nla_parse: 6 callbacks suppressed netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. netlink: 6 bytes leftover after parsing attributes in process `syz-executor.4'. Bluetooth: hci5: command 0x0406 tx timeout watchdog: BUG: soft lockup - CPU#0 stuck for 23s! [syz-executor.5:8541] Modules linked in: irq event stamp: 3081591 hardirqs last enabled at (3081590): [] trace_hardirqs_on_thunk+0x1a/0x1c hardirqs last disabled at (3081591): [] trace_hardirqs_off_thunk+0x1a/0x1c softirqs last enabled at (2891060): [] __do_softirq+0x678/0x980 kernel/softirq.c:318 softirqs last disabled at (2891063): [] invoke_softirq kernel/softirq.c:372 [inline] softirqs last disabled at (2891063): [] irq_exit+0x215/0x260 kernel/softirq.c:412 CPU: 0 PID: 8541 Comm: syz-executor.5 Not tainted 4.19.208-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:on_stack arch/x86/include/asm/stacktrace.h:45 [inline] RIP: 0010:unwind_next_frame+0xecf/0x1400 arch/x86/kernel/unwind_orc.c:572 Code: df 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 ea 02 00 00 49 39 ec 49 8b 46 10 77 24 48 39 e8 76 1f 48 8d 55 08 48 39 d0 0f 93 c1 <49> 39 d4 0f 92 c0 84 c1 74 0b 48 3b 6c 24 18 0f 86 5f 01 00 00 bf RSP: 0018:ffff8880ba0077a8 EFLAGS: 00000212 ORIG_RAX: ffffffffffffff13 RAX: ffff888040398000 RBX: 1ffff11017400efe RCX: 0000000000000001 RDX: ffff8880403978f8 RSI: ffff8880ba007738 RDI: ffff8880ba0078e8 RBP: ffff8880403978f0 R08: 0000000000000001 R09: 0000000000000001 R10: ffff8880ba007937 R11: 0000000000074071 R12: ffff888040390000 R13: ffff8880ba00790d R14: ffff8880ba0078d8 R15: ffffffff8b98e2de FS: 0000555556b4b400(0000) GS:ffff8880ba000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f639d7e4000 CR3: 000000003e826000 CR4: 00000000003406f0 DR0: 0000000000000005 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: __save_stack_trace+0x9f/0x190 arch/x86/kernel/stacktrace.c:44 save_stack mm/kasan/kasan.c:448 [inline] set_track mm/kasan/kasan.c:460 [inline] kasan_kmalloc+0xeb/0x160 mm/kasan/kasan.c:553 __do_kmalloc_node mm/slab.c:3689 [inline] __kmalloc_node_track_caller+0x4c/0x70 mm/slab.c:3703 __kmalloc_reserve net/core/skbuff.c:137 [inline] __alloc_skb+0xae/0x560 net/core/skbuff.c:205 alloc_skb include/linux/skbuff.h:995 [inline] mrp_pdu_init net/802/mrp.c:316 [inline] mrp_pdu_append_vecattr_event+0x7d2/0x1050 net/802/mrp.c:415 mrp_attr_event+0x15d/0x220 net/802/mrp.c:510 mrp_mad_event net/802/mrp.c:590 [inline] mrp_join_timer+0x5a/0xc0 net/802/mrp.c:607 call_timer_fn+0x177/0x700 kernel/time/timer.c:1338 expire_timers+0x243/0x4e0 kernel/time/timer.c:1375 __run_timers kernel/time/timer.c:1696 [inline] run_timer_softirq+0x21c/0x670 kernel/time/timer.c:1709 __do_softirq+0x265/0x980 kernel/softirq.c:292 invoke_softirq kernel/softirq.c:372 [inline] irq_exit+0x215/0x260 kernel/softirq.c:412 exiting_irq arch/x86/include/asm/apic.h:536 [inline] smp_apic_timer_interrupt+0x136/0x550 arch/x86/kernel/apic/apic.c:1098 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:894 RIP: 0010:_vm_normal_page+0x1cd/0x510 mm/memory.c:896 Code: e3 0c 25 00 02 00 00 48 c1 eb 18 89 c6 89 44 24 08 e8 f7 04 d7 ff 8b 44 24 08 85 c0 75 6b e8 7a 03 d7 ff 48 8b 05 43 66 9b 09 <48> 89 de 48 89 c7 48 89 04 24 e8 74 04 d7 ff 48 8b 04 24 48 39 d8 RSP: 0018:ffff8880403976d0 EFLAGS: 00000293 ORIG_RAX: ffffffffffffff13 RAX: 000000000023ffff RBX: 000000000004991e RCX: ffffffff818b8099 RDX: 0000000000000000 RSI: ffffffff818b80a6 RDI: 0000000000000005 RBP: 1ffff11008072edc R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000005 R11: 0000000000000000 R12: 800000004991e007 R13: ffff8880991a2eb0 R14: 00007f1a5a7b1000 R15: ffff888040397700 zap_pte_range mm/memory.c:1323 [inline] zap_pmd_range mm/memory.c:1463 [inline] zap_pud_range mm/memory.c:1492 [inline] zap_p4d_range mm/memory.c:1513 [inline] unmap_page_range+0x1141/0x2c50 mm/memory.c:1534 unmap_single_vma+0x198/0x300 mm/memory.c:1579 unmap_vmas+0xa9/0x180 mm/memory.c:1609 exit_mmap+0x2b9/0x530 mm/mmap.c:3093 __mmput kernel/fork.c:1016 [inline] mmput+0x14e/0x4a0 kernel/fork.c:1037 exit_mm kernel/exit.c:549 [inline] do_exit+0xaec/0x2be0 kernel/exit.c:857 do_group_exit+0x125/0x310 kernel/exit.c:967 get_signal+0x3f2/0x1f70 kernel/signal.c:2589 do_signal+0x8f/0x1670 arch/x86/kernel/signal.c:799 exit_to_usermode_loop+0x204/0x2a0 arch/x86/entry/common.c:163 prepare_exit_to_usermode+0x277/0x2d0 arch/x86/entry/common.c:198 retint_user+0x8/0x18 RIP: 0033:0x7f1a5c99094e Code: Bad RIP value. RSP: 002b:00007ffedf4d8940 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13 RAX: 000000002c61674b RBX: 00007f1a5c75b008 RCX: 0000001b31420000 RDX: 0000001b31424dc4 RSI: ffffffff816c3395 RDI: 0000000000001458 RBP: 0000000000000001 R08: 000000002c61674b R09: 0000001b31424b40 R10: ffffffff816c6a2f R11: 000000002c61674f R12: 0000000000001458 R13: 00007f1a5cadb000 R14: ffffffff816c6a2f R15: 00007f1a5cae6ff0 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 PID: 23 Comm: kworker/u4:1 Not tainted 4.19.208-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Workqueue: bat_events batadv_nc_worker RIP: 0010:__lock_acquire+0x326/0x3ff0 kernel/locking/lockdep.c:3333 Code: 8d 14 80 49 c1 e2 03 45 85 c9 74 45 4a 8d 44 16 d8 48 b9 00 00 00 00 00 fc ff df 48 8d 78 20 48 89 fe 48 c1 ee 03 0f b6 0c 0e <84> c9 74 09 80 f9 03 0f 8e 33 0c 00 00 0f b7 48 20 81 e1 ff 1f 00 RSP: 0018:ffff8880b5047a68 EFLAGS: 00000802 RAX: ffff8880b503ceb0 RBX: 0000000000000000 RCX: 0000000000000000 RDX: 0000000000000000 RSI: 1ffff11016a079da RDI: ffff8880b503ced0 RBP: 0000000000000002 R08: 000000000000002e R09: 0000000000000002 R10: 0000000000000050 R11: 0000000000000000 R12: 0000000000000000 R13: ffff8880b503c600 R14: ffffffff89f85fa0 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff8880ba100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f905b1f7000 CR3: 0000000099d0e000 CR4: 00000000003406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: lock_acquire+0x170/0x3c0 kernel/locking/lockdep.c:3908 rcu_lock_acquire include/linux/rcupdate.h:242 [inline] rcu_read_lock include/linux/rcupdate.h:627 [inline] batadv_nc_purge_orig_hash net/batman-adv/network-coding.c:419 [inline] batadv_nc_worker+0x12d/0xd50 net/batman-adv/network-coding.c:730 process_one_work+0x864/0x1570 kernel/workqueue.c:2153 worker_thread+0x64c/0x1130 kernel/workqueue.c:2296 kthread+0x33f/0x460 kernel/kthread.c:259 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415 ---------------- Code disassembly (best guess): 0: df 48 89 fisttps -0x77(%rax) 3: fa cli 4: 48 c1 ea 03 shr $0x3,%rdx 8: 80 3c 02 00 cmpb $0x0,(%rdx,%rax,1) c: 0f 85 ea 02 00 00 jne 0x2fc 12: 49 39 ec cmp %rbp,%r12 15: 49 8b 46 10 mov 0x10(%r14),%rax 19: 77 24 ja 0x3f 1b: 48 39 e8 cmp %rbp,%rax 1e: 76 1f jbe 0x3f 20: 48 8d 55 08 lea 0x8(%rbp),%rdx 24: 48 39 d0 cmp %rdx,%rax 27: 0f 93 c1 setae %cl * 2a: 49 39 d4 cmp %rdx,%r12 <-- trapping instruction 2d: 0f 92 c0 setb %al 30: 84 c1 test %al,%cl 32: 74 0b je 0x3f 34: 48 3b 6c 24 18 cmp 0x18(%rsp),%rbp 39: 0f 86 5f 01 00 00 jbe 0x19e 3f: bf .byte 0xbf