rcu: INFO: rcu_preempt detected stalls on CPUs/tasks:
rcu: 1-....: (28 ticks this GP) idle=f9c4/1/0x4000000000000000 softirq=50588/50588 fqs=73
rcu: hardirqs softirqs csw/system
rcu: number: 0 0 0
rcu: cputime: 39865 198 16 ==> 45200(ms)
rcu: (detected by 0, t=10502 jiffies, g=67193, q=519 ncpus=2)
Sending NMI from CPU 0 to CPUs 1:
NMI backtrace for cpu 1
CPU: 1 PID: 5040 Comm: syz-executor.2 Not tainted 6.5.0-rc2-syzkaller-00586-g09bd2d7ddaed #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023
RIP: 0010:bytes_is_nonzero mm/kasan/generic.c:85 [inline]
RIP: 0010:memory_is_nonzero mm/kasan/generic.c:102 [inline]
RIP: 0010:memory_is_poisoned_n mm/kasan/generic.c:127 [inline]
RIP: 0010:memory_is_poisoned mm/kasan/generic.c:159 [inline]
RIP: 0010:check_region_inline mm/kasan/generic.c:178 [inline]
RIP: 0010:kasan_check_range+0x10d/0x190 mm/kasan/generic.c:187
Code: 00 00 7c 0b 44 89 c2 e8 e1 ee ff ff 83 f0 01 5b 5d 41 5c c3 48 85 d2 74 4f 48 01 ea eb 09 48 83 c0 01 48 39 d0 74 41 80 38 00 <74> f2 eb b6 41 bc 08 00 00 00 45 29 dc 49 8d 14 2c eb 0c 48 83 c0
RSP: 0018:ffffc900001e05a0 EFLAGS: 00000046
RAX: fffffbfff2309dd0 RBX: fffffbfff2309dd1 RCX: ffffffff816706a5
RDX: fffffbfff2309dd1 RSI: 0000000000000008 RDI: ffffffff9184ee80
RBP: fffffbfff2309dd0 R08: 0000000000000000 R09: fffffbfff2309dd0
R10: ffffffff9184ee87 R11: 0000000000000001 R12: 0000000000000100
R13: 0000000000000008 R14: 1ffff9200003c0c0 R15: ffff88801f244730
FS: 0000555555abe480(0000) GS:ffff8880b9900000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f273e775198 CR3: 00000000590f5000 CR4: 00000000003506e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
instrument_atomic_read include/linux/instrumented.h:68 [inline]
_test_bit include/asm-generic/bitops/instrumented-non-atomic.h:141 [inline]
hlock_class kernel/locking/lockdep.c:228 [inline]
mark_lock+0x105/0x1950 kernel/locking/lockdep.c:4663
mark_usage kernel/locking/lockdep.c:4606 [inline]
__lock_acquire+0x975/0x5de0 kernel/locking/lockdep.c:5098
lock_acquire kernel/locking/lockdep.c:5761 [inline]
lock_acquire+0x1ae/0x510 kernel/locking/lockdep.c:5726
debug_objects_fill_pool lib/debugobjects.c:614 [inline]
debug_object_activate+0x144/0x490 lib/debugobjects.c:713
debug_hrtimer_activate kernel/time/hrtimer.c:422 [inline]
debug_activate kernel/time/hrtimer.c:477 [inline]
enqueue_hrtimer+0x23/0x310 kernel/time/hrtimer.c:1087
__run_hrtimer kernel/time/hrtimer.c:1705 [inline]
__hrtimer_run_queues+0xa0a/0xc10 kernel/time/hrtimer.c:1752
hrtimer_interrupt+0x31b/0x800 kernel/time/hrtimer.c:1814
local_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1098 [inline]
__sysvec_apic_timer_interrupt+0x14a/0x430 arch/x86/kernel/apic/apic.c:1115
sysvec_apic_timer_interrupt+0x42/0xc0 arch/x86/kernel/apic/apic.c:1109
asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:645
RIP: 0010:check_kcov_mode kernel/kcov.c:173 [inline]
RIP: 0010:__sanitizer_cov_trace_pc+0x31/0x70 kernel/kcov.c:207
Code: 4d 3b 7d 7e 89 c1 48 8b 34 24 81 e1 00 01 00 00 65 48 8b 14 25 80 b9 03 00 a9 00 01 ff 00 74 0e 85 c9 74 35 8b 82 04 16 00 00 <85> c0 74 2b 8b 82 e0 15 00 00 83 f8 02 75 20 48 8b 8a e8 15 00 00
RSP: 0018:ffffc900001e0d58 EFLAGS: 00000206
RAX: 0000000000000000 RBX: ffff888022c47394 RCX: 0000000000000100
RDX: ffff88801f243b80 RSI: ffffffff885aa625 RDI: 0000000000000004
RBP: 000000000000000a R08: 0000000000000004 R09: 000000000000000a
R10: 0000000000000000 R11: 0000000000094000 R12: 0000000000000010
R13: ffff888019a74b60 R14: 0000000000000000 R15: 0000000000000001
taprio_dequeue_tc_priority+0x255/0x4b0 net/sched/sch_taprio.c:798
taprio_dequeue+0x12e/0x5f0 net/sched/sch_taprio.c:868
dequeue_skb net/sched/sch_generic.c:292 [inline]
qdisc_restart net/sched/sch_generic.c:397 [inline]
__qdisc_run+0x1c4/0x19d0 net/sched/sch_generic.c:415
qdisc_run include/net/pkt_sched.h:125 [inline]
qdisc_run include/net/pkt_sched.h:122 [inline]
net_tx_action+0x71e/0xc80 net/core/dev.c:5175
__do_softirq+0x218/0x965 kernel/softirq.c:553
invoke_softirq kernel/softirq.c:427 [inline]
__irq_exit_rcu kernel/softirq.c:632 [inline]
irq_exit_rcu+0xb7/0x120 kernel/softirq.c:644
sysvec_apic_timer_interrupt+0x93/0xc0 arch/x86/kernel/apic/apic.c:1109
asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:645
RIP: 0010:on_stack arch/x86/include/asm/stacktrace.h:55 [inline]
RIP: 0010:unwind_next_frame+0xdc4/0x2020 arch/x86/kernel/unwind_orc.c:665
Code: bf 0e 00 00 41 39 5d 00 0f 85 8f 00 00 00 48 b8 00 00 00 00 00 fc ff df 48 8b 14 24 48 c1 ea 03 80 3c 02 00 0f 85 c9 0e 00 00 <49> 8d 7d 08 49 8b 5d 38 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48
RSP: 0018:ffffc900040cf638 EFLAGS: 00000246
RAX: dffffc0000000000 RBX: 0000000000000001 RCX: ffffc900040d0000
RDX: 1ffff92000819edc RSI: ffffc900040cf9e0 RDI: ffffc900040cf6e8
RBP: ffff888012841280 R08: ffffc900040cf6dc R09: ffffffff8f3f0f2c
R10: ffffc900040cf6a8 R11: 000000000000dae1 R12: ffffc900040cf6f8
R13: ffffc900040cf6a8 R14: ffffc900040cf9f8 R15: ffffc900040cf9f0
arch_stack_walk+0x8b/0xf0 arch/x86/kernel/stacktrace.c:25
stack_trace_save+0x96/0xd0 kernel/stacktrace.c:122
kasan_save_stack+0x33/0x50 mm/kasan/common.c:45
kasan_set_track+0x25/0x30 mm/kasan/common.c:52
kasan_save_free_info+0x2b/0x40 mm/kasan/generic.c:522
____kasan_slab_free mm/kasan/common.c:236 [inline]
____kasan_slab_free+0x15e/0x1b0 mm/kasan/common.c:200
kasan_slab_free include/linux/kasan.h:162 [inline]
slab_free_hook mm/slub.c:1792 [inline]
slab_free_freelist_hook+0x10b/0x1e0 mm/slub.c:1818
slab_free mm/slub.c:3801 [inline]
__kmem_cache_free+0xb8/0x2f0 mm/slub.c:3814
kvfree+0x47/0x50 mm/util.c:650
vfree+0x251/0x7a0 mm/vmalloc.c:2846
copy_entries_to_user net/ipv6/netfilter/ip6_tables.c:882 [inline]
get_entries net/ipv6/netfilter/ip6_tables.c:1039 [inline]
do_ip6t_get_ctl+0x8bf/0xab0 net/ipv6/netfilter/ip6_tables.c:1669
nf_getsockopt+0x76/0xe0 net/netfilter/nf_sockopt.c:116
ipv6_getsockopt+0x1f9/0x2b0 net/ipv6/ipv6_sockglue.c:1500
tcp_getsockopt+0x97/0xf0 net/ipv4/tcp.c:4305
__sys_getsockopt+0x220/0x6a0 net/socket.c:2307
__do_sys_getsockopt net/socket.c:2322 [inline]
__se_sys_getsockopt net/socket.c:2319 [inline]
__x64_sys_getsockopt+0xbd/0x150 net/socket.c:2319
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x38/0xb0 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x7f273e67e6ca
Code: c4 c1 e0 1a 0d 00 00 04 00 89 01 e9 e0 fe ff ff e8 3b 05 00 00 66 2e 0f 1f 84 00 00 00 00 00 90 49 89 ca b8 37 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 06 c3 0f 1f 44 00 00 48 c7 c2 b0 ff ff ff f7
RSP: 002b:00007ffffe0ddd28 EFLAGS: 00000216 ORIG_RAX: 0000000000000037
RAX: ffffffffffffffda RBX: 00007ffffe0dddb0 RCX: 00007f273e67e6ca
RDX: 0000000000000041 RSI: 0000000000000029 RDI: 0000000000000003
RBP: 0000000000000003 R08: 00007ffffe0ddd4c R09: 0079746972756365
R10: 00007ffffe0dddb0 R11: 0000000000000216 R12: 00007f273e777200
R13: 00007ffffe0ddd4c R14: 0000000000000000 R15: 00007f273e778d00
rcu: rcu_preempt kthread starved for 513 jiffies! g67193 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=0
rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior.
rcu: RCU grace-period kthread stack dump:
task:rcu_preempt state:R running task stack:28672 pid:16 ppid:2 flags:0x00004000
Call Trace:
context_switch kernel/sched/core.c:5381 [inline]
__schedule+0xee1/0x59f0 kernel/sched/core.c:6710
schedule+0xe7/0x1b0 kernel/sched/core.c:6786
schedule_timeout+0x157/0x2c0 kernel/time/timer.c:2167
rcu_gp_fqs_loop+0x1ec/0xa50 kernel/rcu/tree.c:1609
rcu_gp_kthread+0x249/0x380 kernel/rcu/tree.c:1808
kthread+0x33a/0x430 kernel/kthread.c:389
ret_from_fork+0x2c/0x70 arch/x86/kernel/process.c:145
ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:296
RIP: 0000:0x0
Code: Unable to access opcode bytes at 0xffffffffffffffd6.
RSP: 0000:0000000000000000 EFLAGS: 00000000 ORIG_RAX: 0000000000000000
RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
rcu: Stack dump where RCU GP kthread last ran:
CPU: 0 PID: 5140 Comm: kworker/u4:7 Not tainted 6.5.0-rc2-syzkaller-00586-g09bd2d7ddaed #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023
Workqueue: events_unbound toggle_allocation_gate
RIP: 0010:preempt_count arch/x86/include/asm/preempt.h:27 [inline]
RIP: 0010:check_kcov_mode kernel/kcov.c:173 [inline]
RIP: 0010:write_comp_data+0x0/0x90 kernel/kcov.c:236
Code: 65 8b 15 5b 41 7d 7e 81 e2 00 01 ff 00 75 10 65 48 8b 04 25 80 b9 03 00 48 8b 80 f8 15 00 00 c3 66 2e 0f 1f 84 00 00 00 00 00 <65> 8b 05 31 41 7d 7e 49 89 f1 89 c6 49 89 d2 81 e6 00 01 00 00 49
RSP: 0018:ffffc900044cf930 EFLAGS: 00000202
RAX: 0000000000000001 RBX: ffff8880b9943020 RCX: ffffffff817b1f3a
RDX: 0000000000000001 RSI: 0000000000000000 RDI: 0000000000000005
RBP: 0000000000000003 R08: 0000000000000005 R09: 0000000000000000
R10: 0000000000000001 R11: 0000000000000000 R12: ffffed1017328605
R13: 0000000000000001 R14: ffff8880b983d580 R15: ffff8880b9943028
FS: 0000000000000000(0000) GS:ffff8880b9800000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffffffffffffd6 CR3: 000000000c776000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
csd_lock_wait kernel/smp.c:296 [inline]
smp_call_function_many_cond+0x4fa/0x1570 kernel/smp.c:835
on_each_cpu_cond_mask+0x40/0x90 kernel/smp.c:1003
on_each_cpu include/linux/smp.h:71 [inline]
text_poke_sync arch/x86/kernel/alternative.c:2001 [inline]
text_poke_bp_batch+0x661/0x780 arch/x86/kernel/alternative.c:2294
text_poke_flush arch/x86/kernel/alternative.c:2402 [inline]
text_poke_flush arch/x86/kernel/alternative.c:2399 [inline]
text_poke_finish+0x1a/0x30 arch/x86/kernel/alternative.c:2409
arch_jump_label_transform_apply+0x17/0x30 arch/x86/kernel/jump_label.c:146
jump_label_update+0x32e/0x410 kernel/jump_label.c:829
static_key_enable_cpuslocked+0x1b5/0x270 kernel/jump_label.c:205
static_key_enable+0x1a/0x20 kernel/jump_label.c:218
toggle_allocation_gate mm/kfence/core.c:831 [inline]
toggle_allocation_gate+0xf4/0x250 mm/kfence/core.c:823
process_one_work+0xaa2/0x16f0 kernel/workqueue.c:2597
worker_thread+0x687/0x1110 kernel/workqueue.c:2748
kthread+0x33a/0x430 kernel/kthread.c:389
ret_from_fork+0x2c/0x70 arch/x86/kernel/process.c:145
ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:296
RIP: 0000:0x0
Code: Unable to access opcode bytes at 0xffffffffffffffd6.
RSP: 0000:0000000000000000 EFLAGS: 00000000 ORIG_RAX: 0000000000000000
RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000