rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: rcu: 1-....: (28 ticks this GP) idle=f9c4/1/0x4000000000000000 softirq=50588/50588 fqs=73 rcu: hardirqs softirqs csw/system rcu: number: 0 0 0 rcu: cputime: 39865 198 16 ==> 45200(ms) rcu: (detected by 0, t=10502 jiffies, g=67193, q=519 ncpus=2) Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 PID: 5040 Comm: syz-executor.2 Not tainted 6.5.0-rc2-syzkaller-00586-g09bd2d7ddaed #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 RIP: 0010:bytes_is_nonzero mm/kasan/generic.c:85 [inline] RIP: 0010:memory_is_nonzero mm/kasan/generic.c:102 [inline] RIP: 0010:memory_is_poisoned_n mm/kasan/generic.c:127 [inline] RIP: 0010:memory_is_poisoned mm/kasan/generic.c:159 [inline] RIP: 0010:check_region_inline mm/kasan/generic.c:178 [inline] RIP: 0010:kasan_check_range+0x10d/0x190 mm/kasan/generic.c:187 Code: 00 00 7c 0b 44 89 c2 e8 e1 ee ff ff 83 f0 01 5b 5d 41 5c c3 48 85 d2 74 4f 48 01 ea eb 09 48 83 c0 01 48 39 d0 74 41 80 38 00 <74> f2 eb b6 41 bc 08 00 00 00 45 29 dc 49 8d 14 2c eb 0c 48 83 c0 RSP: 0018:ffffc900001e05a0 EFLAGS: 00000046 RAX: fffffbfff2309dd0 RBX: fffffbfff2309dd1 RCX: ffffffff816706a5 RDX: fffffbfff2309dd1 RSI: 0000000000000008 RDI: ffffffff9184ee80 RBP: fffffbfff2309dd0 R08: 0000000000000000 R09: fffffbfff2309dd0 R10: ffffffff9184ee87 R11: 0000000000000001 R12: 0000000000000100 R13: 0000000000000008 R14: 1ffff9200003c0c0 R15: ffff88801f244730 FS: 0000555555abe480(0000) GS:ffff8880b9900000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f273e775198 CR3: 00000000590f5000 CR4: 00000000003506e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: instrument_atomic_read include/linux/instrumented.h:68 [inline] _test_bit include/asm-generic/bitops/instrumented-non-atomic.h:141 [inline] hlock_class kernel/locking/lockdep.c:228 [inline] mark_lock+0x105/0x1950 kernel/locking/lockdep.c:4663 mark_usage kernel/locking/lockdep.c:4606 [inline] __lock_acquire+0x975/0x5de0 kernel/locking/lockdep.c:5098 lock_acquire kernel/locking/lockdep.c:5761 [inline] lock_acquire+0x1ae/0x510 kernel/locking/lockdep.c:5726 debug_objects_fill_pool lib/debugobjects.c:614 [inline] debug_object_activate+0x144/0x490 lib/debugobjects.c:713 debug_hrtimer_activate kernel/time/hrtimer.c:422 [inline] debug_activate kernel/time/hrtimer.c:477 [inline] enqueue_hrtimer+0x23/0x310 kernel/time/hrtimer.c:1087 __run_hrtimer kernel/time/hrtimer.c:1705 [inline] __hrtimer_run_queues+0xa0a/0xc10 kernel/time/hrtimer.c:1752 hrtimer_interrupt+0x31b/0x800 kernel/time/hrtimer.c:1814 local_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1098 [inline] __sysvec_apic_timer_interrupt+0x14a/0x430 arch/x86/kernel/apic/apic.c:1115 sysvec_apic_timer_interrupt+0x42/0xc0 arch/x86/kernel/apic/apic.c:1109 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:645 RIP: 0010:check_kcov_mode kernel/kcov.c:173 [inline] RIP: 0010:__sanitizer_cov_trace_pc+0x31/0x70 kernel/kcov.c:207 Code: 4d 3b 7d 7e 89 c1 48 8b 34 24 81 e1 00 01 00 00 65 48 8b 14 25 80 b9 03 00 a9 00 01 ff 00 74 0e 85 c9 74 35 8b 82 04 16 00 00 <85> c0 74 2b 8b 82 e0 15 00 00 83 f8 02 75 20 48 8b 8a e8 15 00 00 RSP: 0018:ffffc900001e0d58 EFLAGS: 00000206 RAX: 0000000000000000 RBX: ffff888022c47394 RCX: 0000000000000100 RDX: ffff88801f243b80 RSI: ffffffff885aa625 RDI: 0000000000000004 RBP: 000000000000000a R08: 0000000000000004 R09: 000000000000000a R10: 0000000000000000 R11: 0000000000094000 R12: 0000000000000010 R13: ffff888019a74b60 R14: 0000000000000000 R15: 0000000000000001 taprio_dequeue_tc_priority+0x255/0x4b0 net/sched/sch_taprio.c:798 taprio_dequeue+0x12e/0x5f0 net/sched/sch_taprio.c:868 dequeue_skb net/sched/sch_generic.c:292 [inline] qdisc_restart net/sched/sch_generic.c:397 [inline] __qdisc_run+0x1c4/0x19d0 net/sched/sch_generic.c:415 qdisc_run include/net/pkt_sched.h:125 [inline] qdisc_run include/net/pkt_sched.h:122 [inline] net_tx_action+0x71e/0xc80 net/core/dev.c:5175 __do_softirq+0x218/0x965 kernel/softirq.c:553 invoke_softirq kernel/softirq.c:427 [inline] __irq_exit_rcu kernel/softirq.c:632 [inline] irq_exit_rcu+0xb7/0x120 kernel/softirq.c:644 sysvec_apic_timer_interrupt+0x93/0xc0 arch/x86/kernel/apic/apic.c:1109 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:645 RIP: 0010:on_stack arch/x86/include/asm/stacktrace.h:55 [inline] RIP: 0010:unwind_next_frame+0xdc4/0x2020 arch/x86/kernel/unwind_orc.c:665 Code: bf 0e 00 00 41 39 5d 00 0f 85 8f 00 00 00 48 b8 00 00 00 00 00 fc ff df 48 8b 14 24 48 c1 ea 03 80 3c 02 00 0f 85 c9 0e 00 00 <49> 8d 7d 08 49 8b 5d 38 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 RSP: 0018:ffffc900040cf638 EFLAGS: 00000246 RAX: dffffc0000000000 RBX: 0000000000000001 RCX: ffffc900040d0000 RDX: 1ffff92000819edc RSI: ffffc900040cf9e0 RDI: ffffc900040cf6e8 RBP: ffff888012841280 R08: ffffc900040cf6dc R09: ffffffff8f3f0f2c R10: ffffc900040cf6a8 R11: 000000000000dae1 R12: ffffc900040cf6f8 R13: ffffc900040cf6a8 R14: ffffc900040cf9f8 R15: ffffc900040cf9f0 arch_stack_walk+0x8b/0xf0 arch/x86/kernel/stacktrace.c:25 stack_trace_save+0x96/0xd0 kernel/stacktrace.c:122 kasan_save_stack+0x33/0x50 mm/kasan/common.c:45 kasan_set_track+0x25/0x30 mm/kasan/common.c:52 kasan_save_free_info+0x2b/0x40 mm/kasan/generic.c:522 ____kasan_slab_free mm/kasan/common.c:236 [inline] ____kasan_slab_free+0x15e/0x1b0 mm/kasan/common.c:200 kasan_slab_free include/linux/kasan.h:162 [inline] slab_free_hook mm/slub.c:1792 [inline] slab_free_freelist_hook+0x10b/0x1e0 mm/slub.c:1818 slab_free mm/slub.c:3801 [inline] __kmem_cache_free+0xb8/0x2f0 mm/slub.c:3814 kvfree+0x47/0x50 mm/util.c:650 vfree+0x251/0x7a0 mm/vmalloc.c:2846 copy_entries_to_user net/ipv6/netfilter/ip6_tables.c:882 [inline] get_entries net/ipv6/netfilter/ip6_tables.c:1039 [inline] do_ip6t_get_ctl+0x8bf/0xab0 net/ipv6/netfilter/ip6_tables.c:1669 nf_getsockopt+0x76/0xe0 net/netfilter/nf_sockopt.c:116 ipv6_getsockopt+0x1f9/0x2b0 net/ipv6/ipv6_sockglue.c:1500 tcp_getsockopt+0x97/0xf0 net/ipv4/tcp.c:4305 __sys_getsockopt+0x220/0x6a0 net/socket.c:2307 __do_sys_getsockopt net/socket.c:2322 [inline] __se_sys_getsockopt net/socket.c:2319 [inline] __x64_sys_getsockopt+0xbd/0x150 net/socket.c:2319 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x38/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcd RIP: 0033:0x7f273e67e6ca Code: c4 c1 e0 1a 0d 00 00 04 00 89 01 e9 e0 fe ff ff e8 3b 05 00 00 66 2e 0f 1f 84 00 00 00 00 00 90 49 89 ca b8 37 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 06 c3 0f 1f 44 00 00 48 c7 c2 b0 ff ff ff f7 RSP: 002b:00007ffffe0ddd28 EFLAGS: 00000216 ORIG_RAX: 0000000000000037 RAX: ffffffffffffffda RBX: 00007ffffe0dddb0 RCX: 00007f273e67e6ca RDX: 0000000000000041 RSI: 0000000000000029 RDI: 0000000000000003 RBP: 0000000000000003 R08: 00007ffffe0ddd4c R09: 0079746972756365 R10: 00007ffffe0dddb0 R11: 0000000000000216 R12: 00007f273e777200 R13: 00007ffffe0ddd4c R14: 0000000000000000 R15: 00007f273e778d00 rcu: rcu_preempt kthread starved for 513 jiffies! g67193 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=0 rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. rcu: RCU grace-period kthread stack dump: task:rcu_preempt state:R running task stack:28672 pid:16 ppid:2 flags:0x00004000 Call Trace: context_switch kernel/sched/core.c:5381 [inline] __schedule+0xee1/0x59f0 kernel/sched/core.c:6710 schedule+0xe7/0x1b0 kernel/sched/core.c:6786 schedule_timeout+0x157/0x2c0 kernel/time/timer.c:2167 rcu_gp_fqs_loop+0x1ec/0xa50 kernel/rcu/tree.c:1609 rcu_gp_kthread+0x249/0x380 kernel/rcu/tree.c:1808 kthread+0x33a/0x430 kernel/kthread.c:389 ret_from_fork+0x2c/0x70 arch/x86/kernel/process.c:145 ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:296 RIP: 0000:0x0 Code: Unable to access opcode bytes at 0xffffffffffffffd6. RSP: 0000:0000000000000000 EFLAGS: 00000000 ORIG_RAX: 0000000000000000 RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 rcu: Stack dump where RCU GP kthread last ran: CPU: 0 PID: 5140 Comm: kworker/u4:7 Not tainted 6.5.0-rc2-syzkaller-00586-g09bd2d7ddaed #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 Workqueue: events_unbound toggle_allocation_gate RIP: 0010:preempt_count arch/x86/include/asm/preempt.h:27 [inline] RIP: 0010:check_kcov_mode kernel/kcov.c:173 [inline] RIP: 0010:write_comp_data+0x0/0x90 kernel/kcov.c:236 Code: 65 8b 15 5b 41 7d 7e 81 e2 00 01 ff 00 75 10 65 48 8b 04 25 80 b9 03 00 48 8b 80 f8 15 00 00 c3 66 2e 0f 1f 84 00 00 00 00 00 <65> 8b 05 31 41 7d 7e 49 89 f1 89 c6 49 89 d2 81 e6 00 01 00 00 49 RSP: 0018:ffffc900044cf930 EFLAGS: 00000202 RAX: 0000000000000001 RBX: ffff8880b9943020 RCX: ffffffff817b1f3a RDX: 0000000000000001 RSI: 0000000000000000 RDI: 0000000000000005 RBP: 0000000000000003 R08: 0000000000000005 R09: 0000000000000000 R10: 0000000000000001 R11: 0000000000000000 R12: ffffed1017328605 R13: 0000000000000001 R14: ffff8880b983d580 R15: ffff8880b9943028 FS: 0000000000000000(0000) GS:ffff8880b9800000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffffffffffffd6 CR3: 000000000c776000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: csd_lock_wait kernel/smp.c:296 [inline] smp_call_function_many_cond+0x4fa/0x1570 kernel/smp.c:835 on_each_cpu_cond_mask+0x40/0x90 kernel/smp.c:1003 on_each_cpu include/linux/smp.h:71 [inline] text_poke_sync arch/x86/kernel/alternative.c:2001 [inline] text_poke_bp_batch+0x661/0x780 arch/x86/kernel/alternative.c:2294 text_poke_flush arch/x86/kernel/alternative.c:2402 [inline] text_poke_flush arch/x86/kernel/alternative.c:2399 [inline] text_poke_finish+0x1a/0x30 arch/x86/kernel/alternative.c:2409 arch_jump_label_transform_apply+0x17/0x30 arch/x86/kernel/jump_label.c:146 jump_label_update+0x32e/0x410 kernel/jump_label.c:829 static_key_enable_cpuslocked+0x1b5/0x270 kernel/jump_label.c:205 static_key_enable+0x1a/0x20 kernel/jump_label.c:218 toggle_allocation_gate mm/kfence/core.c:831 [inline] toggle_allocation_gate+0xf4/0x250 mm/kfence/core.c:823 process_one_work+0xaa2/0x16f0 kernel/workqueue.c:2597 worker_thread+0x687/0x1110 kernel/workqueue.c:2748 kthread+0x33a/0x430 kernel/kthread.c:389 ret_from_fork+0x2c/0x70 arch/x86/kernel/process.c:145 ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:296 RIP: 0000:0x0 Code: Unable to access opcode bytes at 0xffffffffffffffd6. RSP: 0000:0000000000000000 EFLAGS: 00000000 ORIG_RAX: 0000000000000000 RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000