watchdog: BUG: soft lockup - CPU#0 stuck for 123s! [syz-executor.4:17121] Modules linked in: irq event stamp: 19343989 hardirqs last enabled at (19343988): [] asm_sysvec_irq_work+0x12/0x20 arch/x86/include/asm/idtentry.h:658 hardirqs last disabled at (19343989): [] sysvec_apic_timer_interrupt+0xb/0xc0 arch/x86/kernel/apic/apic.c:1100 softirqs last enabled at (18929286): [] invoke_softirq kernel/softirq.c:221 [inline] softirqs last enabled at (18929286): [] __irq_exit_rcu kernel/softirq.c:422 [inline] softirqs last enabled at (18929286): [] irq_exit_rcu+0x134/0x200 kernel/softirq.c:434 softirqs last disabled at (18929289): [] invoke_softirq kernel/softirq.c:221 [inline] softirqs last disabled at (18929289): [] __irq_exit_rcu kernel/softirq.c:422 [inline] softirqs last disabled at (18929289): [] irq_exit_rcu+0x134/0x200 kernel/softirq.c:434 CPU: 0 PID: 17121 Comm: syz-executor.4 Not tainted 5.12.0-rc1-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:check_kcov_mode kernel/kcov.c:163 [inline] RIP: 0010:__sanitizer_cov_trace_pc+0x7/0x60 kernel/kcov.c:197 Code: ff ff ff ba 08 00 00 00 4d 8b 03 48 0f bd ca 49 8b 45 00 48 63 c9 e9 64 ff ff ff 0f 1f 84 00 00 00 00 00 65 8b 05 49 98 8e 7e <89> c1 48 8b 34 24 81 e1 00 01 00 00 65 48 8b 14 25 00 f0 01 00 a9 RSP: 0018:ffffc900000078f8 EFLAGS: 00000297 RAX: 0000000000000302 RBX: 0000000000000080 RCX: ffff888014a15340 RDX: 0000000000000000 RSI: ffff888014a15340 RDI: 0000000000000003 RBP: 0000000000000000 R08: 0000000000000007 R09: 0000000000000000 R10: ffffffff885f7a80 R11: 0000000000000004 R12: dffffc0000000000 R13: ffff888013cdb050 R14: ffff888012a41a00 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000020000180 CR3: 0000000016c28000 CR4: 0000000000350ef0 DR0: 0000000020000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 Call Trace: ieee80211_rx_h_mgmt_check net/mac80211/rx.c:3083 [inline] ieee80211_rx_handlers+0x34af/0xae60 net/mac80211/rx.c:3787 ieee80211_invoke_rx_handlers net/mac80211/rx.c:3823 [inline] ieee80211_prepare_and_rx_handle+0x22ad/0x5070 net/mac80211/rx.c:4537 __ieee80211_rx_handle_packet net/mac80211/rx.c:4635 [inline] ieee80211_rx_list+0x930/0x2680 net/mac80211/rx.c:4819 ieee80211_rx_napi+0xf7/0x3d0 net/mac80211/rx.c:4842 ieee80211_rx include/net/mac80211.h:4524 [inline] ieee80211_tasklet_handler+0xd4/0x130 net/mac80211/main.c:235 tasklet_action_common.constprop.0+0x1d7/0x2d0 kernel/softirq.c:557 __do_softirq+0x29b/0x9f6 kernel/softirq.c:345 invoke_softirq kernel/softirq.c:221 [inline] __irq_exit_rcu kernel/softirq.c:422 [inline] irq_exit_rcu+0x134/0x200 kernel/softirq.c:434 sysvec_apic_timer_interrupt+0x93/0xc0 arch/x86/kernel/apic/apic.c:1100 asm_sysvec_apic_timer_interrupt+0x12/0x20 arch/x86/include/asm/idtentry.h:632 RIP: 0010:mm_update_next_owner+0x432/0x7a0 kernel/exit.c:388 Code: 8d ad b0 fb ff ff 48 81 fd 50 c8 cb 8b 0f 84 65 01 00 00 e8 90 e6 2e 00 48 8d bd dc fb ff ff 48 89 f8 48 c1 e8 03 0f b6 14 18 <48> 89 f8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 b5 02 00 00 44 RSP: 0018:ffffc90002bc7b18 EFLAGS: 00000217 RAX: 1ffff110040c3005 RBX: dffffc0000000000 RCX: 0000000000000000 RDX: 0000000000000000 RSI: ffffffff814470e0 RDI: ffff88802061802c RBP: ffff888020618450 R08: 0000000000000000 R09: ffffffff8bc0a083 R10: ffffffff8144711f R11: 0000000000000001 R12: ffff888022589500 R13: ffff888020618000 R14: 0000000000200000 R15: ffff888011528010 exit_mm kernel/exit.c:500 [inline] do_exit+0xb02/0x2a60 kernel/exit.c:812 do_group_exit+0x125/0x310 kernel/exit.c:922 get_signal+0x42c/0x2100 kernel/signal.c:2773 arch_do_signal_or_restart+0x2a8/0x1eb0 arch/x86/kernel/signal.c:811 handle_signal_work kernel/entry/common.c:147 [inline] exit_to_user_mode_loop kernel/entry/common.c:171 [inline] exit_to_user_mode_prepare+0x148/0x250 kernel/entry/common.c:208 __syscall_exit_to_user_mode_work kernel/entry/common.c:290 [inline] syscall_exit_to_user_mode+0x19/0x50 kernel/entry/common.c:301 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x465ef9 Code: Unable to access opcode bytes at RIP 0x465ecf. RSP: 002b:00007f0250e1b218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca RAX: 0000000000000000 RBX: 000000000056bf68 RCX: 0000000000465ef9 RDX: 0000000000000000 RSI: 0000000000000080 RDI: 000000000056bf68 RBP: 000000000056bf60 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf6c R13: 00007fffb0b92caf R14: 00007f0250e1b300 R15: 0000000000022000 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 PID: 17154 Comm: syz-executor.4 Not tainted 5.12.0-rc1-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:queued_write_lock_slowpath+0x131/0x270 kernel/locking/qrwlock.c:76 Code: 00 00 00 00 fc ff df 49 01 c7 41 83 c6 03 41 0f b6 07 41 38 c6 7c 08 84 c0 0f 85 fe 00 00 00 8b 03 3d 00 01 00 00 74 19 f3 90 <41> 0f b6 07 41 38 c6 7c ec 84 c0 74 e8 48 89 df e8 8a 5c 5d 00 eb RSP: 0018:ffffc90001d2fa60 EFLAGS: 00000006 RAX: 0000000000000300 RBX: ffffffff8bc0a080 RCX: ffffffff8159ecfa RDX: fffffbfff1781411 RSI: 0000000000000004 RDI: ffffffff8bc0a080 RBP: 00000000000000ff R08: 0000000000000001 R09: ffffffff8bc0a083 R10: fffffbfff1781410 R11: 0000000000000000 R12: 1ffff920003a5f4d R13: ffffffff8bc0a084 R14: 0000000000000003 R15: fffffbfff1781410 FS: 0000000000000000(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000000053b0f8 CR3: 0000000016c28000 CR4: 0000000000350ee0 Call Trace: queued_write_lock include/asm-generic/qrwlock.h:97 [inline] do_raw_write_lock+0x1ce/0x280 kernel/locking/spinlock_debug.c:207 exit_notify kernel/exit.c:667 [inline] do_exit+0xc4a/0x2a60 kernel/exit.c:845 do_group_exit+0x125/0x310 kernel/exit.c:922 get_signal+0x42c/0x2100 kernel/signal.c:2773 arch_do_signal_or_restart+0x2a8/0x1eb0 arch/x86/kernel/signal.c:811 handle_signal_work kernel/entry/common.c:147 [inline] exit_to_user_mode_loop kernel/entry/common.c:171 [inline] exit_to_user_mode_prepare+0x148/0x250 kernel/entry/common.c:208 __syscall_exit_to_user_mode_work kernel/entry/common.c:290 [inline] syscall_exit_to_user_mode+0x19/0x50 kernel/entry/common.c:301 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x465ef9 Code: Unable to access opcode bytes at RIP 0x465ecf. RSP: 002b:00007f0250dd9218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca RAX: fffffffffffffe00 RBX: 000000000056c0b8 RCX: 0000000000465ef9 RDX: 0000000000000000 RSI: 0000000000000080 RDI: 000000000056c0b8 RBP: 000000000056c0b0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056c0bc R13: 00007fffb0b92caf R14: 00007f0250dd9300 R15: 0000000000022000