rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: rcu: (detected by 1, t=10502 jiffies, g=125521, q=180 ncpus=2) rcu: All QSes seen, last rcu_preempt kthread activity 10502 (4295124028-4295113526), jiffies_till_next_fqs=1, root ->qsmask 0x0 rcu: rcu_preempt kthread starved for 10502 jiffies! g125521 f0x2 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=0 rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. rcu: RCU grace-period kthread stack dump: task:rcu_preempt state:R running task stack:25976 pid:17 tgid:17 ppid:2 flags:0x00004000 Call Trace: context_switch kernel/sched/core.c:5369 [inline] __schedule+0x1850/0x4c30 kernel/sched/core.c:6756 __schedule_loop kernel/sched/core.c:6833 [inline] schedule+0x14b/0x320 kernel/sched/core.c:6848 schedule_timeout+0x15a/0x290 kernel/time/sleep_timeout.c:99 rcu_gp_fqs_loop+0x2df/0x1330 kernel/rcu/tree.c:2045 rcu_gp_kthread+0xa7/0x3b0 kernel/rcu/tree.c:2247 kthread+0x2f2/0x390 kernel/kthread.c:389 ret_from_fork+0x4d/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 rcu: Stack dump where RCU GP kthread last ran: Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 28219 Comm: syz.0.5595 Not tainted 6.13.0-rc4-syzkaller-00078-g059dd502b263 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 RIP: 0010:__lock_is_held kernel/locking/lockdep.c:5591 [inline] RIP: 0010:lock_is_held_type+0xdb/0x190 kernel/locking/lockdep.c:5921 Code: 63 85 d8 0a 00 00 48 83 c3 28 48 39 c5 7c d8 eb 11 48 c7 c7 40 4d 80 8e 48 89 ee e8 0f 0e 32 f9 eb cb 31 db eb 1e 41 83 fe ff <74> 13 31 c0 f6 43 22 03 0f 95 c0 31 db 44 39 f0 0f 94 c3 eb 05 bb RSP: 0018:ffffc90000007c28 EFLAGS: 00000046 RAX: 0000000000000001 RBX: ffff88807937a8e0 RCX: ffff888079379e00 RDX: ffff888079379e00 RSI: ffff888047ecc300 RDI: ffff88807937a8e0 RBP: 0000000000000000 R08: ffffffff89cdac71 R09: fffff52000000f7c R10: dffffc0000000000 R11: fffff52000000f7c R12: 0000000000000046 R13: ffff888079379e00 R14: 00000000ffffffff R15: ffff888047ecc300 FS: 0000000000000000(0000) GS:ffff8880b8600000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000000 CR3: 000000002e55c000 CR4: 0000000000350ef0 Call Trace: lock_is_held include/linux/lockdep.h:249 [inline] advance_sched+0x148/0xca0 net/sched/sch_taprio.c:927 __run_hrtimer kernel/time/hrtimer.c:1739 [inline] __hrtimer_run_queues+0x59d/0xd30 kernel/time/hrtimer.c:1803 hrtimer_interrupt+0x403/0xa40 kernel/time/hrtimer.c:1865 local_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1038 [inline] __sysvec_apic_timer_interrupt+0x112/0x420 arch/x86/kernel/apic/apic.c:1055 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1049 [inline] sysvec_apic_timer_interrupt+0xa1/0xc0 arch/x86/kernel/apic/apic.c:1049 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702 RIP: 0010:__raw_write_unlock_irq include/linux/rwlock_api_smp.h:274 [inline] RIP: 0010:_raw_write_unlock_irq+0x29/0x50 kernel/locking/spinlock.c:358 Code: 90 f3 0f 1e fa 53 48 89 fb 48 83 c7 18 48 8b 74 24 08 e8 aa 5d af f5 48 89 df e8 22 b7 b0 f5 e8 bd b5 db f5 fb bf 01 00 00 00 f2 09 a2 f5 65 8b 05 53 5d 38 74 85 c0 74 06 5b e9 4c c8 24 00 RSP: 0018:ffffc90003047930 EFLAGS: 00000286 RAX: f2add259b8007100 RBX: ffffffff8e60b040 RCX: ffffffff9a3ab903 RDX: dffffc0000000000 RSI: ffffffff8c0a98e0 RDI: 0000000000000001 RBP: ffffc90003047ab0 R08: ffffffff90197db7 R09: 1ffffffff2032fb6 R10: dffffc0000000000 R11: fffffbfff2032fb7 R12: ffff88802cd84278 R13: dffffc0000000000 R14: ffff88802cd83c00 R15: ffff888079379e00 release_task+0x1681/0x1830 kernel/exit.c:278 exit_notify kernel/exit.c:775 [inline] do_exit+0x1afc/0x28e0 kernel/exit.c:958 do_group_exit+0x207/0x2c0 kernel/exit.c:1087 get_signal+0x16b2/0x1750 kernel/signal.c:3017 arch_do_signal_or_restart+0x96/0x860 arch/x86/kernel/signal.c:337 exit_to_user_mode_loop kernel/entry/common.c:111 [inline] exit_to_user_mode_prepare include/linux/entry-common.h:329 [inline] __syscall_exit_to_user_mode_work kernel/entry/common.c:207 [inline] syscall_exit_to_user_mode+0xce/0x340 kernel/entry/common.c:218 do_syscall_64+0x100/0x230 arch/x86/entry/common.c:89 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f4faaf85d29 Code: Unable to access opcode bytes at 0x7f4faaf85cff. RSP: 002b:00007f4fabe610e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca RAX: fffffffffffffe00 RBX: 00007f4fab175fa8 RCX: 00007f4faaf85d29 RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f4fab175fa8 RBP: 00007f4fab175fa0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4fab175fac R13: 0000000000000000 R14: 00007fff89980680 R15: 00007fff89980768