rcu: INFO: rcu_preempt self-detected stall on CPU rcu: 1-...!: (10500 ticks this GP) idle=a6d/1/0x4000000000000000 softirq=274593/274593 fqs=0 (t=10500 jiffies g=423997 q=104) rcu: rcu_preempt kthread starved for 10500 jiffies! g423997 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=1 rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. rcu: RCU grace-period kthread stack dump: task:rcu_preempt state:R running task stack:26576 pid: 14 ppid: 2 flags:0x00004000 Call Trace: context_switch kernel/sched/core.c:4972 [inline] __schedule+0xb72/0x1460 kernel/sched/core.c:6253 schedule+0x12b/0x1f0 kernel/sched/core.c:6326 schedule_timeout+0x1b9/0x300 kernel/time/timer.c:1881 rcu_gp_fqs_loop+0x1fd/0x770 kernel/rcu/tree.c:1955 rcu_gp_kthread+0xa5/0x350 kernel/rcu/tree.c:2128 kthread+0x468/0x490 kernel/kthread.c:327 ret_from_fork+0x1f/0x30 rcu: Stack dump where RCU GP kthread last ran: NMI backtrace for cpu 1 CPU: 1 PID: 727 Comm: syz-executor.3 Not tainted 5.16.0-rc2-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x1dc/0x2d8 lib/dump_stack.c:106 nmi_cpu_backtrace+0x45f/0x490 lib/nmi_backtrace.c:111 nmi_trigger_cpumask_backtrace+0x16a/0x280 lib/nmi_backtrace.c:62 trigger_single_cpu_backtrace include/linux/nmi.h:164 [inline] rcu_check_gp_kthread_starvation+0x1ff/0x270 kernel/rcu/tree_stall.h:481 print_cpu_stall kernel/rcu/tree_stall.h:625 [inline] check_cpu_stall kernel/rcu/tree_stall.h:711 [inline] rcu_pending kernel/rcu/tree.c:3878 [inline] rcu_sched_clock_irq+0x1e2e/0x2bc0 kernel/rcu/tree.c:2597 update_process_times+0x197/0x200 kernel/time/timer.c:1785 tick_sched_handle kernel/time/tick-sched.c:226 [inline] tick_sched_timer+0x27d/0x420 kernel/time/tick-sched.c:1421 __run_hrtimer kernel/time/hrtimer.c:1685 [inline] __hrtimer_run_queues+0x4cb/0xa60 kernel/time/hrtimer.c:1749 hrtimer_interrupt+0x3b3/0x1040 kernel/time/hrtimer.c:1811 local_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1086 [inline] __sysvec_apic_timer_interrupt+0xf9/0x270 arch/x86/kernel/apic/apic.c:1103 sysvec_apic_timer_interrupt+0x3e/0xb0 arch/x86/kernel/apic/apic.c:1097 asm_sysvec_apic_timer_interrupt+0x12/0x20 RIP: 0010:kasan_quarantine_put+0x84/0x230 mm/kasan/quarantine.c:223 Code: e8 a1 bd ba ff 48 c7 04 24 00 00 00 00 9c 8f 04 24 f7 04 24 00 02 00 00 0f 85 83 00 00 00 41 f7 c7 00 02 00 00 74 01 fb 31 c0 <48> 83 c4 08 5b 41 5c 41 5d 41 5e 41 5f c3 48 8d 80 80 56 03 00 45 RSP: 0018:ffffc90000dc07f8 EFLAGS: 00000206 RAX: a04c69bdaececd01 RBX: ffff88816789f500 RCX: ffffffff81665fb1 RDX: dffffc0000000000 RSI: 0000000000000302 RDI: 0000000000000000 RBP: ffff88816789f500 R08: dffffc0000000000 R09: fffffbfff1ff33f8 R10: fffffbfff1ff33f8 R11: 0000000000000000 R12: 0000000000000000 R13: ffffc90000dc0888 R14: 00000000000c7880 R15: 0000000000000286 kasan_slab_free include/linux/kasan.h:235 [inline] slab_free_hook mm/slub.c:1723 [inline] slab_free_freelist_hook+0x12e/0x1a0 mm/slub.c:1749 slab_free mm/slub.c:3513 [inline] kmem_cache_free+0xa4/0x180 mm/slub.c:3530 kfree_skb_list+0x41/0x70 net/core/skbuff.c:783 __dev_xmit_skb net/core/dev.c:3881 [inline] __dev_queue_xmit+0x2296/0x35c0 net/core/dev.c:4194 mrp_queue_xmit net/802/mrp.c:364 [inline] mrp_join_timer+0x418/0x820 net/802/mrp.c:608 call_timer_fn+0xf6/0x210 kernel/time/timer.c:1421 expire_timers kernel/time/timer.c:1466 [inline] __run_timers+0x71a/0x910 kernel/time/timer.c:1734 run_timer_softirq+0x63/0xf0 kernel/time/timer.c:1747 __do_softirq+0x392/0x7a3 kernel/softirq.c:558 __irq_exit_rcu+0xec/0x170 kernel/softirq.c:636 irq_exit_rcu+0x5/0x20 kernel/softirq.c:648 sysvec_apic_timer_interrupt+0x91/0xb0 arch/x86/kernel/apic/apic.c:1097 asm_sysvec_apic_timer_interrupt+0x12/0x20 RIP: 0010:strlen+0x30/0x60 lib/string.c:487 Code: 89 fe 49 bf 00 00 00 00 00 fc ff df 48 89 f8 66 2e 0f 1f 84 00 00 00 00 00 90 48 89 c3 48 c1 e8 03 42 0f b6 04 38 84 c0 75 0b <48> 8d 43 01 80 3b 00 75 e7 eb 13 89 d9 80 e1 07 38 c1 7c ec 48 89 RSP: 0018:ffffc9001d35f140 EFLAGS: 00000297 RAX: 0000000000000006 RBX: ffffffff8a708848 RCX: 000000008a708800 RDX: ffffffff81d5ee80 RSI: ffffffff8cb1dd40 RDI: ffffffff8a708840 RBP: ffffc9001d35f270 R08: dffffc0000000000 R09: fffffbfff1bfd166 R10: fffffbfff1bfd166 R11: 0000000000000000 R12: ffffffff8cb1dd40 R13: 1ffff92003a6be60 R14: ffffffff8a708840 R15: dffffc0000000000 trace_event_get_offsets_lock include/trace/events/lock.h:39 [inline] perf_trace_lock+0x10b/0x440 include/trace/events/lock.h:39 trace_lock_release+0x128/0x150 include/trace/events/lock.h:58 lock_release+0x82/0x810 kernel/locking/lockdep.c:5648 zap_pte_range+0xa25/0x1ba0 mm/memory.c:1357 zap_pmd_range mm/memory.c:1467 [inline] zap_pud_range mm/memory.c:1496 [inline] zap_p4d_range mm/memory.c:1517 [inline] unmap_page_range+0x745/0xa20 mm/memory.c:1538 unmap_vmas+0x202/0x390 mm/memory.c:1615 exit_mmap+0x3c6/0x6f0 mm/mmap.c:3170 __mmput+0x111/0x3a0 kernel/fork.c:1113 exit_mm+0x211/0x2f0 kernel/exit.c:507 do_exit+0x688/0x24f0 kernel/exit.c:819 do_group_exit+0x168/0x2d0 kernel/exit.c:929 get_signal+0x1740/0x2120 kernel/signal.c:2852 arch_do_signal_or_restart+0x9c/0x730 arch/x86/kernel/signal.c:868 handle_signal_work kernel/entry/common.c:148 [inline] exit_to_user_mode_loop kernel/entry/common.c:172 [inline] exit_to_user_mode_prepare+0x191/0x220 kernel/entry/common.c:207 __syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline] syscall_exit_to_user_mode+0x2e/0x70 kernel/entry/common.c:300 do_syscall_64+0x53/0xd0 arch/x86/entry/common.c:86 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7f5917fd0ae9 Code: Unable to access opcode bytes at RIP 0x7f5917fd0abf. RSP: 002b:00007f5915546218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca RAX: fffffffffffffe00 RBX: 00007f59180e3f68 RCX: 00007f5917fd0ae9 RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f59180e3f68 RBP: 00007f59180e3f60 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f59180e3f6c R13: 00007ffe05a2e8ff R14: 00007f5915546300 R15: 0000000000022000 NMI backtrace for cpu 1 CPU: 1 PID: 727 Comm: syz-executor.3 Not tainted 5.16.0-rc2-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x1dc/0x2d8 lib/dump_stack.c:106 nmi_cpu_backtrace+0x45f/0x490 lib/nmi_backtrace.c:111 nmi_trigger_cpumask_backtrace+0x16a/0x280 lib/nmi_backtrace.c:62 trigger_single_cpu_backtrace include/linux/nmi.h:164 [inline] rcu_dump_cpu_stacks+0x22d/0x390 kernel/rcu/tree_stall.h:343 print_cpu_stall kernel/rcu/tree_stall.h:627 [inline] check_cpu_stall kernel/rcu/tree_stall.h:711 [inline] rcu_pending kernel/rcu/tree.c:3878 [inline] rcu_sched_clock_irq+0x1e33/0x2bc0 kernel/rcu/tree.c:2597 update_process_times+0x197/0x200 kernel/time/timer.c:1785 tick_sched_handle kernel/time/tick-sched.c:226 [inline] tick_sched_timer+0x27d/0x420 kernel/time/tick-sched.c:1421 __run_hrtimer kernel/time/hrtimer.c:1685 [inline] __hrtimer_run_queues+0x4cb/0xa60 kernel/time/hrtimer.c:1749 hrtimer_interrupt+0x3b3/0x1040 kernel/time/hrtimer.c:1811 local_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1086 [inline] __sysvec_apic_timer_interrupt+0xf9/0x270 arch/x86/kernel/apic/apic.c:1103 sysvec_apic_timer_interrupt+0x3e/0xb0 arch/x86/kernel/apic/apic.c:1097 asm_sysvec_apic_timer_interrupt+0x12/0x20 RIP: 0010:kasan_quarantine_put+0x84/0x230 mm/kasan/quarantine.c:223 Code: e8 a1 bd ba ff 48 c7 04 24 00 00 00 00 9c 8f 04 24 f7 04 24 00 02 00 00 0f 85 83 00 00 00 41 f7 c7 00 02 00 00 74 01 fb 31 c0 <48> 83 c4 08 5b 41 5c 41 5d 41 5e 41 5f c3 48 8d 80 80 56 03 00 45 RSP: 0018:ffffc90000dc07f8 EFLAGS: 00000206 RAX: a04c69bdaececd01 RBX: ffff88816789f500 RCX: ffffffff81665fb1 RDX: dffffc0000000000 RSI: 0000000000000302 RDI: 0000000000000000 RBP: ffff88816789f500 R08: dffffc0000000000 R09: fffffbfff1ff33f8 R10: fffffbfff1ff33f8 R11: 0000000000000000 R12: 0000000000000000 R13: ffffc90000dc0888 R14: 00000000000c7880 R15: 0000000000000286 kasan_slab_free include/linux/kasan.h:235 [inline] slab_free_hook mm/slub.c:1723 [inline] slab_free_freelist_hook+0x12e/0x1a0 mm/slub.c:1749 slab_free mm/slub.c:3513 [inline] kmem_cache_free+0xa4/0x180 mm/slub.c:3530 kfree_skb_list+0x41/0x70 net/core/skbuff.c:783 __dev_xmit_skb net/core/dev.c:3881 [inline] __dev_queue_xmit+0x2296/0x35c0 net/core/dev.c:4194 mrp_queue_xmit net/802/mrp.c:364 [inline] mrp_join_timer+0x418/0x820 net/802/mrp.c:608 call_timer_fn+0xf6/0x210 kernel/time/timer.c:1421 expire_timers kernel/time/timer.c:1466 [inline] __run_timers+0x71a/0x910 kernel/time/timer.c:1734 run_timer_softirq+0x63/0xf0 kernel/time/timer.c:1747 __do_softirq+0x392/0x7a3 kernel/softirq.c:558 __irq_exit_rcu+0xec/0x170 kernel/softirq.c:636 irq_exit_rcu+0x5/0x20 kernel/softirq.c:648 sysvec_apic_timer_interrupt+0x91/0xb0 arch/x86/kernel/apic/apic.c:1097 asm_sysvec_apic_timer_interrupt+0x12/0x20 RIP: 0010:strlen+0x30/0x60 lib/string.c:487 Code: 89 fe 49 bf 00 00 00 00 00 fc ff df 48 89 f8 66 2e 0f 1f 84 00 00 00 00 00 90 48 89 c3 48 c1 e8 03 42 0f b6 04 38 84 c0 75 0b <48> 8d 43 01 80 3b 00 75 e7 eb 13 89 d9 80 e1 07 38 c1 7c ec 48 89 RSP: 0018:ffffc9001d35f140 EFLAGS: 00000297 RAX: 0000000000000006 RBX: ffffffff8a708848 RCX: 000000008a708800 RDX: ffffffff81d5ee80 RSI: ffffffff8cb1dd40 RDI: ffffffff8a708840 RBP: ffffc9001d35f270 R08: dffffc0000000000 R09: fffffbfff1bfd166 R10: fffffbfff1bfd166 R11: 0000000000000000 R12: ffffffff8cb1dd40 R13: 1ffff92003a6be60 R14: ffffffff8a708840 R15: dffffc0000000000 trace_event_get_offsets_lock include/trace/events/lock.h:39 [inline] perf_trace_lock+0x10b/0x440 include/trace/events/lock.h:39 trace_lock_release+0x128/0x150 include/trace/events/lock.h:58 lock_release+0x82/0x810 kernel/locking/lockdep.c:5648 zap_pte_range+0xa25/0x1ba0 mm/memory.c:1357 zap_pmd_range mm/memory.c:1467 [inline] zap_pud_range mm/memory.c:1496 [inline] zap_p4d_range mm/memory.c:1517 [inline] unmap_page_range+0x745/0xa20 mm/memory.c:1538 unmap_vmas+0x202/0x390 mm/memory.c:1615 exit_mmap+0x3c6/0x6f0 mm/mmap.c:3170 __mmput+0x111/0x3a0 kernel/fork.c:1113 exit_mm+0x211/0x2f0 kernel/exit.c:507 do_exit+0x688/0x24f0 kernel/exit.c:819 do_group_exit+0x168/0x2d0 kernel/exit.c:929 get_signal+0x1740/0x2120 kernel/signal.c:2852 arch_do_signal_or_restart+0x9c/0x730 arch/x86/kernel/signal.c:868 handle_signal_work kernel/entry/common.c:148 [inline] exit_to_user_mode_loop kernel/entry/common.c:172 [inline] exit_to_user_mode_prepare+0x191/0x220 kernel/entry/common.c:207 __syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline] syscall_exit_to_user_mode+0x2e/0x70 kernel/entry/common.c:300 do_syscall_64+0x53/0xd0 arch/x86/entry/common.c:86 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7f5917fd0ae9 Code: Unable to access opcode bytes at RIP 0x7f5917fd0abf. RSP: 002b:00007f5915546218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca RAX: fffffffffffffe00 RBX: 00007f59180e3f68 RCX: 00007f5917fd0ae9 RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f59180e3f68 RBP: 00007f59180e3f60 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f59180e3f6c R13: 00007ffe05a2e8ff R14: 00007f5915546300 R15: 0000000000022000 ---------------- Code disassembly (best guess): 0: e8 a1 bd ba ff callq 0xffbabda6 5: 48 c7 04 24 00 00 00 movq $0x0,(%rsp) c: 00 d: 9c pushfq e: 8f 04 24 popq (%rsp) 11: f7 04 24 00 02 00 00 testl $0x200,(%rsp) 18: 0f 85 83 00 00 00 jne 0xa1 1e: 41 f7 c7 00 02 00 00 test $0x200,%r15d 25: 74 01 je 0x28 27: fb sti 28: 31 c0 xor %eax,%eax * 2a: 48 83 c4 08 add $0x8,%rsp <-- trapping instruction 2e: 5b pop %rbx 2f: 41 5c pop %r12 31: 41 5d pop %r13 33: 41 5e pop %r14 35: 41 5f pop %r15 37: c3 retq 38: 48 8d 80 80 56 03 00 lea 0x35680(%rax),%rax 3f: 45 rex.RB