mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium watchdog: BUG: soft lockup - CPU#1 stuck for 22s! [syz-executor.5:15245] Modules linked in: irq event stamp: 3419329 hardirqs last enabled at (3419328): [] trace_hardirqs_on_thunk+0x1a/0x1c hardirqs last disabled at (3419329): [] trace_hardirqs_off_thunk+0x1a/0x1c softirqs last enabled at (3376742): [] __do_softirq+0x678/0x980 kernel/softirq.c:318 softirqs last disabled at (3376745): [] invoke_softirq kernel/softirq.c:372 [inline] softirqs last disabled at (3376745): [] irq_exit+0x215/0x260 kernel/softirq.c:412 CPU: 1 PID: 15245 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 RIP: 0010:get_current arch/x86/include/asm/current.h:15 [inline] RIP: 0010:__sanitizer_cov_trace_pc+0x4/0x50 kernel/kcov.c:100 Code: e8 11 dd 35 00 e9 ab fe ff ff 4c 89 ef e8 04 dd 35 00 e9 23 fe ff ff 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 48 8b 34 24 <65> 48 8b 04 25 c0 df 01 00 65 8b 15 cc 59 9f 7e 81 e2 00 01 1f 00 RSP: 0018:ffff8880ba1078c8 EFLAGS: 00000206 ORIG_RAX: ffffffffffffff13 RAX: ffff88804a818200 RBX: 0000000000000303 RCX: ffffffff83771e23 RDX: 0000000000000100 RSI: ffffffff83771e31 RDI: 0000000000000005 RBP: ffffffff88b3e120 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000005 R11: 0000000000000000 R12: 0000000000000001 R13: ffffffff88b3e0e0 R14: ffff88803d13a3c0 R15: ffff8880ba107dd8 FS: 00007f9510bf7700(0000) GS:ffff8880ba100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000055c5e928f298 CR3: 0000000009e6d000 CR4: 00000000003406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: check_preemption_disabled+0x41/0x280 lib/smp_processor_id.c:51 rcu_lockdep_current_cpu_online kernel/rcu/tree.c:1078 [inline] rcu_lockdep_current_cpu_online+0xb2/0x1b0 kernel/rcu/tree.c:1068 rcu_read_lock_held+0xc3/0x110 kernel/rcu/update.c:285 ieee80211_rx_h_decrypt net/mac80211/rx.c:1840 [inline] ieee80211_rx_handlers+0x1bcc/0x9730 net/mac80211/rx.c:3676 ieee80211_invoke_rx_handlers net/mac80211/rx.c:3726 [inline] ieee80211_prepare_and_rx_handle+0x23fa/0x6790 net/mac80211/rx.c:4423 __ieee80211_rx_handle_packet net/mac80211/rx.c:4483 [inline] ieee80211_rx_napi+0x108d/0x2470 net/mac80211/rx.c:4672 ieee80211_rx include/net/mac80211.h:4109 [inline] ieee80211_tasklet_handler+0x101/0x160 net/mac80211/main.c:229 tasklet_action_common.constprop.0+0x265/0x360 kernel/softirq.c:522 __do_softirq+0x265/0x980 kernel/softirq.c:292 invoke_softirq kernel/softirq.c:372 [inline] irq_exit+0x215/0x260 kernel/softirq.c:412 exiting_irq arch/x86/include/asm/apic.h:536 [inline] smp_apic_timer_interrupt+0x136/0x550 arch/x86/kernel/apic/apic.c:1098 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:894 RIP: 0010:__tlb_remove_page_size+0xf8/0x470 mm/memory.c:316 Code: 28 48 8d 7d 08 48 89 fa 48 c1 ea 03 0f b6 04 02 84 c0 74 08 3c 03 0f 8e e0 02 00 00 48 b8 00 00 00 00 00 fc ff df 44 8b 65 08 <4a> 8d 7c e5 10 45 8d 6c 24 01 48 89 fa 48 c1 ea 03 44 89 6d 08 80 RSP: 0018:ffff88803654f738 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13 RAX: dffffc0000000000 RBX: ffff88803654f9b0 RCX: ffffffff818b3334 RDX: 1ffff11008227401 RSI: ffffffff818b3342 RDI: ffff88804113a008 RBP: ffff88804113a000 R08: 0000000000000000 R09: 0000000000001000 R10: 0000000000000004 R11: 0000000000000000 R12: 0000000000000187 R13: ffffea0002cf2840 R14: ffffea0002cf2840 R15: ffff88803654f9d8 __tlb_remove_page include/asm-generic/tlb.h:161 [inline] zap_pte_range mm/memory.c:1353 [inline] zap_pmd_range mm/memory.c:1463 [inline] zap_pud_range mm/memory.c:1492 [inline] zap_p4d_range mm/memory.c:1513 [inline] unmap_page_range+0x14e7/0x2c50 mm/memory.c:1534 unmap_single_vma+0x198/0x300 mm/memory.c:1579 unmap_vmas+0xa9/0x180 mm/memory.c:1609 exit_mmap+0x2b9/0x530 mm/mmap.c:3093 __mmput kernel/fork.c:1016 [inline] mmput+0x14e/0x4a0 kernel/fork.c:1037 exit_mm kernel/exit.c:549 [inline] do_exit+0xaec/0x2be0 kernel/exit.c:857 do_group_exit+0x125/0x310 kernel/exit.c:967 get_signal+0x3f2/0x1f70 kernel/signal.c:2589 do_signal+0x8f/0x1670 arch/x86/kernel/signal.c:799 exit_to_usermode_loop+0x204/0x2a0 arch/x86/entry/common.c:163 prepare_exit_to_usermode arch/x86/entry/common.c:198 [inline] syscall_return_slowpath arch/x86/entry/common.c:271 [inline] do_syscall_64+0x538/0x620 arch/x86/entry/common.c:296 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7f9512282279 Code: Bad RIP value. RSP: 002b:00007f9510bf7168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 RAX: 0000000000023000 RBX: 00007f9512394f80 RCX: 00007f9512282279 RDX: 0000000000023000 RSI: 0000000020000200 RDI: 0000000000000006 RBP: 00007f95122dc189 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffd80e6780f R14: 00007f9510bf7300 R15: 0000000000022000 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 PID: 13573 Comm: kworker/u4:5 Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 Workqueue: bat_events batadv_nc_worker RIP: 0010:__lock_acquire+0x232/0x3ff0 kernel/locking/lockdep.c:3303 Code: ff ff ff 48 ba 00 00 00 00 00 fc ff df 89 f0 49 8d 7c c6 08 48 89 f9 48 c1 e9 03 80 3c 11 00 0f 85 90 2a 00 00 49 8b 44 c6 08 <48> 85 c0 0f 84 38 ff ff ff 48 8d b8 38 01 00 00 be 04 00 00 00 48 RSP: 0018:ffff8880390e79e8 EFLAGS: 00000046 RAX: ffffffff8cddf3b0 RBX: 0000000000000000 RCX: 1ffff110071410b0 RDX: dffffc0000000000 RSI: 0000000000000000 RDI: ffff888038a08580 RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000001 R10: 0000000000000004 R11: 0000000000000000 R12: 0000000000000000 R13: ffff888057958100 R14: ffff888038a08578 R15: 0000000000000001 FS: 0000000000000000(0000) GS:ffff8880ba000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000c003854d40 CR3: 00000000abb89000 CR4: 00000000003406f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: lock_acquire+0x170/0x3c0 kernel/locking/lockdep.c:3908 __raw_spin_lock_bh include/linux/spinlock_api_smp.h:135 [inline] _raw_spin_lock_bh+0x2f/0x40 kernel/locking/spinlock.c:168 spin_lock_bh include/linux/spinlock.h:334 [inline] batadv_nc_purge_paths+0xdc/0x310 net/batman-adv/network-coding.c:453 batadv_nc_worker+0x6fa/0xd50 net/batman-adv/network-coding.c:731 process_one_work+0x864/0x1570 kernel/workqueue.c:2153 worker_thread+0x64c/0x1130 kernel/workqueue.c:2296 kthread+0x33f/0x460 kernel/kthread.c:259 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415