watchdog: BUG: soft lockup - CPU#0 stuck for 23s! [aoe_tx0:2341] Modules linked in: irq event stamp: 48000637 hardirqs last enabled at (48000636): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:151 [inline] hardirqs last enabled at (48000636): [] _raw_spin_unlock_irqrestore+0x38/0x98 kernel/locking/spinlock.c:194 hardirqs last disabled at (48000637): [] __el1_irq arch/arm64/kernel/entry-common.c:533 [inline] hardirqs last disabled at (48000637): [] el1_interrupt+0x24/0x68 arch/arm64/kernel/entry-common.c:551 softirqs last enabled at (1106): [] local_bh_enable+0x10/0x34 include/linux/bottom_half.h:32 softirqs last disabled at (1110): [] local_bh_disable+0x10/0x34 include/linux/bottom_half.h:19 CPU: 0 UID: 0 PID: 2341 Comm: aoe_tx0 Not tainted 6.11.0-rc7-syzkaller-g5f5673607153 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:152 [inline] pc : _raw_spin_unlock_irqrestore+0x44/0x98 kernel/locking/spinlock.c:194 lr : __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:151 [inline] lr : _raw_spin_unlock_irqrestore+0x38/0x98 kernel/locking/spinlock.c:194 sp : ffff8000a1077720 x29: ffff8000a1077720 x28: ffff0000c5a6ccf0 x27: ffff0000c5a6cc80 x26: ffff0000d652ece8 x25: ffff0000d8ac2020 x24: 0000000000000000 x23: 0000000000000000 x22: 0000000000000000 x21: dfff800000000000 x20: ffff800097380e00 x19: 0000000000000000 x18: ffff8000a1077400 x17: 0000000000033715 x16: ffff800080347214 x15: 0000000000000001 x14: 1ffff00012e701c0 x13: 0000000000000000 x12: 0000000000000003 x11: 0000000000000202 x10: 0000000000000003 x9 : 0000000000000000 x8 : 00000000000000c0 x7 : ffff800083d6e9f8 x6 : 0000000000000000 x5 : 0000000000000001 x4 : 0000000000000001 x3 : 0000000000000000 x2 : 0000000000000002 x1 : ffff80008b4b2c40 x0 : ffff8001241e1000 Call trace: __daif_local_irq_restore arch/arm64/include/asm/irqflags.h:175 [inline] arch_local_irq_restore arch/arm64/include/asm/irqflags.h:195 [inline] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:151 [inline] _raw_spin_unlock_irqrestore+0x44/0x98 kernel/locking/spinlock.c:194 spin_unlock_irqrestore include/linux/spinlock.h:406 [inline] uart_port_unlock_irqrestore include/linux/serial_core.h:669 [inline] uart_write_room+0x150/0x348 drivers/tty/serial/serial_core.c:647 tty_write_room+0x6c/0x8c drivers/tty/tty_ioctl.c:69 handle_tx+0x120/0x604 drivers/net/caif/caif_serial.c:226 caif_xmit+0x108/0x150 drivers/net/caif/caif_serial.c:282 __netdev_start_xmit include/linux/netdevice.h:4913 [inline] netdev_start_xmit include/linux/netdevice.h:4922 [inline] xmit_one net/core/dev.c:3580 [inline] dev_hard_start_xmit+0x260/0x904 net/core/dev.c:3596 __dev_queue_xmit+0x168c/0x3504 net/core/dev.c:4423 dev_queue_xmit include/linux/netdevice.h:3105 [inline] tx+0x9c/0x1cc drivers/block/aoe/aoenet.c:62 kthread+0x1ac/0x374 drivers/block/aoe/aoecmd.c:1229 kthread+0x288/0x310 kernel/kthread.c:389 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:860 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Not tainted 6.11.0-rc7-syzkaller-g5f5673607153 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : arch_local_irq_enable+0x8/0xc arch/arm64/include/asm/irqflags.h:50 lr : default_idle_call+0xf8/0x128 kernel/sched/idle.c:124 sp : ffff800097657d10 x29: ffff800097657d10 x28: dfff800000000000 x27: 1ffff00012ecafb0 x26: ffff80008f56d000 x25: 0000000000000000 x24: 0000000000000002 x23: 1ffff00011eadaae x22: ffff80008f56d570 x21: 0000000000000000 x20: ffff0000c1b80000 x19: ffff8000802ef5fc x18: 1fffe000366d79ee x17: ffff80008f56d000 x16: ffff8000802eeec0 x15: 0000000000000001 x14: 1fffe000366d9748 x13: 0000000000000000 x12: 0000000000000003 x11: 0000000000000001 x10: 0000000000000003 x9 : 0000000000000000 x8 : 0000000000044533 x7 : ffff80008048d1cc x6 : 0000000000000000 x5 : 0000000000000001 x4 : 0000000000000001 x3 : ffff80008b33aa04 x2 : 0000000000000000 x1 : ffff80008b4b2c40 x0 : ffff800124205000 Call trace: __daif_local_irq_enable arch/arm64/include/asm/irqflags.h:26 [inline] arch_local_irq_enable+0x8/0xc arch/arm64/include/asm/irqflags.h:48 cpuidle_idle_call kernel/sched/idle.c:185 [inline] do_idle+0x1f0/0x4e4 kernel/sched/idle.c:326 cpu_startup_entry+0x5c/0x74 kernel/sched/idle.c:424 secondary_start_kernel+0x1bc/0x1e4 arch/arm64/kernel/smp.c:279 __secondary_switched+0xb8/0xbc arch/arm64/kernel/head.S:417