------------[ cut here ]------------
WARNING: CPU: 1 PID: 7037 at kernel/rcu/tree_stall.h:970 rcu_check_gp_start_stall+0x2c8/0x450 kernel/rcu/tree_stall.h:955
Modules linked in:
CPU: 1 PID: 7037 Comm: syz.4.969 Not tainted 6.1.99-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
RIP: 0010:rcu_check_gp_start_stall+0x2c8/0x450 kernel/rcu/tree_stall.h:970
Code: c7 c7 40 8f cd 91 be 04 00 00 00 e8 82 30 6e 00 b8 01 00 00 00 87 05 07 a4 59 10 85 c0 0f 85 1c ff ff ff 48 c7 c0 80 fb 12 8d <0f> 0b 49 39 c7 74 47 48 c7 c0 24 b6 73 8e 48 c1 e8 03 42 0f b6 04
RSP: 0018:ffffc900001e0b98 EFLAGS: 00010046
RAX: ffffffff8d12fb80 RBX: 0000000100000574 RCX: ffffffff8173eb2e
RDX: 0000000000000001 RSI: 0000000000000004 RDI: ffffffff91cd8f40
RBP: ffffc900001e0df0 R08: dffffc0000000000 R09: 0000000000000003
R10: ffffffffffffffff R11: dffffc0000000001 R12: dffffc0000000000
R13: ffff8880b993b8d2 R14: 0000000000000246 R15: ffffffff8d12fb80
FS: 0000000000000000(0000) GS:ffff8880b9900000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000020000680 CR3: 000000000ce8e000 CR4: 00000000003506e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
rcu_core+0x699/0x1810 kernel/rcu/tree.c:2551
handle_softirqs+0x2ee/0xa40 kernel/softirq.c:571
__do_softirq kernel/softirq.c:605 [inline]
invoke_softirq kernel/softirq.c:445 [inline]
__irq_exit_rcu+0x157/0x240 kernel/softirq.c:654
irq_exit_rcu+0x5/0x20 kernel/softirq.c:666
sysvec_apic_timer_interrupt+0x91/0xb0 arch/x86/kernel/apic/apic.c:1106
asm_sysvec_apic_timer_interrupt+0x16/0x20 arch/x86/include/asm/idtentry.h:653
RIP: 0010:page_table_check_clear+0x387/0x6d0
Code: 44 89 e1 80 e1 07 80 c1 03 38 c1 0f 8c 46 ff ff ff 4c 89 e7 e8 5a 4b f5 ff e9 39 ff ff ff e8 a0 c7 9d ff eb 0c e8 99 c7 9d ff 19 e8 92 c7 9d ff 48 83 c4 08 5b 41 5c 41 5d 41 5e 41 5f 5d c3
RSP: 0018:ffffc90004a872e0 EFLAGS: 00000293
RAX: ffffffff81ecceb7 RBX: ffff8880140e89c0 RCX: ffff888028dabb80
RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000000
RBP: dffffc0000000000 R08: ffffffff81eccd8c R09: ffffed100281d139
R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000000
R13: ffff8880140e89c8 R14: ffffffffffffffff R15: 1ffffffff1a46d9c
zap_pte_range mm/memory.c:1435 [inline]
zap_pmd_range mm/memory.c:1574 [inline]
zap_pud_range mm/memory.c:1603 [inline]
zap_p4d_range mm/memory.c:1624 [inline]
unmap_page_range+0x1b4a/0x2740 mm/memory.c:1645
unmap_vmas+0x48b/0x640 mm/memory.c:1730
exit_mmap+0x252/0x9f0 mm/mmap.c:3227
__mmput+0x115/0x3c0 kernel/fork.c:1199
exit_mm+0x226/0x300 kernel/exit.c:565
do_exit+0x9f6/0x26a0 kernel/exit.c:858
do_group_exit+0x202/0x2b0 kernel/exit.c:1021
get_signal+0x16f7/0x17d0 kernel/signal.c:2862
arch_do_signal_or_restart+0xb0/0x1a10 arch/x86/kernel/signal.c:871
exit_to_user_mode_loop+0x6a/0x100 kernel/entry/common.c:174
exit_to_user_mode_prepare+0xb1/0x140 kernel/entry/common.c:210
__syscall_exit_to_user_mode_work kernel/entry/common.c:292 [inline]
syscall_exit_to_user_mode+0x60/0x270 kernel/entry/common.c:303
do_syscall_64+0x47/0xb0 arch/x86/entry/common.c:87
entry_SYSCALL_64_after_hwframe+0x68/0xd2
RIP: 0033:0x7fc498d7561b
Code: Unable to access opcode bytes at 0x7fc498d755f1.
RSP: 002b:00007fc499a8bf20 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: fffffffffffffffc RBX: 0000000000000003 RCX: 00007fc498d7561b
RDX: 00007fc499a8cff0 RSI: 0000000080085502 RDI: 0000000000000003
RBP: 00007fc499a8cff0 R08: 0000000000000080 R09: 00007fc499a8bfe8
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000080085502
R13: 0000000800000000 R14: 0000000000000012 R15: 00007fc498decadb
----------------
Code disassembly (best guess):
0: 44 89 e1 mov %r12d,%ecx
3: 80 e1 07 and $0x7,%cl
6: 80 c1 03 add $0x3,%cl
9: 38 c1 cmp %al,%cl
b: 0f 8c 46 ff ff ff jl 0xffffff57
11: 4c 89 e7 mov %r12,%rdi
14: e8 5a 4b f5 ff call 0xfff54b73
19: e9 39 ff ff ff jmp 0xffffff57
1e: e8 a0 c7 9d ff call 0xff9dc7c3
23: eb 0c jmp 0x31
25: e8 99 c7 9d ff call 0xff9dc7c3
* 2a: eb 19 jmp 0x45 <-- trapping instruction
2c: e8 92 c7 9d ff call 0xff9dc7c3
31: 48 83 c4 08 add $0x8,%rsp
35: 5b pop %rbx
36: 41 5c pop %r12
38: 41 5d pop %r13
3a: 41 5e pop %r14
3c: 41 5f pop %r15
3e: 5d pop %rbp
3f: c3 ret