rcu: INFO: rcu_preempt self-detected stall on CPU rcu: 1-...!: (1 ticks this GP) idle=26e/1/0x4000000000000004 softirq=50712/50712 fqs=0 rcu: (t=10675 jiffies g=65633 q=2126) rcu: rcu_preempt kthread starved for 10675 jiffies! g65633 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x402 ->cpu=1 rcu: RCU grace-period kthread stack dump: rcu_preempt I29056 10 2 0x80000000 Call Trace: schedule+0x8d/0x1b0 kernel/sched/core.c:3559 schedule_timeout+0x4d1/0xf20 kernel/time/timer.c:1806 rcu_gp_kthread+0xcee/0x2060 kernel/rcu/tree.c:2202 kthread+0x34a/0x420 kernel/kthread.c:246 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415 NMI backtrace for cpu 1 CPU: 1 PID: 21361 Comm: syz-executor.2 Not tainted 4.19.112-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x188/0x20d lib/dump_stack.c:118 nmi_cpu_backtrace.cold+0x63/0xa2 lib/nmi_backtrace.c:101 nmi_trigger_cpumask_backtrace+0x1a6/0x1eb lib/nmi_backtrace.c:62 trigger_single_cpu_backtrace include/linux/nmi.h:164 [inline] rcu_dump_cpu_stacks+0x170/0x1bb kernel/rcu/tree.c:1340 print_cpu_stall kernel/rcu/tree.c:1478 [inline] check_cpu_stall kernel/rcu/tree.c:1550 [inline] __rcu_pending kernel/rcu/tree.c:3293 [inline] rcu_pending kernel/rcu/tree.c:3336 [inline] rcu_check_callbacks.cold+0x634/0xddc kernel/rcu/tree.c:2682 update_process_times+0x2a/0x70 kernel/time/timer.c:1638 tick_sched_handle+0x9b/0x180 kernel/time/tick-sched.c:168 tick_sched_timer+0x42/0x130 kernel/time/tick-sched.c:1278 __run_hrtimer kernel/time/hrtimer.c:1401 [inline] __hrtimer_run_queues+0x2fc/0xd50 kernel/time/hrtimer.c:1463 hrtimer_interrupt+0x312/0x770 kernel/time/hrtimer.c:1521 local_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1067 [inline] smp_apic_timer_interrupt+0x10c/0x550 arch/x86/kernel/apic/apic.c:1092 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:893 RIP: 0010:__do_softirq+0x230/0x93c kernel/softirq.c:278 Code: c7 c0 98 56 b2 88 48 c1 e8 03 42 80 3c 38 00 0f 85 b9 06 00 00 48 83 3d 75 54 72 01 00 0f 84 ca 05 00 00 fb 66 0f 1f 44 00 00 <48> c7 44 24 08 00 91 a0 88 b8 ff ff ff ff 0f bc 44 24 04 83 c0 01 RSP: 0018:ffff8880ae707f28 EFLAGS: 00000286 ORIG_RAX: ffffffffffffff13 RAX: 1ffffffff1164ad3 RBX: ffff888041aea340 RCX: 1ffff1100835d57c RDX: 0000000000000000 RSI: ffff888041aeabe8 RDI: ffff888041aeabbc RBP: ffff8880498df958 R08: ffff888041aea340 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000027 R13: 0000000000000027 R14: 0000000000000000 R15: dffffc0000000000 invoke_softirq kernel/softirq.c:372 [inline] irq_exit+0x17b/0x1c0 kernel/softirq.c:412 exiting_irq arch/x86/include/asm/apic.h:544 [inline] do_IRQ+0x10c/0x1c0 arch/x86/kernel/irq.c:258 common_interrupt+0xf/0xf arch/x86/entry/entry_64.S:670 RIP: 0010:__sanitizer_cov_trace_pc+0x37/0x50 kernel/kcov.c:106 Code: 65 8b 15 fc 48 9a 7e 81 e2 00 01 1f 00 75 2b 8b 90 d0 12 00 00 83 fa 02 75 20 48 8b 88 d8 12 00 00 8b 80 d4 12 00 00 48 8b 11 <48> 83 c2 01 48 39 d0 76 07 48 89 34 d1 48 89 11 c3 0f 1f 84 00 00 RSP: 0018:ffff8880498dfa08 EFLAGS: 00000246 ORIG_RAX: ffffffffffffffd8 RAX: 0000000000040000 RBX: 0000000000000000 RCX: ffffc90013ed4000 RDX: 000000000003ffff RSI: ffffffff81143439 RDI: 0000000000000005 RBP: ffff8880496102c0 R08: ffff888041aea340 R09: 0000000000000001 R10: ffff8880498dfb60 R11: 00000000e8985a77 R12: 0000000000000000 R13: ffff888049614744 R14: 0000000000000000 R15: ffff8880496102f0 kvm_cpu_has_injectable_intr+0x89/0x1e0 arch/x86/kvm/irq.c:93 vcpu_enter_guest+0x237a/0x5ed0 arch/x86/kvm/x86.c:7708 vcpu_run arch/x86/kvm/x86.c:7913 [inline] kvm_arch_vcpu_ioctl_run+0x446/0x16a0 arch/x86/kvm/x86.c:8113 kvm_vcpu_ioctl+0x493/0xe20 arch/x86/kvm/../../../virt/kvm/kvm_main.c:2667 vfs_ioctl fs/ioctl.c:46 [inline] file_ioctl fs/ioctl.c:501 [inline] do_vfs_ioctl+0xcda/0x12e0 fs/ioctl.c:688 ksys_ioctl+0x9b/0xc0 fs/ioctl.c:705 __do_sys_ioctl fs/ioctl.c:712 [inline] __se_sys_ioctl fs/ioctl.c:710 [inline] __x64_sys_ioctl+0x6f/0xb0 fs/ioctl.c:710 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x45c849 Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007fb015863c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 00007fb0158646d4 RCX: 000000000045c849 RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff R13: 00000000000003be R14: 00000000004c647e R15: 000000000076bf0c kvm_hv_set_msr: 478 callbacks suppressed kvm [21413]: vcpu0, guest rIP: 0x108 Hyper-V uhandled wrmsr: 0x4000007c data 0x0 kvm [21413]: vcpu0, guest rIP: 0x108 Hyper-V uhandled wrmsr: 0x40000050 data 0x0 kvm [21413]: vcpu0, guest rIP: 0x108 Hyper-V uhandled wrmsr: 0x40000024 data 0x0 kvm [21413]: vcpu0, guest rIP: 0x108 Hyper-V uhandled wrmsr: 0x40000074 data 0x0 kvm [21413]: vcpu0, guest rIP: 0x108 Hyper-V uhandled wrmsr: 0x40000048 data 0x0 kvm [21413]: vcpu0, guest rIP: 0x108 Hyper-V uhandled wrmsr: 0x4000001c data 0x0 kvm [21413]: vcpu0, guest rIP: 0x108 Hyper-V uhandled wrmsr: 0x4000006c data 0x0 kvm [21413]: vcpu0, guest rIP: 0x108 Hyper-V uhandled wrmsr: 0x40000040 data 0x0 kvm [21413]: vcpu0, guest rIP: 0x108 Hyper-V uhandled wrmsr: 0x40000014 data 0x0 kvm [21413]: vcpu0, guest rIP: 0x108 Hyper-V uhandled wrmsr: 0x40000064 data 0x0 IPVS: ftp: loaded support on port[0] = 21 chnl_net:caif_netlink_parms(): no params data found batman_adv: batadv0: Interface deactivated: batadv_slave_0 batman_adv: batadv0: Removing interface: batadv_slave_0 batman_adv: batadv0: Interface deactivated: batadv_slave_1 batman_adv: batadv0: Removing interface: batadv_slave_1 device bridge_slave_1 left promiscuous mode bridge0: port 2(bridge_slave_1) entered disabled state device bridge_slave_0 left promiscuous mode bridge0: port 1(bridge_slave_0) entered disabled state device veth1_macvtap left promiscuous mode device veth0_macvtap left promiscuous mode device veth1_vlan left promiscuous mode device veth0_vlan left promiscuous mode device hsr_slave_1 left promiscuous mode device hsr_slave_0 left promiscuous mode team0 (unregistering): Port device team_slave_1 removed team0 (unregistering): Port device team_slave_0 removed bond0 (unregistering): Releasing backup interface bond_slave_1 bond0 (unregistering): Releasing backup interface bond_slave_0 bond0 (unregistering): Released all slaves IPVS: ftp: loaded support on port[0] = 21 bridge0: port 1(bridge_slave_0) entered blocking state bridge0: port 1(bridge_slave_0) entered disabled state device bridge_slave_0 entered promiscuous mode bridge0: port 2(bridge_slave_1) entered blocking state bridge0: port 2(bridge_slave_1) entered disabled state device bridge_slave_1 entered promiscuous mode bond0: Enslaving bond_slave_0 as an active interface with an up link bond0: Enslaving bond_slave_1 as an active interface with an up link IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready team0: Port device team_slave_0 added IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready team0: Port device team_slave_1 added batman_adv: batadv0: Adding interface: batadv_slave_0 batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active batman_adv: batadv0: Adding interface: batadv_slave_1 batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active