mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium EXT4-fs (loop4): can't mount with dioread_nolock if block size != PAGE_SIZE mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium watchdog: BUG: soft lockup - CPU#0 stuck for 23s! [syz-executor.3:31068] Modules linked in: irq event stamp: 2982749 hardirqs last enabled at (2982748): [] trace_hardirqs_on_thunk+0x1a/0x1c hardirqs last disabled at (2982749): [] trace_hardirqs_off_thunk+0x1a/0x1c softirqs last enabled at (2970940): [] __do_softirq+0x678/0x980 kernel/softirq.c:318 softirqs last disabled at (2970943): [] invoke_softirq kernel/softirq.c:372 [inline] softirqs last disabled at (2970943): [] irq_exit+0x215/0x260 kernel/softirq.c:412 CPU: 0 PID: 31068 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:rcu_read_lock include/linux/rcupdate.h:625 [inline] RIP: 0010:sta_info_get_bss+0x3e/0x340 net/mac80211/sta_info.c:199 Code: f9 49 8d bd 30 05 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 fe 02 00 00 4d 8b a5 30 05 00 00 2d 23 ba f9 e8 b8 9c cb f9 45 31 c9 45 31 c0 31 d2 31 f6 b9 02 RSP: 0018:ffff8880ba007cc8 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13 RAX: dffffc0000000000 RBX: ffff888051fac660 RCX: ffffffff87a0f17d RDX: 1ffff1100a5cbc86 RSI: ffffffff8796e885 RDI: ffff888052e5e430 RBP: ffff8880a3f6335a R08: 0000000000000000 R09: 0000000000000004 R10: 0000000000000005 R11: 0000000000000000 R12: ffff888051fab780 R13: ffff888052e5df00 R14: 0000000000000001 R15: ffff88804cf6ee80 FS: 00007fb4b235f700(0000) GS:ffff8880ba000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007ffdda7669c0 CR3: 0000000009e6d000 CR4: 00000000003406f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: __ieee80211_rx_handle_packet net/mac80211/rx.c:4542 [inline] ieee80211_rx_napi+0x106d/0x2470 net/mac80211/rx.c:4672 ieee80211_rx include/net/mac80211.h:4109 [inline] ieee80211_tasklet_handler+0x101/0x160 net/mac80211/main.c:229 tasklet_action_common.constprop.0+0x265/0x360 kernel/softirq.c:522 __do_softirq+0x265/0x980 kernel/softirq.c:292 invoke_softirq kernel/softirq.c:372 [inline] irq_exit+0x215/0x260 kernel/softirq.c:412 exiting_irq arch/x86/include/asm/apic.h:536 [inline] smp_apic_timer_interrupt+0x136/0x550 arch/x86/kernel/apic/apic.c:1098 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:894 RIP: 0010:pte_dirty arch/x86/include/asm/pgtable.h:124 [inline] RIP: 0010:zap_pte_range mm/memory.c:1341 [inline] RIP: 0010:zap_pmd_range mm/memory.c:1463 [inline] RIP: 0010:zap_pud_range mm/memory.c:1492 [inline] RIP: 0010:zap_p4d_range mm/memory.c:1513 [inline] RIP: 0010:unmap_page_range+0x12c2/0x2c50 mm/memory.c:1534 Code: 18 31 ff 83 e3 01 89 de e8 fb e7 d6 ff 84 db 75 4a e8 c2 e6 d6 ff 31 ff 48 bb ff 0f 00 00 00 00 f0 ff 48 23 9c 24 b8 00 00 00 <41> 89 dc 41 83 e4 40 44 89 e6 e8 0f e8 d6 ff 45 85 e4 0f 85 d4 08 RSP: 0018:ffff8880a9d8f770 EFLAGS: 00000282 ORIG_RAX: ffffffffffffff13 RAX: ffff888096b46600 RBX: 8000000000000007 RCX: ffffffff818b9ea5 RDX: 0000000000000000 RSI: ffffffff818b9eae RDI: 0000000000000000 RBP: ffffea000260e388 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000001 R11: 0000000000000000 R12: ffffea000260e380 R13: ffffea000260e380 R14: dffffc0000000000 R15: 00007fb4b375d000 unmap_single_vma+0x198/0x300 mm/memory.c:1579 unmap_vmas+0xa9/0x180 mm/memory.c:1609 exit_mmap+0x2b9/0x530 mm/mmap.c:3093 __mmput kernel/fork.c:1016 [inline] mmput+0x14e/0x4a0 kernel/fork.c:1037 exit_mm kernel/exit.c:549 [inline] do_exit+0xaec/0x2be0 kernel/exit.c:857 do_group_exit+0x125/0x310 kernel/exit.c:967 get_signal+0x3f2/0x1f70 kernel/signal.c:2589 do_signal+0x8f/0x1670 arch/x86/kernel/signal.c:799 exit_to_usermode_loop+0x204/0x2a0 arch/x86/entry/common.c:163 prepare_exit_to_usermode arch/x86/entry/common.c:198 [inline] syscall_return_slowpath arch/x86/entry/common.c:271 [inline] do_syscall_64+0x538/0x620 arch/x86/entry/common.c:296 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7fb4b39e9e99 Code: Bad RIP value. RSP: 002b:00007fb4b235f218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca RAX: fffffffffffffe00 RBX: 00007fb4b3afcf68 RCX: 00007fb4b39e9e99 RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007fb4b3afcf68 RBP: 00007fb4b3afcf60 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb4b3afcf6c R13: 00007ffdda74a9ef R14: 00007fb4b235f300 R15: 0000000000022000 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 PID: 9364 Comm: kworker/u4:5 Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Workqueue: bat_events batadv_nc_worker RIP: 0010:__read_once_size include/linux/compiler.h:263 [inline] RIP: 0010:check_kcov_mode kernel/kcov.c:69 [inline] RIP: 0010:write_comp_data+0x1d/0x70 kernel/kcov.c:122 Code: d1 48 89 11 c3 0f 1f 84 00 00 00 00 00 49 89 f1 49 89 fa 65 48 8b 34 25 c0 df 01 00 65 8b 05 7a 59 9f 7e a9 00 01 1f 00 75 4f <8b> 86 60 13 00 00 83 f8 03 75 44 48 8b 86 68 13 00 00 8b b6 64 13 RSP: 0018:ffff888052c5fca8 EFLAGS: 00000246 RAX: 0000000080000000 RBX: 0000000000000000 RCX: ffffffff87d8f06d RDX: 0000000000000000 RSI: ffff888052c50640 RDI: 0000000000000001 RBP: 0000000000000001 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000001 R11: 0000000000000000 R12: 0000000000000000 R13: dffffc0000000000 R14: 00000000000000ba R15: ffff8880a45fe800 FS: 0000000000000000(0000) GS:ffff8880ba100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000c0009fd308 CR3: 000000009732a000 CR4: 00000000003406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: rcu_read_unlock include/linux/rcupdate.h:677 [inline] batadv_nc_purge_orig_hash net/batman-adv/network-coding.c:423 [inline] batadv_nc_worker+0x63d/0xd50 net/batman-adv/network-coding.c:730 process_one_work+0x864/0x1570 kernel/workqueue.c:2153 worker_thread+0x64c/0x1130 kernel/workqueue.c:2296 kthread+0x33f/0x460 kernel/kthread.c:259 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415 ---------------- Code disassembly (best guess): 0: f9 stc 1: 49 8d bd 30 05 00 00 lea 0x530(%r13),%rdi 8: 48 b8 00 00 00 00 00 movabs $0xdffffc0000000000,%rax f: fc ff df 12: 48 89 fa mov %rdi,%rdx 15: 48 c1 ea 03 shr $0x3,%rdx 19: 80 3c 02 00 cmpb $0x0,(%rdx,%rax,1) 1d: 0f 85 fe 02 00 00 jne 0x321 23: 4d 8b a5 30 05 00 00 mov 0x530(%r13),%r12 * 2a: e8 2d 23 ba f9 callq 0xf9ba235c <-- trapping instruction 2f: e8 b8 9c cb f9 callq 0xf9cb9cec 34: 45 31 c9 xor %r9d,%r9d 37: 45 31 c0 xor %r8d,%r8d 3a: 31 d2 xor %edx,%edx 3c: 31 f6 xor %esi,%esi 3e: b9 .byte 0xb9 3f: 02 .byte 0x2