------------[ cut here ]------------
1
WARNING: kernel/rcu/tree_stall.h:1049 at rcu_check_gp_start_stall+0x2e4/0x470 kernel/rcu/tree_stall.h:1049, CPU#1: syz-executor/5843
Modules linked in:
CPU: 1 UID: 0 PID: 5843 Comm: syz-executor Tainted: G L syzkaller #0 PREEMPT(full)
Tainted: [L]=SOFTLOCKUP
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026
RIP: 0010:rcu_check_gp_start_stall+0x2e4/0x470 kernel/rcu/tree_stall.h:1049
Code: ff ff 48 c7 c7 c0 55 2c 9a be 04 00 00 00 e8 43 b6 84 00 4c 89 f7 b8 01 00 00 00 87 05 15 f7 80 18 85 c0 0f 85 17 ff ff ff 90 <0f> 0b 90 48 81 ff 40 41 76 8e 74 47 48 c7 c0 c0 0b 12 90 48 c1 e8
RSP: 0000:ffffc90000a08db8 EFLAGS: 00010046
RAX: 0000000000000000 RBX: 0000000000000246 RCX: ffffffff81ab5e9d
RDX: 0000000000000001 RSI: 0000000000000004 RDI: ffffffff8e764140
RBP: ffffc90000a08f28 R08: 0000000000000003 R09: 0000000000000004
R10: dffffc0000000000 R11: fffffbfff3458ab8 R12: 0000000000002904
R13: dffffc0000000000 R14: ffffffff8e764140 R15: dffffc0000000000
FS: 000055557ab1b500(0000) GS:ffff888125554000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000055557ab36a28 CR3: 0000000063b4a000 CR4: 00000000003526f0
Call Trace:
rcu_core+0x3fe/0x1070 kernel/rcu/tree.c:2864
handle_softirqs+0x22a/0x870 kernel/softirq.c:622
__do_softirq kernel/softirq.c:656 [inline]
invoke_softirq kernel/softirq.c:496 [inline]
__irq_exit_rcu+0x5f/0x150 kernel/softirq.c:723
irq_exit_rcu+0x9/0x30 kernel/softirq.c:739
instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1056 [inline]
sysvec_apic_timer_interrupt+0xa6/0xc0 arch/x86/kernel/apic/apic.c:1056
asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:697
RIP: 0010:csd_lock_wait kernel/smp.c:342 [inline]
RIP: 0010:smp_call_function_many_cond+0xce5/0x12c0 kernel/smp.c:877
Code: 45 8b 2c 24 44 89 ee 83 e6 01 31 ff e8 d4 eb 0b 00 41 83 e5 01 49 bd 00 00 00 00 00 fc ff df 75 07 e8 7f e7 0b 00 eb 38 f3 90 <42> 0f b6 04 2b 84 c0 75 11 41 f7 04 24 01 00 00 00 74 1e e8 63 e7
RSP: 0000:ffffc90004067820 EFLAGS: 00000293
RAX: ffffffff81b9d88d RBX: 1ffff110170c8525 RCX: ffff88807c999e80
RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000
RBP: ffffc90004067950 R08: ffffffff9011d8b7 R09: 1ffffffff2023b16
R10: dffffc0000000000 R11: fffffbfff2023b17 R12: ffff8880b8642928
R13: dffffc0000000000 R14: ffff8880b873c000 R15: 0000000000000000
on_each_cpu_cond_mask+0x3f/0x80 kernel/smp.c:1043
__flush_tlb_multi arch/x86/include/asm/paravirt.h:57 [inline]
flush_tlb_multi arch/x86/mm/tlb.c:1382 [inline]
flush_tlb_mm_range+0x5c3/0x10c0 arch/x86/mm/tlb.c:1472
flush_tlb_page arch/x86/include/asm/tlbflush.h:323 [inline]
ptep_clear_flush+0x120/0x170 mm/pgtable-generic.c:103
wp_page_copy mm/memory.c:3846 [inline]
do_wp_page+0x4129/0x5a00 mm/memory.c:4241
handle_pte_fault mm/memory.c:6333 [inline]
__handle_mm_fault mm/memory.c:6455 [inline]
handle_mm_fault+0x1520/0x3310 mm/memory.c:6624
do_user_addr_fault+0xa73/0x1340 arch/x86/mm/fault.c:1334
handle_page_fault arch/x86/mm/fault.c:1474 [inline]
exc_page_fault+0x6a/0xc0 arch/x86/mm/fault.c:1527
asm_exc_page_fault+0x26/0x30 arch/x86/include/asm/idtentry.h:618
RIP: 0033:0x7f85373613a0
Code: ba 28 00 48 8d 0c 1e 49 39 d0 49 89 48 60 0f 95 c2 48 29 d8 0f b6 d2 48 83 c8 01 48 c1 e2 02 48 09 da 48 83 ca 01 48 89 56 08 <48> 89 41 08 48 8d 4e 10 eb b0 48 8d 0d 37 df 0c 00 ba 9e 10 00 00
RSP: 002b:00007f853773fc50 EFLAGS: 00010206
RAX: 00000000000185e1 RBX: 0000000000008040 RCX: 000055557ab36a20
RDX: 0000000000008041 RSI: 000055557ab2e9e0 RDI: 0000000000000004
RBP: 0000000000000802 R08: 00007f85375ece20 R09: 0000000000000001
R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000008030
R13: 0000000000000000 R14: 00007f85375ece80 R15: 0000000000000000
----------------
Code disassembly (best guess):
0: 45 8b 2c 24 mov (%r12),%r13d
4: 44 89 ee mov %r13d,%esi
7: 83 e6 01 and $0x1,%esi
a: 31 ff xor %edi,%edi
c: e8 d4 eb 0b 00 call 0xbebe5
11: 41 83 e5 01 and $0x1,%r13d
15: 49 bd 00 00 00 00 00 movabs $0xdffffc0000000000,%r13
1c: fc ff df
1f: 75 07 jne 0x28
21: e8 7f e7 0b 00 call 0xbe7a5
26: eb 38 jmp 0x60
28: f3 90 pause
* 2a: 42 0f b6 04 2b movzbl (%rbx,%r13,1),%eax <-- trapping instruction
2f: 84 c0 test %al,%al
31: 75 11 jne 0x44
33: 41 f7 04 24 01 00 00 testl $0x1,(%r12)
3a: 00
3b: 74 1e je 0x5b
3d: e8 .byte 0xe8
3e: 63 e7 movsxd %edi,%esp