rcu: INFO: rcu_preempt detected stalls on CPUs/tasks:
rcu: 1-...!: (0 ticks this GP) idle=151/1/0x4000000000000000 softirq=34091/34091 fqs=0
(detected by 0, t=10506 jiffies, g=43941, q=877 ncpus=2)
Sending NMI from CPU 0 to CPUs 1:
NMI backtrace for cpu 1
CPU: 1 PID: 10244 Comm: syz-executor.5 Not tainted 5.18.0-syzkaller-13760-g032dcf09e2bf #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:__remove_hrtimer+0x95/0x2a0 kernel/time/hrtimer.c:1116
Code: 38 41 83 e4 01 44 89 e6 e8 88 e1 0f 00 45 84 e4 75 13 48 83 c4 08 5b 5d 41 5c 41 5d 41 5e 41 5f e9 70 e5 0f 00 e8 6b e5 0f 00 <48> 8d 7d 50 48 89 de e8 1f 82 b6 02 31 ff 41 89 c4 89 c6 e8 53 e1
RSP: 0018:ffffc900001f0e00 EFLAGS: 00000046
RAX: 0000000000010002 RBX: ffff88807a787340 RCX: 0000000000000000
RDX: ffff88806e3a5880 RSI: ffffffff816aa0c5 RDI: 0000000000000001
RBP: ffff8880b9b2a600 R08: 0000000000000001 R09: 0000000000000000
R10: 0000000000000001 R11: 0000000000000001 R12: 0000000000000001
R13: 0000000000000000 R14: ffff8880b9b2a500 R15: 0000000000000000
FS: 0000000000000000(0000) GS:ffff8880b9b00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000020000040 CR3: 000000000ba8e000 CR4: 0000000000350ee0
Call Trace:
__run_hrtimer kernel/time/hrtimer.c:1665 [inline]
__hrtimer_run_queues+0x4ea/0xe50 kernel/time/hrtimer.c:1749
hrtimer_interrupt+0x31c/0x790 kernel/time/hrtimer.c:1811
local_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1095 [inline]
__sysvec_apic_timer_interrupt+0x146/0x530 arch/x86/kernel/apic/apic.c:1112
sysvec_apic_timer_interrupt+0x8e/0xc0 arch/x86/kernel/apic/apic.c:1106
asm_sysvec_apic_timer_interrupt+0x1b/0x20 arch/x86/include/asm/idtentry.h:649
RIP: 0010:check_kcov_mode kernel/kcov.c:166 [inline]
RIP: 0010:__sanitizer_cov_trace_pc+0xd/0x60 kernel/kcov.c:200
Code: 00 00 e9 66 95 81 02 66 0f 1f 44 00 00 48 8b be a8 01 00 00 e8 b4 ff ff ff 31 c0 c3 90 65 8b 05 09 e9 87 7e 89 c1 48 8b 34 24 <81> e1 00 01 00 00 65 48 8b 14 25 80 6f 02 00 a9 00 01 ff 00 74 0e
RSP: 0018:ffffc900080776f0 EFLAGS: 00000293
RAX: 0000000080000001 RBX: ffffea00010b2280 RCX: 0000000080000001
RDX: ffff88806e3a5880 RSI: ffffffff81c1841e RDI: ffffea00010b2280
RBP: ffffea00010b2280 R08: 0000000000000001 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000001 R12: ffff88807df2b210
R13: ffffea00010b2288 R14: 0000000000000000 R15: 0000000000000000
PageCompound include/linux/page-flags.h:316 [inline]
PageHuge+0xe/0x230 mm/hugetlb.c:1850
page_remove_file_rmap mm/rmap.c:1346 [inline]
page_remove_rmap+0x2df/0x1510 mm/rmap.c:1432
zap_pte_range mm/memory.c:1446 [inline]
zap_pmd_range mm/memory.c:1567 [inline]
zap_pud_range mm/memory.c:1596 [inline]
zap_p4d_range mm/memory.c:1617 [inline]
unmap_page_range+0x1014/0x3710 mm/memory.c:1638
unmap_single_vma+0x196/0x360 mm/memory.c:1686
unmap_vmas+0x18c/0x310 mm/memory.c:1723
exit_mmap+0x1c4/0x4a0 mm/mmap.c:3162
__mmput+0x122/0x4b0 kernel/fork.c:1187
mmput+0x56/0x60 kernel/fork.c:1208
exit_mm kernel/exit.c:510 [inline]
do_exit+0xa12/0x2a00 kernel/exit.c:782
do_group_exit+0xd2/0x2f0 kernel/exit.c:925
get_signal+0x2542/0x2600 kernel/signal.c:2857
arch_do_signal_or_restart+0x82/0x20f0 arch/x86/kernel/signal.c:869
exit_to_user_mode_loop kernel/entry/common.c:166 [inline]
exit_to_user_mode_prepare+0x15f/0x250 kernel/entry/common.c:201
__syscall_exit_to_user_mode_work kernel/entry/common.c:283 [inline]
syscall_exit_to_user_mode+0x19/0x50 kernel/entry/common.c:294
do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86
entry_SYSCALL_64_after_hwframe+0x46/0xb0
RIP: 0033:0x7efc57c89109
Code: Unable to access opcode bytes at RIP 0x7efc57c890df.
RSP: 002b:00007efc58d66218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca
RAX: 0000000000000001 RBX: 00007efc57d9bf68 RCX: 00007efc57c89109
RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007efc57d9bf6c
RBP: 00007efc57d9bf60 R08: 00007fff1cfe1080 R09: 0000000000000000
R10: ffffffffffffffff R11: 0000000000000246 R12: 00007efc57d9bf6c
R13: 00007fff1cfbabbf R14: 00007efc58d66300 R15: 0000000000022000
rcu: rcu_preempt kthread timer wakeup didn't happen for 10505 jiffies! g43941 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x402
rcu: Possible timer handling issue on cpu=1 timer-softirq=26469
rcu: rcu_preempt kthread starved for 10506 jiffies! g43941 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x402 ->cpu=1
rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior.
rcu: RCU grace-period kthread stack dump:
task:rcu_preempt state:I stack:28656 pid: 17 ppid: 2 flags:0x00004000
Call Trace:
context_switch kernel/sched/core.c:5116 [inline]
__schedule+0xa00/0x4b30 kernel/sched/core.c:6428
schedule+0xd2/0x1f0 kernel/sched/core.c:6500
schedule_timeout+0x14a/0x2a0 kernel/time/timer.c:1935
rcu_gp_fqs_loop+0x186/0x810 kernel/rcu/tree.c:1999
rcu_gp_kthread+0x1de/0x320 kernel/rcu/tree.c:2187
kthread+0x2e9/0x3a0 kernel/kthread.c:376
ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:302
rcu: Stack dump where RCU GP kthread last ran:
Sending NMI from CPU 0 to CPUs 1:
NMI backtrace for cpu 1
CPU: 1 PID: 10244 Comm: syz-executor.5 Not tainted 5.18.0-syzkaller-13760-g032dcf09e2bf #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:kasan_mem_to_shadow include/linux/kasan.h:59 [inline]
RIP: 0010:memory_is_poisoned_n mm/kasan/generic.c:129 [inline]
RIP: 0010:memory_is_poisoned mm/kasan/generic.c:159 [inline]
RIP: 0010:check_region_inline mm/kasan/generic.c:180 [inline]
RIP: 0010:kasan_check_range+0x41/0x180 mm/kasan/generic.c:189
Code: 0f 82 18 01 00 00 48 b8 ff ff ff ff ff 7f ff ff 48 39 c7 0f 86 05 01 00 00 49 83 e9 01 48 89 fd 48 b8 00 00 00 00 00 fc ff df <4d> 89 ca 48 c1 ed 03 49 c1 ea 03 48 01 c5 49 01 c2 48 89 e8 49 8d
RSP: 0018:ffffc900001f0bc0 EFLAGS: 00000096
RAX: dffffc0000000000 RBX: 000000000000005c RCX: ffffffff815e131c
RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffffffff9067d8c8
RBP: ffffffff9067d8c8 R08: 0000000000000000 R09: ffffffff9067d8cf
R10: 0000000000000000 R11: 0000000000000001 R12: ffff88806e3a6358
R13: ffff88806e3a5880 R14: 0000000000000000 R15: 0000000000000040
FS: 0000000000000000(0000) GS:ffff8880b9b00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000020000040 CR3: 000000000ba8e000 CR4: 0000000000350ee0
Call Trace:
instrument_atomic_read include/linux/instrumented.h:71 [inline]
test_bit include/asm-generic/bitops/instrumented-non-atomic.h:134 [inline]
__lock_acquire+0x102c/0x5660 kernel/locking/lockdep.c:5023
lock_acquire kernel/locking/lockdep.c:5665 [inline]
lock_acquire+0x1ab/0x570 kernel/locking/lockdep.c:5630
__raw_spin_lock_irq include/linux/spinlock_api_smp.h:119 [inline]
_raw_spin_lock_irq+0x32/0x50 kernel/locking/spinlock.c:170
__run_hrtimer kernel/time/hrtimer.c:1689 [inline]
__hrtimer_run_queues+0x243/0xe50 kernel/time/hrtimer.c:1749
hrtimer_interrupt+0x31c/0x790 kernel/time/hrtimer.c:1811
local_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1095 [inline]
__sysvec_apic_timer_interrupt+0x146/0x530 arch/x86/kernel/apic/apic.c:1112
sysvec_apic_timer_interrupt+0x8e/0xc0 arch/x86/kernel/apic/apic.c:1106
asm_sysvec_apic_timer_interrupt+0x1b/0x20 arch/x86/include/asm/idtentry.h:649
RIP: 0010:check_kcov_mode kernel/kcov.c:166 [inline]
RIP: 0010:__sanitizer_cov_trace_pc+0xd/0x60 kernel/kcov.c:200
Code: 00 00 e9 66 95 81 02 66 0f 1f 44 00 00 48 8b be a8 01 00 00 e8 b4 ff ff ff 31 c0 c3 90 65 8b 05 09 e9 87 7e 89 c1 48 8b 34 24 <81> e1 00 01 00 00 65 48 8b 14 25 80 6f 02 00 a9 00 01 ff 00 74 0e
RSP: 0018:ffffc900080776f0 EFLAGS: 00000293
RAX: 0000000080000001 RBX: ffffea00010b2280 RCX: 0000000080000001
RDX: ffff88806e3a5880 RSI: ffffffff81c1841e RDI: ffffea00010b2280
RBP: ffffea00010b2280 R08: 0000000000000001 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000001 R12: ffff88807df2b210
R13: ffffea00010b2288 R14: 0000000000000000 R15: 0000000000000000
PageCompound include/linux/page-flags.h:316 [inline]
PageHuge+0xe/0x230 mm/hugetlb.c:1850
page_remove_file_rmap mm/rmap.c:1346 [inline]
page_remove_rmap+0x2df/0x1510 mm/rmap.c:1432
zap_pte_range mm/memory.c:1446 [inline]
zap_pmd_range mm/memory.c:1567 [inline]
zap_pud_range mm/memory.c:1596 [inline]
zap_p4d_range mm/memory.c:1617 [inline]
unmap_page_range+0x1014/0x3710 mm/memory.c:1638
unmap_single_vma+0x196/0x360 mm/memory.c:1686
unmap_vmas+0x18c/0x310 mm/memory.c:1723
exit_mmap+0x1c4/0x4a0 mm/mmap.c:3162
__mmput+0x122/0x4b0 kernel/fork.c:1187
mmput+0x56/0x60 kernel/fork.c:1208
exit_mm kernel/exit.c:510 [inline]
do_exit+0xa12/0x2a00 kernel/exit.c:782
do_group_exit+0xd2/0x2f0 kernel/exit.c:925
get_signal+0x2542/0x2600 kernel/signal.c:2857
arch_do_signal_or_restart+0x82/0x20f0 arch/x86/kernel/signal.c:869
exit_to_user_mode_loop kernel/entry/common.c:166 [inline]
exit_to_user_mode_prepare+0x15f/0x250 kernel/entry/common.c:201
__syscall_exit_to_user_mode_work kernel/entry/common.c:283 [inline]
syscall_exit_to_user_mode+0x19/0x50 kernel/entry/common.c:294
do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86
entry_SYSCALL_64_after_hwframe+0x46/0xb0
RIP: 0033:0x7efc57c89109
Code: Unable to access opcode bytes at RIP 0x7efc57c890df.
RSP: 002b:00007efc58d66218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca
RAX: 0000000000000001 RBX: 00007efc57d9bf68 RCX: 00007efc57c89109
RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007efc57d9bf6c
RBP: 00007efc57d9bf60 R08: 00007fff1cfe1080 R09: 0000000000000000
R10: ffffffffffffffff R11: 0000000000000246 R12: 00007efc57d9bf6c
R13: 00007fff1cfbabbf R14: 00007efc58d66300 R15: 0000000000022000
watchdog: BUG: soft lockup - CPU#0 stuck for 246s! [syz-executor.1:10268]
Modules linked in:
irq event stamp: 82942
hardirqs last enabled at (82941): [] asm_sysvec_apic_timer_interrupt+0x1b/0x20 arch/x86/include/asm/idtentry.h:649
hardirqs last disabled at (82942): [] sysvec_apic_timer_interrupt+0xb/0xc0 arch/x86/kernel/apic/apic.c:1106
softirqs last enabled at (984): [] invoke_softirq kernel/softirq.c:445 [inline]
softirqs last enabled at (984): [] __irq_exit_rcu+0x123/0x180 kernel/softirq.c:650
softirqs last disabled at (845): [] invoke_softirq kernel/softirq.c:445 [inline]
softirqs last disabled at (845): [] __irq_exit_rcu+0x123/0x180 kernel/softirq.c:650
CPU: 0 PID: 10268 Comm: syz-executor.1 Not tainted 5.18.0-syzkaller-13760-g032dcf09e2bf #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:csd_lock_wait kernel/smp.c:414 [inline]
RIP: 0010:smp_call_function_many_cond+0x499/0x1110 kernel/smp.c:988
Code: 01 89 ee e8 a9 94 0a 00 85 ed 74 47 48 8b 04 24 49 89 c4 83 e0 07 49 c1 ec 03 48 89 c5 4d 01 fc 83 c5 03 e8 49 98 0a 00 f3 90 <41> 0f b6 04 24 40 38 c5 7c 08 84 c0 0f 85 21 0a 00 00 8b 43 08 31
RSP: 0018:ffffc9000930f980 EFLAGS: 00000246
RAX: 0000000000040000 RBX: ffff8880b9b401e0 RCX: ffffc900065f5000
RDX: 0000000000040000 RSI: ffffffff816fede7 RDI: 0000000000000005
RBP: 0000000000000003 R08: 0000000000000005 R09: 0000000000000000
R10: 0000000000000001 R11: 0000000000000001 R12: ffffed101736803d
R13: 0000000000000001 R14: 0000000000000001 R15: dffffc0000000000
FS: 00007f0ff5199700(0000) GS:ffff8880b9a00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f0ff519a000 CR3: 00000000233f3000 CR4: 0000000000350ef0
Call Trace:
on_each_cpu_cond_mask+0x56/0xa0 kernel/smp.c:1154
kill_bdev block/bdev.c:76 [inline]
set_blocksize+0x2b3/0x370 block/bdev.c:153
sb_set_blocksize block/bdev.c:162 [inline]
sb_min_blocksize+0xc8/0x1c0 block/bdev.c:178
init_nilfs+0x86/0x1280 fs/nilfs2/the_nilfs.c:571
nilfs_fill_super fs/nilfs2/super.c:1047 [inline]
nilfs_mount+0x868/0xfb0 fs/nilfs2/super.c:1317
legacy_get_tree+0x105/0x220 fs/fs_context.c:610
vfs_get_tree+0x89/0x2f0 fs/super.c:1497
do_new_mount fs/namespace.c:3040 [inline]
path_mount+0x1320/0x1fa0 fs/namespace.c:3370
do_mount fs/namespace.c:3383 [inline]
__do_sys_mount fs/namespace.c:3591 [inline]
__se_sys_mount fs/namespace.c:3568 [inline]
__x64_sys_mount+0x27f/0x300 fs/namespace.c:3568
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x46/0xb0
RIP: 0033:0x7f0ff408a63a
================================
WARNING: inconsistent lock state
5.18.0-syzkaller-13760-g032dcf09e2bf #0 Not tainted
--------------------------------
inconsistent {HARDIRQ-ON-W} -> {IN-HARDIRQ-W} usage.
syz-executor.1/10268 [HC1[1]:SC0[0]:HE0:SE1] takes:
ffffffff8beb88d8 (vmap_area_lock){?.+.}-{2:2}, at: spin_lock include/linux/spinlock.h:349 [inline]
ffffffff8beb88d8 (vmap_area_lock){?.+.}-{2:2}, at: find_vmap_area mm/vmalloc.c:1805 [inline]
ffffffff8beb88d8 (vmap_area_lock){?.+.}-{2:2}, at: find_vm_area+0x1c/0x190 mm/vmalloc.c:2525
{HARDIRQ-ON-W} state was registered at:
lock_acquire kernel/locking/lockdep.c:5665 [inline]
lock_acquire+0x1ab/0x570 kernel/locking/lockdep.c:5630
__raw_spin_lock include/linux/spinlock_api_smp.h:133 [inline]
_raw_spin_lock+0x2a/0x40 kernel/locking/spinlock.c:154
spin_lock include/linux/spinlock.h:349 [inline]
alloc_vmap_area+0xa49/0x1f00 mm/vmalloc.c:1586
__get_vm_area_node+0x142/0x3f0 mm/vmalloc.c:2453
get_vm_area_caller+0x43/0x50 mm/vmalloc.c:2506
__ioremap_caller.constprop.0+0x292/0x600 arch/x86/mm/ioremap.c:280
acpi_os_ioremap include/acpi/acpi_io.h:13 [inline]
acpi_map drivers/acpi/osl.c:296 [inline]
acpi_os_map_iomem+0x463/0x550 drivers/acpi/osl.c:355
acpi_tb_acquire_table+0xd8/0x209 drivers/acpi/acpica/tbdata.c:142
acpi_tb_validate_table drivers/acpi/acpica/tbdata.c:317 [inline]
acpi_tb_validate_table+0x50/0x8c drivers/acpi/acpica/tbdata.c:308
acpi_tb_verify_temp_table+0x84/0x674 drivers/acpi/acpica/tbdata.c:504
acpi_reallocate_root_table+0x374/0x3e0 drivers/acpi/acpica/tbxface.c:180
acpi_early_init+0x13a/0x438 drivers/acpi/bus.c:1200
start_kernel+0x3cf/0x48f init/main.c:1098
secondary_startup_64_no_verify+0xce/0xdb
irq event stamp: 82942
hardirqs last enabled at (82941): [] asm_sysvec_apic_timer_interrupt+0x1b/0x20 arch/x86/include/asm/idtentry.h:649
hardirqs last disabled at (82942): [] sysvec_apic_timer_interrupt+0xb/0xc0 arch/x86/kernel/apic/apic.c:1106
softirqs last enabled at (984): [] invoke_softirq kernel/softirq.c:445 [inline]
softirqs last enabled at (984): [] __irq_exit_rcu+0x123/0x180 kernel/softirq.c:650
softirqs last disabled at (845): [] invoke_softirq kernel/softirq.c:445 [inline]
softirqs last disabled at (845): [] __irq_exit_rcu+0x123/0x180 kernel/softirq.c:650
other info that might help us debug this:
Possible unsafe locking scenario:
CPU0
----
lock(vmap_area_lock);
lock(vmap_area_lock);
*** DEADLOCK ***
2 locks held by syz-executor.1/10268:
#0: ffff88807b8ee0e0 (&type->s_umount_key#100/1){+.+.}-{3:3}, at: alloc_super+0x1dd/0xa80 fs/super.c:228
#1: ffff888052a82090 (&nilfs->ns_sem){+.+.}-{3:3}, at: init_nilfs+0x79/0x1280 fs/nilfs2/the_nilfs.c:569
stack backtrace:
CPU: 0 PID: 10268 Comm: syz-executor.1 Not tainted 5.18.0-syzkaller-13760-g032dcf09e2bf #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106
print_usage_bug kernel/locking/lockdep.c:3961 [inline]
valid_state kernel/locking/lockdep.c:3973 [inline]
mark_lock_irq kernel/locking/lockdep.c:4176 [inline]
mark_lock.part.0.cold+0x18/0xd8 kernel/locking/lockdep.c:4632
mark_lock kernel/locking/lockdep.c:4596 [inline]
mark_usage kernel/locking/lockdep.c:4524 [inline]
__lock_acquire+0x14ad/0x5660 kernel/locking/lockdep.c:5007
lock_acquire kernel/locking/lockdep.c:5665 [inline]
lock_acquire+0x1ab/0x570 kernel/locking/lockdep.c:5630
__raw_spin_lock include/linux/spinlock_api_smp.h:133 [inline]
_raw_spin_lock+0x2a/0x40 kernel/locking/spinlock.c:154
spin_lock include/linux/spinlock.h:349 [inline]
find_vmap_area mm/vmalloc.c:1805 [inline]
find_vm_area+0x1c/0x190 mm/vmalloc.c:2525
check_heap_object mm/usercopy.c:176 [inline]
__check_object_size mm/usercopy.c:252 [inline]
__check_object_size+0x1fb/0x7a0 mm/usercopy.c:214
check_object_size include/linux/thread_info.h:199 [inline]
__copy_from_user_inatomic include/linux/uaccess.h:62 [inline]
copy_from_user_nmi arch/x86/lib/usercopy.c:47 [inline]
copy_from_user_nmi+0xcb/0x130 arch/x86/lib/usercopy.c:31
copy_code arch/x86/kernel/dumpstack.c:91 [inline]
show_opcodes+0x59/0xb0 arch/x86/kernel/dumpstack.c:121
show_iret_regs+0xd/0x33 arch/x86/kernel/dumpstack.c:149
__show_regs+0x1e/0x60 arch/x86/kernel/process_64.c:74
show_trace_log_lvl+0x25b/0x2ba arch/x86/kernel/dumpstack.c:292
watchdog_timer_fn+0x469/0x5d0 kernel/watchdog.c:435
__run_hrtimer kernel/time/hrtimer.c:1685 [inline]
__hrtimer_run_queues+0x1c0/0xe50 kernel/time/hrtimer.c:1749
hrtimer_interrupt+0x31c/0x790 kernel/time/hrtimer.c:1811
local_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1095 [inline]
__sysvec_apic_timer_interrupt+0x146/0x530 arch/x86/kernel/apic/apic.c:1112
sysvec_apic_timer_interrupt+0x8e/0xc0 arch/x86/kernel/apic/apic.c:1106
asm_sysvec_apic_timer_interrupt+0x1b/0x20 arch/x86/include/asm/idtentry.h:649
RIP: 0010:csd_lock_wait kernel/smp.c:414 [inline]
RIP: 0010:smp_call_function_many_cond+0x499/0x1110 kernel/smp.c:988
Code: 01 89 ee e8 a9 94 0a 00 85 ed 74 47 48 8b 04 24 49 89 c4 83 e0 07 49 c1 ec 03 48 89 c5 4d 01 fc 83 c5 03 e8 49 98 0a 00 f3 90 <41> 0f b6 04 24 40 38 c5 7c 08 84 c0 0f 85 21 0a 00 00 8b 43 08 31
RSP: 0018:ffffc9000930f980 EFLAGS: 00000246
RAX: 0000000000040000 RBX: ffff8880b9b401e0 RCX: ffffc900065f5000
RDX: 0000000000040000 RSI: ffffffff816fede7 RDI: 0000000000000005
RBP: 0000000000000003 R08: 0000000000000005 R09: 0000000000000000
R10: 0000000000000001 R11: 0000000000000001 R12: ffffed101736803d
R13: 0000000000000001 R14: 0000000000000001 R15: dffffc0000000000
on_each_cpu_cond_mask+0x56/0xa0 kernel/smp.c:1154
kill_bdev block/bdev.c:76 [inline]
set_blocksize+0x2b3/0x370 block/bdev.c:153
sb_set_blocksize block/bdev.c:162 [inline]
sb_min_blocksize+0xc8/0x1c0 block/bdev.c:178
init_nilfs+0x86/0x1280 fs/nilfs2/the_nilfs.c:571
nilfs_fill_super fs/nilfs2/super.c:1047 [inline]
nilfs_mount+0x868/0xfb0 fs/nilfs2/super.c:1317
legacy_get_tree+0x105/0x220 fs/fs_context.c:610
vfs_get_tree+0x89/0x2f0 fs/super.c:1497
do_new_mount fs/namespace.c:3040 [inline]
path_mount+0x1320/0x1fa0 fs/namespace.c:3370
do_mount fs/namespace.c:3383 [inline]
__do_sys_mount fs/namespace.c:3591 [inline]
__se_sys_mount fs/namespace.c:3568 [inline]
__x64_sys_mount+0x27f/0x300 fs/namespace.c:3568
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x46/0xb0
RIP: 0033:0x7f0ff408a63a
Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f0ff5198f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f0ff408a63a
RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f0ff5198fe0
RBP: 00007f0ff5199020 R08: 00007f0ff5199020 R09: 0000000020000000
R10: 0000000000000001 R11: 0000000000000206 R12: 0000000020000000
R13: 0000000020000100 R14: 00007f0ff5198fe0 R15: 0000000020015900
Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f0ff5198f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f0ff408a63a
RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f0ff5198fe0
RBP: 00007f0ff5199020 R08: 00007f0ff5199020 R09: 0000000020000000
R10: 0000000000000001 R11: 0000000000000206 R12: 0000000020000000
R13: 0000000020000100 R14: 00007f0ff5198fe0 R15: 0000000020015900
Sending NMI from CPU 0 to CPUs 1:
NMI backtrace for cpu 1
CPU: 1 PID: 10244 Comm: syz-executor.5 Not tainted 5.18.0-syzkaller-13760-g032dcf09e2bf #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:__netif_schedule+0x31/0x50 net/core/dev.c:3082
Code: 46 29 fa 48 8d bd 58 01 00 00 be 08 00 00 00 e8 85 09 76 fa f0 48 0f ba ad 58 01 00 00 00 0f 92 c3 31 ff 89 de e8 8f 42 29 fa <84> db 74 07 5b 5d e9 84 46 29 fa e8 7f 46 29 fa 48 89 ef e8 07 fd
RSP: 0018:ffffc900001f0db8 EFLAGS: 00000046
RAX: 0000000000010001 RBX: 0000000000000001 RCX: ffffffff87513fa1
RDX: ffff88806e3a5880 RSI: 0000000000000000 RDI: 0000000000000001
RBP: ffff88807a787000 R08: 0000000000000001 R09: 0000000000000000
R10: 0000000000000001 R11: 0000000000000001 R12: ffff88806e9cd100
R13: 193e5dec327cbbd8 R14: ffff88806e9cd120 R15: 193e5dec327cbbd8
FS: 0000000000000000(0000) GS:ffff8880b9b00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000020000040 CR3: 000000000ba8e000 CR4: 0000000000350ee0
Call Trace:
advance_sched+0x4cd/0x9a0 net/sched/sch_taprio.c:769
__run_hrtimer kernel/time/hrtimer.c:1685 [inline]
__hrtimer_run_queues+0x609/0xe50 kernel/time/hrtimer.c:1749
hrtimer_interrupt+0x31c/0x790 kernel/time/hrtimer.c:1811
local_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1095 [inline]
__sysvec_apic_timer_interrupt+0x146/0x530 arch/x86/kernel/apic/apic.c:1112
sysvec_apic_timer_interrupt+0x8e/0xc0 arch/x86/kernel/apic/apic.c:1106
asm_sysvec_apic_timer_interrupt+0x1b/0x20 arch/x86/include/asm/idtentry.h:649
RIP: 0010:check_kcov_mode kernel/kcov.c:166 [inline]
RIP: 0010:__sanitizer_cov_trace_pc+0xd/0x60 kernel/kcov.c:200
Code: 00 00 e9 66 95 81 02 66 0f 1f 44 00 00 48 8b be a8 01 00 00 e8 b4 ff ff ff 31 c0 c3 90 65 8b 05 09 e9 87 7e 89 c1 48 8b 34 24 <81> e1 00 01 00 00 65 48 8b 14 25 80 6f 02 00 a9 00 01 ff 00 74 0e
RSP: 0018:ffffc900080776f0 EFLAGS: 00000293
RAX: 0000000080000001 RBX: ffffea00010b2280 RCX: 0000000080000001
RDX: ffff88806e3a5880 RSI: ffffffff81c1841e RDI: ffffea00010b2280
RBP: ffffea00010b2280 R08: 0000000000000001 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000001 R12: ffff88807df2b210
R13: ffffea00010b2288 R14: 0000000000000000 R15: 0000000000000000
PageCompound include/linux/page-flags.h:316 [inline]
PageHuge+0xe/0x230 mm/hugetlb.c:1850
page_remove_file_rmap mm/rmap.c:1346 [inline]
page_remove_rmap+0x2df/0x1510 mm/rmap.c:1432
zap_pte_range mm/memory.c:1446 [inline]
zap_pmd_range mm/memory.c:1567 [inline]
zap_pud_range mm/memory.c:1596 [inline]
zap_p4d_range mm/memory.c:1617 [inline]
unmap_page_range+0x1014/0x3710 mm/memory.c:1638
unmap_single_vma+0x196/0x360 mm/memory.c:1686
unmap_vmas+0x18c/0x310 mm/memory.c:1723
exit_mmap+0x1c4/0x4a0 mm/mmap.c:3162
__mmput+0x122/0x4b0 kernel/fork.c:1187
mmput+0x56/0x60 kernel/fork.c:1208
exit_mm kernel/exit.c:510 [inline]
do_exit+0xa12/0x2a00 kernel/exit.c:782
do_group_exit+0xd2/0x2f0 kernel/exit.c:925
get_signal+0x2542/0x2600 kernel/signal.c:2857
arch_do_signal_or_restart+0x82/0x20f0 arch/x86/kernel/signal.c:869
exit_to_user_mode_loop kernel/entry/common.c:166 [inline]
exit_to_user_mode_prepare+0x15f/0x250 kernel/entry/common.c:201
__syscall_exit_to_user_mode_work kernel/entry/common.c:283 [inline]
syscall_exit_to_user_mode+0x19/0x50 kernel/entry/common.c:294
do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86
entry_SYSCALL_64_after_hwframe+0x46/0xb0
RIP: 0033:0x7efc57c89109
Code: Unable to access opcode bytes at RIP 0x7efc57c890df.
RSP: 002b:00007efc58d66218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca
RAX: 0000000000000001 RBX: 00007efc57d9bf68 RCX: 00007efc57c89109
RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007efc57d9bf6c
RBP: 00007efc57d9bf60 R08: 00007fff1cfe1080 R09: 0000000000000000
R10: ffffffffffffffff R11: 0000000000000246 R12: 00007efc57d9bf6c
R13: 00007fff1cfbabbf R14: 00007efc58d66300 R15: 0000000000022000
----------------
Code disassembly (best guess):
0: 38 41 83 cmp %al,-0x7d(%rcx)
3: e4 01 in $0x1,%al
5: 44 89 e6 mov %r12d,%esi
8: e8 88 e1 0f 00 callq 0xfe195
d: 45 84 e4 test %r12b,%r12b
10: 75 13 jne 0x25
12: 48 83 c4 08 add $0x8,%rsp
16: 5b pop %rbx
17: 5d pop %rbp
18: 41 5c pop %r12
1a: 41 5d pop %r13
1c: 41 5e pop %r14
1e: 41 5f pop %r15
20: e9 70 e5 0f 00 jmpq 0xfe595
25: e8 6b e5 0f 00 callq 0xfe595
* 2a: 48 8d 7d 50 lea 0x50(%rbp),%rdi <-- trapping instruction
2e: 48 89 de mov %rbx,%rsi
31: e8 1f 82 b6 02 callq 0x2b68255
36: 31 ff xor %edi,%edi
38: 41 89 c4 mov %eax,%r12d
3b: 89 c6 mov %eax,%esi
3d: e8 .byte 0xe8
3e: 53 push %rbx
3f: e1 .byte 0xe1