rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: rcu: 0-....: (1 GPs behind) idle=fe5/1/0x4000000000000002 softirq=23478/23481 fqs=5249 (detected by 1, t=10502 jiffies, g=29081, q=1030) Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 PID: 10054 Comm: syz.2.1641 Not tainted syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 RIP: 0010:bytes_is_nonzero mm/kasan/generic.c:87 [inline] RIP: 0010:memory_is_nonzero mm/kasan/generic.c:102 [inline] RIP: 0010:memory_is_poisoned_n mm/kasan/generic.c:128 [inline] RIP: 0010:memory_is_poisoned mm/kasan/generic.c:159 [inline] RIP: 0010:check_region_inline mm/kasan/generic.c:180 [inline] RIP: 0010:kasan_check_range+0x8a/0x290 mm/kasan/generic.c:189 Code: 1c 21 49 89 df 4d 29 df 49 83 ff 10 7f 29 4d 85 ff 0f 84 38 01 00 00 4c 89 cb 48 f7 d3 4c 01 f3 41 80 3b 00 0f 85 86 01 00 00 <49> ff c3 48 ff c3 75 ee e9 18 01 00 00 44 89 dd 83 e5 07 0f 84 b5 RSP: 0018:ffffc90002e2ea10 EFLAGS: 00000046 RAX: 0000000000000001 RBX: ffffffffffffffff RCX: ffffffff815d0aec RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffffffff901d40c0 RBP: ffffc90002e2ec90 R08: ffffffff901d40c7 R09: 1ffffffff203a818 R10: dffffc0000000000 R11: fffffbfff203a818 R12: dffffc0000000001 R13: ffff888029dd0000 R14: 1ffffffff203a818 R15: 0000000000000001 FS: 0000000000000000(0000) GS:ffff8880b9000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f81e3458dac CR3: 000000000c08e000 CR4: 00000000003506f0 DR0: 0000200000000300 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000ffff0ff1 DR7: 0000000000000600 Call Trace: instrument_atomic_read include/linux/instrumented.h:71 [inline] test_bit include/asm-generic/bitops/instrumented-non-atomic.h:134 [inline] hlock_class kernel/locking/lockdep.c:197 [inline] check_wait_context kernel/locking/lockdep.c:4687 [inline] __lock_acquire+0x5dc/0x7d10 kernel/locking/lockdep.c:4962 lock_acquire+0x19e/0x400 kernel/locking/lockdep.c:5623 rcu_lock_acquire+0x2a/0x30 include/linux/rcupdate.h:313 rcu_read_lock include/linux/rcupdate.h:740 [inline] __perf_event_output kernel/events/core.c:7800 [inline] perf_event_output_forward+0xbc/0x2e0 kernel/events/core.c:7822 __perf_event_overflow+0x364/0x530 kernel/events/core.c:9515 perf_tp_event+0x383/0xbf0 kernel/events/core.c:10047 perf_trace_run_bpf_submit+0xf3/0x1c0 kernel/events/core.c:10021 perf_trace_preemptirq_template+0x2aa/0x360 include/trace/events/preemptirq.h:14 trace_irq_enable_rcuidle+0x108/0x180 include/trace/events/preemptirq.h:40 trace_hardirqs_on+0x57/0x80 kernel/trace/trace_preemptirq.c:44 asm_sysvec_irq_work+0x16/0x20 arch/x86/include/asm/idtentry.h:713 RIP: 0010:rcu_read_unlock_special+0x7f/0x4a0 kernel/rcu/tree_plugin.h:674 Code: eb 03 48 b8 f1 f1 f1 f1 f8 f2 f2 f2 4a 89 04 2b 42 c7 44 2b 08 f8 f3 f3 f3 65 44 8b 35 12 f2 9c 7e 41 f7 c6 00 00 f0 00 74 40 <48> c7 44 24 20 0e 36 e0 45 4a c7 04 2b 00 00 00 00 42 c7 44 2b 08 RSP: 0018:ffffc90002e2f420 EFLAGS: 00000206 RAX: e9fcfab687a1ad00 RBX: 1ffff920005c5e88 RCX: e9fcfab687a1ad00 RDX: dffffc0000000000 RSI: ffffffff8a2b2780 RDI: ffffffff8a79f980 RBP: ffffc90002e2f4f0 R08: ffffffff901d40c7 R09: 1ffffffff203a818 R10: dffffc0000000000 R11: fffffbfff203a819 R12: ffffffff8c322f00 R13: dffffc0000000000 R14: 0000000000000246 R15: 0000000000000001 __rcu_read_unlock+0x78/0xd0 kernel/rcu/tree_plugin.h:422 rcu_read_unlock include/linux/rcupdate.h:772 [inline] __unlock_page_memcg+0xea/0x100 mm/memcontrol.c:2093 zap_pte_range mm/memory.c:1384 [inline] zap_pmd_range mm/memory.c:1505 [inline] zap_pud_range mm/memory.c:1534 [inline] zap_p4d_range mm/memory.c:1555 [inline] unmap_page_range+0xf96/0x2500 mm/memory.c:1576 unmap_vmas+0x131/0x250 mm/memory.c:1653 exit_mmap+0x3b9/0x640 mm/mmap.c:3216 __mmput+0x115/0x3b0 kernel/fork.c:1127 exit_mm+0x588/0x6e0 kernel/exit.c:550 do_exit+0x5a9/0x20c0 kernel/exit.c:870 do_group_exit+0x12e/0x300 kernel/exit.c:997 get_signal+0x6ca/0x12c0 kernel/signal.c:2900 arch_do_signal_or_restart+0xe7/0x12c0 arch/x86/kernel/signal.c:867 handle_signal_work kernel/entry/common.c:154 [inline] exit_to_user_mode_loop+0x9e/0x130 kernel/entry/common.c:178 exit_to_user_mode_prepare+0xee/0x180 kernel/entry/common.c:214 __syscall_exit_to_user_mode_work kernel/entry/common.c:296 [inline] syscall_exit_to_user_mode+0x16/0x40 kernel/entry/common.c:307 do_syscall_64+0x58/0xa0 arch/x86/entry/common.c:86 entry_SYSCALL_64_after_hwframe+0x66/0xd0 RIP: 0033:0x7f3e473d0819 Code: Unable to access opcode bytes at RIP 0x7f3e473d07ef. RSP: 002b:00007f3e4562a0e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca RAX: fffffffffffffe00 RBX: 00007f3e47649fa8 RCX: 00007f3e473d0819 RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f3e47649fa8 RBP: 00007f3e47649fa0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007f3e4764a038 R14: 00007ffda100db70 R15: 00007ffda100dc58