watchdog: BUG: soft lockup - CPU#1 stuck for 26s! [syz-executor.5:8292] Modules linked in: irq event stamp: 314 hardirqs last enabled at (313): [] local_daif_restore+0x1c/0x3c arch/arm64/include/asm/daifflags.h:75 hardirqs last disabled at (314): [] __el1_irq arch/arm64/kernel/entry-common.c:580 [inline] hardirqs last disabled at (314): [] el1_interrupt+0x24/0x54 arch/arm64/kernel/entry-common.c:598 softirqs last enabled at (308): [] local_bh_enable+0x10/0x34 include/linux/bottom_half.h:32 softirqs last disabled at (306): [] local_bh_disable+0x10/0x34 include/linux/bottom_half.h:19 CPU: 1 UID: 0 PID: 8292 Comm: syz-executor.5 Not tainted 6.16.0-rc1-syzkaller-g39dfc971e42d #0 PREEMPT Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : __percpu_read_32+0x0/0xc arch/arm64/include/asm/percpu.h:125 lr : lockdep_enabled kernel/locking/lockdep.c:121 [inline] lr : lock_is_held_type+0x48/0x198 kernel/locking/lockdep.c:5936 sp : ffff8000a34e7b70 x29: ffff8000a34e7b70 x28: 1ffff00011de7106 x27: ffff80008f62e000 x26: 1fffe00019ede4f8 x25: ffff80008f5804c0 x24: dfff800000000000 x23: 0000000000000cc0 x22: 0000000000001000 x21: ffff80008f819ea0 x20: 00000000ffffffff x19: 0000000000000000 x18: 0000000000000000 x17: 0000000000000000 x16: ffff800080520cf8 x15: 0000000000000001 x14: 1fffe00018b9d662 x13: 0000000000000000 x12: 0000000000000000 x11: 000000003d30d030 x10: 0000000000000003 x9 : 0000000000000001 x8 : ffff0000cf6f1e80 x7 : ffff800080b7c4a8 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000001 x3 : 0000000000000000 x2 : 0000000000000000 x1 : 00000000ffffffff x0 : ffff00019bf0a4c0 Call trace: __percpu_read_32+0x0/0xc arch/arm64/include/asm/preempt.h:50 (P) lock_is_held include/linux/lockdep.h:249 [inline] __might_resched+0x48/0x4c4 kernel/sched/core.c:8762 __might_sleep+0x94/0x110 kernel/sched/core.c:8729 might_alloc include/linux/sched/mm.h:321 [inline] slab_pre_alloc_hook mm/slub.c:4099 [inline] slab_alloc_node mm/slub.c:4177 [inline] kmem_cache_alloc_noprof+0x74/0x3e8 mm/slub.c:4204 getname_flags+0xb4/0x470 fs/namei.c:146 getname include/linux/fs.h:2903 [inline] __do_sys_symlinkat fs/namei.c:4772 [inline] __se_sys_symlinkat fs/namei.c:4769 [inline] __arm64_sys_symlinkat+0x8c/0xb4 fs/namei.c:4769 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x58/0x17c arch/arm64/kernel/entry-common.c:767 el0t_64_sync_handler+0x78/0x108 arch/arm64/kernel/entry-common.c:786 el0t_64_sync+0x198/0x19c arch/arm64/kernel/entry.S:600 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 42 Comm: kworker/u8:3 Not tainted 6.16.0-rc1-syzkaller-g39dfc971e42d #0 PREEMPT Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 Workqueue: bat_events batadv_dat_purge pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : __daif_local_irq_enable arch/arm64/include/asm/irqflags.h:-1 [inline] pc : arch_local_irq_enable arch/arm64/include/asm/irqflags.h:48 [inline] pc : handle_softirqs+0x1f8/0xc88 kernel/softirq.c:563 lr : handle_softirqs+0x1f4/0xc88 kernel/softirq.c:563 sp : ffff800080007ee0 x29: ffff800080007f80 x28: ffff0000c1c55b80 x27: 0000000000000386 x26: ffff0000c1c55b88 x25: ffff80008f62e768 x24: ffff0000c1c55b90 x23: ffff0000c1c55b80 x22: 1fffe0001838ab71 x21: dfff800000000000 x20: ffff80008f58018c x19: ffff00019befa000 x18: 1fffe000337dc876 x17: ffff80010c964000 x16: ffff800080520d04 x15: 0000000000000001 x14: 1ffff00012e737b8 x13: 0000000000000000 x12: 0000000000000000 x11: ffff80009311ec08 x10: 0000000000000003 x9 : 0000000000000000 x8 : 0000000000196774 x7 : ffff8000806244b8 x6 : 0000000000000000 x5 : 0000000000000001 x4 : 0000000000000001 x3 : 0000000000000010 x2 : 0000000000000002 x1 : ffff80008ec0daa7 x0 : ffff80010c964000 Call trace: __daif_local_irq_enable arch/arm64/include/asm/irqflags.h:26 [inline] (P) arch_local_irq_enable arch/arm64/include/asm/irqflags.h:48 [inline] (P) handle_softirqs+0x1f8/0xc88 kernel/softirq.c:563 (P) __do_softirq+0x14/0x20 kernel/softirq.c:613 ____do_softirq+0x14/0x20 arch/arm64/kernel/irq.c:81 call_on_irq_stack+0x24/0x30 arch/arm64/kernel/entry.S:891 do_softirq_own_stack+0x20/0x2c arch/arm64/kernel/irq.c:86 invoke_softirq kernel/softirq.c:460 [inline] __irq_exit_rcu+0x1b0/0x478 kernel/softirq.c:680 irq_exit_rcu+0x14/0x84 kernel/softirq.c:696 __el1_irq arch/arm64/kernel/entry-common.c:584 [inline] el1_interrupt+0x38/0x54 arch/arm64/kernel/entry-common.c:598 el1h_64_irq_handler+0x18/0x24 arch/arm64/kernel/entry-common.c:603 el1h_64_irq+0x6c/0x70 arch/arm64/kernel/entry.S:596 __daif_local_irq_enable arch/arm64/include/asm/irqflags.h:26 [inline] (P) arch_local_irq_enable arch/arm64/include/asm/irqflags.h:48 [inline] (P) __local_bh_enable_ip+0x1f0/0x35c kernel/softirq.c:412 (P) __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x3c/0x4c kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] __batadv_dat_purge+0x2b0/0x360 net/batman-adv/distributed-arp-table.c:185 batadv_dat_purge+0x28/0x78 net/batman-adv/distributed-arp-table.c:204 process_one_work+0x7e8/0x155c kernel/workqueue.c:3238 process_scheduled_works kernel/workqueue.c:3321 [inline] worker_thread+0x958/0xed8 kernel/workqueue.c:3402 kthread+0x5fc/0x75c kernel/kthread.c:464 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:847