rcu: INFO: rcu_preempt detected stalls on CPUs/tasks:
rcu: 1-...!: (0 ticks this GP) idle=915c/1/0x4000000000000000 softirq=55167/55168 fqs=8
rcu: (detected by 0, t=10502 jiffies, g=66905, q=149 ncpus=2)
Sending NMI from CPU 0 to CPUs 1:
NMI backtrace for cpu 1
CPU: 1 PID: 5046 Comm: syz-executor.3 Not tainted 6.5.0-rc5-syzkaller-00243-g9106536c1aa3 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023
RIP: 0010:lockdep_enabled kernel/locking/lockdep.c:122 [inline]
RIP: 0010:lock_release+0x122/0x680 kernel/locking/lockdep.c:5774
Code: 7e 85 c0 0f 85 ad 02 00 00 65 4c 8b 34 25 80 b9 03 00 49 8d be c4 0a 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <0f> b6 14 02 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 d9
RSP: 0018:ffffc900001e0cb8 EFLAGS: 00000013
RAX: dffffc0000000000 RBX: ffffffff8eabd470 RCX: ffffffff81670ab5
RDX: 1ffff1100505e8c8 RSI: ffffffff8ac81120 RDI: ffff8880282f4644
RBP: 1ffff9200003c199 R08: 0000000000000000 R09: fffffbfff1d573ea
R10: ffffffff8eab9f57 R11: 0000000000000000 R12: ffff888042ca1300
R13: ffff88804543b800 R14: ffff8880282f3b80 R15: ffff88804543ac00
FS: 0000555555bc7480(0000) GS:ffff8880b9900000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000015ab1e8 CR3: 000000004c4e4000 CR4: 0000000000350ee0
Call Trace:
__raw_spin_unlock include/linux/spinlock_api_smp.h:141 [inline]
_raw_spin_unlock+0x16/0x40 kernel/locking/spinlock.c:186
spin_unlock include/linux/spinlock.h:391 [inline]
advance_sched+0x60e/0xc60 net/sched/sch_taprio.c:992
__run_hrtimer kernel/time/hrtimer.c:1688 [inline]
__hrtimer_run_queues+0x203/0xc10 kernel/time/hrtimer.c:1752
hrtimer_interrupt+0x31b/0x800 kernel/time/hrtimer.c:1814
local_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1098 [inline]
__sysvec_apic_timer_interrupt+0x14a/0x430 arch/x86/kernel/apic/apic.c:1115
sysvec_apic_timer_interrupt+0x8e/0xc0 arch/x86/kernel/apic/apic.c:1109
asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:645
RIP: 0010:__sanitizer_cov_trace_pc+0x3b/0x70 kernel/kcov.c:207
Code: 81 e1 00 01 00 00 65 48 8b 14 25 80 b9 03 00 a9 00 01 ff 00 74 0e 85 c9 74 35 8b 82 04 16 00 00 85 c0 74 2b 8b 82 e0 15 00 00 <83> f8 02 75 20 48 8b 8a e8 15 00 00 8b 92 e4 15 00 00 48 8b 01 48
RSP: 0018:ffffc90003acf798 EFLAGS: 00000246
RAX: 0000000000000000 RBX: 0000000000000033 RCX: 0000000000000000
RDX: ffff8880282f3b80 RSI: ffffffff8a25046c RDI: 0000000000000001
RBP: ffff88801970fd28 R08: 0000000000000001 R09: 0000000000000000
R10: 000000000000006c R11: 0000000000094000 R12: 000000000000006c
R13: 0000000000000000 R14: ffff88801970fd00 R15: 0000000000000027
string_nocheck lib/vsprintf.c:647 [inline]
string+0x13c/0x3d0 lib/vsprintf.c:726
vsnprintf+0xc5f/0x1870 lib/vsprintf.c:2817
tomoyo_supervisor+0x117/0xea0 security/tomoyo/common.c:2060
tomoyo_audit_path_log security/tomoyo/file.c:168 [inline]
tomoyo_path_permission security/tomoyo/file.c:587 [inline]
tomoyo_path_permission+0x270/0x3b0 security/tomoyo/file.c:573
tomoyo_path_perm+0x361/0x450 security/tomoyo/file.c:838
tomoyo_path_unlink+0x92/0xd0 security/tomoyo/tomoyo.c:161
security_path_unlink+0xf9/0x160 security/security.c:1728
do_unlinkat+0x375/0x6d0 fs/namei.c:4392
__do_sys_unlink fs/namei.c:4443 [inline]
__se_sys_unlink fs/namei.c:4441 [inline]
__x64_sys_unlink+0xc8/0x110 fs/namei.c:4441
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x38/0xb0 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x7f8c2947c297
Code: 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 57 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007ffef3ec72e8 EFLAGS: 00000206 ORIG_RAX: 0000000000000057
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f8c2947c297
RDX: 00007ffef3ec7310 RSI: 00007ffef3ec73a0 RDI: 00007ffef3ec73a0
RBP: 00007ffef3ec73a0 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000100 R11: 0000000000000206 R12: 00007ffef3ec8460
R13: 00007f8c294c73b9 R14: 00000000000e81b0 R15: 0000000000000014
rcu: rcu_preempt kthread starved for 10486 jiffies! g66905 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=0
rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior.
rcu: RCU grace-period kthread stack dump:
task:rcu_preempt state:R running task stack:28192 pid:16 ppid:2 flags:0x00004000
Call Trace:
context_switch kernel/sched/core.c:5381 [inline]
__schedule+0xee1/0x59f0 kernel/sched/core.c:6710
schedule+0xe7/0x1b0 kernel/sched/core.c:6786
schedule_timeout+0x157/0x2c0 kernel/time/timer.c:2167
rcu_gp_fqs_loop+0x1ec/0xa50 kernel/rcu/tree.c:1609
rcu_gp_kthread+0x249/0x380 kernel/rcu/tree.c:1808
kthread+0x33a/0x430 kernel/kthread.c:389
ret_from_fork+0x2c/0x70 arch/x86/kernel/process.c:145
ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:304
rcu: Stack dump where RCU GP kthread last ran:
CPU: 0 PID: 17655 Comm: syz-executor.0 Not tainted 6.5.0-rc5-syzkaller-00243-g9106536c1aa3 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023
RIP: 0010:csd_lock_wait kernel/smp.c:296 [inline]
RIP: 0010:smp_call_function_many_cond+0x4db/0x1570 kernel/smp.c:835
Code: 4d 48 b8 00 00 00 00 00 fc ff df 4d 89 fc 4c 89 fd 49 c1 ec 03 83 e5 07 49 01 c4 83 c5 03 e8 1c 5f 0b 00 f3 90 41 0f b6 04 24 <40> 38 c5 7c 08 84 c0 0f 85 3c 0e 00 00 8b 43 08 31 ff 83 e0 01 41
RSP: 0018:ffffc90006c5f9c0 EFLAGS: 00000293
RAX: 0000000000000000 RBX: ffff8880b9943020 RCX: 0000000000000000
RDX: ffff888026998000 RSI: ffffffff817aa984 RDI: 0000000000000005
RBP: 0000000000000003 R08: 0000000000000005 R09: 0000000000000000
R10: 0000000000000001 R11: 0000000000000000 R12: ffffed1017328605
R13: 0000000000000001 R14: ffff8880b983d580 R15: ffff8880b9943028
FS: 0000555556817480(0000) GS:ffff8880b9800000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000001b32f24000 CR3: 0000000017af1000 CR4: 0000000000350ef0
Call Trace:
on_each_cpu_cond_mask+0x40/0x90 kernel/smp.c:1003
on_each_cpu include/linux/smp.h:71 [inline]
text_poke_sync arch/x86/kernel/alternative.c:2001 [inline]
text_poke_bp_batch+0x250/0x780 arch/x86/kernel/alternative.c:2211
text_poke_flush arch/x86/kernel/alternative.c:2402 [inline]
text_poke_flush arch/x86/kernel/alternative.c:2399 [inline]
text_poke_finish+0x1a/0x30 arch/x86/kernel/alternative.c:2409
arch_jump_label_transform_apply+0x17/0x30 arch/x86/kernel/jump_label.c:146
jump_label_update+0x32e/0x410 kernel/jump_label.c:829
static_key_disable_cpuslocked+0x154/0x1b0 kernel/jump_label.c:235
static_key_disable+0x1a/0x20 kernel/jump_label.c:243
tracepoint_remove_func kernel/tracepoint.c:417 [inline]
tracepoint_probe_unregister+0x4a1/0xd20 kernel/tracepoint.c:551
bpf_raw_tp_link_release+0x55/0xa0 kernel/bpf/syscall.c:3275
bpf_link_free+0xe4/0x1b0 kernel/bpf/syscall.c:2840
bpf_link_put_direct kernel/bpf/syscall.c:2871 [inline]
bpf_link_release+0x63/0x80 kernel/bpf/syscall.c:2878
__fput+0x3f7/0xac0 fs/file_table.c:384
task_work_run+0x14d/0x240 kernel/task_work.c:179
resume_user_mode_work include/linux/resume_user_mode.h:49 [inline]
exit_to_user_mode_loop kernel/entry/common.c:171 [inline]
exit_to_user_mode_prepare+0x210/0x240 kernel/entry/common.c:204
__syscall_exit_to_user_mode_work kernel/entry/common.c:286 [inline]
syscall_exit_to_user_mode+0x1d/0x50 kernel/entry/common.c:297
do_syscall_64+0x44/0xb0 arch/x86/entry/common.c:86
entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x7f5ca727b9da
Code: 48 3d 00 f0 ff ff 77 48 c3 0f 1f 80 00 00 00 00 48 83 ec 18 89 7c 24 0c e8 03 7f 02 00 8b 7c 24 0c 89 c2 b8 03 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 36 89 d7 89 44 24 0c e8 63 7f 02 00 8b 44 24
RSP: 002b:00007fffe60ef9a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003
RAX: 0000000000000000 RBX: 0000000000000006 RCX: 00007f5ca727b9da
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000005
RBP: 0000000000000032 R08: 0000001b33320000 R09: 0000000000000705
R10: 00000000819fe4eb R11: 0000000000000293 R12: 00007f5ca6e009b8
R13: ffffffffffffffff R14: 00007f5ca6e00000 R15: 00000000000e81c1