------------[ cut here ]------------ WARNING: CPU: 1 PID: 7037 at kernel/rcu/tree_stall.h:970 rcu_check_gp_start_stall+0x2c8/0x450 kernel/rcu/tree_stall.h:955 Modules linked in: CPU: 1 PID: 7037 Comm: syz.4.969 Not tainted 6.1.99-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 RIP: 0010:rcu_check_gp_start_stall+0x2c8/0x450 kernel/rcu/tree_stall.h:970 Code: c7 c7 40 8f cd 91 be 04 00 00 00 e8 82 30 6e 00 b8 01 00 00 00 87 05 07 a4 59 10 85 c0 0f 85 1c ff ff ff 48 c7 c0 80 fb 12 8d <0f> 0b 49 39 c7 74 47 48 c7 c0 24 b6 73 8e 48 c1 e8 03 42 0f b6 04 RSP: 0018:ffffc900001e0b98 EFLAGS: 00010046 RAX: ffffffff8d12fb80 RBX: 0000000100000574 RCX: ffffffff8173eb2e RDX: 0000000000000001 RSI: 0000000000000004 RDI: ffffffff91cd8f40 RBP: ffffc900001e0df0 R08: dffffc0000000000 R09: 0000000000000003 R10: ffffffffffffffff R11: dffffc0000000001 R12: dffffc0000000000 R13: ffff8880b993b8d2 R14: 0000000000000246 R15: ffffffff8d12fb80 FS: 0000000000000000(0000) GS:ffff8880b9900000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000020000680 CR3: 000000000ce8e000 CR4: 00000000003506e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: rcu_core+0x699/0x1810 kernel/rcu/tree.c:2551 handle_softirqs+0x2ee/0xa40 kernel/softirq.c:571 __do_softirq kernel/softirq.c:605 [inline] invoke_softirq kernel/softirq.c:445 [inline] __irq_exit_rcu+0x157/0x240 kernel/softirq.c:654 irq_exit_rcu+0x5/0x20 kernel/softirq.c:666 sysvec_apic_timer_interrupt+0x91/0xb0 arch/x86/kernel/apic/apic.c:1106 asm_sysvec_apic_timer_interrupt+0x16/0x20 arch/x86/include/asm/idtentry.h:653 RIP: 0010:page_table_check_clear+0x387/0x6d0 Code: 44 89 e1 80 e1 07 80 c1 03 38 c1 0f 8c 46 ff ff ff 4c 89 e7 e8 5a 4b f5 ff e9 39 ff ff ff e8 a0 c7 9d ff eb 0c e8 99 c7 9d ff 19 e8 92 c7 9d ff 48 83 c4 08 5b 41 5c 41 5d 41 5e 41 5f 5d c3 RSP: 0018:ffffc90004a872e0 EFLAGS: 00000293 RAX: ffffffff81ecceb7 RBX: ffff8880140e89c0 RCX: ffff888028dabb80 RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000000 RBP: dffffc0000000000 R08: ffffffff81eccd8c R09: ffffed100281d139 R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000000 R13: ffff8880140e89c8 R14: ffffffffffffffff R15: 1ffffffff1a46d9c zap_pte_range mm/memory.c:1435 [inline] zap_pmd_range mm/memory.c:1574 [inline] zap_pud_range mm/memory.c:1603 [inline] zap_p4d_range mm/memory.c:1624 [inline] unmap_page_range+0x1b4a/0x2740 mm/memory.c:1645 unmap_vmas+0x48b/0x640 mm/memory.c:1730 exit_mmap+0x252/0x9f0 mm/mmap.c:3227 __mmput+0x115/0x3c0 kernel/fork.c:1199 exit_mm+0x226/0x300 kernel/exit.c:565 do_exit+0x9f6/0x26a0 kernel/exit.c:858 do_group_exit+0x202/0x2b0 kernel/exit.c:1021 get_signal+0x16f7/0x17d0 kernel/signal.c:2862 arch_do_signal_or_restart+0xb0/0x1a10 arch/x86/kernel/signal.c:871 exit_to_user_mode_loop+0x6a/0x100 kernel/entry/common.c:174 exit_to_user_mode_prepare+0xb1/0x140 kernel/entry/common.c:210 __syscall_exit_to_user_mode_work kernel/entry/common.c:292 [inline] syscall_exit_to_user_mode+0x60/0x270 kernel/entry/common.c:303 do_syscall_64+0x47/0xb0 arch/x86/entry/common.c:87 entry_SYSCALL_64_after_hwframe+0x68/0xd2 RIP: 0033:0x7fc498d7561b Code: Unable to access opcode bytes at 0x7fc498d755f1. RSP: 002b:00007fc499a8bf20 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: fffffffffffffffc RBX: 0000000000000003 RCX: 00007fc498d7561b RDX: 00007fc499a8cff0 RSI: 0000000080085502 RDI: 0000000000000003 RBP: 00007fc499a8cff0 R08: 0000000000000080 R09: 00007fc499a8bfe8 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000080085502 R13: 0000000800000000 R14: 0000000000000012 R15: 00007fc498decadb ---------------- Code disassembly (best guess): 0: 44 89 e1 mov %r12d,%ecx 3: 80 e1 07 and $0x7,%cl 6: 80 c1 03 add $0x3,%cl 9: 38 c1 cmp %al,%cl b: 0f 8c 46 ff ff ff jl 0xffffff57 11: 4c 89 e7 mov %r12,%rdi 14: e8 5a 4b f5 ff call 0xfff54b73 19: e9 39 ff ff ff jmp 0xffffff57 1e: e8 a0 c7 9d ff call 0xff9dc7c3 23: eb 0c jmp 0x31 25: e8 99 c7 9d ff call 0xff9dc7c3 * 2a: eb 19 jmp 0x45 <-- trapping instruction 2c: e8 92 c7 9d ff call 0xff9dc7c3 31: 48 83 c4 08 add $0x8,%rsp 35: 5b pop %rbx 36: 41 5c pop %r12 38: 41 5d pop %r13 3a: 41 5e pop %r14 3c: 41 5f pop %r15 3e: 5d pop %rbp 3f: c3 ret