=============================
WARNING: suspicious RCU usage
6.2.0-rc7-syzkaller-17891-geaed33698e35 #0 Not tainted
-----------------------------
lib/maple_tree.c:852 suspicious rcu_dereference_check() usage!
other info that might help us debug this:
rcu_scheduler_active = 2, debug_locks = 1
5 locks held by syz-executor115/5128:
#0: ffff0000c82f2460 (sb_writers#7){.+.+}-{0:0}, at: vfs_write+0x174/0x44c
#1: ffff0000c95dd688 (&of->mutex){+.+.}-{3:3}, at: kernfs_fop_write_iter+0x120/0x288
#2: ffff0000c03954a0 (kn->active#42){.+.+}-{0:0}, at: kernfs_fop_write_iter+0x128/0x288
#3: ffff80000d4bc640 (ksm_thread_mutex){+.+.}-{3:3}, at: run_store+0x8c/0x608
#4: ffff0000c94cb748 (&mm->mmap_lock){++++}-{3:3}, at: run_store+0x200/0x608
stack backtrace:
CPU: 0 PID: 5128 Comm: syz-executor115 Not tainted 6.2.0-rc7-syzkaller-17891-geaed33698e35 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/21/2023
Call trace:
dump_backtrace+0x1c8/0x1f4
show_stack+0x2c/0x3c
dump_stack_lvl+0xd0/0x124
dump_stack+0x1c/0x28
lockdep_rcu_suspicious+0x138/0x154
mas_state_walk+0x1a4/0x200
mas_walk+0x2c/0xc4
mas_find+0x10c/0x13c
run_store+0x214/0x608
kobj_attr_store+0x4c/0x70
sysfs_kf_write+0xf4/0x11c
kernfs_fop_write_iter+0x1d8/0x288
vfs_write+0x2bc/0x44c
ksys_write+0xb4/0x160
__arm64_sys_write+0x24/0x34
invoke_syscall+0x64/0x178
el0_svc_common+0xbc/0x180
do_el0_svc+0x48/0x110
el0_svc+0x58/0x14c
el0t_64_sync_handler+0x84/0xf0
el0t_64_sync+0x190/0x194