rcu: INFO: rcu_preempt detected expedited stalls on CPUs/tasks: { 0-.... } 2669 jiffies s: 242433 root: 0x1/. rcu: blocking rcu_node structures (internal RCU debug): Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 PID: 7600 Comm: syz-executor.0 Not tainted 6.8.0-rc6-syzkaller-00120-g87adedeba51a #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 RIP: 0010:ip6_ignore_linkdown include/net/addrconf.h:419 [inline] RIP: 0010:find_match+0x120/0xbe0 net/ipv6/route.c:742 Code: e8 c5 a5 80 f7 4d 85 e4 0f 84 6f 09 00 00 49 81 c4 44 06 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df 0f b6 04 08 <84> c0 0f 85 70 09 00 00 41 8b 1c 24 31 ff 89 de e8 cb a9 80 f7 85 RSP: 0018:ffffc90000006a00 EFLAGS: 00000a03 RAX: 0000000000000000 RBX: 0000000000000001 RCX: dffffc0000000000 RDX: 0000000000000102 RSI: 0000000000000001 RDI: 0000000000000000 RBP: 1ffff1101039c995 R08: ffffffff8a12c77e R09: ffffc90000006d30 R10: ffffc90000006d20 R11: fffff52000000d72 R12: ffff88803827d644 R13: ffff888081ce4cbf R14: 1ffff1101039c997 R15: 0000000000000003 FS: 0000000000000000(0000) GS:ffff8880b9400000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000055df73068680 CR3: 000000000df32000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: __find_rr_leaf+0x275/0x8e0 net/ipv6/route.c:830 find_rr_leaf net/ipv6/route.c:851 [inline] rt6_select net/ipv6/route.c:895 [inline] fib6_table_lookup+0x413/0xbb0 net/ipv6/route.c:2183 ip6_pol_route+0x268/0x14b0 net/ipv6/route.c:2219 pol_lookup_func include/net/ip6_fib.h:576 [inline] fib6_rule_lookup+0x3c2/0x790 net/ipv6/fib6_rules.c:121 ip6_route_output_flags_noref net/ipv6/route.c:2627 [inline] ip6_route_output_flags+0x38e/0x610 net/ipv6/route.c:2639 ip6_dst_lookup_tail+0x26b/0x11a0 net/ipv6/ip6_output.c:1147 ip6_dst_lookup_flow+0xb9/0x180 net/ipv6/ip6_output.c:1250 sctp_v6_get_dst+0x1054/0x1e20 net/sctp/ipv6.c:384 sctp_transport_route+0x12c/0x2e0 net/sctp/transport.c:455 sctp_packet_config+0x460/0xdb0 net/sctp/output.c:103 sctp_outq_select_transport+0x474/0x580 net/sctp/outqueue.c:869 sctp_outq_flush_ctrl net/sctp/outqueue.c:903 [inline] sctp_outq_flush+0x4db/0x3e60 net/sctp/outqueue.c:1212 sctp_side_effects net/sctp/sm_sideeffect.c:1198 [inline] sctp_do_sm+0x59cc/0x60c0 net/sctp/sm_sideeffect.c:1169 sctp_generate_timeout_event+0x22e/0x360 net/sctp/sm_sideeffect.c:295 call_timer_fn+0x17e/0x600 kernel/time/timer.c:1700 expire_timers kernel/time/timer.c:1751 [inline] __run_timers+0x621/0x830 kernel/time/timer.c:2038 run_timer_softirq+0x67/0xf0 kernel/time/timer.c:2051 __do_softirq+0x2bb/0x942 kernel/softirq.c:553 invoke_softirq kernel/softirq.c:427 [inline] __irq_exit_rcu+0xf1/0x1c0 kernel/softirq.c:632 irq_exit_rcu+0x9/0x30 kernel/softirq.c:644 sysvec_apic_timer_interrupt+0x97/0xb0 arch/x86/kernel/apic/apic.c:1076 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:649 RIP: 0010:__sanitizer_cov_trace_pc+0x5c/0x70 kernel/kcov.c:225 Code: d8 15 00 00 83 fa 02 75 21 48 8b 91 e0 15 00 00 48 8b 32 48 8d 7e 01 8b 89 dc 15 00 00 48 39 cf 73 08 48 89 3a 48 89 44 f2 08 cc cc cc cc 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 90 90 RSP: 0018:ffffc9000d2d7360 EFLAGS: 00000293 RAX: ffffffff81dcde47 RBX: 000000000023ffff RCX: ffff88807c7bd940 RDX: 0000000000000000 RSI: 000000000023ffff RDI: 0000000000053b84 RBP: ffffc9000d2d7601 R08: ffffffff81dcde39 R09: 1ffffd400029dc18 R10: dffffc0000000000 R11: fffff9400029dc19 R12: 8000000053b84007 R13: 0000000000053b84 R14: 00007f14c6c75000 R15: ffff88807efdeb00 vm_normal_page+0x97/0x1e0 mm/memory.c:641 zap_pte_range mm/memory.c:1449 [inline] zap_pmd_range mm/memory.c:1597 [inline] zap_pud_range mm/memory.c:1626 [inline] zap_p4d_range mm/memory.c:1647 [inline] unmap_page_range+0xb5f/0x3600 mm/memory.c:1668 unmap_vmas+0x3cc/0x5f0 mm/memory.c:1758 exit_mmap+0x2c6/0xd40 mm/mmap.c:3279 __mmput+0x115/0x3c0 kernel/fork.c:1343 exit_mm+0x21f/0x310 kernel/exit.c:569 do_exit+0x9af/0x2740 kernel/exit.c:858 do_group_exit+0x206/0x2c0 kernel/exit.c:1020 get_signal+0x176d/0x1850 kernel/signal.c:2893 arch_do_signal_or_restart+0x96/0x860 arch/x86/kernel/signal.c:310 exit_to_user_mode_loop kernel/entry/common.c:105 [inline] exit_to_user_mode_prepare include/linux/entry-common.h:328 [inline] __syscall_exit_to_user_mode_work kernel/entry/common.c:201 [inline] syscall_exit_to_user_mode+0xc8/0x360 kernel/entry/common.c:212 do_syscall_64+0x108/0x240 arch/x86/entry/common.c:89 entry_SYSCALL_64_after_hwframe+0x6f/0x77 RIP: 0033:0x7f14c747dda9 Code: Unable to access opcode bytes at 0x7f14c747dd7f. RSP: 002b:00007f14c82700c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002c RAX: 0000000000000001 RBX: 00007f14c75ac050 RCX: 00007f14c747dda9 RDX: 0000000000000001 RSI: 0000000020000000 RDI: 0000000000000005 RBP: 00007f14c74ca47a R08: 00000000200000c0 R09: 000000000000001c R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 000000000000000b R14: 00007f14c75ac050 R15: 00007ffc48b2ba58