watchdog: BUG: soft lockup - CPU#1 stuck for 118s! [syz.0.29:6014] Modules linked in: irq event stamp: 22442333 hardirqs last enabled at (22442332): [] irqentry_exit+0x74/0x90 kernel/entry/common.c:310 hardirqs last disabled at (22442333): [] sysvec_apic_timer_interrupt+0xe/0xc0 arch/x86/kernel/apic/apic.c:1050 softirqs last enabled at (20227854): [] __do_softirq kernel/softirq.c:613 [inline] softirqs last enabled at (20227854): [] invoke_softirq kernel/softirq.c:453 [inline] softirqs last enabled at (20227854): [] __irq_exit_rcu+0xca/0x1f0 kernel/softirq.c:680 softirqs last disabled at (20227857): [] __do_softirq kernel/softirq.c:613 [inline] softirqs last disabled at (20227857): [] invoke_softirq kernel/softirq.c:453 [inline] softirqs last disabled at (20227857): [] __irq_exit_rcu+0xca/0x1f0 kernel/softirq.c:680 CPU: 1 UID: 0 PID: 6014 Comm: syz.0.29 Not tainted 6.15.0-syzkaller-gcd2e103d57e5 #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 RIP: 0010:rcu_read_unlock_special+0x87/0x4c0 kernel/rcu/tree_plugin.h:694 Code: f1 f1 f1 00 f2 f2 f2 4a 89 04 2b 66 42 c7 44 2b 09 f3 f3 42 c6 44 2b 0b f3 65 44 8b 35 72 54 f4 10 41 f7 c6 00 00 f0 00 74 49 <48> c7 44 24 40 0e 36 e0 45 4a c7 04 2b 00 00 00 00 66 42 c7 44 2b RSP: 0018:ffffc90000a084a0 EFLAGS: 00000206 RAX: 7afd5de72dd6aa00 RBX: 1ffff9200014109c RCX: 7afd5de72dd6aa00 RDX: 0000000000000002 RSI: ffffffff8d9705ba RDI: ffffffff8be26f40 RBP: ffffc90000a08598 R08: ffffffff8fa0bcf7 R09: 1ffffffff1f4179e R10: dffffc0000000000 R11: fffffbfff1f4179f R12: ffffffff8e142400 R13: dffffc0000000000 R14: 0000000000000246 R15: 0000000000000002 FS: 00007fc4da0016c0(0000) GS:ffff888125d5f000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007ffffd015f19 CR3: 00000000115fe000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: __rcu_read_unlock+0x84/0xe0 kernel/rcu/tree_plugin.h:438 rcu_read_unlock include/linux/rcupdate.h:873 [inline] class_rcu_destructor include/linux/rcupdate.h:1155 [inline] unwind_next_frame+0x19ae/0x2390 arch/x86/kernel/unwind_orc.c:680 arch_stack_walk+0x11c/0x150 arch/x86/kernel/stacktrace.c:25 stack_trace_save+0x9c/0xe0 kernel/stacktrace.c:122 kasan_save_stack mm/kasan/common.c:47 [inline] kasan_save_track+0x3e/0x80 mm/kasan/common.c:68 unpoison_slab_object mm/kasan/common.c:319 [inline] __kasan_slab_alloc+0x6c/0x80 mm/kasan/common.c:345 kasan_slab_alloc include/linux/kasan.h:250 [inline] slab_post_alloc_hook mm/slub.c:4147 [inline] slab_alloc_node mm/slub.c:4196 [inline] kmem_cache_alloc_node_noprof+0x1bb/0x3c0 mm/slub.c:4248 __alloc_skb+0x112/0x2d0 net/core/skbuff.c:660 alloc_skb include/linux/skbuff.h:1336 [inline] lapb_send_control+0x38/0x3e0 net/lapb/lapb_subr.c:227 lapb_t1timer_expiry+0x699/0xab0 net/lapb/lapb_timer.c:-1 call_timer_fn+0x17b/0x5f0 kernel/time/timer.c:1747 expire_timers kernel/time/timer.c:1798 [inline] __run_timers kernel/time/timer.c:2372 [inline] __run_timer_base+0x61a/0x860 kernel/time/timer.c:2384 run_timer_base kernel/time/timer.c:2393 [inline] run_timer_softirq+0xb7/0x180 kernel/time/timer.c:2403 handle_softirqs+0x283/0x870 kernel/softirq.c:579 __do_softirq kernel/softirq.c:613 [inline] invoke_softirq kernel/softirq.c:453 [inline] __irq_exit_rcu+0xca/0x1f0 kernel/softirq.c:680 irq_exit_rcu+0x9/0x30 kernel/softirq.c:696 instr_sysvec_irq_work arch/x86/kernel/irq_work.c:17 [inline] sysvec_irq_work+0xa3/0xc0 arch/x86/kernel/irq_work.c:17 asm_sysvec_irq_work+0x1a/0x20 arch/x86/include/asm/idtentry.h:738 RIP: 0010:finish_task_switch+0x26b/0x950 kernel/sched/core.c:5260 Code: 0f 84 3c 01 00 00 48 85 db 0f 85 63 01 00 00 0f 1f 44 00 00 4c 8b 75 d0 4c 89 e7 e8 ef 3c d5 09 e8 aa f7 35 00 fb 4c 8b 65 c0 <49> 8d bc 24 18 16 00 00 48 89 f8 48 c1 e8 03 42 0f b6 04 28 84 c0 RSP: 0018:ffffc9000ab27358 EFLAGS: 00000282 RAX: 7afd5de72dd6aa00 RBX: 0000000000000000 RCX: 7afd5de72dd6aa00 RDX: 0000000000000007 RSI: ffffffff8d9705ba RDI: ffffffff8be26f40 RBP: ffffc9000ab273b0 R08: ffffffff8fa0bcf7 R09: 1ffffffff1f4179e R10: dffffc0000000000 R11: fffffbfff1f4179f R12: ffff8880781fda00 R13: dffffc0000000000 R14: ffff88802e678000 R15: ffff8880b873c4d8 context_switch kernel/sched/core.c:5395 [inline] __schedule+0x16fd/0x4d00 kernel/sched/core.c:6781 preempt_schedule_irq+0xb5/0x150 kernel/sched/core.c:7104 irqentry_exit+0x6f/0x90 kernel/entry/common.c:307 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702 RIP: 0010:__sanitizer_cov_trace_pc+0x5d/0x70 kernel/kcov.c:235 Code: 18 16 00 00 83 fa 02 75 21 48 8b 91 20 16 00 00 48 8b 32 48 8d 7e 01 8b 89 1c 16 00 00 48 39 cf 73 08 48 89 3a 48 89 44 f2 08 cc cc cc cc cc 66 66 66 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 RSP: 0018:ffffc9000ab27740 EFLAGS: 00000283 RAX: ffffffff817441d2 RBX: 000000005da32690 RCX: 0000000000080000 RDX: ffffc9000bc1b000 RSI: 0000000000010de8 RDI: 0000000000010de9 RBP: ffff88805da32690 R08: ffffffff8fa0bcf7 R09: 1ffffffff1f4179e R10: dffffc0000000000 R11: fffffbfff1f4179f R12: ffffea0000000000 R13: 0000000000000000 R14: 000000000000002e R15: dffffc0000000000 phys_addr_valid arch/x86/mm/physaddr.h:7 [inline] __phys_addr+0xb2/0x180 arch/x86/mm/physaddr.c:28 virt_to_folio include/linux/mm.h:1178 [inline] virt_to_slab mm/slab.h:211 [inline] qlink_to_cache mm/kasan/quarantine.c:131 [inline] qlist_free_all+0x39/0x140 mm/kasan/quarantine.c:176 kasan_quarantine_reduce+0x148/0x160 mm/kasan/quarantine.c:286 __kasan_slab_alloc+0x22/0x80 mm/kasan/common.c:329 kasan_slab_alloc include/linux/kasan.h:250 [inline] slab_post_alloc_hook mm/slub.c:4147 [inline] slab_alloc_node mm/slub.c:4196 [inline] __kmalloc_cache_node_noprof+0x1c0/0x3d0 mm/slub.c:4366 kmalloc_node_noprof include/linux/slab.h:928 [inline] __get_vm_area_node+0x13f/0x300 mm/vmalloc.c:3168 __vmalloc_node_range_noprof+0x301/0x12f0 mm/vmalloc.c:3845 __vmalloc_node_noprof mm/vmalloc.c:3948 [inline] __vmalloc_noprof+0xb1/0xf0 mm/vmalloc.c:3962 bpf_prog_alloc_no_stats+0x4a/0x4e0 kernel/bpf/core.c:104 bpf_prog_alloc+0x3c/0x1a0 kernel/bpf/core.c:146 bpf_prog_load+0x735/0x1930 kernel/bpf/syscall.c:2882 __sys_bpf+0x5f1/0x860 kernel/bpf/syscall.c:5836 __do_sys_bpf kernel/bpf/syscall.c:5943 [inline] __se_sys_bpf kernel/bpf/syscall.c:5941 [inline] __x64_sys_bpf+0x7c/0x90 kernel/bpf/syscall.c:5941 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7fc4d918e969 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fc4da001038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 RAX: ffffffffffffffda RBX: 00007fc4d93b5fa0 RCX: 00007fc4d918e969 RDX: 0000000000000094 RSI: 0000200000000600 RDI: 0000000000000005 RBP: 00007fc4d9210ab1 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000000 R14: 00007fc4d93b5fa0 R15: 00007ffc6edcda98 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 1303 Comm: aoe_tx0 Not tainted 6.15.0-syzkaller-gcd2e103d57e5 #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 RIP: 0010:number+0x4bf/0xf60 lib/vsprintf.c:514 Code: 44 24 34 41 88 06 e9 b6 00 00 00 8d 73 ff bf ff ff ff ff e8 e3 75 5f f6 ff cb 48 89 5c 24 18 0f 88 29 01 00 00 4c 8b 7c 24 20 <45> 29 ef 44 89 fe 83 e6 03 31 db 31 ff e8 bf 75 5f f6 4c 89 7c 24 RSP: 0018:ffffc90003fee9a0 EFLAGS: 00000203 RAX: ffffffff8b60c93d RBX: 0000000000000001 RCX: 0000000000000000 RDX: ffff8880278ebc00 RSI: 0000000000000001 RDI: 00000000ffffffff RBP: ffffc90003feeac0 R08: ffffc90003feea37 R09: 0000000000000000 R10: ffffc90003feea20 R11: fffff520007fdd47 R12: 000000000000010a R13: 0000000000000003 R14: ffffc90003feeda1 R15: 0000000000000005 FS: 0000000000000000(0000) GS:ffff888125c5f000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00005580bda14098 CR3: 000000000df36000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: vsnprintf+0x91b/0xf00 lib/vsprintf.c:2838 sprintf+0xd9/0x120 lib/vsprintf.c:3037 print_time kernel/printk/printk.c:1381 [inline] info_print_prefix+0x155/0x310 kernel/printk/printk.c:1407 record_print_text+0x154/0x430 kernel/printk/printk.c:1456 printk_get_next_message+0x26d/0x7b0 kernel/printk/printk.c:3024 console_emit_next_record kernel/printk/printk.c:3092 [inline] console_flush_all+0x4ca/0xc40 kernel/printk/printk.c:3226 __console_flush_and_unlock kernel/printk/printk.c:3285 [inline] console_unlock+0xc4/0x270 kernel/printk/printk.c:3325 vprintk_emit+0x5b7/0x7a0 kernel/printk/printk.c:2450 dev_vprintk_emit+0x337/0x3f0 drivers/base/core.c:4917 dev_printk_emit+0xe0/0x130 drivers/base/core.c:4928 __netdev_printk+0x3d7/0x4d0 net/core/dev.c:12508 netdev_warn+0x10a/0x160 net/core/dev.c:12561 ieee802154_subif_start_xmit+0x136/0x190 net/mac802154/tx.c:232 __netdev_start_xmit include/linux/netdevice.h:5215 [inline] netdev_start_xmit include/linux/netdevice.h:5224 [inline] xmit_one net/core/dev.c:3830 [inline] dev_hard_start_xmit+0x2d4/0x830 net/core/dev.c:3846 sch_direct_xmit+0x241/0x4b0 net/sched/sch_generic.c:344 __dev_xmit_skb net/core/dev.c:4102 [inline] __dev_queue_xmit+0x17b6/0x3a70 net/core/dev.c:4679 dev_queue_xmit include/linux/netdevice.h:3355 [inline] tx+0x6b/0x190 drivers/block/aoe/aoenet.c:62 kthread+0x1cd/0x3e0 drivers/block/aoe/aoecmd.c:1237 kthread+0x711/0x8a0 kernel/kthread.c:464 ret_from_fork+0x3fc/0x770 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245