watchdog: BUG: soft lockup - CPU#0 stuck for 21s! [syz-executor.5:10883] Modules linked in: irq event stamp: 14984475 hardirqs last enabled at (14984474): [] asm_sysvec_apic_timer_interrupt+0x1a/0x20 hardirqs last disabled at (14984475): [] sysvec_apic_timer_interrupt+0xf/0xc0 softirqs last enabled at (14883006): [] __irq_exit_rcu+0x11b/0x180 softirqs last disabled at (14883009): [] __irq_exit_rcu+0x11b/0x180 CPU: 0 PID: 10883 Comm: syz-executor.5 Not tainted 6.1.0-rc8-next-20221207 #1 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 RIP: 0010:unwind_next_frame+0xaaf/0x2130 Code: c1 84 c0 0f 95 c0 84 c1 0f 85 ce 12 00 00 41 83 e7 07 44 38 fa 0f 9e c1 84 d2 0f 95 c0 84 c1 0f 85 b7 12 00 00 41 0f b6 40 04 e8 04 3c 01 0f 84 b9 09 00 00 3c 04 0f 84 e3 08 00 00 84 c0 0f RSP: 0018:ffff88806ce098d8 EFLAGS: 00000246 RAX: 0000000000000005 RBX: 0000000000000002 RCX: 0000000000000001 RDX: 0000000000000000 RSI: ffff88806ce09ff0 RDI: ffff88806ce099c0 RBP: ffff88806ce099b0 R08: ffffffff860585d6 R09: ffffffff860585da R10: ffffed100d9c1338 R11: ffff88806ce09998 R12: ffff88806ce09999 R13: ffff88806ce099b8 R14: ffff88806ce09958 R15: 0000000000000003 FS: 0000000000000000(0000) GS:ffff88806ce00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fe286596542 CR3: 000000000d616000 CR4: 0000000000350ef0 Call Trace: arch_stack_walk+0x87/0xf0 stack_trace_save+0x90/0xd0 __create_object+0x389/0xc10 __kmem_cache_alloc_node+0x25b/0x400 __kmalloc_node_track_caller+0x43/0xb0 __alloc_skb+0xe9/0x310 __netdev_alloc_skb+0x76/0x3e0 __ieee80211_beacon_get+0x3d9/0x1310 ieee80211_beacon_get_tim+0x99/0x4f0 mac80211_hwsim_beacon_tx+0x1d2/0xab0 __iterate_interfaces+0x2d3/0x560 ieee80211_iterate_active_interfaces_atomic+0x74/0x180 mac80211_hwsim_beacon+0x105/0x200 __hrtimer_run_queues+0x54b/0xba0 hrtimer_run_softirq+0x176/0x350 __do_softirq+0x1c7/0x8f9 __irq_exit_rcu+0x11b/0x180 irq_exit_rcu+0x9/0x30 sysvec_apic_timer_interrupt+0x92/0xc0 asm_sysvec_apic_timer_interrupt+0x1a/0x20 RIP: 0010:__sanitizer_cov_trace_pc+0x20/0x70 Code: 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 65 8b 05 dd 37 ba 7e 89 c1 48 8b 34 24 81 e1 00 01 00 00 65 48 8b 14 25 00 89 03 00 00 01 ff 00 74 0e 85 c9 74 35 8b 82 0c 14 00 00 85 c0 74 2b 8b RSP: 0018:ffff88804637f678 EFLAGS: 00000246 RAX: 0000000080000000 RBX: ffff8880101e06c8 RCX: 0000000000000000 RDX: ffff888047340000 RSI: ffffffff81773a3f RDI: 0000000000000004 RBP: 00000000000000d7 R08: 0000000000000004 R09: 000000000000019d R10: 00000000000000d7 R11: 0000000000000001 R12: 000000000000019d R13: dffffc0000000000 R14: ffff8880101e0010 R15: 000000000000019d free_pages_and_swap_cache+0x3f/0xa0 tlb_batch_pages_flush+0xa8/0x1b0 unmap_page_range+0x164b/0x2c10 unmap_single_vma+0x190/0x2a0 unmap_vmas+0x226/0x380 exit_mmap+0x158/0x680 mmput+0xd5/0x390 do_exit+0x99b/0x2720 do_group_exit+0xd4/0x2a0 get_signal+0x21b7/0x22f0 arch_do_signal_or_restart+0x79/0x5a0 exit_to_user_mode_prepare+0x131/0x1a0 syscall_exit_to_user_mode+0x1d/0x50 do_syscall_64+0x4c/0x90 entry_SYSCALL_64_after_hwframe+0x72/0xdc RIP: 0033:0x7fa4ca124c27 Code: Unable to access opcode bytes at 0x7fa4ca124bfd. RSP: 002b:00007fa4c769afa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fa4ca124c27 RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000100 RBP: 00007fa4c769b040 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 0000000020000100 R14: 00007fa4c769b000 R15: 0000000000000000 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 PID: 10895 Comm: syz-executor.4 Not tainted 6.1.0-rc8-next-20221207 #1 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 RIP: 0010:lapic_next_deadline+0x25/0x50 Code: 90 90 90 90 90 f3 0f 1e fa 0f ae f0 0f ae e8 0f 31 48 c1 e2 20 b9 e0 06 00 00 48 09 c2 48 8d 04 fa 48 89 c2 48 c1 ea 20 0f 30 <66> 90 31 c0 e9 86 0c 32 03 48 89 c6 31 d2 bf e0 06 00 00 e8 c3 8e RSP: 0018:ffff88806cf09ed8 EFLAGS: 00000017 RAX: 000002cae12dc8ac RBX: 0000000000000000 RCX: 00000000000006e0 RDX: 00000000000002ca RSI: ffff88806cf28100 RDI: 00000000000004ac RBP: ffff88806cf28100 R08: 0000000000000007 R09: 0000000000000000 R10: 0000000000000d60 R11: 0000000000000001 R12: 00000000000004ac R13: 0000000000000000 R14: 0000000000000000 R15: ffff88806cf2b840 FS: 0000000000000000(0000) GS:ffff88806cf00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f46adbaa000 CR3: 000000000d616000 CR4: 0000000000350ee0 Call Trace: clockevents_program_event+0x248/0x360 tick_program_event+0xb0/0x150 hrtimer_interrupt+0x36a/0x770 __sysvec_apic_timer_interrupt+0x148/0x500 sysvec_apic_timer_interrupt+0x8d/0xc0 asm_sysvec_apic_timer_interrupt+0x1a/0x20 RIP: 0010:core_kernel_text+0x0/0xa0 Code: 03 48 85 c0 74 06 5d e9 92 44 23 03 48 89 ef 5d e9 35 a1 18 00 0f 1f 44 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 <66> 0f 1f 00 41 54 53 48 89 fb 48 81 ff 00 00 00 81 72 09 48 81 ff RSP: 0018:ffff8880477973d8 EFLAGS: 00000282 RAX: dffffc0000000000 RBX: ffffffff8115c915 RCX: 0000000000000000 RDX: 1ffff11008ef2e8f RSI: ffff888047797ba0 RDI: ffffffff8115c915 RBP: ffffffff8115c915 R08: ffffffff860df234 R09: ffffffff860df238 R10: ffffed1008ef2e91 R11: ffff888047797460 R12: ffff8880477974e8 R13: 0000000000000000 R14: ffff88803db39ac0 R15: ffff88800844fa00 kernel_text_address+0x11/0xc0 __kernel_text_address+0xd/0x40 unwind_get_return_address+0x59/0xa0 arch_stack_walk+0x9d/0xf0 stack_trace_save+0x90/0xd0 kasan_save_stack+0x22/0x50 __kasan_record_aux_stack+0x95/0xb0 __call_rcu_common.constprop.0+0x6a/0xa40 kmem_cache_free+0xc1/0x610 ___pte_free_tlb+0x1d/0x110 free_pgd_range+0x7be/0x1330 free_pgtables+0x2d6/0x420 exit_mmap+0x1b8/0x680 mmput+0xd5/0x390 do_exit+0x99b/0x2720 do_group_exit+0xd4/0x2a0 get_signal+0x21b7/0x22f0 arch_do_signal_or_restart+0x79/0x5a0 exit_to_user_mode_prepare+0x131/0x1a0 syscall_exit_to_user_mode+0x1d/0x50 do_syscall_64+0x4c/0x90 entry_SYSCALL_64_after_hwframe+0x72/0xdc RIP: 0033:0x7fdd4e375b19 Code: Unable to access opcode bytes at 0x7fdd4e375aef. RSP: 002b:00007fdd4b8eb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000100 RAX: 0000000000000000 RBX: 00007fdd4e488f60 RCX: 00007fdd4e375b19 RDX: 0000000020000000 RSI: 0000000000000009 RDI: 0000000000000000 RBP: 00007fdd4e3cff6d R08: 0000000000000000 R09: 0000000000000000 R10: 0000000020000180 R11: 0000000000000246 R12: 0000000000000000 R13: 00007fff9356e3bf R14: 00007fdd4b8eb300 R15: 0000000000022000 ---------------- Code disassembly (best guess): 0: c1 84 c0 0f 95 c0 84 roll $0xc1,-0x7b3f6af1(%rax,%rax,8) 7: c1 8: 0f 85 ce 12 00 00 jne 0x12dc e: 41 83 e7 07 and $0x7,%r15d 12: 44 38 fa cmp %r15b,%dl 15: 0f 9e c1 setle %cl 18: 84 d2 test %dl,%dl 1a: 0f 95 c0 setne %al 1d: 84 c1 test %al,%cl 1f: 0f 85 b7 12 00 00 jne 0x12dc 25: 41 0f b6 40 04 movzbl 0x4(%r8),%eax * 2a: c0 e8 04 shr $0x4,%al <-- trapping instruction 2d: 3c 01 cmp $0x1,%al 2f: 0f 84 b9 09 00 00 je 0x9ee 35: 3c 04 cmp $0x4,%al 37: 0f 84 e3 08 00 00 je 0x920 3d: 84 c0 test %al,%al 3f: 0f .byte 0xf