netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. ieee802154 phy0 wpan0: encryption failed: -22 ieee802154 phy1 wpan1: encryption failed: -22 watchdog: BUG: soft lockup - CPU#1 stuck for 21s! [syz-executor.1:7453] Modules linked in: irq event stamp: 2774187 hardirqs last enabled at (2774186): [] trace_hardirqs_on_thunk+0x1a/0x1c hardirqs last disabled at (2774187): [] trace_hardirqs_off_thunk+0x1a/0x1c softirqs last enabled at (2754678): [] __do_softirq+0x678/0x980 kernel/softirq.c:318 softirqs last disabled at (2754681): [] invoke_softirq kernel/softirq.c:372 [inline] softirqs last disabled at (2754681): [] irq_exit+0x215/0x260 kernel/softirq.c:412 CPU: 1 PID: 7453 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 RIP: 0010:preempt_count_add+0xa0/0x190 kernel/sched/core.c:3242 Code: c6 c8 e2 0b 85 d2 75 11 65 8b 05 ab 70 c0 7e 0f b6 c0 3d f4 00 00 00 7f 64 65 8b 05 9a 70 c0 7e 25 ff ff ff 7f 39 c5 74 03 5b <5d> c3 48 8b 5c 24 10 48 89 df e8 41 15 0a 00 85 c0 75 35 65 48 8b RSP: 0018:ffff8880ba1078f8 EFLAGS: 00000293 ORIG_RAX: ffffffffffffff13 RAX: 0000000000000303 RBX: ffff888231bf4480 RCX: 0000000000000000 RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000001 RBP: 0000000000000001 R08: 0000000000000000 R09: ffffed101742455a R10: ffff8880ba122ad3 R11: 0000000000000000 R12: 0000000000000001 R13: ffff88804975d7f0 R14: 0000000000000000 R15: ffff8880ba107dd8 FS: 00007fdcfe2a3700(0000) GS:ffff8880ba100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fba59052710 CR3: 0000000009e6d000 CR4: 00000000003406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: rcu_lockdep_current_cpu_online kernel/rcu/tree.c:1076 [inline] rcu_lockdep_current_cpu_online+0x32/0x1b0 kernel/rcu/tree.c:1068 rcu_read_lock_held+0xc3/0x110 kernel/rcu/update.c:285 ieee80211_rx_h_decrypt net/mac80211/rx.c:1897 [inline] ieee80211_rx_handlers+0x44d5/0x9730 net/mac80211/rx.c:3676 ieee80211_invoke_rx_handlers net/mac80211/rx.c:3726 [inline] ieee80211_prepare_and_rx_handle+0x23fa/0x6790 net/mac80211/rx.c:4423 __ieee80211_rx_handle_packet net/mac80211/rx.c:4483 [inline] ieee80211_rx_napi+0x108d/0x2470 net/mac80211/rx.c:4672 ieee80211_rx include/net/mac80211.h:4109 [inline] ieee80211_tasklet_handler+0x101/0x160 net/mac80211/main.c:229 tasklet_action_common.constprop.0+0x265/0x360 kernel/softirq.c:522 __do_softirq+0x265/0x980 kernel/softirq.c:292 invoke_softirq kernel/softirq.c:372 [inline] irq_exit+0x215/0x260 kernel/softirq.c:412 exiting_irq arch/x86/include/asm/apic.h:536 [inline] smp_apic_timer_interrupt+0x136/0x550 arch/x86/kernel/apic/apic.c:1098 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:894 RIP: 0010:__read_once_size include/linux/compiler.h:263 [inline] RIP: 0010:compound_head include/linux/page-flags.h:142 [inline] RIP: 0010:PageAnon include/linux/page-flags.h:418 [inline] RIP: 0010:zap_pte_range mm/memory.c:1340 [inline] RIP: 0010:zap_pmd_range mm/memory.c:1463 [inline] RIP: 0010:zap_pud_range mm/memory.c:1492 [inline] RIP: 0010:zap_p4d_range mm/memory.c:1513 [inline] RIP: 0010:unmap_page_range+0x124a/0x2c50 mm/memory.c:1534 Code: 39 79 18 48 0f 43 41 18 4d 85 ed 48 89 41 18 0f 84 36 fe ff ff e8 36 e7 d6 ff 49 8d 6d 08 48 89 e8 48 c1 e8 03 42 80 3c 30 00 <0f> 85 df 16 00 00 49 8b 45 08 31 ff 4d 89 ec 48 89 c3 48 89 84 24 RSP: 0018:ffff888231077770 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13 RAX: 1ffffd4000469039 RBX: 0000000000000001 RCX: ffff8882310779b0 RDX: 0000000000000000 RSI: ffffffff818b9e3a RDI: ffff8882310779c8 RBP: ffffea00023481c8 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000001 R11: 0000000000000000 R12: 800000008d207007 R13: ffffea00023481c0 R14: dffffc0000000000 R15: 00007fdcfed23000 unmap_single_vma+0x198/0x300 mm/memory.c:1579 unmap_vmas+0xa9/0x180 mm/memory.c:1609 exit_mmap+0x2b9/0x530 mm/mmap.c:3093 __mmput kernel/fork.c:1016 [inline] mmput+0x14e/0x4a0 kernel/fork.c:1037 exit_mm kernel/exit.c:549 [inline] do_exit+0xaec/0x2be0 kernel/exit.c:857 do_group_exit+0x125/0x310 kernel/exit.c:967 get_signal+0x3f2/0x1f70 kernel/signal.c:2589 do_signal+0x8f/0x1670 arch/x86/kernel/signal.c:799 exit_to_usermode_loop+0x204/0x2a0 arch/x86/entry/common.c:163 prepare_exit_to_usermode arch/x86/entry/common.c:198 [inline] syscall_return_slowpath arch/x86/entry/common.c:271 [inline] do_syscall_64+0x538/0x620 arch/x86/entry/common.c:296 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7fdcffd520d9 Code: Bad RIP value. RSP: 002b:00007fdcfe2a3168 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 RAX: 000000000000004b RBX: 00007fdcffe72050 RCX: 00007fdcffd520d9 RDX: 04924924924926d3 RSI: 0000000020000200 RDI: 0000000000000003 RBP: 00007fdcffdadae9 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffc37fd13bf R14: 00007fdcfe2a3300 R15: 0000000000022000 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 PID: 7 Comm: kworker/u4:0 Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 Workqueue: bat_events batadv_nc_worker RIP: 0010:__lock_acquire+0x783/0x3ff0 kernel/locking/lockdep.c:3406 Code: 11 00 0f 85 db 27 00 00 49 8b 9d 78 08 00 00 45 31 ff 45 85 c9 41 0f 94 c7 48 ba 00 00 00 00 00 fc ff df 4c 89 d1 48 c1 e9 03 <80> 3c 11 00 0f 85 e5 26 00 00 48 8b 4c 24 18 49 89 1a 48 ba 00 00 RSP: 0018:ffff8880b5a47a68 EFLAGS: 00000806 RAX: 000000000000002e RBX: 2dd150d81d9d9e89 RCX: 1ffff11016b46d53 RDX: dffffc0000000000 RSI: ffff8880b5a36a98 RDI: ffffffff8cd630c0 RBP: 0000000000000000 R08: 000000000000002e R09: 0000000000000002 R10: ffff8880b5a36a98 R11: 0000000000000000 R12: 000000000002002e R13: ffff8880b5a361c0 R14: ffff8880b5a36ab0 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff8880ba000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000c025605248 CR3: 00000000b41b1000 CR4: 00000000003406f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: lock_acquire+0x170/0x3c0 kernel/locking/lockdep.c:3908 rcu_lock_acquire include/linux/rcupdate.h:242 [inline] rcu_read_lock include/linux/rcupdate.h:627 [inline] batadv_nc_purge_orig_hash net/batman-adv/network-coding.c:419 [inline] batadv_nc_worker+0x12d/0xd50 net/batman-adv/network-coding.c:730 process_one_work+0x864/0x1570 kernel/workqueue.c:2153 worker_thread+0x64c/0x1130 kernel/workqueue.c:2296 kthread+0x33f/0x460 kernel/kthread.c:259 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415