rcu: INFO: rcu_preempt detected expedited stalls on CPUs/tasks: { 1-.... } 2639 jiffies s: 407905 root: 0x2/. rcu: blocking rcu_node structures (internal RCU debug): Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 PID: 8863 Comm: syz.7.1048 Not tainted syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 RIP: 0010:check_wait_context kernel/locking/lockdep.c:4739 [inline] RIP: 0010:__lock_acquire+0x6fd/0x7c50 kernel/locking/lockdep.c:4999 Code: fe 0f 88 70 01 00 00 44 89 fb 81 e3 ff ff ff 7f 83 f8 31 73 43 48 8d 04 9b 49 8d 5c c5 00 48 89 d8 48 c1 e8 03 42 0f b6 04 00 <84> c0 75 45 8b 1b 48 8b 44 24 50 42 0f b6 04 00 84 c0 75 55 48 8b RSP: 0018:ffffc90005956aa0 EFLAGS: 00000806 RAX: 0000000000000000 RBX: ffff88802d63e468 RCX: ffff88802d63d940 RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffffffff908c8240 RBP: ffffc90005956cf0 R08: dffffc0000000000 R09: fffffbfff2119049 R10: fffffbfff2119049 R11: 1ffffffff2119048 R12: 0000000000000000 R13: ffff88802d63e440 R14: 0000000000000003 R15: 0000000000000001 FS: 0000000000000000(0000) GS:ffff8880b8f00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000004 CR3: 000000000c68e000 CR4: 00000000003506e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 Call Trace: lock_acquire+0x1b4/0x490 kernel/locking/lockdep.c:5662 rcu_lock_acquire include/linux/rcupdate.h:350 [inline] rcu_read_lock_sched include/linux/rcupdate.h:883 [inline] pfn_valid include/linux/mmzone.h:1857 [inline] __virt_addr_valid+0x1a5/0x540 arch/x86/mm/physaddr.c:65 kasan_addr_to_slab+0x9/0xc0 mm/kasan/common.c:35 __kasan_record_aux_stack+0xf/0xc0 mm/kasan/generic.c:471 irq_work_queue_on+0x10f/0x260 kernel/irq_work.c:140 rcu_read_unlock_special+0x3c7/0x500 kernel/rcu/tree_plugin.h:678 __rcu_read_unlock+0x78/0xd0 kernel/rcu/tree_plugin.h:426 rcu_read_unlock include/linux/rcupdate.h:823 [inline] trace_call_bpf+0x58c/0x680 kernel/trace/bpf_trace.c:137 perf_trace_run_bpf_submit+0x79/0x1c0 kernel/events/core.c:9997 perf_trace_preemptirq_template+0x287/0x330 include/trace/events/preemptirq.h:14 trace_irq_enable_rcuidle+0xd3/0x140 include/trace/events/preemptirq.h:40 trace_hardirqs_on+0x24/0x40 kernel/trace/trace_preemptirq.c:44 asm_sysvec_irq_work+0x16/0x20 arch/x86/include/asm/idtentry.h:728 RIP: 0010:rcu_read_unlock_special+0x84/0x500 kernel/rcu/tree_plugin.h:685 Code: f1 f1 f1 00 f2 f2 f2 4a 89 04 2b 66 42 c7 44 2b 09 f3 f3 42 c6 44 2b 0b f3 65 44 8b 35 fd 86 96 7e 41 f7 c6 00 00 f0 00 74 45 <48> c7 44 24 40 0e 36 e0 45 4a c7 04 2b 00 00 00 00 66 42 c7 44 2b RSP: 0018:ffffc90005957340 EFLAGS: 00000206 RAX: c75eadb91926c600 RBX: 1ffff92000b2ae70 RCX: c75eadb91926c600 RDX: dffffc0000000000 RSI: ffffffff8a6c0600 RDI: ffffffff8abef920 RBP: ffffc90005957430 R08: dffffc0000000000 R09: fffffbfff2119049 R10: fffffbfff2119049 R11: 1ffffffff2119048 R12: 0000000000000246 R13: dffffc0000000000 R14: ffff8880b8f3b900 R15: 0000000000000002 __rcu_read_unlock+0x78/0xd0 kernel/rcu/tree_plugin.h:426 rcu_read_unlock include/linux/rcupdate.h:823 [inline] page_ext_put+0x91/0xb0 mm/page_ext.c:182 ptep_get_and_clear_full arch/x86/include/asm/jump_label.h:-1 [inline] zap_pte_range mm/memory.c:1435 [inline] zap_pmd_range mm/memory.c:1574 [inline] zap_pud_range mm/memory.c:1603 [inline] zap_p4d_range mm/memory.c:1624 [inline] unmap_page_range+0x1924/0x2500 mm/memory.c:1645 unmap_vmas+0x22c/0x330 mm/memory.c:1730 exit_mmap+0x1cc/0x8e0 mm/mmap.c:3250 __mmput+0x118/0x3c0 kernel/fork.c:1200 exit_mm+0x1e6/0x2c0 kernel/exit.c:565 do_exit+0x8c1/0x2400 kernel/exit.c:867 do_group_exit+0x217/0x2d0 kernel/exit.c:1022 get_signal+0x1272/0x1350 kernel/signal.c:2871 arch_do_signal_or_restart+0xb7/0x1240 arch/x86/kernel/signal.c:871 exit_to_user_mode_loop+0x70/0x110 kernel/entry/common.c:174 exit_to_user_mode_prepare+0xee/0x180 kernel/entry/common.c:210 __syscall_exit_to_user_mode_work kernel/entry/common.c:292 [inline] syscall_exit_to_user_mode+0x16/0x40 kernel/entry/common.c:303 do_syscall_64+0x58/0xa0 arch/x86/entry/common.c:87 entry_SYSCALL_64_after_hwframe+0x68/0xd2 RIP: 0033:0x7efdba78f749 Code: Unable to access opcode bytes at 0x7efdba78f71f. RSP: 002b:00007efdbb6b5038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a RAX: 0000000000000006 RBX: 00007efdba9e6090 RCX: 00007efdba78f749 RDX: ffffffffffffffff RSI: 0000000000000000 RDI: 0000200000000000 RBP: 00007efdba813f91 R08: 0000000000000000 R09: 0000000000000000 R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000000 R13: 00007efdba9e6128 R14: 00007efdba9e6090 R15: 00007ffdaf3e6b58