============================= [ BUG: Invalid wait context ] 6.12.0-rc7-next-20241115 #1 Not tainted ----------------------------- syz-executor.1/18264 is trying to lock: ffff88807ffdcf78 (&zone->lock){..-.}-{3:3}, at: __rmqueue_pcplist+0x4cd/0xe60 other info that might help us debug this: context-{2:2} 4 locks held by syz-executor.1/18264: #0: ffff88803e5373e0 (&mm->mmap_lock){++++}-{4:4}, at: exit_mmap+0xfd/0xac0 #1: ffffffff85c16180 (rcu_read_lock){....}-{1:3}, at: __pte_offset_map+0x31/0x370 #2: ffff88800c1749d8 (ptlock_ptr(ptdesc)#2){+.+.}-{3:3}, at: __pte_offset_map_lock+0x121/0x330 #3: ffff88806cf41518 (&pcp->lock){+.+.}-{3:3}, at: get_page_from_freelist+0x4a5/0x2130 stack backtrace: CPU: 1 UID: 0 PID: 18264 Comm: syz-executor.1 Not tainted 6.12.0-rc7-next-20241115 #1 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 Call Trace: dump_stack_lvl+0xca/0x120 __lock_acquire+0x1535/0x4430 lock_acquire.part.0+0xeb/0x320 _raw_spin_lock_irqsave+0x3a/0x60 __rmqueue_pcplist+0x4cd/0xe60 get_page_from_freelist+0x500/0x2130 __alloc_pages_noprof+0x213/0x1f90 alloc_pages_mpol_noprof+0xf2/0x330 stack_depot_save_flags+0x575/0x900 kasan_save_stack+0x34/0x50 __kasan_record_aux_stack+0x8c/0xa0 task_work_add+0xb8/0x390 run_posix_cpu_timers+0x65e/0x760 tick_nohz_handler+0x414/0x6d0 __hrtimer_run_queues+0x57c/0xa70 hrtimer_interrupt+0x369/0x830 __sysvec_apic_timer_interrupt+0xc2/0x330 sysvec_apic_timer_interrupt+0x6b/0x80 asm_sysvec_apic_timer_interrupt+0x1a/0x20 RIP: 0010:__sanitizer_cov_trace_pc+0x0/0x80 Code: 7e 60 e8 a3 ff ff ff 31 c0 e9 3c e8 34 03 66 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1e fa 48 8b 34 24 65 48 8b 15 b0 a5 b1 7e 65 8b 05 b1 a5 b1 RSP: 0018:ffff88803c0cf5e0 EFLAGS: 00000282 RAX: 0000000000000000 RBX: dffffc0000000000 RCX: ffffffff8179ae27 RDX: ffff88801e1f1b80 RSI: 0000000000000000 RDI: 0000000000000007 RBP: 1ffff11007819ebe R08: 0000000000000000 R09: fffff940001e4d3e R10: 800000003c9a8007 R11: 00000000000007e0 R12: ffff88800e601d20 R13: 00007f7d1d306000 R14: 800000003c9a8007 R15: ffff88803c0cfad0 vm_normal_page+0xa1/0x310 unmap_page_range+0xa51/0x3590 unmap_single_vma+0x19a/0x2b0 unmap_vmas+0x1f1/0x450 exit_mmap+0x187/0xac0 mmput+0xd5/0x350 do_exit+0x9ae/0x2a30 do_group_exit+0xd3/0x2a0 get_signal+0x2240/0x2320 arch_do_signal_or_restart+0x81/0x780 syscall_exit_to_user_mode+0x123/0x1e0 do_syscall_64+0xcc/0x1d0 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f7d1f524b19 Code: Unable to access opcode bytes at 0x7f7d1f524aef. RSP: 002b:00007f7d1ca9a218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca RAX: fffffffffffffe00 RBX: 00007f7d1f637f68 RCX: 00007f7d1f524b19 RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f7d1f637f68 RBP: 00007f7d1f637f60 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7d1f637f6c R13: 00007ffceb0867df R14: 00007f7d1ca9a300 R15: 0000000000022000 ---------------- Code disassembly (best guess): 0: 7e 60 jle 0x62 2: e8 a3 ff ff ff callq 0xffffffaa 7: 31 c0 xor %eax,%eax 9: e9 3c e8 34 03 jmpq 0x334e84a e: 66 66 2e 0f 1f 84 00 data16 nopw %cs:0x0(%rax,%rax,1) 15: 00 00 00 00 19: 90 nop 1a: 90 nop 1b: 90 nop 1c: 90 nop 1d: 90 nop 1e: 90 nop 1f: 90 nop 20: 90 nop 21: 90 nop 22: 90 nop 23: 90 nop 24: 90 nop 25: 90 nop 26: 90 nop 27: 90 nop 28: 90 nop 29: 90 nop * 2a: f3 0f 1e fa endbr64 <-- trapping instruction 2e: 48 8b 34 24 mov (%rsp),%rsi 32: 65 48 8b 15 b0 a5 b1 mov %gs:0x7eb1a5b0(%rip),%rdx # 0x7eb1a5ea 39: 7e 3a: 65 gs 3b: 8b .byte 0x8b 3c: 05 .byte 0x5 3d: b1 a5 mov $0xa5,%cl 3f: b1 .byte 0xb1