rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: rcu: 0-....: (1 GPs behind) idle=ae3/1/0x4000000000000002 softirq=11992/11993 fqs=5250 (detected by 1, t=10502 jiffies, g=21913, q=402345) Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 PID: 12342 Comm: syz-executor318 Not tainted syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 RIP: 0010:bytes_is_nonzero mm/kasan/generic.c:85 [inline] RIP: 0010:memory_is_nonzero mm/kasan/generic.c:102 [inline] RIP: 0010:memory_is_poisoned_n mm/kasan/generic.c:128 [inline] RIP: 0010:memory_is_poisoned mm/kasan/generic.c:159 [inline] RIP: 0010:check_region_inline mm/kasan/generic.c:180 [inline] RIP: 0010:kasan_check_range+0x7b/0x290 mm/kasan/generic.c:189 Code: 5c 37 ff 48 c1 eb 03 4e 8d 14 3b 4d 89 d6 4d 29 ce 49 83 fe 10 7f 26 4d 85 f6 0f 84 39 01 00 00 48 f7 d3 4c 01 db 41 80 39 00 <0f> 85 c1 01 00 00 49 ff c1 48 ff c3 75 ee e9 1c 01 00 00 44 89 cb RSP: 0018:ffffc90005a66c20 EFLAGS: 00000046 RAX: 0000000000000001 RBX: ffffffffffffffff RCX: ffffffff81645fbf RDX: 0000000000000001 RSI: 0000000000000008 RDI: ffff8880783d1dc0 RBP: ffffc90005a66d20 R08: dffffc0000000000 R09: ffffed100f07a3b8 R10: ffffed100f07a3b9 R11: 1ffff1100f07a3b8 R12: ffffffff8c120c00 R13: 0000000000000000 R14: 0000000000000001 R15: dffffc0000000001 FS: 0000000000000000(0000) GS:ffff8880b9000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f39572f6780 CR3: 000000000be8e000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: instrument_atomic_write include/linux/instrumented.h:86 [inline] set_bit include/asm-generic/bitops/instrumented-atomic.h:28 [inline] set_ti_thread_flag include/linux/thread_info.h:89 [inline] set_tsk_thread_flag include/linux/sched.h:1968 [inline] set_tsk_need_resched include/linux/sched.h:1999 [inline] rcu_read_unlock_special+0x25f/0x480 kernel/rcu/tree_plugin.h:659 __rcu_read_unlock+0x78/0xd0 kernel/rcu/tree_plugin.h:422 rcu_read_unlock include/linux/rcupdate.h:772 [inline] __perf_event_output kernel/events/core.c:7813 [inline] perf_event_output_forward+0x216/0x280 kernel/events/core.c:7822 __perf_event_overflow+0x364/0x530 kernel/events/core.c:9515 perf_swevent_overflow kernel/events/core.c:9591 [inline] perf_swevent_event+0x4ad/0x530 kernel/events/core.c:9629 perf_tp_event+0x32c/0xb50 kernel/events/core.c:10047 perf_trace_run_bpf_submit+0xf3/0x1c0 kernel/events/core.c:10021 perf_trace_preemptirq_template+0x2be/0x380 include/trace/events/preemptirq.h:14 trace_irq_enable_rcuidle+0x108/0x180 include/trace/events/preemptirq.h:40 trace_hardirqs_on+0x57/0x80 kernel/trace/trace_preemptirq.c:44 asm_sysvec_irq_work+0x16/0x20 arch/x86/include/asm/idtentry.h:713 RIP: 0010:rcu_read_unlock_special+0x84/0x480 kernel/rcu/tree_plugin.h:674 Code: f1 f1 f1 00 f2 f2 f2 4a 89 04 2b 66 42 c7 44 2b 09 f3 f3 42 c6 44 2b 0b f3 65 44 8b 35 ed 11 9e 7e 41 f7 c6 00 00 f0 00 74 45 <48> c7 44 24 20 0e 36 e0 45 4a c7 04 2b 00 00 00 00 66 42 c7 44 2b RSP: 0018:ffffc90005a67420 EFLAGS: 00000206 RAX: 795143262febf000 RBX: 1ffff92000b4ce88 RCX: 795143262febf000 RDX: dffffc0000000000 RSI: ffffffff8a0b1c60 RDI: ffffffff8a59e580 RBP: ffffc90005a674f0 R08: dffffc0000000000 R09: fffffbfff1ff7c19 R10: fffffbfff1ff7c19 R11: 1ffffffff1ff7c18 R12: ffffffff8c120c00 R13: dffffc0000000000 R14: 0000000000000246 R15: 0000000000000001 __rcu_read_unlock+0x78/0xd0 kernel/rcu/tree_plugin.h:422 rcu_read_unlock include/linux/rcupdate.h:772 [inline] __unlock_page_memcg+0xea/0x100 mm/memcontrol.c:2093 zap_pte_range mm/memory.c:1384 [inline] zap_pmd_range mm/memory.c:1505 [inline] zap_pud_range mm/memory.c:1534 [inline] zap_p4d_range mm/memory.c:1555 [inline] unmap_page_range+0xfbc/0x2520 mm/memory.c:1576 unmap_vmas+0x11b/0x230 mm/memory.c:1653 exit_mmap+0x38f/0x5f0 mm/mmap.c:3216 __mmput+0x115/0x3b0 kernel/fork.c:1127 exit_mm+0x567/0x6c0 kernel/exit.c:550 do_exit+0x5a1/0x20a0 kernel/exit.c:870 do_group_exit+0x12e/0x300 kernel/exit.c:997 get_signal+0x6ca/0x12c0 kernel/signal.c:2900 arch_do_signal_or_restart+0xc1/0x1300 arch/x86/kernel/signal.c:867 handle_signal_work kernel/entry/common.c:154 [inline] exit_to_user_mode_loop+0x9e/0x130 kernel/entry/common.c:178 exit_to_user_mode_prepare+0xee/0x180 kernel/entry/common.c:214 __syscall_exit_to_user_mode_work kernel/entry/common.c:296 [inline] syscall_exit_to_user_mode+0x16/0x40 kernel/entry/common.c:307 do_syscall_64+0x58/0xa0 arch/x86/entry/common.c:86 entry_SYSCALL_64_after_hwframe+0x66/0xd0 RIP: 0033:0x7f3957303459 Code: Unable to access opcode bytes at RIP 0x7f395730342f. RSP: 002b:00007f39572c4228 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca RAX: fffffffffffffe00 RBX: 0000000000000000 RCX: 00007f3957303459 RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f395738d308 RBP: 00007f395738d308 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00002000000000c0 R13: 00007f395738d300 R14: 00007fff3a5c53a0 R15: 00007fff3a5c5488 INFO: NMI handler (nmi_cpu_backtrace_handler) took too long to run: 1.936 msecs