------------[ cut here ]------------
WARNING: CPU: 0 PID: 5241 at kernel/sched/fair.c:5337 place_entity+0x463/0x520 kernel/sched/fair.c:5337
Modules linked in:
CPU: 0 UID: 0 PID: 5241 Comm: syz-executor Not tainted 6.11.0-rc4-next-20240821-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024
RIP: 0010:place_entity+0x463/0x520 kernel/sched/fair.c:5337
Code: 27 48 83 c4 30 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc 48 8b 3c 24 4c 89 fe e8 77 14 00 00 48 89 04 24 e9 e0 fd ff ff 90 <0f> 0b 90 41 bd 01 00 00 00 e9 22 ff ff ff 89 d9 80 e1 07 38 c1 0f
RSP: 0018:ffffc90000007bf0 EFLAGS: 00010046
RAX: 000000000197b800 RBX: 00000000000065ee RCX: 0000000000100000
RDX: 0000000000000400 RSI: ffff888025c3bc80 RDI: ffff888025c3bd00
RBP: dffffc0000000000 R08: ffff88802f5e8147 R09: 1ffff11005ebd028
R10: dffffc0000000000 R11: ffffed1005ebd029 R12: 00000000025bbf86
R13: 0000000000000000 R14: 0000000000000000 R15: ffff888025c3bc80
FS: 00005555773b6500(0000) GS:ffff8880b9000000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000000 CR3: 000000006430a000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
enqueue_entity+0x271/0x1920 kernel/sched/fair.c:5409
enqueue_task_fair+0x206/0xe30 kernel/sched/fair.c:6985
enqueue_task+0x1a5/0x300 kernel/sched/core.c:2014
activate_task kernel/sched/core.c:2056 [inline]
ttwu_do_activate+0x1d1/0x7e0 kernel/sched/core.c:3665
ttwu_queue kernel/sched/core.c:3940 [inline]
try_to_wake_up+0x8bc/0x1480 kernel/sched/core.c:4266
swake_up_locked kernel/sched/swait.c:29 [inline]
complete_with_flags kernel/sched/completion.c:24 [inline]
complete+0xac/0x1c0 kernel/sched/completion.c:47
csd_do_func kernel/smp.c:134 [inline]
__flush_smp_call_function_queue+0xb88/0x1690 kernel/smp.c:571
__sysvec_call_function_single+0xb8/0x430 arch/x86/kernel/smp.c:271
instr_sysvec_call_function_single arch/x86/kernel/smp.c:266 [inline]
sysvec_call_function_single+0x9e/0xc0 arch/x86/kernel/smp.c:266
asm_sysvec_call_function_single+0x1a/0x20 arch/x86/include/asm/idtentry.h:709
RIP: 0010:console_flush_all+0xaad/0xfd0 kernel/printk/printk.c:3055
Code: ff ff e8 26 b0 1f 00 90 0f 0b 90 e9 d8 f8 ff ff e8 18 b0 1f 00 e8 43 6f 49 0a 4d 85 f6 74 b6 e8 09 b0 1f 00 fb 48 8b 44 24 70 <42> 0f b6 04 38 84 c0 48 8b 7c 24 30 0f 85 22 02 00 00 0f b6 1f 31
RSP: 0018:ffffc90003b0e860 EFLAGS: 00000293
RAX: 1ffff92000761d58 RBX: 0000000000000000 RCX: ffff888021525a00
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
RBP: ffffc90003b0ea10 R08: ffffffff81741014 R09: 1ffffffff26f5700
R10: dffffc0000000000 R11: fffffbfff26f5701 R12: ffffffff8f171458
R13: ffffffff8f171400 R14: 0000000000000200 R15: dffffc0000000000
console_unlock+0x13b/0x4d0 kernel/printk/printk.c:3118
vprintk_emit+0x5dc/0x7c0 kernel/printk/printk.c:2348
_printk+0xd5/0x120 kernel/printk/printk.c:2373
batadv_hardif_activate_interface+0x16e/0x3c0 net/batman-adv/hard-interface.c:675
batadv_hard_if_event+0x354/0x1620 net/batman-adv/hard-interface.c:977
notifier_call_chain+0x19f/0x3e0 kernel/notifier.c:93
__dev_notify_flags+0x207/0x400
dev_change_flags+0xf0/0x1a0 net/core/dev.c:8916
do_setlink+0xcd0/0x41f0 net/core/rtnetlink.c:2900
__rtnl_newlink net/core/rtnetlink.c:3696 [inline]
rtnl_newlink+0x180d/0x20a0 net/core/rtnetlink.c:3743
rtnetlink_rcv_msg+0x73f/0xcf0 net/core/rtnetlink.c:6647
netlink_rcv_skb+0x1e3/0x430 net/netlink/af_netlink.c:2550
netlink_unicast_kernel net/netlink/af_netlink.c:1331 [inline]
netlink_unicast+0x7f6/0x990 net/netlink/af_netlink.c:1357
netlink_sendmsg+0x8e4/0xcb0 net/netlink/af_netlink.c:1901
sock_sendmsg_nosec net/socket.c:730 [inline]
__sock_sendmsg+0x221/0x270 net/socket.c:745
__sys_sendto+0x3a8/0x500 net/socket.c:2204
__do_sys_sendto net/socket.c:2216 [inline]
__se_sys_sendto net/socket.c:2212 [inline]
__x64_sys_sendto+0xde/0x100 net/socket.c:2212
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f6d3d17bd0c
Code: 2a 5a 02 00 44 8b 4c 24 2c 4c 8b 44 24 20 89 c5 44 8b 54 24 28 48 8b 54 24 18 b8 2c 00 00 00 48 8b 74 24 10 8b 7c 24 08 0f 05 <48> 3d 00 f0 ff ff 77 34 89 ef 48 89 44 24 08 e8 70 5a 02 00 48 8b
RSP: 002b:00007ffde32ffda0 EFLAGS: 00000293 ORIG_RAX: 000000000000002c
RAX: ffffffffffffffda RBX: 00007f6d3de44620 RCX: 00007f6d3d17bd0c
RDX: 000000000000002c RSI: 00007f6d3de44670 RDI: 0000000000000003
RBP: 0000000000000000 R08: 00007ffde32ffdf4 R09: 000000000000000c
R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000003
R13: 0000000000000000 R14: 00007f6d3de44670 R15: 0000000000000000
----------------
Code disassembly (best guess), 2 bytes skipped:
0: e8 26 b0 1f 00 call 0x1fb02b
5: 90 nop
6: 0f 0b ud2
8: 90 nop
9: e9 d8 f8 ff ff jmp 0xfffff8e6
e: e8 18 b0 1f 00 call 0x1fb02b
13: e8 43 6f 49 0a call 0xa496f5b
18: 4d 85 f6 test %r14,%r14
1b: 74 b6 je 0xffffffd3
1d: e8 09 b0 1f 00 call 0x1fb02b
22: fb sti
23: 48 8b 44 24 70 mov 0x70(%rsp),%rax
* 28: 42 0f b6 04 38 movzbl (%rax,%r15,1),%eax <-- trapping instruction
2d: 84 c0 test %al,%al
2f: 48 8b 7c 24 30 mov 0x30(%rsp),%rdi
34: 0f 85 22 02 00 00 jne 0x25c
3a: 0f b6 1f movzbl (%rdi),%ebx
3d: 31 .byte 0x31