rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: rcu: 1-...!: (1 GPs behind) idle=b5fc/1/0x4000000000000000 softirq=65329/65332 fqs=15 rcu: (detected by 0, t=10505 jiffies, g=89273, q=1217 ncpus=2) Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 PID: 16737 Comm: kworker/u4:4 Not tainted 6.5.0-rc1-next-20230713-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 Workqueue: bat_events batadv_nc_worker RIP: 0010:bytes_is_nonzero mm/kasan/generic.c:85 [inline] RIP: 0010:memory_is_nonzero mm/kasan/generic.c:102 [inline] RIP: 0010:memory_is_poisoned_n mm/kasan/generic.c:127 [inline] RIP: 0010:memory_is_poisoned mm/kasan/generic.c:159 [inline] RIP: 0010:check_region_inline mm/kasan/generic.c:178 [inline] RIP: 0010:kasan_check_range+0x10d/0x190 mm/kasan/generic.c:187 Code: 00 00 7c 0b 44 89 c2 e8 e1 ee ff ff 83 f0 01 5b 5d 41 5c c3 48 85 d2 74 4f 48 01 ea eb 09 48 83 c0 01 48 39 d0 74 41 80 38 00 <74> f2 eb b6 41 bc 08 00 00 00 45 29 dc 49 8d 14 2c eb 0c 48 83 c0 RSP: 0000:ffffc900001dfd40 EFLAGS: 00000046 RAX: fffffbfff230add1 RBX: fffffbfff230add2 RCX: ffffffff81670d25 RDX: fffffbfff230add2 RSI: 0000000000000008 RDI: ffffffff91856e88 RBP: fffffbfff230add1 R08: 0000000000000000 R09: fffffbfff230add1 R10: ffffffff91856e8f R11: 000000000000004e R12: 0000000000000010 R13: 0000000000000004 R14: 1ffff9200003bfb4 R15: ffff8880310a64c8 FS: 0000000000000000(0000) GS:ffff8880b9900000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f3c70c79b53 CR3: 0000000035d4e000 CR4: 00000000003506e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: instrument_atomic_read include/linux/instrumented.h:68 [inline] _test_bit include/asm-generic/bitops/instrumented-non-atomic.h:141 [inline] hlock_class kernel/locking/lockdep.c:228 [inline] mark_lock+0x105/0x1950 kernel/locking/lockdep.c:4663 mark_usage kernel/locking/lockdep.c:4574 [inline] __lock_acquire+0x165c/0x5de0 kernel/locking/lockdep.c:5098 lock_acquire kernel/locking/lockdep.c:5761 [inline] lock_acquire+0x1ae/0x510 kernel/locking/lockdep.c:5726 __raw_spin_lock_irq include/linux/spinlock_api_smp.h:119 [inline] _raw_spin_lock_irq+0x36/0x50 kernel/locking/spinlock.c:170 __run_hrtimer kernel/time/hrtimer.c:1692 [inline] __hrtimer_run_queues+0x2bd/0xc10 kernel/time/hrtimer.c:1752 hrtimer_interrupt+0x31b/0x800 kernel/time/hrtimer.c:1814 local_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1098 [inline] __sysvec_apic_timer_interrupt+0x14a/0x430 arch/x86/kernel/apic/apic.c:1115 sysvec_apic_timer_interrupt+0x42/0xc0 arch/x86/kernel/apic/apic.c:1109 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:645 RIP: 0010:____nf_conntrack_find net/netfilter/nf_conntrack_core.c:747 [inline] RIP: 0010:__nf_conntrack_find_get+0x17d/0xcc0 net/netfilter/nf_conntrack_core.c:780 Code: f9 41 39 dd 0f 85 33 ff ff ff e8 2e 29 1c f9 49 0f af ef 48 89 eb 48 c1 eb 20 49 8d 2c dc 48 89 e8 48 c1 e8 03 42 80 3c 30 00 <0f> 85 f2 0a 00 00 4c 8b 6d 00 31 ff 44 89 ed 83 e5 01 89 ee e8 6a RSP: 0000:ffffc900001e03c0 EFLAGS: 00000246 RAX: 1ffff110036be2ae RBX: 000000000003e2ae RCX: 0000000000000100 RDX: ffff8880310a5940 RSI: ffffffff886a6cd2 RDI: 0000000000000004 RBP: ffff88801b5f1570 R08: 0000000000000004 R09: 0000000000000000 R10: 0000000000000000 R11: 7f3d000045000801 R12: ffff88801b400000 R13: 0000000000000000 R14: dffffc0000000000 R15: 00000000f8ab9eb7 resolve_normal_ct net/netfilter/nf_conntrack_core.c:1832 [inline] nf_conntrack_in+0x5e4/0x1850 net/netfilter/nf_conntrack_core.c:1996 nf_hook_entry_hookfn include/linux/netfilter.h:143 [inline] nf_hook_slow+0xbf/0x1e0 net/netfilter/core.c:626 nf_hook_slow_list+0x1a7/0x3f0 net/netfilter/core.c:665 NF_HOOK_LIST.constprop.0+0x19c/0x380 include/linux/netfilter.h:339 ip_sublist_rcv net/ipv4/ip_input.c:636 [inline] ip_list_rcv+0x326/0x440 net/ipv4/ip_input.c:673 __netif_receive_skb_list_ptype net/core/dev.c:5495 [inline] __netif_receive_skb_list_core+0x52c/0x8a0 net/core/dev.c:5543 __netif_receive_skb_list net/core/dev.c:5595 [inline] netif_receive_skb_list_internal+0x76b/0xe00 net/core/dev.c:5686 gro_normal_list include/net/gro.h:439 [inline] gro_normal_list include/net/gro.h:435 [inline] napi_complete_done+0x23f/0x990 net/core/dev.c:6026 virtqueue_napi_complete drivers/net/virtio_net.c:415 [inline] virtnet_poll+0x1025/0x1700 drivers/net/virtio_net.c:2072 __napi_poll.constprop.0+0xb4/0x530 net/core/dev.c:6456 napi_poll net/core/dev.c:6523 [inline] net_rx_action+0x956/0xe90 net/core/dev.c:6656 __do_softirq+0x218/0x965 kernel/softirq.c:553 do_softirq kernel/softirq.c:454 [inline] do_softirq+0xaa/0xe0 kernel/softirq.c:441 __local_bh_enable_ip+0xf8/0x120 kernel/softirq.c:381 spin_unlock_bh include/linux/spinlock.h:396 [inline] batadv_nc_purge_paths+0x1ce/0x3c0 net/batman-adv/network-coding.c:471 batadv_nc_worker+0x9bd/0x10f0 net/batman-adv/network-coding.c:722 process_one_work+0xaa2/0x16f0 kernel/workqueue.c:2600 worker_thread+0x687/0x1110 kernel/workqueue.c:2751 kthread+0x33a/0x430 kernel/kthread.c:389 ret_from_fork+0x2c/0x70 arch/x86/kernel/process.c:145 ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:296 RIP: 0000:0x0 Code: Unable to access opcode bytes at 0xffffffffffffffd6. RSP: 0000:0000000000000000 EFLAGS: 00000000 ORIG_RAX: 0000000000000000 RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 rcu: rcu_preempt kthread starved for 10430 jiffies! g89273 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=0 rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. rcu: RCU grace-period kthread stack dump: task:rcu_preempt state:R running task stack:28288 pid:16 ppid:2 flags:0x00004000 Call Trace: context_switch kernel/sched/core.c:5380 [inline] __schedule+0xee1/0x59f0 kernel/sched/core.c:6709 schedule+0xe7/0x1b0 kernel/sched/core.c:6785 schedule_timeout+0x157/0x2c0 kernel/time/timer.c:2167 rcu_gp_fqs_loop+0x1ec/0xa50 kernel/rcu/tree.c:1613 rcu_gp_kthread+0x249/0x380 kernel/rcu/tree.c:1812 kthread+0x33a/0x430 kernel/kthread.c:389 ret_from_fork+0x2c/0x70 arch/x86/kernel/process.c:145 ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:296 RIP: 0000:0x0 Code: Unable to access opcode bytes at 0xffffffffffffffd6. RSP: 0000:0000000000000000 EFLAGS: 00000000 ORIG_RAX: 0000000000000000 RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 rcu: Stack dump where RCU GP kthread last ran: CPU: 0 PID: 18290 Comm: syz-executor.4 Not tainted 6.5.0-rc1-next-20230713-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 RIP: 0010:csd_lock_wait kernel/smp.c:300 [inline] RIP: 0010:smp_call_function_many_cond+0x4d6/0x1570 kernel/smp.c:844 Code: 0b 00 85 ed 74 4d 48 b8 00 00 00 00 00 fc ff df 4d 89 fc 4c 89 fd 49 c1 ec 03 83 e5 07 49 01 c4 83 c5 03 e8 ec 64 0b 00 f3 90 <41> 0f b6 04 24 40 38 c5 7c 08 84 c0 0f 85 3c 0e 00 00 8b 43 08 31 RSP: 0018:ffffc90005d1f818 EFLAGS: 00000293 RAX: 0000000000000000 RBX: ffff8880b99417c0 RCX: 0000000000000000 RDX: ffff88807a4c3b80 RSI: ffffffff817b3114 RDI: 0000000000000005 RBP: 0000000000000003 R08: 0000000000000005 R09: 0000000000000000 R10: 0000000000000001 R11: 0000000000094000 R12: ffffed10173282f9 R13: 0000000000000001 R14: ffff8880b983d600 R15: ffff8880b99417c8 FS: 0000000000000000(0000) GS:ffff8880b9800000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffffffffffffd6 CR3: 0000000022383000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: on_each_cpu_cond_mask+0x40/0x90 kernel/smp.c:1012 __flush_tlb_multi arch/x86/include/asm/paravirt.h:87 [inline] flush_tlb_multi arch/x86/mm/tlb.c:943 [inline] flush_tlb_mm_range+0x356/0x530 arch/x86/mm/tlb.c:1029 tlb_flush arch/x86/include/asm/tlb.h:20 [inline] tlb_flush_mmu_tlbonly include/asm-generic/tlb.h:458 [inline] tlb_flush_mmu_tlbonly include/asm-generic/tlb.h:448 [inline] tlb_flush_mmu mm/mmu_gather.c:298 [inline] tlb_finish_mmu+0x335/0x7e0 mm/mmu_gather.c:391 exit_mmap+0x2db/0x960 mm/mmap.c:3209 __mmput+0x12a/0x4d0 kernel/fork.c:1348 mmput+0x62/0x70 kernel/fork.c:1370 exit_mm kernel/exit.c:567 [inline] do_exit+0x9b4/0x2a20 kernel/exit.c:861 do_group_exit+0xd4/0x2a0 kernel/exit.c:1024 get_signal+0x23d1/0x27b0 kernel/signal.c:2888 arch_do_signal_or_restart+0x89/0x5f0 arch/x86/kernel/signal.c:308 exit_to_user_mode_loop kernel/entry/common.c:168 [inline] exit_to_user_mode_prepare+0x11f/0x240 kernel/entry/common.c:204 __syscall_exit_to_user_mode_work kernel/entry/common.c:286 [inline] syscall_exit_to_user_mode+0x1d/0x50 kernel/entry/common.c:297 do_syscall_64+0x44/0xb0 arch/x86/entry/common.c:86 entry_SYSCALL_64_after_hwframe+0x63/0xcd RIP: 0033:0x7f812187cb29 Code: Unable to access opcode bytes at 0x7f812187caff. RSP: 002b:00007f812250e178 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca RAX: fffffffffffffe00 RBX: 00007f812199c058 RCX: 00007f812187cb29 RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f812199c058 RBP: 00007f812199c050 R08: 00007f812250e6c0 R09: 00007f812250e6c0 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f812199c05c R13: 000000000000006e R14: 00007ffe9a89bb40 R15: 00007ffe9a89bc28