rcu: INFO: rcu_preempt detected stalls on CPUs/tasks:
rcu: (detected by 1, t=10502 jiffies, g=13369, q=681 ncpus=2)
rcu: All QSes seen, last rcu_preempt kthread activity 10500 (4294959386-4294948886), jiffies_till_next_fqs=1, root ->qsmask 0x0
rcu: rcu_preempt kthread starved for 10500 jiffies! g13369 f0x2 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=0
rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior.
rcu: RCU grace-period kthread stack dump:
task:rcu_preempt state:R running task stack:26920 pid:17 ppid:2 flags:0x00004000
Call Trace:
context_switch kernel/sched/core.c:5381 [inline]
__schedule+0x1553/0x45a0 kernel/sched/core.c:6700
schedule+0xbd/0x170 kernel/sched/core.c:6774
schedule_timeout+0x188/0x2d0 kernel/time/timer.c:2168
rcu_gp_fqs_loop+0x313/0x1590 kernel/rcu/tree.c:1667
rcu_gp_kthread+0x9d/0x3b0 kernel/rcu/tree.c:1866
kthread+0x2fa/0x390 kernel/kthread.c:388
ret_from_fork+0x48/0x80 arch/x86/kernel/process.c:152
ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:293
rcu: Stack dump where RCU GP kthread last ran:
Sending NMI from CPU 1 to CPUs 0:
NMI backtrace for cpu 0
CPU: 0 PID: 6003 Comm: syz.2.27 Not tainted syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026
RIP: 0010:hlock_class kernel/locking/lockdep.c:228 [inline]
RIP: 0010:mark_lock+0x9c/0x320 kernel/locking/lockdep.c:4656
Code: 89 c7 41 81 e7 ff 1f 00 00 c1 e8 03 25 f8 03 00 00 48 8d b8 00 f5 1b 91 be 08 00 00 00 e8 fc 5e 76 00 4c 0f a3 3d 94 14 b3 0f <73> 10 49 69 c7 d0 00 00 00 4c 8d b8 c0 73 b2 90 eb 24 48 c7 c0 80
RSP: 0018:ffffc900035777c0 EFLAGS: 00000057
RAX: 0000000000000001 RBX: ffff88802ce41e00 RCX: ffffffff8168e064
RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffffffff911bf530
RBP: 0000000000000003 R08: ffffffff911bf537 R09: 1ffffffff2237ea6
R10: dffffc0000000000 R11: fffffbfff2237ea7 R12: 0000000000000008
R13: dffffc0000000000 R14: ffff88802ce428e0 R15: 00000000000001ad
FS: 00007f66a95aa6c0(0000) GS:ffff8880b8e00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000020000006b000 CR3: 000000007b388000 CR4: 00000000003506f0
Call Trace:
mark_usage kernel/locking/lockdep.c:4579 [inline]
__lock_acquire+0x111e/0x7d40 kernel/locking/lockdep.c:5091
lock_acquire+0x19e/0x420 kernel/locking/lockdep.c:5754
__might_fault+0xc6/0x120 mm/memory.c:5968
__clear_user arch/x86/include/asm/uaccess_64.h:167 [inline]
clear_user arch/x86/include/asm/uaccess_64.h:191 [inline]
copy_siginfo_to_user+0x5b/0xa0 kernel/signal.c:3374
x64_setup_rt_frame+0x746/0xc40 arch/x86/kernel/signal_64.c:194
setup_rt_frame arch/x86/kernel/signal.c:223 [inline]
handle_signal arch/x86/kernel/signal.c:267 [inline]
arch_do_signal_or_restart+0x42c/0x800 arch/x86/kernel/signal.c:312
exit_to_user_mode_loop+0x70/0x110 kernel/entry/common.c:174
exit_to_user_mode_prepare+0xee/0x180 kernel/entry/common.c:210
__syscall_exit_to_user_mode_work kernel/entry/common.c:291 [inline]
syscall_exit_to_user_mode+0x1a/0x50 kernel/entry/common.c:302
do_syscall_64+0x61/0xa0 arch/x86/entry/common.c:82
entry_SYSCALL_64_after_hwframe+0x68/0xd2
RIP: 0033:0x7f66a879aeb9
Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f66a95aa0e8 EFLAGS: 00000246
RAX: 0000000000000000 RBX: 00007f66a8a15fa8 RCX: 00007f66a879aeb9
RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f66a8a15fac
RBP: 00007f66a8a15fa0 R08: 0000000000745d1e R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007f66a8a16038 R14: 00007ffccd89a260 R15: 00007ffccd89a348