watchdog: BUG: soft lockup - CPU#1 stuck for 22s! [syz-executor.3:30955] Modules linked in: irq event stamp: 2337529 hardirqs last enabled at (2337528): [] trace_hardirqs_on_thunk+0x1a/0x1c hardirqs last disabled at (2337529): [] trace_hardirqs_off_thunk+0x1a/0x1c softirqs last enabled at (1750): [] llc_ui_connect+0x4ec/0xc20 net/llc/af_llc.c:520 softirqs last disabled at (1751): [] do_softirq_own_stack+0x2a/0x40 arch/x86/entry/entry_64.S:1092 CPU: 1 PID: 30955 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:arch_local_irq_restore arch/x86/include/asm/paravirt.h:789 [inline] RIP: 0010:lock_acquire+0x1ec/0x3c0 kernel/locking/lockdep.c:3911 Code: 08 00 00 00 00 00 00 48 c1 e8 03 80 3c 10 00 0f 85 b7 01 00 00 48 83 3d 09 2e a6 08 00 0f 84 2a 01 00 00 48 8b 7c 24 08 57 9d <0f> 1f 44 00 00 48 83 c4 18 5b 5d 41 5c 41 5d 41 5e 41 5f c3 65 8b RSP: 0018:ffff8880ba107d18 EFLAGS: 00000286 ORIG_RAX: ffffffffffffff13 RAX: 1ffffffff13e3051 RBX: ffff88804fb0c580 RCX: 00000000000052af RDX: dffffc0000000000 RSI: 000000002124b10c RDI: 0000000000000286 RBP: ffff8880ba107da0 R08: ffffffff8cd40ab8 R09: 0000000000000000 R10: ffff88804fb0ce08 R11: 0000000000000000 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000001 FS: 00007f3761071700(0000) GS:ffff8880ba100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000559e2800a000 CR3: 000000005298e000 CR4: 00000000003406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: call_timer_fn+0x113/0x700 kernel/time/timer.c:1335 expire_timers+0x243/0x4e0 kernel/time/timer.c:1375 __run_timers kernel/time/timer.c:1696 [inline] run_timer_softirq+0x21c/0x670 kernel/time/timer.c:1709 __do_softirq+0x265/0x980 kernel/softirq.c:292 do_softirq_own_stack+0x2a/0x40 arch/x86/entry/entry_64.S:1092 do_softirq.part.0+0x160/0x1c0 kernel/softirq.c:336 do_softirq kernel/softirq.c:328 [inline] __local_bh_enable_ip+0x20e/0x270 kernel/softirq.c:189 llc_ui_connect+0x4ec/0xc20 net/llc/af_llc.c:520 __sys_connect+0x265/0x2c0 net/socket.c:1775 __do_sys_connect net/socket.c:1786 [inline] __se_sys_connect net/socket.c:1783 [inline] __x64_sys_connect+0x6f/0xb0 net/socket.c:1783 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7f37626fbfe9 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f3761071168 EFLAGS: 00000246 ORIG_RAX: 000000000000002a RAX: ffffffffffffffda RBX: 00007f376280ef60 RCX: 00007f37626fbfe9 RDX: 0000000000000010 RSI: 0000000020000380 RDI: 0000000000000006 RBP: 00007f376275608d R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffddf604cff R14: 00007f3761071300 R15: 0000000000022000 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 PID: 12226 Comm: kworker/u4:6 Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Workqueue: bat_events batadv_tt_purge RIP: 0010:mark_held_locks+0x0/0xf0 kernel/locking/lockdep.c:2798 Code: c7 60 37 24 8d e8 00 6b 4d 00 e9 e8 f7 ff ff 48 c7 c7 40 f7 36 8d e8 ef 6a 4d 00 e9 1f f8 ff ff 66 2e 0f 1f 84 00 00 00 00 00 <48> b8 00 00 00 00 00 fc ff df 41 57 41 56 41 55 49 89 fd 48 81 c7 RSP: 0018:ffff88803fbd7c00 EFLAGS: 00000002 RAX: 0000000000000001 RBX: ffff88809dd0c200 RCX: 1ffff11013ba195a RDX: 1ffff11013ba194e RSI: 0000000000000001 RDI: ffff88809dd0c200 RBP: ffffffff813922a9 R08: 0000000000000001 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: ffff88809dd0c200 R13: ffff88801220d118 R14: 00000000000927c0 R15: dffffc0000000000 FS: 0000000000000000(0000) GS:ffff8880ba000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000001b2d824000 CR3: 0000000099fc8000 CR4: 00000000003406f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: __trace_hardirqs_on_caller kernel/locking/lockdep.c:2839 [inline] lockdep_hardirqs_on+0x3a8/0x5c0 kernel/locking/lockdep.c:2884 __local_bh_enable_ip+0x159/0x270 kernel/softirq.c:194 spin_unlock_bh include/linux/spinlock.h:374 [inline] batadv_tt_local_purge+0x278/0x370 net/batman-adv/translation-table.c:1456 batadv_tt_purge+0x2c/0xa00 net/batman-adv/translation-table.c:3811 process_one_work+0x864/0x1570 kernel/workqueue.c:2153 worker_thread+0x64c/0x1130 kernel/workqueue.c:2296 kthread+0x33f/0x460 kernel/kthread.c:259 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415 ---------------- Code disassembly (best guess): 0: 08 00 or %al,(%rax) 2: 00 00 add %al,(%rax) 4: 00 00 add %al,(%rax) 6: 00 48 c1 add %cl,-0x3f(%rax) 9: e8 03 80 3c 10 callq 0x103c8011 e: 00 0f add %cl,(%rdi) 10: 85 b7 01 00 00 48 test %esi,0x48000001(%rdi) 16: 83 3d 09 2e a6 08 00 cmpl $0x0,0x8a62e09(%rip) # 0x8a62e26 1d: 0f 84 2a 01 00 00 je 0x14d 23: 48 8b 7c 24 08 mov 0x8(%rsp),%rdi 28: 57 push %rdi 29: 9d popfq * 2a: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1) <-- trapping instruction 2f: 48 83 c4 18 add $0x18,%rsp 33: 5b pop %rbx 34: 5d pop %rbp 35: 41 5c pop %r12 37: 41 5d pop %r13 39: 41 5e pop %r14 3b: 41 5f pop %r15 3d: c3 retq 3e: 65 gs 3f: 8b .byte 0x8b