audit: type=1804 audit(1673536902.246:858): pid=6833 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir2077442158/syzkaller.xFERkg/1742/bus" dev="sda1" ino=14866 res=1 watchdog: BUG: soft lockup - CPU#0 stuck for 23s! [syz-executor.1:6807] Modules linked in: irq event stamp: 293949 hardirqs last enabled at (293948): [] seqcount_lockdep_reader_access include/linux/seqlock.h:83 [inline] hardirqs last enabled at (293948): [] read_seqcount_begin include/linux/seqlock.h:164 [inline] hardirqs last enabled at (293948): [] ktime_get+0x235/0x2f0 kernel/time/timekeeping.c:756 hardirqs last disabled at (293949): [] trace_hardirqs_off_thunk+0x1a/0x1c softirqs last enabled at (3606): [] netlink_insert+0x156/0x11d0 net/netlink/af_netlink.c:608 softirqs last disabled at (3704): [] __dev_queue_xmit+0x1e2/0x2e00 net/core/dev.c:3773 CPU: 0 PID: 6807 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 RIP: 0010:cake_drop net/sched/sch_cake.c:1472 [inline] RIP: 0010:cake_enqueue+0x1282/0x33d0 net/sched/sch_cake.c:1848 Code: 84 c0 74 08 3c 01 0f 8e 73 1b 00 00 45 0f b7 a7 98 42 00 00 31 ff 44 89 e6 e8 0a 5f c9 fa 66 45 85 e4 75 2d 41 bc 00 10 00 00 a9 5d c9 fa 44 89 e6 48 89 df 41 83 ec 01 e8 ea 33 ff ff 44 89 RSP: 0018:ffff88821e927680 EFLAGS: 00000217 ORIG_RAX: ffffffffffffff13 RAX: 0000000000000002 RBX: ffff88803ec76fc0 RCX: ffffffff869927e3 RDX: 0000000000000da2 RSI: ffff888041948480 RDI: 0000000000000005 RBP: dffffc0000000000 R08: ffffffff8c665018 R09: 00000000ffffffff R10: 0000000000000005 R11: ffffffff8c66501b R12: 0000000000000da2 R13: 0000000000000300 R14: ffff8880256018c0 R15: ffff88803ec76d40 FS: 00007fa5ec741700(0000) GS:ffff8880ba000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000001b2db28000 CR3: 0000000099a43000 CR4: 00000000003406f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: __dev_xmit_skb net/core/dev.c:3494 [inline] __dev_queue_xmit+0x140a/0x2e00 net/core/dev.c:3807 __netlink_deliver_tap_skb net/netlink/af_netlink.c:303 [inline] __netlink_deliver_tap net/netlink/af_netlink.c:321 [inline] netlink_deliver_tap+0x8fb/0xb00 net/netlink/af_netlink.c:334 netlink_deliver_tap_kernel net/netlink/af_netlink.c:343 [inline] netlink_unicast_kernel net/netlink/af_netlink.c:1324 [inline] netlink_unicast+0x545/0x690 net/netlink/af_netlink.c:1351 netlink_sendmsg+0x6c3/0xc50 net/netlink/af_netlink.c:1917 sock_sendmsg_nosec net/socket.c:651 [inline] sock_sendmsg+0xc3/0x120 net/socket.c:661 ___sys_sendmsg+0x7bb/0x8e0 net/socket.c:2227 __sys_sendmsg net/socket.c:2265 [inline] __do_sys_sendmsg net/socket.c:2274 [inline] __se_sys_sendmsg net/socket.c:2272 [inline] __x64_sys_sendmsg+0x132/0x220 net/socket.c:2272 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7fa5ee1cf0c9 Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fa5ec741168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e RAX: ffffffffffffffda RBX: 00007fa5ee2eef80 RCX: 00007fa5ee1cf0c9 RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000006 RBP: 00007fa5ee22aae9 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffc5b86b61f R14: 00007fa5ec741300 R15: 0000000000022000 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 PID: 7 Comm: kworker/u4:0 Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 Workqueue: bat_events batadv_nc_worker RIP: 0010:__sanitizer_cov_trace_pc+0x47/0x50 kernel/kcov.c:111 Code: 90 60 13 00 00 83 fa 02 75 20 48 8b 88 68 13 00 00 8b 80 64 13 00 00 48 8b 11 48 83 c2 01 48 39 d0 76 07 48 89 34 d1 48 89 11 0f 1f 84 00 00 00 00 00 49 89 f1 49 89 fa 65 48 8b 34 25 c0 df RSP: 0018:ffff8880b5a47ca8 EFLAGS: 00000293 RAX: ffff8880b5a361c0 RBX: 0000000000000001 RCX: ffffffff87d8f371 RDX: 0000000000000000 RSI: ffffffff87d8f07a RDI: 0000000000000001 RBP: 0000000000000001 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000001 R11: 0000000000000000 R12: 0000000000000000 R13: dffffc0000000000 R14: 000000000000004d R15: ffff8880a4b32c00 FS: 0000000000000000(0000) GS:ffff8880ba100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000c0012c5000 CR3: 000000009374b000 CR4: 00000000003406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: rcu_read_unlock include/linux/rcupdate.h:680 [inline] batadv_nc_purge_orig_hash net/batman-adv/network-coding.c:423 [inline] batadv_nc_worker+0x64a/0xd50 net/batman-adv/network-coding.c:730 process_one_work+0x864/0x1570 kernel/workqueue.c:2153 worker_thread+0x64c/0x1130 kernel/workqueue.c:2296 kthread+0x33f/0x460 kernel/kthread.c:259 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415