watchdog: BUG: soft lockup - CPU#0 stuck for 26s! [syz.3.265:7570] Modules linked in: irq event stamp: 7387 hardirqs last enabled at (7386): [] __exit_to_kernel_mode arch/arm64/kernel/entry-common.c:85 [inline] hardirqs last enabled at (7386): [] exit_to_kernel_mode+0xdc/0x10c arch/arm64/kernel/entry-common.c:95 hardirqs last disabled at (7387): [] __el1_irq arch/arm64/kernel/entry-common.c:557 [inline] hardirqs last disabled at (7387): [] el1_interrupt+0x24/0x68 arch/arm64/kernel/entry-common.c:575 softirqs last enabled at (1258): [] local_bh_enable+0x10/0x34 include/linux/bottom_half.h:32 softirqs last disabled at (1270): [] spin_lock_bh include/linux/spinlock.h:356 [inline] softirqs last disabled at (1270): [] sock_devmem_dontneed+0x1d8/0x5fc net/core/sock.c:1086 CPU: 0 UID: 0 PID: 7570 Comm: syz.3.265 Not tainted 6.12.0-rc5-syzkaller-g1bf329c696cf #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : preempt_count arch/arm64/include/asm/preempt.h:13 [inline] pc : check_kcov_mode kernel/kcov.c:183 [inline] pc : write_comp_data kernel/kcov.c:246 [inline] pc : __sanitizer_cov_trace_const_cmp8+0x14/0x98 kernel/kcov.c:321 lr : xa_is_internal include/linux/xarray.h:175 [inline] lr : xa_is_err include/linux/xarray.h:207 [inline] lr : xa_err include/linux/xarray.h:226 [inline] lr : xas_error include/linux/xarray.h:1431 [inline] lr : xas_result lib/xarray.c:1491 [inline] lr : __xa_erase+0x150/0x1e0 lib/xarray.c:1511 sp : ffff80009ca676d0 x29: ffff80009ca67780 x28: ffff80009ca67a30 x27: 0000000000000000 x26: ffff0000c5feb100 x25: ffff0000c5feb104 x24: ffff80009ca676e0 x23: dfff800000000000 x22: ffff70001394cedc x21: 0000000000000001 x20: 0000000000000001 x19: 0000000000000000 x18: ffff80009ca674a0 x17: 0000000000036c2f x16: ffff80008058af60 x15: 0000000000000003 x14: 1ffff0001394cee4 x13: 0000000000000000 x12: 0000000000000000 x11: 0000000000040000 x10: 000000000003ffff x9 : 0000000000000201 x8 : ffff0000cfd35ac0 x7 : 0000000000000000 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000010 x2 : 0000000000000008 x1 : 0000000000000001 x0 : 0000000000000002 Call trace: preempt_count arch/arm64/include/asm/preempt.h:13 [inline] (P) check_kcov_mode kernel/kcov.c:183 [inline] (P) write_comp_data kernel/kcov.c:246 [inline] (P) __sanitizer_cov_trace_const_cmp8+0x14/0x98 kernel/kcov.c:321 (P) xa_is_internal include/linux/xarray.h:175 [inline] (L) xa_is_err include/linux/xarray.h:207 [inline] (L) xa_err include/linux/xarray.h:226 [inline] (L) xas_error include/linux/xarray.h:1431 [inline] (L) xas_result lib/xarray.c:1491 [inline] (L) __xa_erase+0x150/0x1e0 lib/xarray.c:1511 (L) sock_devmem_dontneed+0x2a0/0x5fc net/core/sock.c:1089 sk_setsockopt+0x74c/0x30d8 net/core/sock.c:1280 sock_setsockopt+0x68/0x80 net/core/sock.c:1633 do_sock_setsockopt+0x238/0x4e0 net/socket.c:2330 __sys_setsockopt+0x128/0x1a8 net/socket.c:2357 __do_sys_setsockopt net/socket.c:2366 [inline] __se_sys_setsockopt net/socket.c:2363 [inline] __arm64_sys_setsockopt+0xb8/0xd4 net/socket.c:2363 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:744 el0t_64_sync_handler+0x84/0x108 arch/arm64/kernel/entry-common.c:762 el0t_64_sync+0x198/0x19c arch/arm64/kernel/entry.S:600 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 2171 Comm: kworker/u8:10 Not tainted 6.12.0-rc5-syzkaller-g1bf329c696cf #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Workqueue: bat_events batadv_nc_worker pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : should_resched arch/arm64/include/asm/preempt.h:79 [inline] pc : __local_bh_enable_ip+0x228/0x44c kernel/softirq.c:389 lr : __local_bh_enable_ip+0x224/0x44c kernel/softirq.c:387 sp : ffff8000a0c37990 x29: ffff8000a0c379a0 x28: dfff800000000000 x27: 1fffe0001d99eafd x26: 0000000000000000 x25: ffff0000c8295080 x24: 0000000000000001 x23: 1fffe000198413c9 x22: dfff800000000000 x21: ffff80008b1d4264 x20: ffff0001b3670800 x19: ffff0000cc209e48 x18: 1fffe000366cb876 x17: ffff80008f7fd000 x16: ffff80008035bf2c x15: 0000000000000001 x14: 1fffe00019052a10 x13: ffff8000a0c38000 x12: 0000000000000003 x11: 0000000000000000 x10: 0000000000ff0100 x9 : 0000000000000000 x8 : 00000000001b6e75 x7 : ffff80008b1d4040 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000001 x3 : 0000000000000000 x2 : 0000000000000006 x1 : 0000000000000080 x0 : ffff800123f0d000 Call trace: __daif_local_irq_enable arch/arm64/include/asm/irqflags.h:26 [inline] (P) arch_local_irq_enable arch/arm64/include/asm/irqflags.h:48 [inline] (P) __local_bh_enable_ip+0x228/0x44c kernel/softirq.c:387 (P) __local_bh_enable_ip+0x224/0x44c kernel/softirq.c:387 (L) __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x3c/0x4c kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] batadv_nc_purge_paths+0x2f4/0x378 net/batman-adv/network-coding.c:471 batadv_nc_worker+0x314/0x580 net/batman-adv/network-coding.c:722 process_one_work+0x7bc/0x1600 kernel/workqueue.c:3229 process_scheduled_works kernel/workqueue.c:3310 [inline] worker_thread+0x97c/0xeec kernel/workqueue.c:3391 kthread+0x288/0x310 kernel/kthread.c:389 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:862