watchdog: BUG: soft lockup - CPU#1 stuck for 22s! [aoe_tx0:2344] Modules linked in: irq event stamp: 37110453 hardirqs last enabled at (37110452): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:151 [inline] hardirqs last enabled at (37110452): [] _raw_spin_unlock_irqrestore+0x38/0x98 kernel/locking/spinlock.c:194 hardirqs last disabled at (37110453): [] __el1_irq arch/arm64/kernel/entry-common.c:557 [inline] hardirqs last disabled at (37110453): [] el1_interrupt+0x24/0x68 arch/arm64/kernel/entry-common.c:575 softirqs last enabled at (3248): [] local_bh_enable+0x10/0x34 include/linux/bottom_half.h:32 softirqs last disabled at (3252): [] local_bh_disable+0x10/0x34 include/linux/bottom_half.h:19 CPU: 1 UID: 0 PID: 2344 Comm: aoe_tx0 Not tainted 6.12.0-syzkaller-g7b1d1d4cfac0 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:152 [inline] pc : _raw_spin_unlock_irqrestore+0x44/0x98 kernel/locking/spinlock.c:194 lr : __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:151 [inline] lr : _raw_spin_unlock_irqrestore+0x38/0x98 kernel/locking/spinlock.c:194 sp : ffff8000a1917730 x29: ffff8000a1917730 x28: ffff0000d479fcb0 x27: dfff800000000000 x26: 0000000000000000 x25: ffff800091292c00 x24: ffff0000c9500f48 x23: 0000000000000003 x22: 0000000000000000 x21: ffff800091292c00 x20: ffff80009776cde0 x19: 0000000000000000 x18: ffff8000a19173e0 x17: 0000000000041ec5 x16: ffff800080355c58 x15: 0000000000000001 x14: 1ffff00012eed9bc x13: ffff8000a1918000 x12: 0000000000000003 x11: 0000000000000202 x10: 0000000000000003 x9 : 0000000000000000 x8 : 00000000000000c0 x7 : ffff800083ec1ff0 x6 : 0000000000000000 x5 : 0000000000000001 x4 : 0000000000000001 x3 : 0000000000000000 x2 : 0000000000000002 x1 : ffff80008b6c4000 x0 : ffff800123e21000 Call trace: __daif_local_irq_restore arch/arm64/include/asm/irqflags.h:175 [inline] (P) arch_local_irq_restore arch/arm64/include/asm/irqflags.h:195 [inline] (P) __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:151 [inline] (P) _raw_spin_unlock_irqrestore+0x44/0x98 kernel/locking/spinlock.c:194 (P) __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:151 [inline] (L) _raw_spin_unlock_irqrestore+0x38/0x98 kernel/locking/spinlock.c:194 (L) spin_unlock_irqrestore include/linux/spinlock.h:406 [inline] uart_port_unlock_irqrestore include/linux/serial_core.h:782 [inline] uart_write+0x4b0/0x9b4 drivers/tty/serial/serial_core.c:628 handle_tx+0x200/0x604 drivers/net/caif/caif_serial.c:236 caif_xmit+0x108/0x150 drivers/net/caif/caif_serial.c:282 __netdev_start_xmit include/linux/netdevice.h:4928 [inline] netdev_start_xmit include/linux/netdevice.h:4937 [inline] xmit_one net/core/dev.c:3588 [inline] dev_hard_start_xmit+0x260/0x904 net/core/dev.c:3604 __dev_queue_xmit+0x1638/0x3548 net/core/dev.c:4432 dev_queue_xmit include/linux/netdevice.h:3094 [inline] tx+0x9c/0x1cc drivers/block/aoe/aoenet.c:62 kthread+0x1ac/0x374 drivers/block/aoe/aoecmd.c:1237 kthread+0x288/0x310 kernel/kthread.c:389 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:862 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 9543 Comm: syz-executor Not tainted 6.12.0-syzkaller-g7b1d1d4cfac0 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : __sanitizer_cov_trace_const_cmp8+0x8c/0x98 kernel/kcov.c:323 lr : contpte_try_unfold arch/arm64/include/asm/pgtable.h:1597 [inline] lr : get_and_clear_full_ptes arch/arm64/include/asm/pgtable.h:1707 [inline] lr : zap_present_folio_ptes mm/memory.c:1496 [inline] lr : zap_present_ptes mm/memory.c:1579 [inline] lr : zap_pte_range mm/memory.c:1621 [inline] lr : zap_pmd_range mm/memory.c:1739 [inline] lr : zap_pud_range mm/memory.c:1768 [inline] lr : zap_p4d_range mm/memory.c:1789 [inline] lr : unmap_page_range+0x14dc/0x2e3c mm/memory.c:1810 sp : ffff80009ed46fb0 x29: ffff80009ed47360 x28: ffff0000e265c000 x27: 1fffe0001e2b709c x26: ffff80009ed47600 x25: fffffdffc39a3580 x24: dfff800000000000 x23: fffffdffc39a3598 x22: 00680001268d6fc3 x21: 0000000000000001 x20: 1fffffbff87346b3 x19: 0010000000000001 x18: 1fffe000183e4d94 x17: ffff80008f8cd000 x16: ffff8000831615b0 x15: 0000000000000001 x14: 1fffffbff87346ae x13: 0000000000000000 x12: 0000000000000000 x11: ffff7fbff87346af x10: 0000000000ff0100 x9 : 0000000000000000 x8 : ffff0000c7e43c80 x7 : ffff800080b7e8a0 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000000 x2 : 00680001268d6fc3 x1 : 0000000000000001 x0 : 0010000000000001 Call trace: write_comp_data kernel/kcov.c:269 [inline] (P) __sanitizer_cov_trace_const_cmp8+0x8c/0x98 kernel/kcov.c:321 (P) contpte_try_unfold arch/arm64/include/asm/pgtable.h:1597 [inline] (L) get_and_clear_full_ptes arch/arm64/include/asm/pgtable.h:1707 [inline] (L) zap_present_folio_ptes mm/memory.c:1496 [inline] (L) zap_present_ptes mm/memory.c:1579 [inline] (L) zap_pte_range mm/memory.c:1621 [inline] (L) zap_pmd_range mm/memory.c:1739 [inline] (L) zap_pud_range mm/memory.c:1768 [inline] (L) zap_p4d_range mm/memory.c:1789 [inline] (L) unmap_page_range+0x14dc/0x2e3c mm/memory.c:1810 (L) unmap_single_vma mm/memory.c:1856 [inline] unmap_vmas+0x378/0x598 mm/memory.c:1900 exit_mmap+0x1dc/0xc00 mm/mmap.c:1923 __mmput+0xec/0x338 kernel/fork.c:1348 mmput+0x70/0xac kernel/fork.c:1370 exit_mm+0x148/0x210 kernel/exit.c:571 do_exit+0x470/0x1ad0 kernel/exit.c:926 do_group_exit+0x194/0x22c kernel/exit.c:1088 get_signal+0x1410/0x152c kernel/signal.c:2918 do_signal+0x23c/0x391c arch/arm64/kernel/signal.c:1645 do_notify_resume+0x74/0x1f4 arch/arm64/kernel/entry-common.c:148 exit_to_user_mode_prepare arch/arm64/kernel/entry-common.c:169 [inline] exit_to_user_mode arch/arm64/kernel/entry-common.c:178 [inline] el0_svc+0xac/0x168 arch/arm64/kernel/entry-common.c:745 el0t_64_sync_handler+0x84/0x108 arch/arm64/kernel/entry-common.c:762 el0t_64_sync+0x198/0x19c arch/arm64/kernel/entry.S:600