IPv6: ADDRCONF(NETDEV_UP): bond338: link is not ready 8021q: adding VLAN 0 to HW filter on device bond338 ieee802154 phy0 wpan0: encryption failed: -22 ieee802154 phy1 wpan1: encryption failed: -22 watchdog: BUG: soft lockup - CPU#1 stuck for 23s! [syz-executor.2:18790] Modules linked in: irq event stamp: 1525813 hardirqs last enabled at (1525812): [] trace_hardirqs_on_thunk+0x1a/0x1c hardirqs last disabled at (1525813): [] trace_hardirqs_off_thunk+0x1a/0x1c softirqs last enabled at (1524992): [] __do_softirq+0x678/0x980 kernel/softirq.c:318 softirqs last disabled at (1524995): [] invoke_softirq kernel/softirq.c:372 [inline] softirqs last disabled at (1524995): [] irq_exit+0x215/0x260 kernel/softirq.c:412 CPU: 1 PID: 18790 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:call_timer_fn+0x0/0x700 kernel/time/timer.c:1315 Code: df 48 89 fa 48 c1 ea 03 80 3c 02 00 75 0a 48 8b 7b 48 5b e9 92 b7 ee ff e8 9d da 44 00 eb ef 66 66 2e 0f 1f 84 00 00 00 00 00 <41> 57 41 56 41 55 41 54 49 bc 00 00 00 00 00 fc ff df 55 53 48 89 RSP: 0018:ffff8880ba107de8 EFLAGS: 00000202 ORIG_RAX: ffffffffffffff13 RAX: 0000000000000101 RBX: dffffc0000000000 RCX: 0000000000000000 RDX: 0000000000000004 RSI: ffffffff8688f6d0 RDI: ffff888095dfca50 RBP: ffff888095dfca50 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: ffffffff8688f6d0 R13: ffff8880ba122b40 R14: ffff8880ba107e78 R15: 0000000000000000 FS: 00007f1ea8c3a700(0000) GS:ffff8880ba100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000564078d6d160 CR3: 00000000a4bc7000 CR4: 00000000003406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: expire_timers+0x243/0x4e0 kernel/time/timer.c:1375 __run_timers kernel/time/timer.c:1696 [inline] run_timer_softirq+0x21c/0x670 kernel/time/timer.c:1709 __do_softirq+0x265/0x980 kernel/softirq.c:292 invoke_softirq kernel/softirq.c:372 [inline] irq_exit+0x215/0x260 kernel/softirq.c:412 exiting_irq arch/x86/include/asm/apic.h:536 [inline] smp_apic_timer_interrupt+0x136/0x550 arch/x86/kernel/apic/apic.c:1098 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:894 RIP: 0010:arch_local_irq_restore arch/x86/include/asm/paravirt.h:789 [inline] RIP: 0010:lock_acquire+0x1ec/0x3c0 kernel/locking/lockdep.c:3911 Code: 08 00 00 00 00 00 00 48 c1 e8 03 80 3c 10 00 0f 85 b7 01 00 00 48 83 3d 09 2e a6 08 00 0f 84 2a 01 00 00 48 8b 7c 24 08 57 9d <0f> 1f 44 00 00 48 83 c4 18 5b 5d 41 5c 41 5d 41 5e 41 5f c3 65 8b RSP: 0018:ffff8880296af668 EFLAGS: 00000286 ORIG_RAX: ffffffffffffff13 RAX: 1ffffffff13e3051 RBX: ffff8880a05d43c0 RCX: ff934e6a97baa5c9 RDX: dffffc0000000000 RSI: 000000009dc2ee2c RDI: 0000000000000286 RBP: ffffffff89f85fa0 R08: 0000000031958bc5 R09: 0000000000000001 R10: ffff8880a05d4c70 R11: 0000000000000000 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000002 R15: 0000000000000000 rcu_lock_acquire include/linux/rcupdate.h:242 [inline] rcu_read_lock include/linux/rcupdate.h:627 [inline] lock_page_memcg+0x36/0x220 mm/memcontrol.c:1908 page_remove_file_rmap+0x36/0xa30 mm/rmap.c:1212 page_remove_rmap+0xe5/0x120 mm/rmap.c:1297 zap_pte_range mm/memory.c:1350 [inline] zap_pmd_range mm/memory.c:1463 [inline] zap_pud_range mm/memory.c:1492 [inline] zap_p4d_range mm/memory.c:1513 [inline] unmap_page_range+0x147d/0x2c50 mm/memory.c:1534 unmap_single_vma+0x198/0x300 mm/memory.c:1579 unmap_vmas+0xa9/0x180 mm/memory.c:1609 exit_mmap+0x2b9/0x530 mm/mmap.c:3093 __mmput kernel/fork.c:1016 [inline] mmput+0x14e/0x4a0 kernel/fork.c:1037 exit_mm kernel/exit.c:549 [inline] do_exit+0xaec/0x2be0 kernel/exit.c:857 do_group_exit+0x125/0x310 kernel/exit.c:967 get_signal+0x3f2/0x1f70 kernel/signal.c:2589 do_signal+0x8f/0x1670 arch/x86/kernel/signal.c:799 exit_to_usermode_loop+0x204/0x2a0 arch/x86/entry/common.c:163 prepare_exit_to_usermode arch/x86/entry/common.c:198 [inline] syscall_return_slowpath arch/x86/entry/common.c:271 [inline] do_syscall_64+0x538/0x620 arch/x86/entry/common.c:296 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7f1eaa2c4fe9 Code: Bad RIP value. RSP: 002b:00007f1ea8c3a168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 RAX: 0000000000001d4e RBX: 00007f1eaa3d7f60 RCX: 00007f1eaa2c4fe9 RDX: 00000001000001bd RSI: 00000000200000c0 RDI: 0000000000000006 RBP: 00007f1eaa31f08d R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007fff1ad3819f R14: 00007f1ea8c3a300 R15: 0000000000022000 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 PID: 123 Comm: kworker/u4:3 Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Workqueue: bat_events batadv_nc_worker RIP: 0010:__sanitizer_cov_trace_pc+0x22/0x50 kernel/kcov.c:101 Code: 90 90 90 90 90 90 90 90 48 8b 34 24 65 48 8b 04 25 c0 df 01 00 65 8b 15 cc 59 9f 7e 81 e2 00 01 1f 00 75 2b 8b 90 60 13 00 00 <83> fa 02 75 20 48 8b 88 68 13 00 00 8b 80 64 13 00 00 48 8b 11 48 RSP: 0018:ffff8880b52d7858 EFLAGS: 00000046 RAX: ffff8880b52a0400 RBX: dffffc0000000000 RCX: 0000000000000000 RDX: 0000000000000000 RSI: ffffffff816c5f3e RDI: ffffffff886fb520 RBP: ffff8880b52d7930 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000005 R11: 0000000000000000 R12: ffffffff886fb460 R13: ffffed1016a5af28 R14: ffffc90006bb7038 R15: 0000000000000018 FS: 0000000000000000(0000) GS:ffff8880ba000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000c01547404c CR3: 00000000a4bc7000 CR4: 00000000003406f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: ___bpf_prog_run+0x289e/0x4e80 kernel/bpf/core.c:1110 ---------------- Code disassembly (best guess): 0: df 48 89 fisttps -0x77(%rax) 3: fa cli 4: 48 c1 ea 03 shr $0x3,%rdx 8: 80 3c 02 00 cmpb $0x0,(%rdx,%rax,1) c: 75 0a jne 0x18 e: 48 8b 7b 48 mov 0x48(%rbx),%rdi 12: 5b pop %rbx 13: e9 92 b7 ee ff jmpq 0xffeeb7aa 18: e8 9d da 44 00 callq 0x44daba 1d: eb ef jmp 0xe 1f: 66 66 2e 0f 1f 84 00 data16 nopw %cs:0x0(%rax,%rax,1) 26: 00 00 00 00 * 2a: 41 57 push %r15 <-- trapping instruction 2c: 41 56 push %r14 2e: 41 55 push %r13 30: 41 54 push %r12 32: 49 bc 00 00 00 00 00 movabs $0xdffffc0000000000,%r12 39: fc ff df 3c: 55 push %rbp 3d: 53 push %rbx 3e: 48 rex.W 3f: 89 .byte 0x89