rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: rcu: 1-...!: (0 ticks this GP) idle=915c/1/0x4000000000000000 softirq=55167/55168 fqs=8 rcu: (detected by 0, t=10502 jiffies, g=66905, q=149 ncpus=2) Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 PID: 5046 Comm: syz-executor.3 Not tainted 6.5.0-rc5-syzkaller-00243-g9106536c1aa3 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 RIP: 0010:lockdep_enabled kernel/locking/lockdep.c:122 [inline] RIP: 0010:lock_release+0x122/0x680 kernel/locking/lockdep.c:5774 Code: 7e 85 c0 0f 85 ad 02 00 00 65 4c 8b 34 25 80 b9 03 00 49 8d be c4 0a 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <0f> b6 14 02 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 d9 RSP: 0018:ffffc900001e0cb8 EFLAGS: 00000013 RAX: dffffc0000000000 RBX: ffffffff8eabd470 RCX: ffffffff81670ab5 RDX: 1ffff1100505e8c8 RSI: ffffffff8ac81120 RDI: ffff8880282f4644 RBP: 1ffff9200003c199 R08: 0000000000000000 R09: fffffbfff1d573ea R10: ffffffff8eab9f57 R11: 0000000000000000 R12: ffff888042ca1300 R13: ffff88804543b800 R14: ffff8880282f3b80 R15: ffff88804543ac00 FS: 0000555555bc7480(0000) GS:ffff8880b9900000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00000000015ab1e8 CR3: 000000004c4e4000 CR4: 0000000000350ee0 Call Trace: __raw_spin_unlock include/linux/spinlock_api_smp.h:141 [inline] _raw_spin_unlock+0x16/0x40 kernel/locking/spinlock.c:186 spin_unlock include/linux/spinlock.h:391 [inline] advance_sched+0x60e/0xc60 net/sched/sch_taprio.c:992 __run_hrtimer kernel/time/hrtimer.c:1688 [inline] __hrtimer_run_queues+0x203/0xc10 kernel/time/hrtimer.c:1752 hrtimer_interrupt+0x31b/0x800 kernel/time/hrtimer.c:1814 local_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1098 [inline] __sysvec_apic_timer_interrupt+0x14a/0x430 arch/x86/kernel/apic/apic.c:1115 sysvec_apic_timer_interrupt+0x8e/0xc0 arch/x86/kernel/apic/apic.c:1109 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:645 RIP: 0010:__sanitizer_cov_trace_pc+0x3b/0x70 kernel/kcov.c:207 Code: 81 e1 00 01 00 00 65 48 8b 14 25 80 b9 03 00 a9 00 01 ff 00 74 0e 85 c9 74 35 8b 82 04 16 00 00 85 c0 74 2b 8b 82 e0 15 00 00 <83> f8 02 75 20 48 8b 8a e8 15 00 00 8b 92 e4 15 00 00 48 8b 01 48 RSP: 0018:ffffc90003acf798 EFLAGS: 00000246 RAX: 0000000000000000 RBX: 0000000000000033 RCX: 0000000000000000 RDX: ffff8880282f3b80 RSI: ffffffff8a25046c RDI: 0000000000000001 RBP: ffff88801970fd28 R08: 0000000000000001 R09: 0000000000000000 R10: 000000000000006c R11: 0000000000094000 R12: 000000000000006c R13: 0000000000000000 R14: ffff88801970fd00 R15: 0000000000000027 string_nocheck lib/vsprintf.c:647 [inline] string+0x13c/0x3d0 lib/vsprintf.c:726 vsnprintf+0xc5f/0x1870 lib/vsprintf.c:2817 tomoyo_supervisor+0x117/0xea0 security/tomoyo/common.c:2060 tomoyo_audit_path_log security/tomoyo/file.c:168 [inline] tomoyo_path_permission security/tomoyo/file.c:587 [inline] tomoyo_path_permission+0x270/0x3b0 security/tomoyo/file.c:573 tomoyo_path_perm+0x361/0x450 security/tomoyo/file.c:838 tomoyo_path_unlink+0x92/0xd0 security/tomoyo/tomoyo.c:161 security_path_unlink+0xf9/0x160 security/security.c:1728 do_unlinkat+0x375/0x6d0 fs/namei.c:4392 __do_sys_unlink fs/namei.c:4443 [inline] __se_sys_unlink fs/namei.c:4441 [inline] __x64_sys_unlink+0xc8/0x110 fs/namei.c:4441 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x38/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcd RIP: 0033:0x7f8c2947c297 Code: 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 57 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007ffef3ec72e8 EFLAGS: 00000206 ORIG_RAX: 0000000000000057 RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f8c2947c297 RDX: 00007ffef3ec7310 RSI: 00007ffef3ec73a0 RDI: 00007ffef3ec73a0 RBP: 00007ffef3ec73a0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000100 R11: 0000000000000206 R12: 00007ffef3ec8460 R13: 00007f8c294c73b9 R14: 00000000000e81b0 R15: 0000000000000014 rcu: rcu_preempt kthread starved for 10486 jiffies! g66905 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=0 rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. rcu: RCU grace-period kthread stack dump: task:rcu_preempt state:R running task stack:28192 pid:16 ppid:2 flags:0x00004000 Call Trace: context_switch kernel/sched/core.c:5381 [inline] __schedule+0xee1/0x59f0 kernel/sched/core.c:6710 schedule+0xe7/0x1b0 kernel/sched/core.c:6786 schedule_timeout+0x157/0x2c0 kernel/time/timer.c:2167 rcu_gp_fqs_loop+0x1ec/0xa50 kernel/rcu/tree.c:1609 rcu_gp_kthread+0x249/0x380 kernel/rcu/tree.c:1808 kthread+0x33a/0x430 kernel/kthread.c:389 ret_from_fork+0x2c/0x70 arch/x86/kernel/process.c:145 ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:304 rcu: Stack dump where RCU GP kthread last ran: CPU: 0 PID: 17655 Comm: syz-executor.0 Not tainted 6.5.0-rc5-syzkaller-00243-g9106536c1aa3 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 RIP: 0010:csd_lock_wait kernel/smp.c:296 [inline] RIP: 0010:smp_call_function_many_cond+0x4db/0x1570 kernel/smp.c:835 Code: 4d 48 b8 00 00 00 00 00 fc ff df 4d 89 fc 4c 89 fd 49 c1 ec 03 83 e5 07 49 01 c4 83 c5 03 e8 1c 5f 0b 00 f3 90 41 0f b6 04 24 <40> 38 c5 7c 08 84 c0 0f 85 3c 0e 00 00 8b 43 08 31 ff 83 e0 01 41 RSP: 0018:ffffc90006c5f9c0 EFLAGS: 00000293 RAX: 0000000000000000 RBX: ffff8880b9943020 RCX: 0000000000000000 RDX: ffff888026998000 RSI: ffffffff817aa984 RDI: 0000000000000005 RBP: 0000000000000003 R08: 0000000000000005 R09: 0000000000000000 R10: 0000000000000001 R11: 0000000000000000 R12: ffffed1017328605 R13: 0000000000000001 R14: ffff8880b983d580 R15: ffff8880b9943028 FS: 0000555556817480(0000) GS:ffff8880b9800000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000001b32f24000 CR3: 0000000017af1000 CR4: 0000000000350ef0 Call Trace: on_each_cpu_cond_mask+0x40/0x90 kernel/smp.c:1003 on_each_cpu include/linux/smp.h:71 [inline] text_poke_sync arch/x86/kernel/alternative.c:2001 [inline] text_poke_bp_batch+0x250/0x780 arch/x86/kernel/alternative.c:2211 text_poke_flush arch/x86/kernel/alternative.c:2402 [inline] text_poke_flush arch/x86/kernel/alternative.c:2399 [inline] text_poke_finish+0x1a/0x30 arch/x86/kernel/alternative.c:2409 arch_jump_label_transform_apply+0x17/0x30 arch/x86/kernel/jump_label.c:146 jump_label_update+0x32e/0x410 kernel/jump_label.c:829 static_key_disable_cpuslocked+0x154/0x1b0 kernel/jump_label.c:235 static_key_disable+0x1a/0x20 kernel/jump_label.c:243 tracepoint_remove_func kernel/tracepoint.c:417 [inline] tracepoint_probe_unregister+0x4a1/0xd20 kernel/tracepoint.c:551 bpf_raw_tp_link_release+0x55/0xa0 kernel/bpf/syscall.c:3275 bpf_link_free+0xe4/0x1b0 kernel/bpf/syscall.c:2840 bpf_link_put_direct kernel/bpf/syscall.c:2871 [inline] bpf_link_release+0x63/0x80 kernel/bpf/syscall.c:2878 __fput+0x3f7/0xac0 fs/file_table.c:384 task_work_run+0x14d/0x240 kernel/task_work.c:179 resume_user_mode_work include/linux/resume_user_mode.h:49 [inline] exit_to_user_mode_loop kernel/entry/common.c:171 [inline] exit_to_user_mode_prepare+0x210/0x240 kernel/entry/common.c:204 __syscall_exit_to_user_mode_work kernel/entry/common.c:286 [inline] syscall_exit_to_user_mode+0x1d/0x50 kernel/entry/common.c:297 do_syscall_64+0x44/0xb0 arch/x86/entry/common.c:86 entry_SYSCALL_64_after_hwframe+0x63/0xcd RIP: 0033:0x7f5ca727b9da Code: 48 3d 00 f0 ff ff 77 48 c3 0f 1f 80 00 00 00 00 48 83 ec 18 89 7c 24 0c e8 03 7f 02 00 8b 7c 24 0c 89 c2 b8 03 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 36 89 d7 89 44 24 0c e8 63 7f 02 00 8b 44 24 RSP: 002b:00007fffe60ef9a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 RAX: 0000000000000000 RBX: 0000000000000006 RCX: 00007f5ca727b9da RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000005 RBP: 0000000000000032 R08: 0000001b33320000 R09: 0000000000000705 R10: 00000000819fe4eb R11: 0000000000000293 R12: 00007f5ca6e009b8 R13: ffffffffffffffff R14: 00007f5ca6e00000 R15: 00000000000e81c1