rcu: INFO: rcu_preempt detected expedited stalls on CPUs/tasks: { 1-.... } 2643 jiffies s: 26869 root: 0x2/. rcu: blocking rcu_node structures (internal RCU debug): Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 PID: 11141 Comm: syz.4.1942 Not tainted syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 RIP: 0010:find_held_lock kernel/locking/lockdep.c:5152 [inline] RIP: 0010:__lock_release kernel/locking/lockdep.c:5337 [inline] RIP: 0010:lock_release+0x21f/0x920 kernel/locking/lockdep.c:5682 Code: 28 83 f8 32 0f 83 f1 04 00 00 4b 8d 04 b6 4c 8d 24 c3 48 89 c3 4c 89 e7 48 8b 74 24 10 e8 69 49 c8 08 44 89 7c 24 3c 44 89 fa <85> c0 0f 84 d9 01 00 00 4d 85 e4 0f 84 03 03 00 00 4d 8d 74 24 24 RSP: 0018:ffffc90004566c80 EFLAGS: 00000046 RAX: 0000000000000001 RBX: 0000000000000014 RCX: 0000000000000001 RDX: 0000000000000004 RSI: ffffffff8cb2d6e0 RDI: ffff8880265664c0 RBP: ffffc90004566d90 R08: ffffffff8e1fd76f R09: 1ffffffff1c3faed R10: dffffc0000000000 R11: fffffbfff1c3faee R12: ffff8880265664c0 R13: dffffc0000000000 R14: 0000000000000004 R15: 0000000000000004 FS: 0000000000000000(0000) GS:ffff8880b8f00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000110c2e354a CR3: 000000000c88e000 CR4: 00000000003506e0 DR0: 0000000000000000 DR1: 0000200000000300 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 Call Trace: rcu_lock_release include/linux/rcupdate.h:355 [inline] rcu_read_unlock_sched include/linux/rcupdate.h:904 [inline] pfn_valid include/linux/mmzone.h:1867 [inline] __virt_addr_valid+0x435/0x540 arch/x86/mm/physaddr.c:65 kasan_addr_to_slab+0x9/0xc0 mm/kasan/common.c:36 __kasan_record_aux_stack+0xf/0xc0 mm/kasan/generic.c:471 irq_work_queue_on+0x10f/0x260 kernel/irq_work.c:140 rcu_read_unlock_special+0x3c9/0x510 kernel/rcu/tree_plugin.h:678 __rcu_read_unlock+0x78/0xd0 kernel/rcu/tree_plugin.h:426 rcu_read_unlock include/linux/rcupdate.h:823 [inline] trace_call_bpf+0x5bb/0x6b0 kernel/trace/bpf_trace.c:137 perf_trace_run_bpf_submit+0x79/0x1c0 kernel/events/core.c:9997 perf_trace_preemptirq_template+0x268/0x320 include/trace/events/preemptirq.h:14 trace_irq_enable_rcuidle+0xd3/0x140 include/trace/events/preemptirq.h:40 trace_hardirqs_on+0x24/0x40 kernel/trace/trace_preemptirq.c:44 asm_sysvec_irq_work+0x16/0x20 arch/x86/include/asm/idtentry.h:728 RIP: 0010:rcu_read_unlock_special+0x7f/0x510 kernel/rcu/tree_plugin.h:685 Code: eb 03 48 b8 f1 f1 f1 f1 f8 f2 f2 f2 4a 89 04 2b 42 c7 44 2b 08 f8 f3 f3 f3 65 44 8b 35 e2 33 95 7e 41 f7 c6 00 00 f0 00 74 40 <48> c7 44 24 40 0e 36 e0 45 4a c7 04 2b 00 00 00 00 42 c7 44 2b 08 RSP: 0018:ffffc900045672a0 EFLAGS: 00000206 RAX: 5c109e97a08a0400 RBX: 1ffff920008ace5c RCX: 5c109e97a08a0400 RDX: dffffc0000000000 RSI: ffffffff8a8c1220 RDI: ffffffff8adf0f60 RBP: ffffc90004567398 R08: ffffffff90af6247 R09: 1ffffffff215ec48 R10: dffffc0000000000 R11: fffffbfff215ec49 R12: 0000000000000246 R13: dffffc0000000000 R14: ffff8880b8f3b900 R15: 0000000000000002 __rcu_read_unlock+0x78/0xd0 kernel/rcu/tree_plugin.h:426 rcu_read_unlock include/linux/rcupdate.h:823 [inline] __folio_memcg_unlock+0xea/0x110 mm/memcontrol.c:2151 page_remove_rmap+0x7e3/0xea0 mm/rmap.c:1462 zap_pte_range mm/memory.c:1451 [inline] zap_pmd_range mm/memory.c:1572 [inline] zap_pud_range mm/memory.c:1601 [inline] zap_p4d_range mm/memory.c:1622 [inline] unmap_page_range+0x114a/0x2500 mm/memory.c:1643 unmap_vmas+0x260/0x390 mm/memory.c:1728 exit_mmap+0x20d/0x960 mm/mmap.c:3250 __mmput+0x118/0x3c0 kernel/fork.c:1205 exit_mm+0x1fe/0x2d0 kernel/exit.c:565 do_exit+0x905/0x2480 kernel/exit.c:867 do_group_exit+0x217/0x2d0 kernel/exit.c:1022 get_signal+0x1272/0x1350 kernel/signal.c:2871 arch_do_signal_or_restart+0xc4/0x1350 arch/x86/kernel/signal.c:871 exit_to_user_mode_loop+0x70/0x110 kernel/entry/common.c:174 exit_to_user_mode_prepare+0xee/0x180 kernel/entry/common.c:210 __syscall_exit_to_user_mode_work kernel/entry/common.c:292 [inline] syscall_exit_to_user_mode+0x16/0x40 kernel/entry/common.c:303 do_syscall_64+0x58/0xa0 arch/x86/entry/common.c:82 entry_SYSCALL_64_after_hwframe+0x68/0xd2 RIP: 0033:0x7f66d719c799 Code: Unable to access opcode bytes at 0x7f66d719c76f. RSP: 002b:00007f66d80d50e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca RAX: fffffffffffffe00 RBX: 00007f66d7415fa8 RCX: 00007f66d719c799 RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f66d7415fa8 RBP: 00007f66d7415fa0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007f66d7416038 R14: 00007ffff48b7a60 R15: 00007ffff48b7b48