NOHZ tick-stop error: local softirq work is pending, handler #200!!! Oops: general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN PTI KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Not tainted 6.11.0-rc4-next-20240823-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 RIP: 0010:____rb_erase_color lib/rbtree.c:354 [inline] RIP: 0010:__rb_erase_color+0x2d7/0xa30 lib/rbtree.c:413 Code: 73 02 00 00 49 8d 5c 24 10 48 89 dd 48 c1 ed 03 42 80 7c 35 00 00 74 08 48 89 df e8 13 d8 44 f6 4c 8b 2b 4d 89 ef 49 c1 ef 03 <43> 80 3c 37 00 74 08 4c 89 ef e8 fa d7 44 f6 41 f6 45 00 01 48 89 RSP: 0018:ffffc900001a76a0 EFLAGS: 00010046 RAX: 1ffff110041fb012 RBX: ffff888020fd80a0 RCX: dffffc0000000000 RDX: ffffffff81680dc0 RSI: ffff8880306e0848 RDI: ffff888020fd8090 RBP: 1ffff110041fb014 R08: ffff88802a548147 R09: 1ffff110054a9028 R10: dffffc0000000000 R11: ffffed10054a9029 R12: ffff888020fd8090 R13: 0000000000000000 R14: dffffc0000000000 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff8880b9100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000020002000 CR3: 0000000066e56000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: rb_erase_augmented include/linux/rbtree_augmented.h:331 [inline] rb_erase_augmented_cached include/linux/rbtree_augmented.h:340 [inline] __dequeue_entity+0x953/0xd30 kernel/sched/fair.c:863 dequeue_entity+0x7b0/0x1a70 kernel/sched/fair.c:5516 dequeue_entities+0x234/0xfa0 kernel/sched/fair.c:7090 dequeue_task_fair+0xad/0x150 kernel/sched/fair.c:7178 deactivate_task kernel/sched/core.c:2074 [inline] try_steal_cookie kernel/sched/core.c:6306 [inline] steal_cookie_task kernel/sched/core.c:6333 [inline] sched_core_balance+0xc6f/0x1180 kernel/sched/core.c:6353 do_balance_callbacks kernel/sched/core.c:4963 [inline] __balance_callbacks+0x188/0x280 kernel/sched/core.c:5017 finish_lock_switch kernel/sched/core.c:5064 [inline] finish_task_switch+0x1d3/0x870 kernel/sched/core.c:5183 context_switch kernel/sched/core.c:5314 [inline] __schedule+0x1852/0x4b30 kernel/sched/core.c:6677 schedule_idle+0x53/0x90 kernel/sched/core.c:6795 do_idle+0x56a/0x5d0 kernel/sched/idle.c:354 cpu_startup_entry+0x42/0x60 kernel/sched/idle.c:424 start_secondary+0x102/0x110 arch/x86/kernel/smpboot.c:313 common_startup_64+0x13e/0x147 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:____rb_erase_color lib/rbtree.c:354 [inline] RIP: 0010:__rb_erase_color+0x2d7/0xa30 lib/rbtree.c:413 Code: 73 02 00 00 49 8d 5c 24 10 48 89 dd 48 c1 ed 03 42 80 7c 35 00 00 74 08 48 89 df e8 13 d8 44 f6 4c 8b 2b 4d 89 ef 49 c1 ef 03 <43> 80 3c 37 00 74 08 4c 89 ef e8 fa d7 44 f6 41 f6 45 00 01 48 89 RSP: 0018:ffffc900001a76a0 EFLAGS: 00010046 RAX: 1ffff110041fb012 RBX: ffff888020fd80a0 RCX: dffffc0000000000 RDX: ffffffff81680dc0 RSI: ffff8880306e0848 RDI: ffff888020fd8090 RBP: 1ffff110041fb014 R08: ffff88802a548147 R09: 1ffff110054a9028 R10: dffffc0000000000 R11: ffffed10054a9029 R12: ffff888020fd8090 R13: 0000000000000000 R14: dffffc0000000000 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff8880b9100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000020002000 CR3: 0000000066e56000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: 73 02 jae 0x4 2: 00 00 add %al,(%rax) 4: 49 8d 5c 24 10 lea 0x10(%r12),%rbx 9: 48 89 dd mov %rbx,%rbp c: 48 c1 ed 03 shr $0x3,%rbp 10: 42 80 7c 35 00 00 cmpb $0x0,0x0(%rbp,%r14,1) 16: 74 08 je 0x20 18: 48 89 df mov %rbx,%rdi 1b: e8 13 d8 44 f6 call 0xf644d833 20: 4c 8b 2b mov (%rbx),%r13 23: 4d 89 ef mov %r13,%r15 26: 49 c1 ef 03 shr $0x3,%r15 * 2a: 43 80 3c 37 00 cmpb $0x0,(%r15,%r14,1) <-- trapping instruction 2f: 74 08 je 0x39 31: 4c 89 ef mov %r13,%rdi 34: e8 fa d7 44 f6 call 0xf644d833 39: 41 f6 45 00 01 testb $0x1,0x0(%r13) 3e: 48 rex.W 3f: 89 .byte 0x89