rcu: INFO: rcu_preempt self-detected stall on CPU
rcu: 1-...!: (10500 ticks this GP) idle=a6d/1/0x4000000000000000 softirq=274593/274593 fqs=0
(t=10500 jiffies g=423997 q=104)
rcu: rcu_preempt kthread starved for 10500 jiffies! g423997 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=1
rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior.
rcu: RCU grace-period kthread stack dump:
task:rcu_preempt state:R running task stack:26576 pid: 14 ppid: 2 flags:0x00004000
Call Trace:
context_switch kernel/sched/core.c:4972 [inline]
__schedule+0xb72/0x1460 kernel/sched/core.c:6253
schedule+0x12b/0x1f0 kernel/sched/core.c:6326
schedule_timeout+0x1b9/0x300 kernel/time/timer.c:1881
rcu_gp_fqs_loop+0x1fd/0x770 kernel/rcu/tree.c:1955
rcu_gp_kthread+0xa5/0x350 kernel/rcu/tree.c:2128
kthread+0x468/0x490 kernel/kthread.c:327
ret_from_fork+0x1f/0x30
rcu: Stack dump where RCU GP kthread last ran:
NMI backtrace for cpu 1
CPU: 1 PID: 727 Comm: syz-executor.3 Not tainted 5.16.0-rc2-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0x1dc/0x2d8 lib/dump_stack.c:106
nmi_cpu_backtrace+0x45f/0x490 lib/nmi_backtrace.c:111
nmi_trigger_cpumask_backtrace+0x16a/0x280 lib/nmi_backtrace.c:62
trigger_single_cpu_backtrace include/linux/nmi.h:164 [inline]
rcu_check_gp_kthread_starvation+0x1ff/0x270 kernel/rcu/tree_stall.h:481
print_cpu_stall kernel/rcu/tree_stall.h:625 [inline]
check_cpu_stall kernel/rcu/tree_stall.h:711 [inline]
rcu_pending kernel/rcu/tree.c:3878 [inline]
rcu_sched_clock_irq+0x1e2e/0x2bc0 kernel/rcu/tree.c:2597
update_process_times+0x197/0x200 kernel/time/timer.c:1785
tick_sched_handle kernel/time/tick-sched.c:226 [inline]
tick_sched_timer+0x27d/0x420 kernel/time/tick-sched.c:1421
__run_hrtimer kernel/time/hrtimer.c:1685 [inline]
__hrtimer_run_queues+0x4cb/0xa60 kernel/time/hrtimer.c:1749
hrtimer_interrupt+0x3b3/0x1040 kernel/time/hrtimer.c:1811
local_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1086 [inline]
__sysvec_apic_timer_interrupt+0xf9/0x270 arch/x86/kernel/apic/apic.c:1103
sysvec_apic_timer_interrupt+0x3e/0xb0 arch/x86/kernel/apic/apic.c:1097
asm_sysvec_apic_timer_interrupt+0x12/0x20
RIP: 0010:kasan_quarantine_put+0x84/0x230 mm/kasan/quarantine.c:223
Code: e8 a1 bd ba ff 48 c7 04 24 00 00 00 00 9c 8f 04 24 f7 04 24 00 02 00 00 0f 85 83 00 00 00 41 f7 c7 00 02 00 00 74 01 fb 31 c0 <48> 83 c4 08 5b 41 5c 41 5d 41 5e 41 5f c3 48 8d 80 80 56 03 00 45
RSP: 0018:ffffc90000dc07f8 EFLAGS: 00000206
RAX: a04c69bdaececd01 RBX: ffff88816789f500 RCX: ffffffff81665fb1
RDX: dffffc0000000000 RSI: 0000000000000302 RDI: 0000000000000000
RBP: ffff88816789f500 R08: dffffc0000000000 R09: fffffbfff1ff33f8
R10: fffffbfff1ff33f8 R11: 0000000000000000 R12: 0000000000000000
R13: ffffc90000dc0888 R14: 00000000000c7880 R15: 0000000000000286
kasan_slab_free include/linux/kasan.h:235 [inline]
slab_free_hook mm/slub.c:1723 [inline]
slab_free_freelist_hook+0x12e/0x1a0 mm/slub.c:1749
slab_free mm/slub.c:3513 [inline]
kmem_cache_free+0xa4/0x180 mm/slub.c:3530
kfree_skb_list+0x41/0x70 net/core/skbuff.c:783
__dev_xmit_skb net/core/dev.c:3881 [inline]
__dev_queue_xmit+0x2296/0x35c0 net/core/dev.c:4194
mrp_queue_xmit net/802/mrp.c:364 [inline]
mrp_join_timer+0x418/0x820 net/802/mrp.c:608
call_timer_fn+0xf6/0x210 kernel/time/timer.c:1421
expire_timers kernel/time/timer.c:1466 [inline]
__run_timers+0x71a/0x910 kernel/time/timer.c:1734
run_timer_softirq+0x63/0xf0 kernel/time/timer.c:1747
__do_softirq+0x392/0x7a3 kernel/softirq.c:558
__irq_exit_rcu+0xec/0x170 kernel/softirq.c:636
irq_exit_rcu+0x5/0x20 kernel/softirq.c:648
sysvec_apic_timer_interrupt+0x91/0xb0 arch/x86/kernel/apic/apic.c:1097
asm_sysvec_apic_timer_interrupt+0x12/0x20
RIP: 0010:strlen+0x30/0x60 lib/string.c:487
Code: 89 fe 49 bf 00 00 00 00 00 fc ff df 48 89 f8 66 2e 0f 1f 84 00 00 00 00 00 90 48 89 c3 48 c1 e8 03 42 0f b6 04 38 84 c0 75 0b <48> 8d 43 01 80 3b 00 75 e7 eb 13 89 d9 80 e1 07 38 c1 7c ec 48 89
RSP: 0018:ffffc9001d35f140 EFLAGS: 00000297
RAX: 0000000000000006 RBX: ffffffff8a708848 RCX: 000000008a708800
RDX: ffffffff81d5ee80 RSI: ffffffff8cb1dd40 RDI: ffffffff8a708840
RBP: ffffc9001d35f270 R08: dffffc0000000000 R09: fffffbfff1bfd166
R10: fffffbfff1bfd166 R11: 0000000000000000 R12: ffffffff8cb1dd40
R13: 1ffff92003a6be60 R14: ffffffff8a708840 R15: dffffc0000000000
trace_event_get_offsets_lock include/trace/events/lock.h:39 [inline]
perf_trace_lock+0x10b/0x440 include/trace/events/lock.h:39
trace_lock_release+0x128/0x150 include/trace/events/lock.h:58
lock_release+0x82/0x810 kernel/locking/lockdep.c:5648
zap_pte_range+0xa25/0x1ba0 mm/memory.c:1357
zap_pmd_range mm/memory.c:1467 [inline]
zap_pud_range mm/memory.c:1496 [inline]
zap_p4d_range mm/memory.c:1517 [inline]
unmap_page_range+0x745/0xa20 mm/memory.c:1538
unmap_vmas+0x202/0x390 mm/memory.c:1615
exit_mmap+0x3c6/0x6f0 mm/mmap.c:3170
__mmput+0x111/0x3a0 kernel/fork.c:1113
exit_mm+0x211/0x2f0 kernel/exit.c:507
do_exit+0x688/0x24f0 kernel/exit.c:819
do_group_exit+0x168/0x2d0 kernel/exit.c:929
get_signal+0x1740/0x2120 kernel/signal.c:2852
arch_do_signal_or_restart+0x9c/0x730 arch/x86/kernel/signal.c:868
handle_signal_work kernel/entry/common.c:148 [inline]
exit_to_user_mode_loop kernel/entry/common.c:172 [inline]
exit_to_user_mode_prepare+0x191/0x220 kernel/entry/common.c:207
__syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline]
syscall_exit_to_user_mode+0x2e/0x70 kernel/entry/common.c:300
do_syscall_64+0x53/0xd0 arch/x86/entry/common.c:86
entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7f5917fd0ae9
Code: Unable to access opcode bytes at RIP 0x7f5917fd0abf.
RSP: 002b:00007f5915546218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca
RAX: fffffffffffffe00 RBX: 00007f59180e3f68 RCX: 00007f5917fd0ae9
RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f59180e3f68
RBP: 00007f59180e3f60 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 00007f59180e3f6c
R13: 00007ffe05a2e8ff R14: 00007f5915546300 R15: 0000000000022000
NMI backtrace for cpu 1
CPU: 1 PID: 727 Comm: syz-executor.3 Not tainted 5.16.0-rc2-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0x1dc/0x2d8 lib/dump_stack.c:106
nmi_cpu_backtrace+0x45f/0x490 lib/nmi_backtrace.c:111
nmi_trigger_cpumask_backtrace+0x16a/0x280 lib/nmi_backtrace.c:62
trigger_single_cpu_backtrace include/linux/nmi.h:164 [inline]
rcu_dump_cpu_stacks+0x22d/0x390 kernel/rcu/tree_stall.h:343
print_cpu_stall kernel/rcu/tree_stall.h:627 [inline]
check_cpu_stall kernel/rcu/tree_stall.h:711 [inline]
rcu_pending kernel/rcu/tree.c:3878 [inline]
rcu_sched_clock_irq+0x1e33/0x2bc0 kernel/rcu/tree.c:2597
update_process_times+0x197/0x200 kernel/time/timer.c:1785
tick_sched_handle kernel/time/tick-sched.c:226 [inline]
tick_sched_timer+0x27d/0x420 kernel/time/tick-sched.c:1421
__run_hrtimer kernel/time/hrtimer.c:1685 [inline]
__hrtimer_run_queues+0x4cb/0xa60 kernel/time/hrtimer.c:1749
hrtimer_interrupt+0x3b3/0x1040 kernel/time/hrtimer.c:1811
local_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1086 [inline]
__sysvec_apic_timer_interrupt+0xf9/0x270 arch/x86/kernel/apic/apic.c:1103
sysvec_apic_timer_interrupt+0x3e/0xb0 arch/x86/kernel/apic/apic.c:1097
asm_sysvec_apic_timer_interrupt+0x12/0x20
RIP: 0010:kasan_quarantine_put+0x84/0x230 mm/kasan/quarantine.c:223
Code: e8 a1 bd ba ff 48 c7 04 24 00 00 00 00 9c 8f 04 24 f7 04 24 00 02 00 00 0f 85 83 00 00 00 41 f7 c7 00 02 00 00 74 01 fb 31 c0 <48> 83 c4 08 5b 41 5c 41 5d 41 5e 41 5f c3 48 8d 80 80 56 03 00 45
RSP: 0018:ffffc90000dc07f8 EFLAGS: 00000206
RAX: a04c69bdaececd01 RBX: ffff88816789f500 RCX: ffffffff81665fb1
RDX: dffffc0000000000 RSI: 0000000000000302 RDI: 0000000000000000
RBP: ffff88816789f500 R08: dffffc0000000000 R09: fffffbfff1ff33f8
R10: fffffbfff1ff33f8 R11: 0000000000000000 R12: 0000000000000000
R13: ffffc90000dc0888 R14: 00000000000c7880 R15: 0000000000000286
kasan_slab_free include/linux/kasan.h:235 [inline]
slab_free_hook mm/slub.c:1723 [inline]
slab_free_freelist_hook+0x12e/0x1a0 mm/slub.c:1749
slab_free mm/slub.c:3513 [inline]
kmem_cache_free+0xa4/0x180 mm/slub.c:3530
kfree_skb_list+0x41/0x70 net/core/skbuff.c:783
__dev_xmit_skb net/core/dev.c:3881 [inline]
__dev_queue_xmit+0x2296/0x35c0 net/core/dev.c:4194
mrp_queue_xmit net/802/mrp.c:364 [inline]
mrp_join_timer+0x418/0x820 net/802/mrp.c:608
call_timer_fn+0xf6/0x210 kernel/time/timer.c:1421
expire_timers kernel/time/timer.c:1466 [inline]
__run_timers+0x71a/0x910 kernel/time/timer.c:1734
run_timer_softirq+0x63/0xf0 kernel/time/timer.c:1747
__do_softirq+0x392/0x7a3 kernel/softirq.c:558
__irq_exit_rcu+0xec/0x170 kernel/softirq.c:636
irq_exit_rcu+0x5/0x20 kernel/softirq.c:648
sysvec_apic_timer_interrupt+0x91/0xb0 arch/x86/kernel/apic/apic.c:1097
asm_sysvec_apic_timer_interrupt+0x12/0x20
RIP: 0010:strlen+0x30/0x60 lib/string.c:487
Code: 89 fe 49 bf 00 00 00 00 00 fc ff df 48 89 f8 66 2e 0f 1f 84 00 00 00 00 00 90 48 89 c3 48 c1 e8 03 42 0f b6 04 38 84 c0 75 0b <48> 8d 43 01 80 3b 00 75 e7 eb 13 89 d9 80 e1 07 38 c1 7c ec 48 89
RSP: 0018:ffffc9001d35f140 EFLAGS: 00000297
RAX: 0000000000000006 RBX: ffffffff8a708848 RCX: 000000008a708800
RDX: ffffffff81d5ee80 RSI: ffffffff8cb1dd40 RDI: ffffffff8a708840
RBP: ffffc9001d35f270 R08: dffffc0000000000 R09: fffffbfff1bfd166
R10: fffffbfff1bfd166 R11: 0000000000000000 R12: ffffffff8cb1dd40
R13: 1ffff92003a6be60 R14: ffffffff8a708840 R15: dffffc0000000000
trace_event_get_offsets_lock include/trace/events/lock.h:39 [inline]
perf_trace_lock+0x10b/0x440 include/trace/events/lock.h:39
trace_lock_release+0x128/0x150 include/trace/events/lock.h:58
lock_release+0x82/0x810 kernel/locking/lockdep.c:5648
zap_pte_range+0xa25/0x1ba0 mm/memory.c:1357
zap_pmd_range mm/memory.c:1467 [inline]
zap_pud_range mm/memory.c:1496 [inline]
zap_p4d_range mm/memory.c:1517 [inline]
unmap_page_range+0x745/0xa20 mm/memory.c:1538
unmap_vmas+0x202/0x390 mm/memory.c:1615
exit_mmap+0x3c6/0x6f0 mm/mmap.c:3170
__mmput+0x111/0x3a0 kernel/fork.c:1113
exit_mm+0x211/0x2f0 kernel/exit.c:507
do_exit+0x688/0x24f0 kernel/exit.c:819
do_group_exit+0x168/0x2d0 kernel/exit.c:929
get_signal+0x1740/0x2120 kernel/signal.c:2852
arch_do_signal_or_restart+0x9c/0x730 arch/x86/kernel/signal.c:868
handle_signal_work kernel/entry/common.c:148 [inline]
exit_to_user_mode_loop kernel/entry/common.c:172 [inline]
exit_to_user_mode_prepare+0x191/0x220 kernel/entry/common.c:207
__syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline]
syscall_exit_to_user_mode+0x2e/0x70 kernel/entry/common.c:300
do_syscall_64+0x53/0xd0 arch/x86/entry/common.c:86
entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7f5917fd0ae9
Code: Unable to access opcode bytes at RIP 0x7f5917fd0abf.
RSP: 002b:00007f5915546218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca
RAX: fffffffffffffe00 RBX: 00007f59180e3f68 RCX: 00007f5917fd0ae9
RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f59180e3f68
RBP: 00007f59180e3f60 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 00007f59180e3f6c
R13: 00007ffe05a2e8ff R14: 00007f5915546300 R15: 0000000000022000
----------------
Code disassembly (best guess):
0: e8 a1 bd ba ff callq 0xffbabda6
5: 48 c7 04 24 00 00 00 movq $0x0,(%rsp)
c: 00
d: 9c pushfq
e: 8f 04 24 popq (%rsp)
11: f7 04 24 00 02 00 00 testl $0x200,(%rsp)
18: 0f 85 83 00 00 00 jne 0xa1
1e: 41 f7 c7 00 02 00 00 test $0x200,%r15d
25: 74 01 je 0x28
27: fb sti
28: 31 c0 xor %eax,%eax
* 2a: 48 83 c4 08 add $0x8,%rsp <-- trapping instruction
2e: 5b pop %rbx
2f: 41 5c pop %r12
31: 41 5d pop %r13
33: 41 5e pop %r14
35: 41 5f pop %r15
37: c3 retq
38: 48 8d 80 80 56 03 00 lea 0x35680(%rax),%rax
3f: 45 rex.RB