=============================
[ BUG: Invalid wait context ]
6.12.0-rc7-next-20241115 #1 Not tainted
-----------------------------
syz-executor.1/18264 is trying to lock:
ffff88807ffdcf78 (&zone->lock){..-.}-{3:3}, at: __rmqueue_pcplist+0x4cd/0xe60
other info that might help us debug this:
context-{2:2}
4 locks held by syz-executor.1/18264:
#0: ffff88803e5373e0 (&mm->mmap_lock){++++}-{4:4}, at: exit_mmap+0xfd/0xac0
#1: ffffffff85c16180 (rcu_read_lock){....}-{1:3}, at: __pte_offset_map+0x31/0x370
#2: ffff88800c1749d8 (ptlock_ptr(ptdesc)#2){+.+.}-{3:3}, at: __pte_offset_map_lock+0x121/0x330
#3: ffff88806cf41518 (&pcp->lock){+.+.}-{3:3}, at: get_page_from_freelist+0x4a5/0x2130
stack backtrace:
CPU: 1 UID: 0 PID: 18264 Comm: syz-executor.1 Not tainted 6.12.0-rc7-next-20241115 #1
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
Call Trace:
dump_stack_lvl+0xca/0x120
__lock_acquire+0x1535/0x4430
lock_acquire.part.0+0xeb/0x320
_raw_spin_lock_irqsave+0x3a/0x60
__rmqueue_pcplist+0x4cd/0xe60
get_page_from_freelist+0x500/0x2130
__alloc_pages_noprof+0x213/0x1f90
alloc_pages_mpol_noprof+0xf2/0x330
stack_depot_save_flags+0x575/0x900
kasan_save_stack+0x34/0x50
__kasan_record_aux_stack+0x8c/0xa0
task_work_add+0xb8/0x390
run_posix_cpu_timers+0x65e/0x760
tick_nohz_handler+0x414/0x6d0
__hrtimer_run_queues+0x57c/0xa70
hrtimer_interrupt+0x369/0x830
__sysvec_apic_timer_interrupt+0xc2/0x330
sysvec_apic_timer_interrupt+0x6b/0x80
asm_sysvec_apic_timer_interrupt+0x1a/0x20
RIP: 0010:__sanitizer_cov_trace_pc+0x0/0x80
Code: 7e 60 e8 a3 ff ff ff 31 c0 e9 3c e8 34 03 66 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1e fa 48 8b 34 24 65 48 8b 15 b0 a5 b1 7e 65 8b 05 b1 a5 b1
RSP: 0018:ffff88803c0cf5e0 EFLAGS: 00000282
RAX: 0000000000000000 RBX: dffffc0000000000 RCX: ffffffff8179ae27
RDX: ffff88801e1f1b80 RSI: 0000000000000000 RDI: 0000000000000007
RBP: 1ffff11007819ebe R08: 0000000000000000 R09: fffff940001e4d3e
R10: 800000003c9a8007 R11: 00000000000007e0 R12: ffff88800e601d20
R13: 00007f7d1d306000 R14: 800000003c9a8007 R15: ffff88803c0cfad0
vm_normal_page+0xa1/0x310
unmap_page_range+0xa51/0x3590
unmap_single_vma+0x19a/0x2b0
unmap_vmas+0x1f1/0x450
exit_mmap+0x187/0xac0
mmput+0xd5/0x350
do_exit+0x9ae/0x2a30
do_group_exit+0xd3/0x2a0
get_signal+0x2240/0x2320
arch_do_signal_or_restart+0x81/0x780
syscall_exit_to_user_mode+0x123/0x1e0
do_syscall_64+0xcc/0x1d0
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f7d1f524b19
Code: Unable to access opcode bytes at 0x7f7d1f524aef.
RSP: 002b:00007f7d1ca9a218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca
RAX: fffffffffffffe00 RBX: 00007f7d1f637f68 RCX: 00007f7d1f524b19
RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f7d1f637f68
RBP: 00007f7d1f637f60 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7d1f637f6c
R13: 00007ffceb0867df R14: 00007f7d1ca9a300 R15: 0000000000022000
----------------
Code disassembly (best guess):
0: 7e 60 jle 0x62
2: e8 a3 ff ff ff callq 0xffffffaa
7: 31 c0 xor %eax,%eax
9: e9 3c e8 34 03 jmpq 0x334e84a
e: 66 66 2e 0f 1f 84 00 data16 nopw %cs:0x0(%rax,%rax,1)
15: 00 00 00 00
19: 90 nop
1a: 90 nop
1b: 90 nop
1c: 90 nop
1d: 90 nop
1e: 90 nop
1f: 90 nop
20: 90 nop
21: 90 nop
22: 90 nop
23: 90 nop
24: 90 nop
25: 90 nop
26: 90 nop
27: 90 nop
28: 90 nop
29: 90 nop
* 2a: f3 0f 1e fa endbr64 <-- trapping instruction
2e: 48 8b 34 24 mov (%rsp),%rsi
32: 65 48 8b 15 b0 a5 b1 mov %gs:0x7eb1a5b0(%rip),%rdx # 0x7eb1a5ea
39: 7e
3a: 65 gs
3b: 8b .byte 0x8b
3c: 05 .byte 0x5
3d: b1 a5 mov $0xa5,%cl
3f: b1 .byte 0xb1