watchdog: BUG: soft lockup - CPU#0 stuck for 22s! [kworker/u8:8:580] Modules linked in: irq event stamp: 238563 hardirqs last enabled at (238562): [] __exit_to_kernel_mode arch/arm64/kernel/entry-common.c:85 [inline] hardirqs last enabled at (238562): [] exit_to_kernel_mode+0xdc/0x10c arch/arm64/kernel/entry-common.c:95 hardirqs last disabled at (238563): [] __el1_irq arch/arm64/kernel/entry-common.c:533 [inline] hardirqs last disabled at (238563): [] el1_interrupt+0x24/0x68 arch/arm64/kernel/entry-common.c:551 softirqs last enabled at (234128): [] softirq_handle_end kernel/softirq.c:400 [inline] softirqs last enabled at (234128): [] __do_softirq+0xb10/0xd2c kernel/softirq.c:583 softirqs last disabled at (234130): [] spin_lock_bh include/linux/spinlock.h:356 [inline] softirqs last disabled at (234130): [] batadv_tt_local_commit_changes+0x24/0x44 net/batman-adv/translation-table.c:3717 CPU: 0 PID: 580 Comm: kworker/u8:8 Not tainted 6.9.0-rc2-syzkaller-00413-gf2f80ac80987 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 Workqueue: bat_events batadv_iv_send_outstanding_bat_ogm_packet pstate: 00400005 (nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : queued_spin_lock_slowpath+0x15c/0xd38 kernel/locking/qspinlock.c:383 lr : queued_spin_lock_slowpath+0x168/0xd38 kernel/locking/qspinlock.c:383 sp : ffff800097ce76e0 x29: ffff800097ce7780 x28: 1fffe0001a76726a x27: 1ffff00012f9cee8 x26: dfff800000000000 x25: 1fffe0001a76726c x24: ffff800097ce7700 x23: ffff800097ce7740 x22: ffff700012f9cee0 x21: 0000000000000001 x20: 0000000000000001 x19: ffff0000d3b39350 x18: 1fffe0003684464f x17: ffff800126140000 x16: ffff800080a5c2f0 x15: 0000000000000001 x14: 1fffe0001a76726a x13: 0000000000000000 x12: 0000000000000000 x11: ffff60001a76726b x10: 1fffe0001a76726a x9 : 0000000000000000 x8 : 0000000000000001 x7 : ffff80008a4a9bac x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000001 x3 : ffff80008a824f30 x2 : 0000000000000000 x1 : 0000000000000001 x0 : 0000000000000001 Call trace: __cmpwait_case_8 arch/arm64/include/asm/cmpxchg.h:229 [inline] __cmpwait arch/arm64/include/asm/cmpxchg.h:257 [inline] queued_spin_lock_slowpath+0x15c/0xd38 kernel/locking/qspinlock.c:383 queued_spin_lock include/asm-generic/qspinlock.h:114 [inline] do_raw_spin_lock+0x320/0x348 kernel/locking/spinlock_debug.c:116 __raw_spin_lock_bh include/linux/spinlock_api_smp.h:127 [inline] _raw_spin_lock_bh+0x50/0x60 kernel/locking/spinlock.c:178 spin_lock_bh include/linux/spinlock.h:356 [inline] batadv_tt_local_commit_changes+0x24/0x44 net/batman-adv/translation-table.c:3717 batadv_iv_ogm_schedule_buff net/batman-adv/bat_iv_ogm.c:811 [inline] batadv_iv_ogm_schedule+0x1ec/0xdf0 net/batman-adv/bat_iv_ogm.c:868 batadv_iv_send_outstanding_bat_ogm_packet+0x740/0x900 net/batman-adv/bat_iv_ogm.c:1712 process_one_work+0x7b8/0x15d4 kernel/workqueue.c:3254 process_scheduled_works kernel/workqueue.c:3335 [inline] worker_thread+0x938/0xef4 kernel/workqueue.c:3416 kthread+0x288/0x310 kernel/kthread.c:388 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:860 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 PID: 6561 Comm: syz-executor.0 Not tainted 6.9.0-rc2-syzkaller-00413-gf2f80ac80987 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : lock_release+0x0/0x9cc kernel/locking/lockdep.c:5762 lr : __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:165 [inline] lr : _raw_spin_unlock_bh+0x28/0x4c kernel/locking/spinlock.c:210 sp : ffff80009e787110 x29: ffff80009e787110 x28: dfff800000000000 x27: 1fffe0001c62ce51 x26: ffff0000e3167298 x25: ffff0000e3167288 x24: ffff0000dc0d4458 x23: ffff0000d0d080d0 x22: dead000000000122 x21: 000000000000008b x20: ffff80008a4ac668 x19: ffff0000d43a22c0 x18: 0000000000000008 x17: 77656e2074696620 x16: ffff8000803396a0 x15: ffff700013cf0e0c x14: 1ffff00013cf0e0c x13: 0000000000000004 x12: ffffffffffffffff x11: ffff700013cf0e0c x10: 0000000000ff0100 x9 : 0000000000000000 x8 : ffff0000e2bf3c80 x7 : ffff80008a4ac4e0 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000001 x3 : ffff800080347614 x2 : 0000000000000001 x1 : ffff80008a4ac668 x0 : ffff0000d43a22d8 Call trace: validate_chain kernel/locking/lockdep.c:3869 [inline] lock_release+0x0/0x9cc kernel/locking/lockdep.c:5137 spin_unlock_bh include/linux/spinlock.h:396 [inline] batadv_tt_local_purge_pending_clients+0x278/0x300 net/batman-adv/translation-table.c:3673 batadv_tt_local_resize_to_mtu+0xa8/0x154 net/batman-adv/translation-table.c:3957 batadv_update_min_mtu+0x74/0xa4 net/batman-adv/hard-interface.c:651 batadv_netlink_set_mesh+0x50c/0x1078 net/batman-adv/netlink.c:499 genl_family_rcv_msg_doit net/netlink/genetlink.c:1113 [inline] genl_family_rcv_msg net/netlink/genetlink.c:1193 [inline] genl_rcv_msg+0x888/0xbb0 net/netlink/genetlink.c:1208 netlink_rcv_skb+0x214/0x3c4 net/netlink/af_netlink.c:2559 genl_rcv+0x38/0x50 net/netlink/genetlink.c:1217 netlink_unicast_kernel net/netlink/af_netlink.c:1335 [inline] netlink_unicast+0x65c/0x898 net/netlink/af_netlink.c:1361 netlink_sendmsg+0x7a0/0xa84 net/netlink/af_netlink.c:1905 sock_sendmsg_nosec net/socket.c:730 [inline] __sock_sendmsg net/socket.c:745 [inline] ____sys_sendmsg+0x56c/0x840 net/socket.c:2584 ___sys_sendmsg net/socket.c:2638 [inline] __sys_sendmsg+0x26c/0x33c net/socket.c:2667 __do_sys_sendmsg net/socket.c:2676 [inline] __se_sys_sendmsg net/socket.c:2674 [inline] __arm64_sys_sendmsg+0x80/0x94 net/socket.c:2674 __invoke_syscall arch/arm64/kernel/syscall.c:34 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:48 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:133 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:152 el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:712 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:730 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598