watchdog: BUG: soft lockup - CPU#0 stuck for 38s! [cmp:5045] Modules linked in: irq event stamp: 10432 hardirqs last enabled at (10431): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (10431): [] _raw_spin_unlock_irqrestore+0xa8/0x14c kernel/locking/spinlock.c:194 hardirqs last disabled at (10432): [] enter_el1_irq_or_nmi+0x10/0x1c arch/arm64/kernel/entry-common.c:227 softirqs last enabled at (10164): [] softirq_handle_end kernel/softirq.c:401 [inline] softirqs last enabled at (10164): [] handle_softirqs+0xa4c/0xbf0 kernel/softirq.c:586 softirqs last disabled at (6377): [] __do_softirq kernel/softirq.c:592 [inline] softirqs last disabled at (6377): [] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] softirqs last disabled at (6377): [] invoke_softirq kernel/softirq.c:439 [inline] softirqs last disabled at (6377): [] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:641 CPU: 0 PID: 5045 Comm: cmp Not tainted 5.15.183-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : check_kcov_mode kernel/kcov.c:174 [inline] pc : write_comp_data kernel/kcov.c:227 [inline] pc : __sanitizer_cov_trace_const_cmp8+0x74/0xc0 kernel/kcov.c:300 lr : unwind_frame+0xe0/0x544 arch/arm64/kernel/stacktrace.c:-1 sp : ffff80001f9c7330 x29: ffff80001f9c7340 x28: dfff800000000000 x27: ffff80001f9c7530 x26: dfff800000000000 x25: 1ffff00003f38e78 x24: 0000000000000030 x23: ffff80001f9c8000 x22: ffff80001f9c0000 x21: ffff0000ce8d1b40 x20: ffff80001f9c77f0 x19: ffff80001f9c73c0 x18: 0000000000000000 x17: 0000000000000000 x16: ffff8000082bf2b8 x15: 0000000000000002 x14: 00000000ffff8000 x13: 0000000000000000 x12: 0000000000ff0100 x11: 0000000000000000 x10: ff80800008044c88 x9 : ffff0000ce8d1b40 x8 : ffff800008044c88 x7 : 0000000000000000 x6 : 000000000000003f x5 : 0000000000000040 x4 : 0000000000000000 x3 : ffff800008044e7c x2 : 0000000000000001 x1 : ffff80001f9c77f0 x0 : ffffffffffffffef Call trace: check_kcov_mode kernel/kcov.c:172 [inline] write_comp_data kernel/kcov.c:227 [inline] __sanitizer_cov_trace_const_cmp8+0x74/0xc0 kernel/kcov.c:300 walk_stackframe arch/arm64/kernel/stacktrace.c:148 [inline] arch_stack_walk+0x200/0x2b4 arch/arm64/kernel/stacktrace.c:238 stack_trace_save+0x94/0xd8 kernel/stacktrace.c:122 kasan_save_stack mm/kasan/common.c:38 [inline] kasan_set_track+0x4c/0x84 mm/kasan/common.c:46 kasan_set_free_info+0x28/0x4c mm/kasan/generic.c:360 ____kasan_slab_free+0x118/0x164 mm/kasan/common.c:366 __kasan_slab_free+0x18/0x28 mm/kasan/common.c:374 kasan_slab_free include/linux/kasan.h:230 [inline] slab_free_hook mm/slub.c:1705 [inline] slab_free_freelist_hook+0x128/0x1e8 mm/slub.c:1731 slab_free mm/slub.c:3499 [inline] kmem_cache_free+0xdc/0x3b4 mm/slub.c:3515 vm_area_free+0x28/0x38 kernel/fork.c:376 remove_vma mm/mmap.c:187 [inline] exit_mmap+0x3e0/0x4e0 mm/mmap.c:3215 __mmput+0xec/0x3b8 kernel/fork.c:1127 mmput+0x80/0xc8 kernel/fork.c:1148 exit_mm+0x4a0/0x684 kernel/exit.c:550 do_exit+0x4e4/0x1f58 kernel/exit.c:861 do_group_exit+0x100/0x268 kernel/exit.c:996 __do_sys_exit_group kernel/exit.c:1007 [inline] __se_sys_exit_group kernel/exit.c:1005 [inline] __wake_up_parent+0x0/0x60 kernel/exit.c:1005 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:52 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x58/0x14c arch/arm64/kernel/syscall.c:181 el0_svc+0x78/0x1e0 arch/arm64/kernel/entry-common.c:608 el0t_64_sync_handler+0xcc/0xe4 arch/arm64/kernel/entry-common.c:626 el0t_64_sync+0x1a0/0x1a4 arch/arm64/kernel/entry.S:584