------------[ cut here ]------------
WARNING: CPU: 0 PID: 6505 at kernel/rcu/tree_stall.h:1015 rcu_check_gp_start_stall+0x2e4/0x470 kernel/rcu/tree_stall.h:1015
Modules linked in:
CPU: 0 UID: 0 PID: 6505 Comm: syz.4.176 Not tainted 6.16.0-rc3-syzkaller-ge34a79b96ab9 #0 PREEMPT(full)
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
RIP: 0010:rcu_check_gp_start_stall+0x2e4/0x470 kernel/rcu/tree_stall.h:1015
Code: ff ff 48 c7 c7 40 74 ac 99 be 04 00 00 00 e8 03 2e 7c 00 4c 89 f7 b8 01 00 00 00 87 05 65 cd 04 18 85 c0 0f 85 17 ff ff ff 90 <0f> 0b 90 48 81 ff 00 42 14 8e 74 47 48 c7 c0 30 3e a1 8f 48 c1 e8
RSP: 0018:ffffc90000007bb8 EFLAGS: 00010046
RAX: 0000000000000000 RBX: 0000000000000a02 RCX: ffffffff81a7a6cd
RDX: 0000000000000001 RSI: 0000000000000004 RDI: ffffffff8e144200
RBP: ffffc90000007e30 R08: 0000000000000003 R09: 0000000000000004
R10: dffffc0000000000 R11: fffffbfff3358e88 R12: 0000000000002904
R13: 1ffff110170c75f2 R14: ffffffff8e144200 R15: dffffc0000000000
FS: 00007f5cc3b676c0(0000) GS:ffff888125c50000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f9a99fa7f98 CR3: 0000000068904000 CR4: 00000000003526f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600
Call Trace:
rcu_core+0x5f7/0x1710 kernel/rcu/tree.c:2827
handle_softirqs+0x286/0x870 kernel/softirq.c:579
__do_softirq kernel/softirq.c:613 [inline]
invoke_softirq kernel/softirq.c:453 [inline]
__irq_exit_rcu+0xca/0x1f0 kernel/softirq.c:680
irq_exit_rcu+0x9/0x30 kernel/softirq.c:696
instr_sysvec_irq_work arch/x86/kernel/irq_work.c:17 [inline]
sysvec_irq_work+0xa3/0xc0 arch/x86/kernel/irq_work.c:17
asm_sysvec_irq_work+0x1a/0x20 arch/x86/include/asm/idtentry.h:738
RIP: 0010:rcu_read_unlock_special+0x87/0x4c0 kernel/rcu/tree_plugin.h:694
Code: f1 f1 f1 00 f2 f2 f2 4a 89 04 2b 66 42 c7 44 2b 09 f3 f3 42 c6 44 2b 0b f3 65 44 8b 35 a2 35 f5 10 41 f7 c6 00 00 f0 00 74 49 <48> c7 44 24 40 0e 36 e0 45 4a c7 04 2b 00 00 00 00 66 42 c7 44 2b
RSP: 0018:ffffc9001b4c64a0 EFLAGS: 00000206
RAX: 30a74626ca38ed00 RBX: 1ffff92003698c9c RCX: 30a74626ca38ed00
RDX: 0000000000000006 RSI: ffffffff8d982385 RDI: ffffffff8be28d40
RBP: ffffc9001b4c6598 R08: ffffffff8fa10cf7 R09: 1ffffffff1f4219e
R10: dffffc0000000000 R11: fffffbfff1f4219f R12: ffffffff8e144200
R13: dffffc0000000000 R14: 0000000000000246 R15: 0000000000000001
__rcu_read_unlock+0x84/0xe0 kernel/rcu/tree_plugin.h:438
rcu_read_unlock include/linux/rcupdate.h:873 [inline]
class_rcu_destructor include/linux/rcupdate.h:1155 [inline]
unwind_next_frame+0x19ae/0x2390 arch/x86/kernel/unwind_orc.c:680
arch_stack_walk+0x11c/0x150 arch/x86/kernel/stacktrace.c:25
stack_trace_save+0x9c/0xe0 kernel/stacktrace.c:122
save_stack+0xf5/0x1f0 mm/page_owner.c:156
__reset_page_owner+0x71/0x1f0 mm/page_owner.c:308
reset_page_owner include/linux/page_owner.h:25 [inline]
free_pages_prepare mm/page_alloc.c:1248 [inline]
free_unref_folios+0xc66/0x14d0 mm/page_alloc.c:2763
folios_put_refs+0x559/0x640 mm/swap.c:992
folios_put include/linux/mm.h:1415 [inline]
folio_batch_move_lru+0x319/0x3a0 mm/swap.c:175
__folio_batch_add_and_move+0x5ad/0xd20 mm/swap.c:196
shmem_alloc_and_add_folio+0xcb3/0xf60 mm/shmem.c:1949
shmem_get_folio_gfp+0x59d/0x1660 mm/shmem.c:2536
shmem_get_folio mm/shmem.c:2642 [inline]
shmem_write_begin+0xf7/0x2b0 mm/shmem.c:3292
generic_perform_write+0x2c7/0x910 mm/filemap.c:4112
shmem_file_write_iter+0xf8/0x120 mm/shmem.c:3467
__kernel_write_iter+0x390/0x860 fs/read_write.c:619
dump_emit_page fs/coredump.c:1112 [inline]
dump_user_range+0x873/0xc70 fs/coredump.c:1186
elf_core_dump+0x32ed/0x3900 fs/binfmt_elf.c:2075
do_coredump+0x2806/0x3440 fs/coredump.c:950
get_signal+0x1109/0x1340 kernel/signal.c:3019
arch_do_signal_or_restart+0x9a/0x750 arch/x86/kernel/signal.c:337
exit_to_user_mode_loop kernel/entry/common.c:111 [inline]
exit_to_user_mode_prepare include/linux/entry-common.h:330 [inline]
irqentry_exit_to_user_mode+0x81/0x120 kernel/entry/common.c:184
exc_page_fault+0x9f/0xf0 arch/x86/mm/fault.c:1535
asm_exc_page_fault+0x26/0x30 arch/x86/include/asm/idtentry.h:623
RIP: 0033:0x41ed01b6031b
Code: Unable to access opcode bytes at 0x41ed01b602f1.
RSP: 002b:00002000000004a8 EFLAGS: 00010217
RAX: 0000000000000000 RBX: 00007f5cc2fb5fa0 RCX: 00007f5cc2d8e929
RDX: 00002000000004c0 RSI: 00002000000004a0 RDI: 0000000020004000
RBP: 00007f5cc2e10b39 R08: 0000200000000540 R09: 0000200000000540
R10: 0000200000000500 R11: 0000000000000206 R12: 0000000000000000
R13: 0000000000000000 R14: 00007f5cc2fb5fa0 R15: 00007ffc36482a58
----------------
Code disassembly (best guess):
0: f1 int1
1: f1 int1
2: f1 int1
3: 00 f2 add %dh,%dl
5: f2 f2 4a 89 04 2b repnz repnz mov %rax,(%rbx,%r13,1)
b: 66 42 c7 44 2b 09 f3 movw $0xf3f3,0x9(%rbx,%r13,1)
12: f3
13: 42 c6 44 2b 0b f3 movb $0xf3,0xb(%rbx,%r13,1)
19: 65 44 8b 35 a2 35 f5 mov %gs:0x10f535a2(%rip),%r14d # 0x10f535c3
20: 10
21: 41 f7 c6 00 00 f0 00 test $0xf00000,%r14d
28: 74 49 je 0x73
* 2a: 48 c7 44 24 40 0e 36 movq $0x45e0360e,0x40(%rsp) <-- trapping instruction
31: e0 45
33: 4a c7 04 2b 00 00 00 movq $0x0,(%rbx,%r13,1)
3a: 00
3b: 66 data16
3c: 42 rex.X
3d: c7 .byte 0xc7
3e: 44 rex.R
3f: 2b .byte 0x2b