rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: rcu: 0-....: (1 GPs behind) idle=a2d/1/0x4000000000000002 softirq=30884/30885 fqs=5247 (detected by 1, t=10502 jiffies, g=42173, q=1153) Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 PID: 12274 Comm: syz.4.2170 Not tainted syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 RIP: 0010:test_bit include/asm-generic/bitops/instrumented-non-atomic.h:134 [inline] RIP: 0010:hlock_class kernel/locking/lockdep.c:197 [inline] RIP: 0010:__lock_acquire+0x10a8/0x7d10 kernel/locking/lockdep.c:5008 Code: 48 8b 44 24 78 48 8d 58 f8 48 89 d8 48 c1 e8 03 42 0f b6 04 00 84 c0 0f 85 d8 5d 00 00 8b 03 89 c3 81 e3 ff 1f 00 00 c1 e8 03 <25> f8 03 00 00 48 8d b8 c0 40 1d 90 be 08 00 00 00 e8 32 18 61 00 RSP: 0018:ffffc900036fe8e0 EFLAGS: 00000003 RAX: 0000000000014002 RBX: 0000000000000015 RCX: 000000005c85de98 RDX: 000000008f3411fa RSI: 0000000095bb49c3 RDI: ffffffff901d40c0 RBP: ffffc900036feb30 R08: dffffc0000000000 R09: 1ffffffff203a818 R10: dffffc0000000000 R11: fffffbfff203a819 R12: 000000007e5bcbe9 R13: ffff888028a63b80 R14: 0000000071c939ae R15: ffff888028a64708 FS: 0000000000000000(0000) GS:ffff8880b9000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000110c37a95f CR3: 000000007d7d4000 CR4: 00000000003506f0 DR0: 0000200000000300 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 Call Trace: lock_acquire+0x19e/0x400 kernel/locking/lockdep.c:5623 rcu_lock_acquire+0x2a/0x30 include/linux/rcupdate.h:313 rcu_read_lock include/linux/rcupdate.h:740 [inline] __perf_output_begin kernel/events/ring_buffer.c:163 [inline] perf_output_begin_forward+0xa5/0xa40 kernel/events/ring_buffer.c:271 __perf_event_output kernel/events/core.c:7804 [inline] perf_event_output_forward+0x19b/0x2e0 kernel/events/core.c:7822 __perf_event_overflow+0x364/0x530 kernel/events/core.c:9515 perf_swevent_overflow kernel/events/core.c:9591 [inline] perf_swevent_event+0x4ad/0x530 kernel/events/core.c:9629 perf_tp_event+0x383/0xbf0 kernel/events/core.c:10047 perf_trace_run_bpf_submit+0xf3/0x1c0 kernel/events/core.c:10021 perf_trace_preemptirq_template+0x2aa/0x360 include/trace/events/preemptirq.h:14 trace_irq_enable_rcuidle+0x108/0x180 include/trace/events/preemptirq.h:40 trace_hardirqs_on+0x57/0x80 kernel/trace/trace_preemptirq.c:44 asm_sysvec_irq_work+0x16/0x20 arch/x86/include/asm/idtentry.h:713 RIP: 0010:rcu_read_unlock_special+0x7f/0x4a0 kernel/rcu/tree_plugin.h:674 Code: eb 03 48 b8 f1 f1 f1 f1 f8 f2 f2 f2 4a 89 04 2b 42 c7 44 2b 08 f8 f3 f3 f3 65 44 8b 35 12 f2 9c 7e 41 f7 c6 00 00 f0 00 74 40 <48> c7 44 24 20 0e 36 e0 45 4a c7 04 2b 00 00 00 00 42 c7 44 2b 08 RSP: 0018:ffffc900036ff460 EFLAGS: 00000206 RAX: 0b517a77c9645200 RBX: 1ffff920006dfe90 RCX: 0b517a77c9645200 RDX: dffffc0000000000 RSI: ffffffff8a2b2780 RDI: ffffffff8a79f980 RBP: ffffc900036ff530 R08: ffffffff901d40c7 R09: 1ffffffff203a818 R10: dffffc0000000000 R11: fffffbfff203a819 R12: ffffffff8c322f00 R13: dffffc0000000000 R14: 0000000000000246 R15: 0000000000000001 __rcu_read_unlock+0x78/0xd0 kernel/rcu/tree_plugin.h:422 rcu_read_unlock include/linux/rcupdate.h:772 [inline] __unlock_page_memcg+0xea/0x100 mm/memcontrol.c:2093 zap_pte_range mm/memory.c:1384 [inline] zap_pmd_range mm/memory.c:1505 [inline] zap_pud_range mm/memory.c:1534 [inline] zap_p4d_range mm/memory.c:1555 [inline] unmap_page_range+0xf96/0x2500 mm/memory.c:1576 unmap_vmas+0x131/0x250 mm/memory.c:1653 exit_mmap+0x3b9/0x640 mm/mmap.c:3216 __mmput+0x115/0x3b0 kernel/fork.c:1127 exit_mm+0x588/0x6e0 kernel/exit.c:550 do_exit+0x5a9/0x20c0 kernel/exit.c:870 do_group_exit+0x12e/0x300 kernel/exit.c:997 get_signal+0x6ca/0x12c0 kernel/signal.c:2900 arch_do_signal_or_restart+0xe7/0x12c0 arch/x86/kernel/signal.c:867 handle_signal_work kernel/entry/common.c:154 [inline] exit_to_user_mode_loop+0x9e/0x130 kernel/entry/common.c:178 exit_to_user_mode_prepare+0xee/0x180 kernel/entry/common.c:214 __syscall_exit_to_user_mode_work kernel/entry/common.c:296 [inline] syscall_exit_to_user_mode+0x16/0x40 kernel/entry/common.c:307 ret_from_fork+0x15/0x30 arch/x86/entry/entry_64.S:280 RIP: 0033:0x7f70c6483589 Code: Unable to access opcode bytes at RIP 0x7f70c648355f. RSP: 002b:00007f70c469a1c0 EFLAGS: 00000202 ORIG_RAX: 00000000000001b3 RAX: 0000000000000000 RBX: 00007f70c643eb20 RCX: 00007f70c6483589 RDX: 00007f70c643eb20 RSI: 0000000000000058 RDI: 00007ffca81a13e0 RBP: 00007f70c469a6c0 R08: 00007f70c469a6c0 R09: 00007ffca81a14c7 R10: 0000000000000008 R11: 0000000000000202 R12: ffffffffffffffe8 R13: 000000000000006e R14: 00007ffca81a13e0 R15: 00007ffca81a14c8