watchdog: BUG: soft lockup - CPU#0 stuck for 22s! [kworker/0:1:8] Modules linked in: irq event stamp: 227432 hardirqs last enabled at (227431): [] __exit_to_kernel_mode arch/arm64/kernel/entry-common.c:84 [inline] hardirqs last enabled at (227431): [] exit_to_kernel_mode+0xdc/0x10c arch/arm64/kernel/entry-common.c:94 hardirqs last disabled at (227432): [] __el1_irq arch/arm64/kernel/entry-common.c:499 [inline] hardirqs last disabled at (227432): [] el1_interrupt+0x24/0x68 arch/arm64/kernel/entry-common.c:517 softirqs last enabled at (227428): [] softirq_handle_end kernel/softirq.c:400 [inline] softirqs last enabled at (227428): [] __do_softirq+0xac8/0xce4 kernel/softirq.c:583 softirqs last disabled at (227413): [] ____do_softirq+0x14/0x20 arch/arm64/kernel/irq.c:81 CPU: 0 PID: 8 Comm: kworker/0:1 Not tainted 6.8.0-syzkaller-08073-g480e035fc4c7 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 Workqueue: events bpf_prog_free_deferred pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : csd_lock_wait kernel/smp.c:320 [inline] pc : smp_call_function_many_cond+0xe44/0x1d70 kernel/smp.c:855 lr : csd_lock_wait kernel/smp.c:320 [inline] lr : smp_call_function_many_cond+0xe5c/0x1d70 kernel/smp.c:855 sp : ffff800091787830 x29: ffff8000917878a0 x28: ffff0001b463b800 x27: 0000000000000011 x26: ffff80008d4b10f0 x25: 1fffe000368c7700 x24: 0000000000000008 x23: 1fffe000368c7701 x22: ffffffffffffffff x21: ffff0001b4663368 x20: 0000000000000001 x19: ffff0001b463b808 x18: 1fffe000368c4b96 x17: ffff80008d4ad000 x16: ffff800089fe49c0 x15: 0000000000000001 x14: 1fffe000368cc66d x13: 0000000000000000 x12: 0000000000000000 x11: ffff6000368cc66e x10: 0000000000ff0100 x9 : 0000000000000000 x8 : 0000000000000011 x7 : ffff80008006263c x6 : 0000000000000000 x5 : 0000000000000001 x4 : 0000000000000000 x3 : ffff80008048c2e4 x2 : 0000000000000000 x1 : 0000000000000004 x0 : 0000000000000001 Call trace: __cmpwait_case_32 arch/arm64/include/asm/cmpxchg.h:231 [inline] __cmpwait arch/arm64/include/asm/cmpxchg.h:257 [inline] csd_lock_wait kernel/smp.c:320 [inline] smp_call_function_many_cond+0xe44/0x1d70 kernel/smp.c:855 smp_call_function_many kernel/smp.c:879 [inline] smp_call_function kernel/smp.c:901 [inline] kick_all_cpus_sync+0x40/0xa0 kernel/smp.c:1047 flush_icache_range arch/arm64/include/asm/cacheflush.h:103 [inline] __text_poke+0xd4/0xf4 arch/arm64/kernel/patching.c:133 aarch64_insn_set+0x50/0x80 arch/arm64/kernel/patching.c:180 bpf_arch_text_invalidate+0x30/0x4c arch/arm64/net/bpf_jit_comp.c:211 bpf_prog_pack_free+0x1cc/0x44c kernel/bpf/core.c:995 bpf_jit_binary_pack_free+0x54/0xcc kernel/bpf/core.c:1194 bpf_jit_free+0x100/0x1a8 arch/arm64/net/bpf_jit_comp.c:2484 bpf_prog_free_deferred+0x504/0x5dc kernel/bpf/core.c:2783 process_one_work+0x7ac/0x15c0 kernel/workqueue.c:3254 process_scheduled_works kernel/workqueue.c:3335 [inline] worker_thread+0x938/0xef4 kernel/workqueue.c:3416 kthread+0x288/0x310 kernel/kthread.c:388 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:860 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 PID: 5870 Comm: syz-executor.3 Not tainted 6.8.0-syzkaller-08073-g480e035fc4c7 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : arch_local_irq_enable arch/arm64/include/asm/irqflags.h:49 [inline] pc : __do_softirq+0x1c0/0xce4 kernel/softirq.c:538 lr : __do_softirq+0x1bc/0xce4 kernel/softirq.c:538 sp : ffff800080017f20 x29: ffff800080017f90 x28: ffff0000e1623c00 x27: 0000000000000001 x26: ffff80008d411640 x25: ffff0000e1623c08 x24: dfff800000000000 x23: ffff0000e1623c00 x22: ffff0001b465c640 x21: ffff0001b4648a9c x20: 0000000000000386 x19: ffff0001b465c640 x18: ffff800096166158 x17: ffff80012724b000 x16: ffff80008031cee8 x15: 0000000000000001 x14: ffff80008d4b05b8 x13: dfff800000000000 x12: 0000000000000003 x11: 0000000000000101 x10: 0000000000000003 x9 : 0000000000000000 x8 : 000000000001d050 x7 : ffff800080431770 x6 : 0000000000000000 x5 : 0000000000000001 x4 : 0000000000000001 x3 : 0000000000000000 x2 : 0000000000000002 x1 : ffff80008a13d640 x0 : ffff80012724b000 Call trace: __daif_local_irq_enable arch/arm64/include/asm/irqflags.h:27 [inline] arch_local_irq_enable arch/arm64/include/asm/irqflags.h:49 [inline] __do_softirq+0x1c0/0xce4 kernel/softirq.c:538 ____do_softirq+0x14/0x20 arch/arm64/kernel/irq.c:81 call_on_irq_stack+0x24/0x4c arch/arm64/kernel/entry.S:889 do_softirq_own_stack+0x20/0x2c arch/arm64/kernel/irq.c:86 invoke_softirq kernel/softirq.c:435 [inline] __irq_exit_rcu+0x1d8/0x434 kernel/softirq.c:633 irq_exit_rcu+0x14/0x84 kernel/softirq.c:645 __el1_irq arch/arm64/kernel/entry-common.c:503 [inline] el1_interrupt+0x38/0x68 arch/arm64/kernel/entry-common.c:517 el1h_64_irq_handler+0x18/0x24 arch/arm64/kernel/entry-common.c:522 el1h_64_irq+0x64/0x68 arch/arm64/kernel/entry.S:594 __daif_local_irq_restore arch/arm64/include/asm/irqflags.h:176 [inline] arch_local_irq_restore arch/arm64/include/asm/irqflags.h:196 [inline] console_emit_next_record kernel/printk/printk.c:2914 [inline] console_flush_all+0x67c/0xb74 kernel/printk/printk.c:2973 console_unlock+0xec/0x3d4 kernel/printk/printk.c:3042 vprintk_emit+0x1ec/0x350 kernel/printk/printk.c:2342 vprintk_default+0xa0/0xe4 kernel/printk/printk.c:2357 vprintk+0x200/0x2d4 kernel/printk/printk_safe.c:45 _printk+0xdc/0x128 kernel/printk/printk.c:2367 batadv_check_known_mac_addr+0x25c/0x3a8 net/batman-adv/hard-interface.c:528 batadv_hard_if_event+0x468/0xf0c net/batman-adv/hard-interface.c:998 notifier_call_chain+0x1a4/0x510 kernel/notifier.c:93 raw_notifier_call_chain+0x3c/0x50 kernel/notifier.c:461 call_netdevice_notifiers_info net/core/dev.c:1950 [inline] call_netdevice_notifiers_extack net/core/dev.c:1988 [inline] call_netdevice_notifiers net/core/dev.c:2002 [inline] dev_set_mac_address+0x2fc/0x430 net/core/dev.c:8946 dev_set_mac_address_user+0x44/0x68 net/core/dev.c:8960 do_setlink+0x770/0x377c net/core/rtnetlink.c:2839 __rtnl_newlink net/core/rtnetlink.c:3680 [inline] rtnl_newlink+0x14c0/0x1bcc net/core/rtnetlink.c:3727 rtnetlink_rcv_msg+0x724/0xdbc net/core/rtnetlink.c:6595 netlink_rcv_skb+0x214/0x3c4 net/netlink/af_netlink.c:2559 rtnetlink_rcv+0x28/0x38 net/core/rtnetlink.c:6613 netlink_unicast_kernel net/netlink/af_netlink.c:1335 [inline] netlink_unicast+0x65c/0x898 net/netlink/af_netlink.c:1361 netlink_sendmsg+0x7a0/0xa84 net/netlink/af_netlink.c:1905 sock_sendmsg_nosec net/socket.c:730 [inline] __sock_sendmsg net/socket.c:745 [inline] __sys_sendto+0x374/0x4f4 net/socket.c:2191 __do_sys_sendto net/socket.c:2203 [inline] __se_sys_sendto net/socket.c:2199 [inline] __arm64_sys_sendto+0xd8/0xf8 net/socket.c:2199 __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:51 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:136 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:155 el0_svc+0x54/0x158 arch/arm64/kernel/entry-common.c:678 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:696 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598