rcu: INFO: rcu_preempt detected expedited stalls on CPUs/tasks: { 0-.... } 2669 jiffies s: 242433 root: 0x1/.
rcu: blocking rcu_node structures (internal RCU debug):
Sending NMI from CPU 1 to CPUs 0:
NMI backtrace for cpu 0
CPU: 0 PID: 7600 Comm: syz-executor.0 Not tainted 6.8.0-rc6-syzkaller-00120-g87adedeba51a #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024
RIP: 0010:ip6_ignore_linkdown include/net/addrconf.h:419 [inline]
RIP: 0010:find_match+0x120/0xbe0 net/ipv6/route.c:742
Code: e8 c5 a5 80 f7 4d 85 e4 0f 84 6f 09 00 00 49 81 c4 44 06 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df 0f b6 04 08 <84> c0 0f 85 70 09 00 00 41 8b 1c 24 31 ff 89 de e8 cb a9 80 f7 85
RSP: 0018:ffffc90000006a00 EFLAGS: 00000a03
RAX: 0000000000000000 RBX: 0000000000000001 RCX: dffffc0000000000
RDX: 0000000000000102 RSI: 0000000000000001 RDI: 0000000000000000
RBP: 1ffff1101039c995 R08: ffffffff8a12c77e R09: ffffc90000006d30
R10: ffffc90000006d20 R11: fffff52000000d72 R12: ffff88803827d644
R13: ffff888081ce4cbf R14: 1ffff1101039c997 R15: 0000000000000003
FS: 0000000000000000(0000) GS:ffff8880b9400000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000055df73068680 CR3: 000000000df32000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
__find_rr_leaf+0x275/0x8e0 net/ipv6/route.c:830
find_rr_leaf net/ipv6/route.c:851 [inline]
rt6_select net/ipv6/route.c:895 [inline]
fib6_table_lookup+0x413/0xbb0 net/ipv6/route.c:2183
ip6_pol_route+0x268/0x14b0 net/ipv6/route.c:2219
pol_lookup_func include/net/ip6_fib.h:576 [inline]
fib6_rule_lookup+0x3c2/0x790 net/ipv6/fib6_rules.c:121
ip6_route_output_flags_noref net/ipv6/route.c:2627 [inline]
ip6_route_output_flags+0x38e/0x610 net/ipv6/route.c:2639
ip6_dst_lookup_tail+0x26b/0x11a0 net/ipv6/ip6_output.c:1147
ip6_dst_lookup_flow+0xb9/0x180 net/ipv6/ip6_output.c:1250
sctp_v6_get_dst+0x1054/0x1e20 net/sctp/ipv6.c:384
sctp_transport_route+0x12c/0x2e0 net/sctp/transport.c:455
sctp_packet_config+0x460/0xdb0 net/sctp/output.c:103
sctp_outq_select_transport+0x474/0x580 net/sctp/outqueue.c:869
sctp_outq_flush_ctrl net/sctp/outqueue.c:903 [inline]
sctp_outq_flush+0x4db/0x3e60 net/sctp/outqueue.c:1212
sctp_side_effects net/sctp/sm_sideeffect.c:1198 [inline]
sctp_do_sm+0x59cc/0x60c0 net/sctp/sm_sideeffect.c:1169
sctp_generate_timeout_event+0x22e/0x360 net/sctp/sm_sideeffect.c:295
call_timer_fn+0x17e/0x600 kernel/time/timer.c:1700
expire_timers kernel/time/timer.c:1751 [inline]
__run_timers+0x621/0x830 kernel/time/timer.c:2038
run_timer_softirq+0x67/0xf0 kernel/time/timer.c:2051
__do_softirq+0x2bb/0x942 kernel/softirq.c:553
invoke_softirq kernel/softirq.c:427 [inline]
__irq_exit_rcu+0xf1/0x1c0 kernel/softirq.c:632
irq_exit_rcu+0x9/0x30 kernel/softirq.c:644
sysvec_apic_timer_interrupt+0x97/0xb0 arch/x86/kernel/apic/apic.c:1076
asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:649
RIP: 0010:__sanitizer_cov_trace_pc+0x5c/0x70 kernel/kcov.c:225
Code: d8 15 00 00 83 fa 02 75 21 48 8b 91 e0 15 00 00 48 8b 32 48 8d 7e 01 8b 89 dc 15 00 00 48 39 cf 73 08 48 89 3a 48 89 44 f2 08 cc cc cc cc 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 90 90
RSP: 0018:ffffc9000d2d7360 EFLAGS: 00000293
RAX: ffffffff81dcde47 RBX: 000000000023ffff RCX: ffff88807c7bd940
RDX: 0000000000000000 RSI: 000000000023ffff RDI: 0000000000053b84
RBP: ffffc9000d2d7601 R08: ffffffff81dcde39 R09: 1ffffd400029dc18
R10: dffffc0000000000 R11: fffff9400029dc19 R12: 8000000053b84007
R13: 0000000000053b84 R14: 00007f14c6c75000 R15: ffff88807efdeb00
vm_normal_page+0x97/0x1e0 mm/memory.c:641
zap_pte_range mm/memory.c:1449 [inline]
zap_pmd_range mm/memory.c:1597 [inline]
zap_pud_range mm/memory.c:1626 [inline]
zap_p4d_range mm/memory.c:1647 [inline]
unmap_page_range+0xb5f/0x3600 mm/memory.c:1668
unmap_vmas+0x3cc/0x5f0 mm/memory.c:1758
exit_mmap+0x2c6/0xd40 mm/mmap.c:3279
__mmput+0x115/0x3c0 kernel/fork.c:1343
exit_mm+0x21f/0x310 kernel/exit.c:569
do_exit+0x9af/0x2740 kernel/exit.c:858
do_group_exit+0x206/0x2c0 kernel/exit.c:1020
get_signal+0x176d/0x1850 kernel/signal.c:2893
arch_do_signal_or_restart+0x96/0x860 arch/x86/kernel/signal.c:310
exit_to_user_mode_loop kernel/entry/common.c:105 [inline]
exit_to_user_mode_prepare include/linux/entry-common.h:328 [inline]
__syscall_exit_to_user_mode_work kernel/entry/common.c:201 [inline]
syscall_exit_to_user_mode+0xc8/0x360 kernel/entry/common.c:212
do_syscall_64+0x108/0x240 arch/x86/entry/common.c:89
entry_SYSCALL_64_after_hwframe+0x6f/0x77
RIP: 0033:0x7f14c747dda9
Code: Unable to access opcode bytes at 0x7f14c747dd7f.
RSP: 002b:00007f14c82700c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002c
RAX: 0000000000000001 RBX: 00007f14c75ac050 RCX: 00007f14c747dda9
RDX: 0000000000000001 RSI: 0000000020000000 RDI: 0000000000000005
RBP: 00007f14c74ca47a R08: 00000000200000c0 R09: 000000000000001c
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 000000000000000b R14: 00007f14c75ac050 R15: 00007ffc48b2ba58