rcu: INFO: rcu_preempt self-detected stall on CPU rcu: 0-....: (10439 ticks this GP) idle=c0e/1/0x4000000000000000 softirq=54325/54329 fqs=5074 (t=10503 jiffies g=79565 q=94) NMI backtrace for cpu 0 CPU: 0 PID: 21633 Comm: syz-executor.0 Not tainted 5.11.0-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:79 [inline] dump_stack+0xfa/0x151 lib/dump_stack.c:120 nmi_cpu_backtrace.cold+0x44/0xd7 lib/nmi_backtrace.c:105 nmi_trigger_cpumask_backtrace+0x1b3/0x230 lib/nmi_backtrace.c:62 trigger_single_cpu_backtrace include/linux/nmi.h:164 [inline] rcu_dump_cpu_stacks+0x222/0x2a7 kernel/rcu/tree_stall.h:341 print_cpu_stall kernel/rcu/tree_stall.h:622 [inline] check_cpu_stall kernel/rcu/tree_stall.h:697 [inline] rcu_pending kernel/rcu/tree.c:3830 [inline] rcu_sched_clock_irq.cold+0x4f7/0x11dd kernel/rcu/tree.c:2650 update_process_times+0x16d/0x200 kernel/time/timer.c:1796 tick_sched_handle+0x9b/0x180 kernel/time/tick-sched.c:226 tick_sched_timer+0x1b0/0x2d0 kernel/time/tick-sched.c:1369 __run_hrtimer kernel/time/hrtimer.c:1519 [inline] __hrtimer_run_queues+0x1c0/0xe40 kernel/time/hrtimer.c:1583 hrtimer_interrupt+0x334/0x940 kernel/time/hrtimer.c:1645 local_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1089 [inline] __sysvec_apic_timer_interrupt+0x146/0x540 arch/x86/kernel/apic/apic.c:1106 sysvec_apic_timer_interrupt+0x40/0xc0 arch/x86/kernel/apic/apic.c:1100 asm_sysvec_apic_timer_interrupt+0x12/0x20 arch/x86/include/asm/idtentry.h:632 RIP: 0010:__raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:161 [inline] RIP: 0010:_raw_spin_unlock_irqrestore+0x2e/0x50 kernel/locking/spinlock.c:191 Code: 48 83 c7 18 53 48 89 f3 48 8b 74 24 10 e8 2a 59 54 f8 48 89 ef e8 a2 0e 55 f8 80 e7 02 74 06 e8 d8 68 74 f8 fb bf 01 00 00 00 1d 0a 49 f8 65 8b 05 06 1f fd 76 85 c0 74 03 5b 5d c3 e8 61 74 RSP: 0018:ffffc90000007c88 EFLAGS: 00000206 RAX: 00000000020ac482 RBX: 0000000000000206 RCX: 1ffffffff1f56eea RDX: 0000000000000000 RSI: 0000000000000102 RDI: 0000000000000001 RBP: ffffffff8bfcf140 R08: 0000000000000001 R09: ffffffff8fab0877 R10: 0000000000000001 R11: 0000000000000000 R12: ffff888021e87c80 R13: 0000000000000000 R14: 000000000000000c R15: ffff888062210d00 kcov_remote_start_common include/linux/kcov.h:47 [inline] ieee80211_rx_list+0x423/0x2680 net/mac80211/rx.c:4801 ieee80211_rx_napi+0xf7/0x3d0 net/mac80211/rx.c:4842 ieee80211_rx include/net/mac80211.h:4524 [inline] ieee80211_tasklet_handler+0xd4/0x130 net/mac80211/main.c:235 tasklet_action_common.constprop.0+0x1d7/0x2d0 kernel/softirq.c:557 __do_softirq+0x29b/0x9f6 kernel/softirq.c:345 invoke_softirq kernel/softirq.c:221 [inline] __irq_exit_rcu kernel/softirq.c:422 [inline] irq_exit_rcu+0x134/0x200 kernel/softirq.c:434 sysvec_apic_timer_interrupt+0x93/0xc0 arch/x86/kernel/apic/apic.c:1100 asm_sysvec_apic_timer_interrupt+0x12/0x20 arch/x86/include/asm/idtentry.h:632 RIP: 0010:bytes_is_nonzero mm/kasan/generic.c:84 [inline] RIP: 0010:memory_is_nonzero mm/kasan/generic.c:101 [inline] RIP: 0010:memory_is_poisoned_n mm/kasan/generic.c:127 [inline] RIP: 0010:memory_is_poisoned mm/kasan/generic.c:158 [inline] RIP: 0010:check_region_inline mm/kasan/generic.c:176 [inline] RIP: 0010:kasan_check_range+0xde/0x180 mm/kasan/generic.c:185 Code: 74 f2 48 89 c2 b8 01 00 00 00 48 85 d2 75 56 5b 5d 41 5c c3 48 85 d2 74 5e 48 01 ea eb 09 48 83 c0 01 48 39 d0 74 50 80 38 00 <74> f2 eb d4 41 bc 08 00 00 00 48 89 ea 45 29 dc 4d 8d 1c 2c eb 0c RSP: 0018:ffffc90002957778 EFLAGS: 00000246 RAX: fffff940000db288 RBX: fffff940000db289 RCX: ffffffff81a6ac0d RDX: fffff940000db289 RSI: 0000000000000008 RDI: ffffea00006d9440 RBP: fffff940000db288 R08: 0000000000000000 R09: ffffea00006d9447 R10: fffff940000db288 R11: 0000000000000000 R12: 0000000000000000 R13: ffff88802460d500 R14: dffffc0000000000 R15: 00007fe4a18a1000 instrument_atomic_read include/linux/instrumented.h:71 [inline] test_bit include/asm-generic/bitops/instrumented-non-atomic.h:134 [inline] PageCompound include/linux/page-flags.h:198 [inline] page_mapcount include/linux/mm.h:853 [inline] zap_pte_range mm/memory.c:1277 [inline] zap_pmd_range mm/memory.c:1380 [inline] zap_pud_range mm/memory.c:1409 [inline] zap_p4d_range mm/memory.c:1430 [inline] unmap_page_range+0xe3d/0x2650 mm/memory.c:1451 unmap_single_vma+0x198/0x300 mm/memory.c:1496 unmap_vmas+0x16d/0x2f0 mm/memory.c:1528 exit_mmap+0x2a8/0x590 mm/mmap.c:3218 __mmput+0x122/0x470 kernel/fork.c:1082 mmput+0x58/0x60 kernel/fork.c:1103 exit_mm kernel/exit.c:501 [inline] do_exit+0xb6f/0x2ae0 kernel/exit.c:812 do_group_exit+0x125/0x310 kernel/exit.c:922 get_signal+0x42c/0x2100 kernel/signal.c:2773 arch_do_signal_or_restart+0x2a8/0x1eb0 arch/x86/kernel/signal.c:811 handle_signal_work kernel/entry/common.c:147 [inline] exit_to_user_mode_loop kernel/entry/common.c:171 [inline] exit_to_user_mode_prepare+0x148/0x250 kernel/entry/common.c:208 __syscall_exit_to_user_mode_work kernel/entry/common.c:290 [inline] syscall_exit_to_user_mode+0x19/0x50 kernel/entry/common.c:301 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x465ef9 Code: Unable to access opcode bytes at RIP 0x465ecf. RSP: 002b:00007fe4a0c3e188 EFLAGS: 00000246 ORIG_RAX: 000000000000002c RAX: 0000000000278000 RBX: 000000000056bf60 RCX: 0000000000465ef9 RDX: ffffffffffffffef RSI: 0000000020d7cfcb RDI: 0000000000000007 RBP: 00000000004bcd1c R08: 0000000000000000 R09: 0000000000000053 R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf60 R13: 00007ffec843785f R14: 00007fe4a0c3e300 R15: 0000000000022000