rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: rcu: Tasks blocked on level-0 rcu_node (CPUs 0-1): P24700/1:b..l rcu: (detected by 0, t=10505 jiffies, g=152289, q=982 ncpus=2) task:syz-executor.2 state:R running task stack:27168 pid:24700 ppid:5070 flags:0x00000006 Call Trace: context_switch kernel/sched/core.c:5381 [inline] __schedule+0xee1/0x59f0 kernel/sched/core.c:6710 preempt_schedule_irq+0x52/0x90 kernel/sched/core.c:7022 irqentry_exit+0x35/0x80 kernel/entry/common.c:433 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:645 RIP: 0010:lock_acquire+0x1ef/0x510 kernel/locking/lockdep.c:5729 Code: c1 05 55 ff 9a 7e 83 f8 01 0f 85 b0 02 00 00 9c 58 f6 c4 02 0f 85 9b 02 00 00 48 85 ed 74 01 fb 48 b8 00 00 00 00 00 fc ff df <48> 01 c3 48 c7 03 00 00 00 00 48 c7 43 08 00 00 00 00 48 8b 84 24 RSP: 0018:ffffc900157d7bb8 EFLAGS: 00000206 RAX: dffffc0000000000 RBX: 1ffff92002afaf79 RCX: 0000000000000001 RDX: 1ffff11004538158 RSI: ffffffff8a6c7b80 RDI: ffffffff8ac808e0 RBP: 0000000000000200 R08: 0000000000000000 R09: fffffbfff23095d0 R10: ffffffff9184ae87 R11: 0000000000000000 R12: 0000000000000000 R13: 0000000000000000 R14: ffffffff8c9a6580 R15: 0000000000000000 rcu_lock_acquire include/linux/rcupdate.h:303 [inline] rcu_read_lock include/linux/rcupdate.h:749 [inline] get_obj_cgroup_from_current+0xd6/0x270 mm/memcontrol.c:3029 memcg_slab_pre_alloc_hook mm/slab.h:487 [inline] slab_pre_alloc_hook mm/slab.h:714 [inline] slab_alloc_node mm/slub.c:3452 [inline] slab_alloc mm/slub.c:3478 [inline] __kmem_cache_alloc_lru mm/slub.c:3485 [inline] kmem_cache_alloc+0x8e/0x3b0 mm/slub.c:3494 kmem_cache_zalloc include/linux/slab.h:693 [inline] alloc_empty_file+0x73/0x1d0 fs/file_table.c:206 alloc_file+0x5e/0x7f0 fs/file_table.c:293 alloc_file_pseudo+0x174/0x240 fs/file_table.c:336 sock_alloc_file+0x50/0x1d0 net/socket.c:466 sock_map_fd net/socket.c:491 [inline] __sys_socket+0x1b0/0x250 net/socket.c:1660 __do_sys_socket net/socket.c:1665 [inline] __se_sys_socket net/socket.c:1663 [inline] __x64_sys_socket+0x72/0xb0 net/socket.c:1663 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x38/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcd RIP: 0033:0x7f68a1e7e867 RSP: 002b:00007f68a2bdd038 EFLAGS: 00000286 ORIG_RAX: 0000000000000029 RAX: ffffffffffffffda RBX: 00007f68a1f9c120 RCX: 00007f68a1e7e867 RDX: 0000000000000010 RSI: 0000000000000003 RDI: 0000000000000010 RBP: 00000000ffffffff R08: 0000000000000000 R09: 0000000000000000 R10: 0000000020007580 R11: 0000000000000286 R12: 0000000000000000 R13: 000000000000000b R14: 00007f68a1f9c120 R15: 00007ffe5d65a078 rcu: rcu_preempt kthread starved for 9672 jiffies! g152289 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=0 rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. rcu: RCU grace-period kthread stack dump: task:rcu_preempt state:R running task stack:28672 pid:16 ppid:2 flags:0x00004000 Call Trace: context_switch kernel/sched/core.c:5381 [inline] __schedule+0xee1/0x59f0 kernel/sched/core.c:6710 schedule+0xe7/0x1b0 kernel/sched/core.c:6786 schedule_timeout+0x157/0x2c0 kernel/time/timer.c:2167 rcu_gp_fqs_loop+0x1ec/0xa50 kernel/rcu/tree.c:1609 rcu_gp_kthread+0x249/0x380 kernel/rcu/tree.c:1808 kthread+0x33a/0x430 kernel/kthread.c:389 ret_from_fork+0x2c/0x70 arch/x86/kernel/process.c:145 ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:296 RIP: 0000:0x0 Code: Unable to access opcode bytes at 0xffffffffffffffd6. RSP: 0000:0000000000000000 EFLAGS: 00000000 ORIG_RAX: 0000000000000000 RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 rcu: Stack dump where RCU GP kthread last ran: CPU: 0 PID: 47 Comm: kworker/u4:3 Not tainted 6.5.0-rc3-syzkaller-00191-g0756384fb1bd #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 Workqueue: events_unbound toggle_allocation_gate RIP: 0010:csd_lock_wait kernel/smp.c:296 [inline] RIP: 0010:smp_call_function_many_cond+0x4d6/0x1570 kernel/smp.c:835 Code: 0b 00 85 ed 74 4d 48 b8 00 00 00 00 00 fc ff df 4d 89 fc 4c 89 fd 49 c1 ec 03 83 e5 07 49 01 c4 83 c5 03 e8 1c 5f 0b 00 f3 90 <41> 0f b6 04 24 40 38 c5 7c 08 84 c0 0f 85 3c 0e 00 00 8b 43 08 31 RSP: 0018:ffffc90000b87938 EFLAGS: 00000293 RAX: 0000000000000000 RBX: ffff8880b9943020 RCX: 0000000000000000 RDX: ffff888016685940 RSI: ffffffff817b1234 RDI: 0000000000000005 RBP: 0000000000000003 R08: 0000000000000005 R09: 0000000000000000 R10: 0000000000000001 R11: 0000000000000000 R12: ffffed1017328605 R13: 0000000000000001 R14: ffff8880b983d580 R15: ffff8880b9943028 FS: 0000000000000000(0000) GS:ffff8880b9800000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffffffffffffd6 CR3: 000000000c776000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: on_each_cpu_cond_mask+0x40/0x90 kernel/smp.c:1003 on_each_cpu include/linux/smp.h:71 [inline] text_poke_sync arch/x86/kernel/alternative.c:2001 [inline] text_poke_bp_batch+0x250/0x780 arch/x86/kernel/alternative.c:2211 text_poke_flush arch/x86/kernel/alternative.c:2402 [inline] text_poke_flush arch/x86/kernel/alternative.c:2399 [inline] text_poke_finish+0x1a/0x30 arch/x86/kernel/alternative.c:2409 arch_jump_label_transform_apply+0x17/0x30 arch/x86/kernel/jump_label.c:146 jump_label_update+0x32e/0x410 kernel/jump_label.c:829 static_key_enable_cpuslocked+0x1b5/0x270 kernel/jump_label.c:205 static_key_enable+0x1a/0x20 kernel/jump_label.c:218 toggle_allocation_gate mm/kfence/core.c:831 [inline] toggle_allocation_gate+0xf4/0x250 mm/kfence/core.c:823 process_one_work+0xaa2/0x16f0 kernel/workqueue.c:2597 worker_thread+0x687/0x1110 kernel/workqueue.c:2748 kthread+0x33a/0x430 kernel/kthread.c:389 ret_from_fork+0x2c/0x70 arch/x86/kernel/process.c:145 ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:296 RIP: 0000:0x0 Code: Unable to access opcode bytes at 0xffffffffffffffd6. RSP: 0000:0000000000000000 EFLAGS: 00000000 ORIG_RAX: 0000000000000000 RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000