rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: rcu: 0-...!: (2 ticks this GP) idle=d65c/1/0x4000000000000000 softirq=85266/85268 fqs=0 rcu: Tasks blocked on level-0 rcu_node (CPUs 0-1): P32059/1:b..l P32052/1:b..l rcu: (detected by 1, t=10502 jiffies, g=151509, q=21 ncpus=2) Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 PID: 32060 Comm: syz-executor.1 Not tainted 6.7.0-rc6-syzkaller-00010-g2cf4f94d8e86 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 RIP: 0010:check_region_inline mm/kasan/generic.c:167 [inline] RIP: 0010:kasan_check_range+0x14c/0x190 mm/kasan/generic.c:187 Code: c0 01 49 89 d3 48 39 d0 74 11 80 38 00 74 ef 4d 8d 1c 2c 48 85 c0 48 89 c2 75 97 48 89 da 4c 89 d8 4c 29 da e9 30 ff ff ff 5b 01 00 00 00 5d 41 5c c3 b8 01 00 00 00 c3 48 29 c3 48 89 da 49 RSP: 0018:ffffc900000079c8 EFLAGS: 00000046 RAX: fffffbfff23e1ff2 RBX: 000000000000086d RCX: ffffffff8166037e RDX: fffffbfff23e1ff2 RSI: 0000000000000008 RDI: ffffffff91f0ff88 RBP: fffffbfff23e1ff1 R08: 0000000000000000 R09: fffffbfff23e1ff1 R10: ffffffff91f0ff8f R11: 0000000000000005 R12: ffff888079abe140 R13: 0000000000000001 R14: 0000000000000000 R15: 1ffff92000000f44 FS: 0000000000000000(0000) GS:ffff8880b9800000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000020404030 CR3: 000000007f5da000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: instrument_atomic_read include/linux/instrumented.h:68 [inline] _test_bit include/asm-generic/bitops/instrumented-non-atomic.h:141 [inline] hlock_class+0x4e/0x130 kernel/locking/lockdep.c:228 mark_lock+0xb5/0xc50 kernel/locking/lockdep.c:4656 mark_usage kernel/locking/lockdep.c:4564 [inline] __lock_acquire+0x1368/0x3b20 kernel/locking/lockdep.c:5091 lock_acquire kernel/locking/lockdep.c:5754 [inline] lock_acquire+0x1ae/0x520 kernel/locking/lockdep.c:5719 __raw_spin_lock include/linux/spinlock_api_smp.h:133 [inline] _raw_spin_lock+0x2e/0x40 kernel/locking/spinlock.c:154 spin_lock include/linux/spinlock.h:351 [inline] advance_sched+0xd5/0xc60 net/sched/sch_taprio.c:935 __run_hrtimer kernel/time/hrtimer.c:1688 [inline] __hrtimer_run_queues+0x203/0xc20 kernel/time/hrtimer.c:1752 hrtimer_interrupt+0x31b/0x800 kernel/time/hrtimer.c:1814 local_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1065 [inline] __sysvec_apic_timer_interrupt+0x105/0x400 arch/x86/kernel/apic/apic.c:1082 sysvec_apic_timer_interrupt+0x90/0xb0 arch/x86/kernel/apic/apic.c:1076 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:649 RIP: 0010:check_kcov_mode kernel/kcov.c:173 [inline] RIP: 0010:__sanitizer_cov_trace_pc+0x1d/0x60 kernel/kcov.c:207 Code: 66 66 2e 0f 1f 84 00 00 00 00 00 66 90 f3 0f 1e fa 65 48 8b 14 25 00 bd 03 00 65 8b 05 74 5b 7d 7e a9 00 01 ff 00 48 8b 34 24 <74> 0f f6 c4 01 74 35 8b 82 fc 15 00 00 85 c0 74 2b 8b 82 d8 15 00 RSP: 0018:ffffc90004b8f608 EFLAGS: 00000246 RAX: 0000000080000001 RBX: ffffea0000d7df00 RCX: ffffffff81e6ba32 RDX: ffff888079abe140 RSI: ffffffff81e6ba72 RDI: ffffea0000d7df18 RBP: 0000000000000000 R08: 0000000000000007 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000003 R12: ffff888014dadae0 R13: 0000000000000001 R14: ffff888029c1e661 R15: ffffea0000d7dec8 get_page_table_check mm/page_table_check.c:53 [inline] page_table_check_clear mm/page_table_check.c:78 [inline] page_table_check_clear+0x332/0x9b0 mm/page_table_check.c:61 __page_table_check_pte_clear+0xef/0x100 mm/page_table_check.c:158 page_table_check_pte_clear include/linux/page_table_check.h:49 [inline] ptep_get_and_clear_full arch/x86/include/asm/pgtable.h:1301 [inline] zap_pte_range mm/memory.c:1440 [inline] zap_pmd_range mm/memory.c:1583 [inline] zap_pud_range mm/memory.c:1612 [inline] zap_p4d_range mm/memory.c:1633 [inline] unmap_page_range+0x1861/0x2b70 mm/memory.c:1654 unmap_single_vma+0x194/0x2b0 mm/memory.c:1700 unmap_vmas+0x229/0x470 mm/memory.c:1744 exit_mmap+0x1ad/0xa70 mm/mmap.c:3308 __mmput+0x12a/0x4d0 kernel/fork.c:1349 mmput+0x62/0x70 kernel/fork.c:1371 exit_mm kernel/exit.c:567 [inline] do_exit+0x9a5/0x2ad0 kernel/exit.c:856 do_group_exit+0xd4/0x2a0 kernel/exit.c:1018 get_signal+0x23b5/0x2790 kernel/signal.c:2904 arch_do_signal_or_restart+0x90/0x7f0 arch/x86/kernel/signal.c:309 exit_to_user_mode_loop kernel/entry/common.c:168 [inline] exit_to_user_mode_prepare+0x121/0x240 kernel/entry/common.c:204 __syscall_exit_to_user_mode_work kernel/entry/common.c:285 [inline] syscall_exit_to_user_mode+0x1e/0x60 kernel/entry/common.c:296 do_syscall_64+0x4d/0x110 arch/x86/entry/common.c:89 entry_SYSCALL_64_after_hwframe+0x63/0x6b RIP: 0033:0x7ff14547cba9 Code: Unable to access opcode bytes at 0x7ff14547cb7f. RSP: 002b:00007ff1462660c8 EFLAGS: 00000246 ORIG_RAX: 000000000000012b RAX: 0000000000010106 RBX: 00007ff14559c050 RCX: 00007ff14547cba9 RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003 RBP: 00007ff1454c847a R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000000 R13: 000000000000006e R14: 00007ff14559c050 R15: 00007ffce1973ee8 task:syz-executor.5 state:R running task stack:27200 pid:32052 tgid:32052 ppid:5079 flags:0x00004002 Call Trace: context_switch kernel/sched/core.c:5376 [inline] __schedule+0xedb/0x5af0 kernel/sched/core.c:6688 preempt_schedule_common+0x45/0xc0 kernel/sched/core.c:6865 preempt_schedule_thunk+0x1a/0x30 arch/x86/entry/thunk_64.S:45 __raw_spin_unlock include/linux/spinlock_api_smp.h:143 [inline] _raw_spin_unlock+0x3a/0x40 kernel/locking/spinlock.c:186 spin_unlock include/linux/spinlock.h:391 [inline] zap_pte_range mm/memory.c:1535 [inline] zap_pmd_range mm/memory.c:1583 [inline] zap_pud_range mm/memory.c:1612 [inline] zap_p4d_range mm/memory.c:1633 [inline] unmap_page_range+0x1acb/0x2b70 mm/memory.c:1654 unmap_single_vma+0x194/0x2b0 mm/memory.c:1700 unmap_vmas+0x229/0x470 mm/memory.c:1744 exit_mmap+0x1ad/0xa70 mm/mmap.c:3308 __mmput+0x12a/0x4d0 kernel/fork.c:1349 mmput+0x62/0x70 kernel/fork.c:1371 exit_mm kernel/exit.c:567 [inline] do_exit+0x9a5/0x2ad0 kernel/exit.c:856 do_group_exit+0xd4/0x2a0 kernel/exit.c:1018 __do_sys_exit_group kernel/exit.c:1029 [inline] __se_sys_exit_group kernel/exit.c:1027 [inline] __x64_sys_exit_group+0x3e/0x50 kernel/exit.c:1027 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0x40/0x110 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x63/0x6b RIP: 0033:0x7fe80667cba9 RSP: 002b:00007ffcbb6ba3d8 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 RAX: ffffffffffffffda RBX: 000000000000001e RCX: 00007fe80667cba9 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 0000000000000001 R08: 000000000000018d R09: 0000000000000000 R10: 0000001b31320000 R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000001 task:syz-executor.0 state:R running task stack:27680 pid:32059 tgid:32056 ppid:5097 flags:0x00000002 Call Trace: context_switch kernel/sched/core.c:5376 [inline] __schedule+0xedb/0x5af0 kernel/sched/core.c:6688 preempt_schedule_common+0x45/0xc0 kernel/sched/core.c:6865 preempt_schedule_thunk+0x1a/0x30 arch/x86/entry/thunk_64.S:45 __raw_spin_unlock include/linux/spinlock_api_smp.h:143 [inline] _raw_spin_unlock+0x3a/0x40 kernel/locking/spinlock.c:186 spin_unlock include/linux/spinlock.h:391 [inline] do_anonymous_page mm/memory.c:4224 [inline] do_pte_missing mm/memory.c:3729 [inline] handle_pte_fault mm/memory.c:5039 [inline] __handle_mm_fault+0x2dbc/0x3d70 mm/memory.c:5180 handle_mm_fault+0x47a/0xa10 mm/memory.c:5345 do_user_addr_fault+0x30b/0x1000 arch/x86/mm/fault.c:1364 handle_page_fault arch/x86/mm/fault.c:1505 [inline] exc_page_fault+0x5d/0xc0 arch/x86/mm/fault.c:1561 asm_exc_page_fault+0x26/0x30 arch/x86/include/asm/idtentry.h:570 RIP: 0033:0x7f84426287d0 RSP: 002b:00007f844347e520 EFLAGS: 00010282 RAX: 0000000000115000 RBX: 00007f844347e5c0 RCX: 0000000000000016 RDX: 00000000000000ff RSI: 0000000000000200 RDI: 00007f844347e660 RBP: 00000000000000e8 R08: 00007f8438dff000 R09: 00000000000000fe R10: 00000000200096c2 R11: 00000000000095cf R12: 0000000000000181 R13: 00007f84426ea620 R14: 0000000000000011 R15: 00007f844347e660 rcu: rcu_preempt kthread starved for 10502 jiffies! g151509 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=1 rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. rcu: RCU grace-period kthread stack dump: task:rcu_preempt state:R running task stack:27904 pid:16 tgid:16 ppid:2 flags:0x00004000 Call Trace: context_switch kernel/sched/core.c:5376 [inline] __schedule+0xedb/0x5af0 kernel/sched/core.c:6688 __schedule_loop kernel/sched/core.c:6763 [inline] schedule+0xe9/0x270 kernel/sched/core.c:6778 schedule_timeout+0x137/0x290 kernel/time/timer.c:2167 rcu_gp_fqs_loop+0x1ec/0xb10 kernel/rcu/tree.c:1631 rcu_gp_kthread+0x24b/0x380 kernel/rcu/tree.c:1830 kthread+0x2c6/0x3a0 kernel/kthread.c:388 ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:242 rcu: Stack dump where RCU GP kthread last ran: CPU: 1 PID: 16968 Comm: kworker/u4:9 Not tainted 6.7.0-rc6-syzkaller-00010-g2cf4f94d8e86 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 Workqueue: events_unbound toggle_allocation_gate RIP: 0010:csd_lock_wait kernel/smp.c:311 [inline] RIP: 0010:smp_call_function_many_cond+0x4e4/0x1550 kernel/smp.c:855 Code: 0b 00 85 ed 74 4d 48 b8 00 00 00 00 00 fc ff df 4d 89 f4 4c 89 f5 49 c1 ec 03 83 e5 07 49 01 c4 83 c5 03 e8 fe b6 0b 00 f3 90 <41> 0f b6 04 24 40 38 c5 7c 08 84 c0 0f 85 24 0e 00 00 8b 43 08 31 RSP: 0018:ffffc900147b7930 EFLAGS: 00000293 RAX: 0000000000000000 RBX: ffff8880b98414c0 RCX: ffffffff817aaaa8 RDX: ffff888028aca200 RSI: ffffffff817aaa82 RDI: 0000000000000005 RBP: 0000000000000003 R08: 0000000000000005 R09: 0000000000000000 R10: 0000000000000001 R11: 0000000000000006 R12: ffffed1017308299 R13: 0000000000000001 R14: ffff8880b98414c8 R15: ffff8880b993d900 FS: 0000000000000000(0000) GS:ffff8880b9900000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00005555568c88f8 CR3: 000000000cd77000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: on_each_cpu_cond_mask+0x40/0x90 kernel/smp.c:1023 on_each_cpu include/linux/smp.h:71 [inline] text_poke_sync arch/x86/kernel/alternative.c:2006 [inline] text_poke_bp_batch+0x22b/0x750 arch/x86/kernel/alternative.c:2216 text_poke_flush arch/x86/kernel/alternative.c:2407 [inline] text_poke_flush arch/x86/kernel/alternative.c:2404 [inline] text_poke_finish+0x30/0x40 arch/x86/kernel/alternative.c:2414 arch_jump_label_transform_apply+0x1c/0x30 arch/x86/kernel/jump_label.c:146 jump_label_update+0x1d7/0x400 kernel/jump_label.c:829 static_key_enable_cpuslocked+0x1b7/0x270 kernel/jump_label.c:205 static_key_enable+0x1a/0x20 kernel/jump_label.c:218 toggle_allocation_gate mm/kfence/core.c:830 [inline] toggle_allocation_gate+0xf4/0x250 mm/kfence/core.c:822 process_one_work+0x886/0x15d0 kernel/workqueue.c:2627 process_scheduled_works kernel/workqueue.c:2700 [inline] worker_thread+0x8b9/0x1290 kernel/workqueue.c:2781 kthread+0x2c6/0x3a0 kernel/kthread.c:388 ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:242