netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. watchdog: BUG: soft lockup - CPU#1 stuck for 22s! [syz-executor.5:17481] Modules linked in: irq event stamp: 5309209 hardirqs last enabled at (5309208): [] __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:168 [inline] hardirqs last enabled at (5309208): [] _raw_spin_unlock_irq+0x24/0x80 kernel/locking/spinlock.c:192 hardirqs last disabled at (5309209): [] trace_hardirqs_off_thunk+0x1a/0x1c softirqs last enabled at (5286594): [] __do_softirq+0x678/0x980 kernel/softirq.c:318 softirqs last disabled at (5286597): [] invoke_softirq kernel/softirq.c:372 [inline] softirqs last disabled at (5286597): [] irq_exit+0x215/0x260 kernel/softirq.c:412 CPU: 1 PID: 17481 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:preempt_count arch/x86/include/asm/preempt.h:23 [inline] RIP: 0010:check_kcov_mode kernel/kcov.c:67 [inline] RIP: 0010:__sanitizer_cov_trace_pc+0xd/0x50 kernel/kcov.c:101 Code: ff 4c 89 ef e8 04 dd 35 00 e9 23 fe ff ff 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 48 8b 34 24 65 48 8b 04 25 c0 df 01 00 <65> 8b 15 cc 59 9f 7e 81 e2 00 01 1f 00 75 2b 8b 90 60 13 00 00 83 RSP: 0018:ffff8880ba107cc8 EFLAGS: 00000206 ORIG_RAX: ffffffffffffff13 RAX: ffff888019ce80c0 RBX: 00000000000003e8 RCX: ffffffff8152df3d RDX: 00000000000003e8 RSI: ffffffff8152df46 RDI: 0000000000000005 RBP: 0000000000000101 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000005 R11: 0000000000000000 R12: 3ffffffffffffffe R13: ffff8880ab36b598 R14: ffff8880ab36b5e0 R15: 0000000000000000 FS: 00007f0f28c0f700(0000) GS:ffff8880ba100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007ffc145a2030 CR3: 00000000b4219000 CR4: 00000000003406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: _msecs_to_jiffies include/linux/jiffies.h:310 [inline] __msecs_to_jiffies+0x26/0x50 kernel/time/time.c:596 msecs_to_jiffies include/linux/jiffies.h:370 [inline] mrp_periodic_timer_arm net/802/mrp.c:618 [inline] mrp_periodic_timer+0x101/0x170 net/802/mrp.c:630 call_timer_fn+0x177/0x700 kernel/time/timer.c:1338 expire_timers+0x243/0x4e0 kernel/time/timer.c:1375 __run_timers kernel/time/timer.c:1696 [inline] run_timer_softirq+0x21c/0x670 kernel/time/timer.c:1709 __do_softirq+0x265/0x980 kernel/softirq.c:292 invoke_softirq kernel/softirq.c:372 [inline] irq_exit+0x215/0x260 kernel/softirq.c:412 exiting_irq arch/x86/include/asm/apic.h:536 [inline] smp_apic_timer_interrupt+0x136/0x550 arch/x86/kernel/apic/apic.c:1098 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:894 RIP: 0010:__tlb_remove_page_size+0x30/0x470 mm/memory.c:308 Code: f6 41 55 41 54 55 89 d5 53 48 89 fb e8 b9 52 d7 ff 48 8d 7b 18 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 80 3c 02 00 <0f> 85 a8 03 00 00 4c 8b 63 18 31 ff 4c 89 e6 e8 1c 54 d7 ff 4d 85 RSP: 0018:ffff888233777738 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13 RAX: dffffc0000000000 RBX: ffff8882337779b0 RCX: ffffffff818ba0c8 RDX: 1ffff110466eef39 RSI: ffffffff818b32b7 RDI: ffff8882337779c8 RBP: 0000000000001000 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000005 R11: 0000000000000000 R12: dead000000000100 R13: ffffea0002a66b80 R14: ffffea0002a66b80 R15: 00007f0f296c4000 __tlb_remove_page include/asm-generic/tlb.h:161 [inline] zap_pte_range mm/memory.c:1353 [inline] zap_pmd_range mm/memory.c:1463 [inline] zap_pud_range mm/memory.c:1492 [inline] zap_p4d_range mm/memory.c:1513 [inline] unmap_page_range+0x14e7/0x2c50 mm/memory.c:1534 unmap_single_vma+0x198/0x300 mm/memory.c:1579 unmap_vmas+0xa9/0x180 mm/memory.c:1609 exit_mmap+0x2b9/0x530 mm/mmap.c:3093 __mmput kernel/fork.c:1016 [inline] mmput+0x14e/0x4a0 kernel/fork.c:1037 exit_mm kernel/exit.c:549 [inline] do_exit+0xaec/0x2be0 kernel/exit.c:857 do_group_exit+0x125/0x310 kernel/exit.c:967 get_signal+0x3f2/0x1f70 kernel/signal.c:2589 do_signal+0x8f/0x1670 arch/x86/kernel/signal.c:799 exit_to_usermode_loop+0x204/0x2a0 arch/x86/entry/common.c:163 prepare_exit_to_usermode arch/x86/entry/common.c:198 [inline] syscall_return_slowpath arch/x86/entry/common.c:271 [inline] do_syscall_64+0x538/0x620 arch/x86/entry/common.c:296 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7f0f2a29a0e9 Code: Bad RIP value. RSP: 002b:00007f0f28c0f168 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 RAX: 0000000000000001 RBX: 00007f0f2a3acf60 RCX: 00007f0f2a29a0e9 RDX: 0000000000000001 RSI: 0000000020000540 RDI: 0000000000000005 RBP: 00007f0f2a2f408d R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000008001 R11: 0000000000000246 R12: 0000000000000000 R13: 00007fffa855c32f R14: 00007f0f28c0f300 R15: 0000000000022000 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 PID: 23 Comm: kworker/u4:1 Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Workqueue: bat_events batadv_purge_orig RIP: 0010:__lock_acquire+0x3a0/0x3ff0 kernel/locking/lockdep.c:3358 Code: 14 02 84 d2 74 09 80 fa 03 0f 8e af 27 00 00 41 0f b7 42 20 49 8d 7a 08 48 89 fa 48 c1 ea 03 66 25 00 e0 09 c8 66 41 89 42 20 <48> b8 00 00 00 00 00 fc ff df 80 3c 02 00 0f 85 46 28 00 00 48 8b RSP: 0018:ffff8880b50479d0 EFLAGS: 00000006 RAX: 000000000000062e RBX: 0000000000000000 RCX: 000000000000062e RDX: 1ffff11016a079dc RSI: 1ffff11016a079da RDI: ffff8880b503cee0 RBP: 0000000000000000 R08: 000000000000062e R09: 0000000000000002 R10: ffff8880b503ced8 R11: 0000000000000000 R12: 0000000000000000 R13: ffff8880b503c600 R14: ffff888037bf2320 R15: 0000000000000001 FS: 0000000000000000(0000) GS:ffff8880ba000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000c00412ff80 CR3: 00000000b3c4a000 CR4: 00000000003406f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: lock_acquire+0x170/0x3c0 kernel/locking/lockdep.c:3908 __raw_spin_lock_bh include/linux/spinlock_api_smp.h:135 [inline] _raw_spin_lock_bh+0x2f/0x40 kernel/locking/spinlock.c:168 spin_lock_bh include/linux/spinlock.h:334 [inline] batadv_purge_orig_ref+0x16d/0x1110 net/batman-adv/originator.c:1363 batadv_purge_orig+0x17/0x60 net/batman-adv/originator.c:1392 process_one_work+0x864/0x1570 kernel/workqueue.c:2153 worker_thread+0x64c/0x1130 kernel/workqueue.c:2296 kthread+0x33f/0x460 kernel/kthread.c:259 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415 ---------------- Code disassembly (best guess): 0: ff 4c 89 ef decl -0x11(%rcx,%rcx,4) 4: e8 04 dd 35 00 callq 0x35dd0d 9: e9 23 fe ff ff jmpq 0xfffffe31 e: 90 nop f: 90 nop 10: 90 nop 11: 90 nop 12: 90 nop 13: 90 nop 14: 90 nop 15: 90 nop 16: 90 nop 17: 90 nop 18: 90 nop 19: 90 nop 1a: 90 nop 1b: 90 nop 1c: 90 nop 1d: 48 8b 34 24 mov (%rsp),%rsi 21: 65 48 8b 04 25 c0 df mov %gs:0x1dfc0,%rax 28: 01 00 * 2a: 65 8b 15 cc 59 9f 7e mov %gs:0x7e9f59cc(%rip),%edx # 0x7e9f59fd <-- trapping instruction 31: 81 e2 00 01 1f 00 and $0x1f0100,%edx 37: 75 2b jne 0x64 39: 8b 90 60 13 00 00 mov 0x1360(%rax),%edx 3f: 83 .byte 0x83