watchdog: BUG: soft lockup - CPU#0 stuck for 22s! [syz-executor.2:5346] Modules linked in: irq event stamp: 4875101 hardirqs last enabled at (4875100): [] asm_sysvec_apic_timer_interrupt+0x1a/0x20 hardirqs last disabled at (4875101): [] sysvec_apic_timer_interrupt+0xf/0x90 softirqs last enabled at (4863278): [] __irq_exit_rcu+0xcc/0x110 softirqs last disabled at (4863281): [] __irq_exit_rcu+0xcc/0x110 CPU: 0 PID: 5346 Comm: syz-executor.2 Not tainted 6.2.0-rc6-next-20230202 #1 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 RIP: 0010:_raw_spin_unlock_irqrestore+0x34/0x50 Code: c7 18 53 48 89 f3 48 8b 74 24 10 e8 b6 a0 e5 fc 48 89 ef e8 3e 1d e6 fc 80 e7 02 74 06 e8 94 dd 0a fd fb 65 ff 0d 54 e9 bb 7b <74> 07 5b 5d e9 07 28 00 00 0f 1f 44 00 00 5b 5d e9 fb 27 00 00 0f RSP: 0018:ffff88806ce097e0 EFLAGS: 00000202 RAX: 00000000004a62f4 RBX: 0000000000000246 RCX: ffffffff812c9dff RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffffff8447a02c RBP: ffff88801ed8d510 R08: 0000000000000001 R09: ffffffff8769a9ef R10: fffffbfff0ed353d R11: 0000000000000001 R12: 0000000000000001 R13: ffff888035aa0050 R14: ffff888043bfac80 R15: ffff88801ed8cb80 FS: 0000000000000000(0000) GS:ffff88806ce00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f17491b19d0 CR3: 0000000005482000 CR4: 0000000000350ef0 Call Trace: ieee80211_rx_h_mgmt+0x38b/0x660 ieee80211_rx_handlers+0x8d50/0xa6d0 ieee80211_prepare_and_rx_handle+0x1c8e/0x58e0 ieee80211_rx_for_interface+0x112/0x200 ieee80211_rx_list+0x1d15/0x2cc0 ieee80211_rx_napi+0xde/0x3c0 ieee80211_tasklet_handler+0xd8/0x140 tasklet_action_common.constprop.0+0x271/0x360 __do_softirq+0x258/0x8a2 __irq_exit_rcu+0xcc/0x110 irq_exit_rcu+0x9/0x20 sysvec_apic_timer_interrupt+0x6e/0x90 asm_sysvec_apic_timer_interrupt+0x1a/0x20 RIP: 0010:perf_swevent_event+0x267/0x550 Code: 24 10 80 38 00 0f 85 88 02 00 00 4c 8b bd f8 01 00 00 31 ff 4c 89 fe e8 87 69 ef ff 4d 85 ff 0f 89 5e ff ff ff 48 83 c4 28 5b <5d> 41 5c 41 5d 41 5e 41 5f e9 6b 6d ef ff e8 66 6d ef ff 48 8d bd RSP: 0018:ffff88803d7cf010 EFLAGS: 00000282 RAX: 0000000000000000 RBX: ffff888044785e00 RCX: ffffffff815bef7c RDX: ffff88801efbb580 RSI: 0000000000000000 RDI: 0000000000000007 RBP: ffff888044785e00 R08: 0000000000000007 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000028 R12: 0000000000000001 R13: ffff88806ce34ca0 R14: ffff88803d7cf100 R15: 0000000000000001 perf_tp_event+0x2ce/0x10c0 perf_trace_run_bpf_submit+0xf3/0x190 perf_trace_lock_acquire+0x339/0x500 trace_lock_acquire+0x105/0x1e0 lock_acquire+0x32/0xc0 _raw_spin_trylock+0x46/0x60 free_unref_page_list+0x55c/0x980 release_pages+0x9d0/0x1040 tlb_batch_pages_flush+0xa8/0x1b0 unmap_page_range+0x1aec/0x2da0 unmap_single_vma+0x194/0x2a0 unmap_vmas+0x233/0x390 exit_mmap+0x15b/0x6a0 mmput+0xd5/0x390 do_exit+0x9c6/0x2800 do_group_exit+0xd4/0x2a0 get_signal+0x23c8/0x2450 arch_do_signal_or_restart+0x79/0x590 exit_to_user_mode_prepare+0xeb/0x180 syscall_exit_to_user_mode+0x1d/0x50 do_syscall_64+0x4c/0x90 entry_SYSCALL_64_after_hwframe+0x72/0xdc RIP: 0033:0x7f395712db19 Code: Unable to access opcode bytes at 0x7f395712daef. RSP: 002b:00007f39546a3188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 RAX: fffffffffffffff4 RBX: 00007f3957240f60 RCX: 00007f395712db19 RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000640 RBP: 00007f3957187f6d R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007fff38f4abff R14: 00007f39546a3300 R15: 0000000000022000 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 skipped: idling at default_idle+0xf/0x20 ---------------- Code disassembly (best guess), 1 bytes skipped: 0: 18 53 48 sbb %dl,0x48(%rbx) 3: 89 f3 mov %esi,%ebx 5: 48 8b 74 24 10 mov 0x10(%rsp),%rsi a: e8 b6 a0 e5 fc callq 0xfce5a0c5 f: 48 89 ef mov %rbp,%rdi 12: e8 3e 1d e6 fc callq 0xfce61d55 17: 80 e7 02 and $0x2,%bh 1a: 74 06 je 0x22 1c: e8 94 dd 0a fd callq 0xfd0addb5 21: fb sti 22: 65 ff 0d 54 e9 bb 7b decl %gs:0x7bbbe954(%rip) # 0x7bbbe97d * 29: 74 07 je 0x32 <-- trapping instruction 2b: 5b pop %rbx 2c: 5d pop %rbp 2d: e9 07 28 00 00 jmpq 0x2839 32: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1) 37: 5b pop %rbx 38: 5d pop %rbp 39: e9 fb 27 00 00 jmpq 0x2839 3e: 0f .byte 0xf