=============================
[ BUG: Invalid wait context ]
6.14.0-rc7-syzkaller-00137-g5fc319360819 #0 Not tainted
-----------------------------
syz.4.838/9147 is trying to lock:
ffffc9001ba52458 (&gpc->lock){....}-{3:3}, at: kvm_xen_set_evtchn_fast+0x1fc/0xa00 arch/x86/kvm/xen.c:1755
other info that might help us debug this:
context-{2:2}
4 locks held by syz.4.838/9147:
#0: ffff88801b076d20 (&mm->mmap_lock){++++}-{4:4}, at: mmap_read_lock include/linux/mmap_lock.h:190 [inline]
#0: ffff88801b076d20 (&mm->mmap_lock){++++}-{4:4}, at: exit_mmap+0x162/0xd40 mm/mmap.c:1269
#1: ffffffff8eb393e0 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire include/linux/rcupdate.h:337 [inline]
#1: ffffffff8eb393e0 (rcu_read_lock){....}-{1:3}, at: rcu_read_lock include/linux/rcupdate.h:849 [inline]
#1: ffffffff8eb393e0 (rcu_read_lock){....}-{1:3}, at: ___pte_offset_map+0x82/0x380 mm/pgtable-generic.c:287
#2: ffff888032d79a98 (ptlock_ptr(ptdesc)#2){+.+.}-{3:3}, at: spin_lock include/linux/spinlock.h:351 [inline]
#2: ffff888032d79a98 (ptlock_ptr(ptdesc)#2){+.+.}-{3:3}, at: __pte_offset_map_lock+0x1ba/0x300 mm/pgtable-generic.c:402
#3: ffffc9001ba52968 (&kvm->srcu){.?.+}-{0:0}, at: srcu_lock_acquire include/linux/srcu.h:164 [inline]
#3: ffffc9001ba52968 (&kvm->srcu){.?.+}-{0:0}, at: srcu_read_lock include/linux/srcu.h:256 [inline]
#3: ffffc9001ba52968 (&kvm->srcu){.?.+}-{0:0}, at: kvm_xen_set_evtchn_fast+0x1c9/0xa00 arch/x86/kvm/xen.c:1753
stack backtrace:
CPU: 1 UID: 0 PID: 9147 Comm: syz.4.838 Not tainted 6.14.0-rc7-syzkaller-00137-g5fc319360819 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025
Call Trace:
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120
print_lock_invalid_wait_context kernel/locking/lockdep.c:4828 [inline]
check_wait_context kernel/locking/lockdep.c:4900 [inline]
__lock_acquire+0x15a8/0x2100 kernel/locking/lockdep.c:5178
lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5851
__raw_read_lock_irqsave include/linux/rwlock_api_smp.h:160 [inline]
_raw_read_lock_irqsave+0xdd/0x130 kernel/locking/spinlock.c:236
kvm_xen_set_evtchn_fast+0x1fc/0xa00 arch/x86/kvm/xen.c:1755
xen_timer_callback+0x1a0/0x380 arch/x86/kvm/xen.c:140
__run_hrtimer kernel/time/hrtimer.c:1801 [inline]
__hrtimer_run_queues+0x551/0xd30 kernel/time/hrtimer.c:1865
hrtimer_interrupt+0x403/0xa40 kernel/time/hrtimer.c:1927
local_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1038 [inline]
__sysvec_apic_timer_interrupt+0x110/0x420 arch/x86/kernel/apic/apic.c:1055
instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1049 [inline]
sysvec_apic_timer_interrupt+0xa1/0xc0 arch/x86/kernel/apic/apic.c:1049
asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702
RIP: 0010:__sanitizer_cov_trace_pc+0x0/0x70 kernel/kcov.c:210
Code: 89 fb e8 23 00 00 00 48 8b 3d 44 13 92 0c 48 89 de 5b e9 83 5e 59 00 0f 1f 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1e fa 48 8b 04 24 65 48 8b 0c 25 00 d5 03 00 65 8b 15 d0 f4
RSP: 0018:ffffc9000db9f4d8 EFLAGS: 00000246
RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffff8880330e3c00
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
RBP: ffffc9000db9f890 R08: ffffffff820c50f9 R09: 1ffffffff2077a2e
R10: dffffc0000000000 R11: fffffbfff2077a2f R12: 0400000000000000
R13: dffffc0000000000 R14: 800000006ca32007 R15: 1ffffd4000365193
folio_test_swapbacked include/linux/page-flags.h:537 [inline]
mm_counter_file include/linux/mm.h:2641 [inline]
mm_counter include/linux/mm.h:2650 [inline]
zap_present_folio_ptes mm/memory.c:1520 [inline]
zap_present_ptes mm/memory.c:1595 [inline]
do_zap_pte_range mm/memory.c:1697 [inline]
zap_pte_range mm/memory.c:1741 [inline]
zap_pmd_range mm/memory.c:1833 [inline]
zap_pud_range mm/memory.c:1862 [inline]
zap_p4d_range mm/memory.c:1883 [inline]
unmap_page_range+0x1778/0x4510 mm/memory.c:1904
unmap_vmas+0x3cc/0x5f0 mm/memory.c:1994
exit_mmap+0x283/0xd40 mm/mmap.c:1284
__mmput+0x115/0x410 kernel/fork.c:1356
exit_mm+0x220/0x310 kernel/exit.c:570
do_exit+0x9ad/0x2940 kernel/exit.c:925
do_group_exit+0x207/0x2c0 kernel/exit.c:1087
__do_sys_exit_group kernel/exit.c:1098 [inline]
__se_sys_exit_group kernel/exit.c:1096 [inline]
__x64_sys_exit_group+0x3f/0x40 kernel/exit.c:1096
x64_sys_call+0x26a8/0x26b0 arch/x86/include/generated/asm/syscalls_64.h:232
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f6edb18d169
Code: Unable to access opcode bytes at 0x7f6edb18d13f.
RSP: 002b:00007ffcc45a9e18 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f6edb18d169
RDX: 0000000000000064 RSI: 0000000000000000 RDI: 0000000000000000
RBP: 00007ffcc45a9e7c R08: 00000005c45a9f0f R09: 00000000000927c0
R10: 0000000000000001 R11: 0000000000000246 R12: 00000000000000ac
R13: 00000000000927c0 R14: 0000000000071bd8 R15: 00007ffcc45a9ed0
----------------
Code disassembly (best guess):
0: 89 fb mov %edi,%ebx
2: e8 23 00 00 00 call 0x2a
7: 48 8b 3d 44 13 92 0c mov 0xc921344(%rip),%rdi # 0xc921352
e: 48 89 de mov %rbx,%rsi
11: 5b pop %rbx
12: e9 83 5e 59 00 jmp 0x595e9a
17: 0f 1f 00 nopl (%rax)
1a: 90 nop
1b: 90 nop
1c: 90 nop
1d: 90 nop
1e: 90 nop
1f: 90 nop
20: 90 nop
21: 90 nop
22: 90 nop
23: 90 nop
24: 90 nop
25: 90 nop
26: 90 nop
27: 90 nop
28: 90 nop
29: 90 nop
* 2a: f3 0f 1e fa endbr64 <-- trapping instruction
2e: 48 8b 04 24 mov (%rsp),%rax
32: 65 48 8b 0c 25 00 d5 mov %gs:0x3d500,%rcx
39: 03 00
3b: 65 gs
3c: 8b .byte 0x8b
3d: 15 .byte 0x15
3e: d0 f4 shl %ah