff80008053826c x15: 0000000000000001 x14: 1ffff00012f17e3b x13: 0000000000000000 x12: 0000000000000000 x11: ffff800093397d48 x10: 0000000000000003 x9 : 0000000000000000 x8 : 00000000000000c0 x7 : ffff800082e5e8a4 x6 : 0000000000000000 x5 : 0000000000000001 x4 : 0000000000000001 x3 : 0000000000000010 x2 : 0000000000000006 x1 : ffff80008ee5b741 x0 : ffff80010c42d000 Call trace: __daif_local_irq_restore arch/arm64/include/asm/irqflags.h:175 [inline] (P) arch_local_irq_restore arch/arm64/include/asm/irqflags.h:195 [inline] (P) __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:151 [inline] (P) _raw_spin_unlock_irqrestore+0x44/0x98 kernel/locking/spinlock.c:194 (P) __debug_check_no_obj_freed lib/debugobjects.c:1108 [inline] debug_check_no_obj_freed+0x454/0x470 lib/debugobjects.c:1129 slab_free_hook mm/slub.c:2471 [inline] slab_free mm/slub.c:6668 [inline] kmem_cache_free+0x120/0x6e4 mm/slub.c:6779 vm_area_free+0x108/0x17c mm/vma_init.c:151 remove_vma+0x120/0x138 mm/vma.c:462 exit_mmap+0x408/0xaac mm/mmap.c:1302 __mmput+0xec/0x3fc kernel/fork.c:1173 mmput+0x70/0xac kernel/fork.c:1196 exec_mmap+0x32c/0x3f0 fs/exec.c:901 begin_new_exec+0x6b4/0x1368 fs/exec.c:1156 load_elf_binary+0x6d8/0x1de4 fs/binfmt_elf.c:1010 search_binary_handler fs/exec.c:1669 [inline] exec_binprm fs/exec.c:1701 [inline] bprm_execve+0x788/0x11c4 fs/exec.c:1753 do_execveat_common+0x6ac/0x834 fs/exec.c:1859 do_execve fs/exec.c:1933 [inline] __do_sys_execve fs/exec.c:2009 [inline] __se_sys_execve fs/exec.c:2004 [inline] __arm64_sys_execve+0x9c/0xb4 fs/exec.c:2004 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x254 arch/arm64/kernel/syscall.c:49 el0_svc_common+0xe8/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x5c/0x26c arch/arm64/kernel/entry-common.c:724 el0t_64_sync_handler+0x84/0x12c arch/arm64/kernel/entry-common.c:743 el0t_64_sync+0x198/0x19c arch/arm64/kernel/entry.S:596 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 6561 Comm: syz-executor Not tainted syzkaller #0 PREEMPT Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/03/2025 pstate: 83400005 (Nzcv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--) pc : __raw_write_unlock_irq include/linux/rwlock_api_smp.h:274 [inline] pc : _raw_write_unlock_irq+0x34/0x80 kernel/locking/spinlock.c:358 lr : __raw_write_unlock_irq include/linux/rwlock_api_smp.h:273 [inline] lr : _raw_write_unlock_irq+0x30/0x80 kernel/locking/spinlock.c:358 sp : ffff8000a3667be0 x29: ffff8000a3667be0 x28: ffff0000dd790000 x27: ffff0000e2145b78 x26: ffff0000e2145580 x25: ffff8000a3667c80 x24: dfff800000000000 x23: ffff0000e2145af0 x22: 0000000000000011 x21: ffff0000cc9f2b90 x20: 0000000000000000 x19: ffff80008f7eb040 x18: 1fffe00033781890 x17: ffff80008f86e000 x16: ffff80008053826c x15: 0000000000000001 x14: 1ffff00011efd608 x13: 0000000000000000 x12: 0000000000000000 x11: ffff700011efd609 x10: 0000000000000003 x9 : 0000000000000000 x8 : 00000000000d3369 x7 : ffff800080511080 x6 : 0000000000000000 x5 : 0000000000000001 x4 : 0000000000000001 x3 : 0000000000000010 x2 : ffff8000a3667be0 x1 : ffff80008ee5b741 x0 : ffff80010c451000 Call trace: __daif_local_irq_enable arch/arm64/include/asm/irqflags.h:26 [inline] (P) arch_local_irq_enable arch/arm64/include/asm/irqflags.h:48 [inline] (P) __raw_write_unlock_irq include/linux/rwlock_api_smp.h:273 [inline] (P) _raw_write_unlock_irq+0x34/0x80 kernel/locking/spinlock.c:358 (P) exit_notify kernel/exit.c:773 [inline] do_exit+0x100c/0x1a1c kernel/exit.c:983 do_group_exit+0x194/0x22c kernel/exit.c:1112 __do_sys_exit_group kernel/exit.c:1123 [inline] __se_sys_exit_group kernel/exit.c:1121 [inline] pid_child_should_wake+0x0/0x1dc kernel/exit.c:1121 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x254 arch/arm64/kernel/syscall.c:49 el0_svc_common+0xe8/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x5c/0x26c arch/arm64/kernel/entry-common.c:724 el0t_64_sync_handler+0x84/0x12c arch/arm64/kernel/entry-common.c:743 el0t_64_sync+0x198/0x19c arch/arm64/kernel/entry.S:596