rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: rcu: 0-....: (0 ticks this GP) idle=a1b/1/0x4000000000000002 softirq=31024/31024 fqs=5250 (detected by 1, t=10502 jiffies, g=34825, q=655) Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 PID: 9383 Comm: syz.0.2427 Not tainted syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 RIP: 0010:hlock_class kernel/locking/lockdep.c:-1 [inline] RIP: 0010:__lock_acquire+0x12b5/0x7c60 kernel/locking/lockdep.c:5009 Code: 81 22 60 00 49 b8 00 00 00 00 00 fc ff df 48 83 3b 00 0f 84 10 4b 00 00 48 8b 44 24 58 42 0f b6 04 00 84 c0 0f 85 16 5a 00 00 <41> 8b 07 89 c3 81 e3 ff 1f 00 00 c1 e8 03 25 f8 03 00 00 48 8d b8 RSP: 0018:ffffc9000570e860 EFLAGS: 00000046 RAX: 0000000000000000 RBX: ffffffff8f946f80 RCX: ffffffff815c0fcf RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffffffff8ffbe0c0 RBP: ffffc9000570eab0 R08: dffffc0000000000 R09: fffffbfff1ff7c19 R10: fffffbfff1ff7c19 R11: 1ffffffff1ff7c18 R12: 000000007e5bcbe9 R13: ffff88807d808000 R14: 0000000071c939ae R15: ffff88807d808b88 FS: 0000000000000000(0000) GS:ffff8880b9000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000001b32d63fff CR3: 00000000757c7000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: lock_acquire+0x197/0x3f0 kernel/locking/lockdep.c:5623 rcu_lock_acquire+0x2a/0x30 include/linux/rcupdate.h:313 rcu_read_lock include/linux/rcupdate.h:740 [inline] __perf_output_begin kernel/events/ring_buffer.c:163 [inline] perf_output_begin_forward+0x97/0xa30 kernel/events/ring_buffer.c:271 __perf_event_output kernel/events/core.c:7804 [inline] perf_event_output_forward+0x15c/0x280 kernel/events/core.c:7822 __perf_event_overflow+0x364/0x530 kernel/events/core.c:9515 perf_swevent_overflow kernel/events/core.c:9591 [inline] perf_swevent_event+0x4ad/0x530 kernel/events/core.c:9629 perf_tp_event+0x32c/0xb50 kernel/events/core.c:10047 perf_trace_run_bpf_submit+0xf3/0x1c0 kernel/events/core.c:10021 perf_trace_preemptirq_template+0x2be/0x380 include/trace/events/preemptirq.h:14 trace_irq_enable_rcuidle+0x108/0x180 include/trace/events/preemptirq.h:40 trace_hardirqs_on+0x57/0x80 kernel/trace/trace_preemptirq.c:44 asm_sysvec_irq_work+0x16/0x20 arch/x86/include/asm/idtentry.h:713 RIP: 0010:rcu_read_unlock_special+0x84/0x480 kernel/rcu/tree_plugin.h:674 Code: f1 f1 f1 00 f2 f2 f2 4a 89 04 2b 66 42 c7 44 2b 09 f3 f3 42 c6 44 2b 0b f3 65 44 8b 35 ed 11 9e 7e 41 f7 c6 00 00 f0 00 74 45 <48> c7 44 24 20 0e 36 e0 45 4a c7 04 2b 00 00 00 00 66 42 c7 44 2b RSP: 0018:ffffc9000570f420 EFLAGS: 00000206 RAX: 1d90298338d7df00 RBX: 1ffff92000ae1e88 RCX: 1d90298338d7df00 RDX: dffffc0000000000 RSI: ffffffff8a0b1c60 RDI: ffffffff8a59e580 RBP: ffffc9000570f4f0 R08: dffffc0000000000 R09: fffffbfff1ff7c19 R10: fffffbfff1ff7c19 R11: 1ffffffff1ff7c18 R12: ffffffff8c120c00 R13: dffffc0000000000 R14: 0000000000000246 R15: 0000000000000001 __rcu_read_unlock+0x78/0xd0 kernel/rcu/tree_plugin.h:422 rcu_read_unlock include/linux/rcupdate.h:772 [inline] __unlock_page_memcg+0xea/0x100 mm/memcontrol.c:2093 zap_pte_range mm/memory.c:1384 [inline] zap_pmd_range mm/memory.c:1505 [inline] zap_pud_range mm/memory.c:1534 [inline] zap_p4d_range mm/memory.c:1555 [inline] unmap_page_range+0xfbc/0x2520 mm/memory.c:1576 unmap_vmas+0x11b/0x230 mm/memory.c:1653 exit_mmap+0x38f/0x5f0 mm/mmap.c:3216 __mmput+0x115/0x3b0 kernel/fork.c:1127 exit_mm+0x567/0x6c0 kernel/exit.c:550 do_exit+0x5a1/0x20a0 kernel/exit.c:870 do_group_exit+0x12e/0x300 kernel/exit.c:997 get_signal+0x6ca/0x12c0 kernel/signal.c:2900 arch_do_signal_or_restart+0xc1/0x1300 arch/x86/kernel/signal.c:867 handle_signal_work kernel/entry/common.c:154 [inline] exit_to_user_mode_loop+0x9e/0x130 kernel/entry/common.c:178 exit_to_user_mode_prepare+0xee/0x180 kernel/entry/common.c:214 __syscall_exit_to_user_mode_work kernel/entry/common.c:296 [inline] syscall_exit_to_user_mode+0x16/0x40 kernel/entry/common.c:307 do_syscall_64+0x58/0xa0 arch/x86/entry/common.c:86 entry_SYSCALL_64_after_hwframe+0x66/0xd0 RIP: 0033:0x7ffbf85b5749 Code: Unable to access opcode bytes at RIP 0x7ffbf85b571f. RSP: 002b:00007ffbf7c240e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca RAX: fffffffffffffe00 RBX: 00007ffbf880bfa8 RCX: 00007ffbf85b5749 RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007ffbf880bfa8 RBP: 00007ffbf880bfa0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffbf880c038 R14: 00007ffd697f6f00 R15: 00007ffd697f6fe8