rcu: INFO: rcu_preempt detected stalls on CPUs/tasks:
rcu: Tasks blocked on level-0 rcu_node (CPUs 0-1): P24700/1:b..l
rcu: (detected by 0, t=10505 jiffies, g=152289, q=982 ncpus=2)
task:syz-executor.2 state:R running task stack:27168 pid:24700 ppid:5070 flags:0x00000006
Call Trace:
context_switch kernel/sched/core.c:5381 [inline]
__schedule+0xee1/0x59f0 kernel/sched/core.c:6710
preempt_schedule_irq+0x52/0x90 kernel/sched/core.c:7022
irqentry_exit+0x35/0x80 kernel/entry/common.c:433
asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:645
RIP: 0010:lock_acquire+0x1ef/0x510 kernel/locking/lockdep.c:5729
Code: c1 05 55 ff 9a 7e 83 f8 01 0f 85 b0 02 00 00 9c 58 f6 c4 02 0f 85 9b 02 00 00 48 85 ed 74 01 fb 48 b8 00 00 00 00 00 fc ff df <48> 01 c3 48 c7 03 00 00 00 00 48 c7 43 08 00 00 00 00 48 8b 84 24
RSP: 0018:ffffc900157d7bb8 EFLAGS: 00000206
RAX: dffffc0000000000 RBX: 1ffff92002afaf79 RCX: 0000000000000001
RDX: 1ffff11004538158 RSI: ffffffff8a6c7b80 RDI: ffffffff8ac808e0
RBP: 0000000000000200 R08: 0000000000000000 R09: fffffbfff23095d0
R10: ffffffff9184ae87 R11: 0000000000000000 R12: 0000000000000000
R13: 0000000000000000 R14: ffffffff8c9a6580 R15: 0000000000000000
rcu_lock_acquire include/linux/rcupdate.h:303 [inline]
rcu_read_lock include/linux/rcupdate.h:749 [inline]
get_obj_cgroup_from_current+0xd6/0x270 mm/memcontrol.c:3029
memcg_slab_pre_alloc_hook mm/slab.h:487 [inline]
slab_pre_alloc_hook mm/slab.h:714 [inline]
slab_alloc_node mm/slub.c:3452 [inline]
slab_alloc mm/slub.c:3478 [inline]
__kmem_cache_alloc_lru mm/slub.c:3485 [inline]
kmem_cache_alloc+0x8e/0x3b0 mm/slub.c:3494
kmem_cache_zalloc include/linux/slab.h:693 [inline]
alloc_empty_file+0x73/0x1d0 fs/file_table.c:206
alloc_file+0x5e/0x7f0 fs/file_table.c:293
alloc_file_pseudo+0x174/0x240 fs/file_table.c:336
sock_alloc_file+0x50/0x1d0 net/socket.c:466
sock_map_fd net/socket.c:491 [inline]
__sys_socket+0x1b0/0x250 net/socket.c:1660
__do_sys_socket net/socket.c:1665 [inline]
__se_sys_socket net/socket.c:1663 [inline]
__x64_sys_socket+0x72/0xb0 net/socket.c:1663
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x38/0xb0 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x7f68a1e7e867
RSP: 002b:00007f68a2bdd038 EFLAGS: 00000286 ORIG_RAX: 0000000000000029
RAX: ffffffffffffffda RBX: 00007f68a1f9c120 RCX: 00007f68a1e7e867
RDX: 0000000000000010 RSI: 0000000000000003 RDI: 0000000000000010
RBP: 00000000ffffffff R08: 0000000000000000 R09: 0000000000000000
R10: 0000000020007580 R11: 0000000000000286 R12: 0000000000000000
R13: 000000000000000b R14: 00007f68a1f9c120 R15: 00007ffe5d65a078
rcu: rcu_preempt kthread starved for 9672 jiffies! g152289 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=0
rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior.
rcu: RCU grace-period kthread stack dump:
task:rcu_preempt state:R running task stack:28672 pid:16 ppid:2 flags:0x00004000
Call Trace:
context_switch kernel/sched/core.c:5381 [inline]
__schedule+0xee1/0x59f0 kernel/sched/core.c:6710
schedule+0xe7/0x1b0 kernel/sched/core.c:6786
schedule_timeout+0x157/0x2c0 kernel/time/timer.c:2167
rcu_gp_fqs_loop+0x1ec/0xa50 kernel/rcu/tree.c:1609
rcu_gp_kthread+0x249/0x380 kernel/rcu/tree.c:1808
kthread+0x33a/0x430 kernel/kthread.c:389
ret_from_fork+0x2c/0x70 arch/x86/kernel/process.c:145
ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:296
RIP: 0000:0x0
Code: Unable to access opcode bytes at 0xffffffffffffffd6.
RSP: 0000:0000000000000000 EFLAGS: 00000000 ORIG_RAX: 0000000000000000
RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
rcu: Stack dump where RCU GP kthread last ran:
CPU: 0 PID: 47 Comm: kworker/u4:3 Not tainted 6.5.0-rc3-syzkaller-00191-g0756384fb1bd #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023
Workqueue: events_unbound toggle_allocation_gate
RIP: 0010:csd_lock_wait kernel/smp.c:296 [inline]
RIP: 0010:smp_call_function_many_cond+0x4d6/0x1570 kernel/smp.c:835
Code: 0b 00 85 ed 74 4d 48 b8 00 00 00 00 00 fc ff df 4d 89 fc 4c 89 fd 49 c1 ec 03 83 e5 07 49 01 c4 83 c5 03 e8 1c 5f 0b 00 f3 90 <41> 0f b6 04 24 40 38 c5 7c 08 84 c0 0f 85 3c 0e 00 00 8b 43 08 31
RSP: 0018:ffffc90000b87938 EFLAGS: 00000293
RAX: 0000000000000000 RBX: ffff8880b9943020 RCX: 0000000000000000
RDX: ffff888016685940 RSI: ffffffff817b1234 RDI: 0000000000000005
RBP: 0000000000000003 R08: 0000000000000005 R09: 0000000000000000
R10: 0000000000000001 R11: 0000000000000000 R12: ffffed1017328605
R13: 0000000000000001 R14: ffff8880b983d580 R15: ffff8880b9943028
FS: 0000000000000000(0000) GS:ffff8880b9800000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffffffffffffd6 CR3: 000000000c776000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
on_each_cpu_cond_mask+0x40/0x90 kernel/smp.c:1003
on_each_cpu include/linux/smp.h:71 [inline]
text_poke_sync arch/x86/kernel/alternative.c:2001 [inline]
text_poke_bp_batch+0x250/0x780 arch/x86/kernel/alternative.c:2211
text_poke_flush arch/x86/kernel/alternative.c:2402 [inline]
text_poke_flush arch/x86/kernel/alternative.c:2399 [inline]
text_poke_finish+0x1a/0x30 arch/x86/kernel/alternative.c:2409
arch_jump_label_transform_apply+0x17/0x30 arch/x86/kernel/jump_label.c:146
jump_label_update+0x32e/0x410 kernel/jump_label.c:829
static_key_enable_cpuslocked+0x1b5/0x270 kernel/jump_label.c:205
static_key_enable+0x1a/0x20 kernel/jump_label.c:218
toggle_allocation_gate mm/kfence/core.c:831 [inline]
toggle_allocation_gate+0xf4/0x250 mm/kfence/core.c:823
process_one_work+0xaa2/0x16f0 kernel/workqueue.c:2597
worker_thread+0x687/0x1110 kernel/workqueue.c:2748
kthread+0x33a/0x430 kernel/kthread.c:389
ret_from_fork+0x2c/0x70 arch/x86/kernel/process.c:145
ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:296
RIP: 0000:0x0
Code: Unable to access opcode bytes at 0xffffffffffffffd6.
RSP: 0000:0000000000000000 EFLAGS: 00000000 ORIG_RAX: 0000000000000000
RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000