rcu: INFO: rcu_preempt self-detected stall on CPU rcu: 1-....: (10500 ticks this GP) idle=1c6/1/0x4000000000000000 softirq=13232/13235 fqs=5234 (t=10502 jiffies g=14401 q=218) NMI backtrace for cpu 1 CPU: 1 PID: 10128 Comm: syz-executor.1 Not tainted 5.11.0-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:79 [inline] dump_stack+0xfa/0x151 lib/dump_stack.c:120 nmi_cpu_backtrace.cold+0x44/0xd7 lib/nmi_backtrace.c:105 nmi_trigger_cpumask_backtrace+0x1b3/0x230 lib/nmi_backtrace.c:62 trigger_single_cpu_backtrace include/linux/nmi.h:164 [inline] rcu_dump_cpu_stacks+0x222/0x2a7 kernel/rcu/tree_stall.h:341 print_cpu_stall kernel/rcu/tree_stall.h:622 [inline] check_cpu_stall kernel/rcu/tree_stall.h:697 [inline] rcu_pending kernel/rcu/tree.c:3830 [inline] rcu_sched_clock_irq.cold+0x4f7/0x11dd kernel/rcu/tree.c:2650 update_process_times+0x16d/0x200 kernel/time/timer.c:1796 tick_sched_handle+0x9b/0x180 kernel/time/tick-sched.c:226 tick_sched_timer+0x1b0/0x2d0 kernel/time/tick-sched.c:1369 __run_hrtimer kernel/time/hrtimer.c:1519 [inline] __hrtimer_run_queues+0x1c0/0xe40 kernel/time/hrtimer.c:1583 hrtimer_interrupt+0x334/0x940 kernel/time/hrtimer.c:1645 local_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1089 [inline] __sysvec_apic_timer_interrupt+0x146/0x540 arch/x86/kernel/apic/apic.c:1106 sysvec_apic_timer_interrupt+0x40/0xc0 arch/x86/kernel/apic/apic.c:1100 asm_sysvec_apic_timer_interrupt+0x12/0x20 arch/x86/include/asm/idtentry.h:632 RIP: 0010:write_comp_data kernel/kcov.c:218 [inline] RIP: 0010:__sanitizer_cov_trace_const_cmp4+0x3/0x70 kernel/kcov.c:284 Code: 83 c2 01 48 c7 44 30 e0 03 00 00 00 48 89 7c 30 e8 48 89 4c 30 f0 4c 89 54 d8 20 48 89 10 5b c3 0f 1f 80 00 00 00 00 41 89 f8 03 00 00 00 4c 8b 14 24 89 f1 65 48 8b 34 25 00 f0 01 00 e8 54 RSP: 0018:ffffc90000db0c98 EFLAGS: 00000246 RAX: 0000000000000000 RBX: 0000000000000001 RCX: 0000000000000100 RDX: ffff888063bed340 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 0000000000000080 R08: 0000000000000000 R09: 0000000000000000 R10: ffffffff88603e91 R11: 0000000000000000 R12: ffff8880303808c0 R13: 0000000000000000 R14: 0000000000000000 R15: ffff888063608d00 ieee80211_rx_monitor net/mac80211/rx.c:760 [inline] ieee80211_rx_list+0xa78/0x2680 net/mac80211/rx.c:4810 ieee80211_rx_napi+0xf7/0x3d0 net/mac80211/rx.c:4842 ieee80211_rx include/net/mac80211.h:4524 [inline] ieee80211_tasklet_handler+0xd4/0x130 net/mac80211/main.c:235 tasklet_action_common.constprop.0+0x1d7/0x2d0 kernel/softirq.c:557 __do_softirq+0x29b/0x9f6 kernel/softirq.c:345 invoke_softirq kernel/softirq.c:221 [inline] __irq_exit_rcu kernel/softirq.c:422 [inline] irq_exit_rcu+0x134/0x200 kernel/softirq.c:434 sysvec_apic_timer_interrupt+0x93/0xc0 arch/x86/kernel/apic/apic.c:1100 asm_sysvec_apic_timer_interrupt+0x12/0x20 arch/x86/include/asm/idtentry.h:632 RIP: 0010:preempt_count arch/x86/include/asm/preempt.h:27 [inline] RIP: 0010:check_kcov_mode kernel/kcov.c:163 [inline] RIP: 0010:__sanitizer_cov_trace_pc+0x0/0x60 kernel/kcov.c:197 Code: e9 22 fd ff ff b9 ff ff ff ff ba 08 00 00 00 4d 8b 03 48 0f bd ca 49 8b 45 00 48 63 c9 e9 64 ff ff ff 0f 1f 84 00 00 00 00 00 <65> 8b 05 49 98 8e 7e 89 c1 48 8b 34 24 81 e1 00 01 00 00 65 48 8b RSP: 0018:ffffc90001a9f790 EFLAGS: 00000246 RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffff888063bed340 RDX: 0000000000000000 RSI: ffff888063bed340 RDI: 0000000000000003 RBP: ffffea00014b5c40 R08: 0000000000000176 R09: 0000000000000000 R10: ffffffff81a6be32 R11: 0000000000000000 R12: ffffea00014b5c70 R13: ffff88802edc3510 R14: dffffc0000000000 R15: 00007fe56aaa3000 zap_pte_range mm/memory.c:1324 [inline] zap_pmd_range mm/memory.c:1380 [inline] zap_pud_range mm/memory.c:1409 [inline] zap_p4d_range mm/memory.c:1430 [inline] unmap_page_range+0x998/0x2650 mm/memory.c:1451 unmap_single_vma+0x198/0x300 mm/memory.c:1496 unmap_vmas+0x16d/0x2f0 mm/memory.c:1528 exit_mmap+0x2a8/0x590 mm/mmap.c:3218 __mmput+0x122/0x470 kernel/fork.c:1082 mmput+0x58/0x60 kernel/fork.c:1103 exit_mm kernel/exit.c:501 [inline] do_exit+0xb0a/0x2a60 kernel/exit.c:812 do_group_exit+0x125/0x310 kernel/exit.c:922 get_signal+0x42c/0x2100 kernel/signal.c:2773 arch_do_signal_or_restart+0x2a8/0x1eb0 arch/x86/kernel/signal.c:811 handle_signal_work kernel/entry/common.c:147 [inline] exit_to_user_mode_loop kernel/entry/common.c:171 [inline] exit_to_user_mode_prepare+0x148/0x250 kernel/entry/common.c:208 __syscall_exit_to_user_mode_work kernel/entry/common.c:290 [inline] syscall_exit_to_user_mode+0x19/0x50 kernel/entry/common.c:301 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x465ef9 Code: Unable to access opcode bytes at RIP 0x465ecf. RSP: 002b:00007fe568919188 EFLAGS: 00000246 ORIG_RAX: 000000000000002c RAX: 0000000000278000 RBX: 000000000056bf60 RCX: 0000000000465ef9 RDX: ffffffffffffffef RSI: 0000000020d7cfcb RDI: 0000000000000005 RBP: 00000000004bcd1c R08: 0000000000000000 R09: 0000000000000053 R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf60 R13: 00007ffed872f82f R14: 00007fe568919300 R15: 0000000000022000