rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: (detected by 1, t=10502 jiffies, g=25629, q=558) rcu: All QSes seen, last rcu_preempt kthread activity 10494 (4294979386-4294968892), jiffies_till_next_fqs=1, root ->qsmask 0x0 rcu: rcu_preempt kthread starved for 10494 jiffies! g25629 f0x2 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=0 rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. rcu: RCU grace-period kthread stack dump: task:rcu_preempt state:R running task stack:29176 pid: 11 ppid: 2 flags:0x00004000 Call Trace: context_switch kernel/sched/core.c:3779 [inline] __schedule+0x893/0x2130 kernel/sched/core.c:4528 schedule+0xcf/0x270 kernel/sched/core.c:4606 schedule_timeout+0x148/0x250 kernel/time/timer.c:1871 rcu_gp_fqs_loop kernel/rcu/tree.c:1925 [inline] rcu_gp_kthread+0xb4c/0x1c90 kernel/rcu/tree.c:2099 kthread+0x3b1/0x4a0 kernel/kthread.c:292 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:296 ================================ WARNING: inconsistent lock state 5.10.0-rc7-syzkaller #0 Not tainted -------------------------------- inconsistent {IN-HARDIRQ-W} -> {HARDIRQ-ON-W} usage. syz-executor.5/12980 [HC0[0]:SC1[1]:HE0:SE0] takes: ffffffff8b33f998 (rcu_node_0){?.-.}-{2:2}, at: print_other_cpu_stall kernel/rcu/tree_stall.h:487 [inline] ffffffff8b33f998 (rcu_node_0){?.-.}-{2:2}, at: check_cpu_stall kernel/rcu/tree_stall.h:646 [inline] ffffffff8b33f998 (rcu_node_0){?.-.}-{2:2}, at: rcu_pending kernel/rcu/tree.c:3694 [inline] ffffffff8b33f998 (rcu_node_0){?.-.}-{2:2}, at: rcu_sched_clock_irq.cold+0xbc/0xee8 kernel/rcu/tree.c:2567 {IN-HARDIRQ-W} state was registered at: lock_acquire kernel/locking/lockdep.c:5437 [inline] lock_acquire+0x29d/0x740 kernel/locking/lockdep.c:5402 __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline] _raw_spin_lock_irqsave+0x39/0x50 kernel/locking/spinlock.c:159 rcu_report_exp_cpu_mult+0x72/0x320 kernel/rcu/tree_exp.h:237 flush_smp_call_function_queue+0x34b/0x640 kernel/smp.c:425 __sysvec_call_function_single+0x95/0x3d0 arch/x86/kernel/smp.c:248 asm_call_irq_on_stack+0xf/0x20 __run_sysvec_on_irqstack arch/x86/include/asm/irq_stack.h:37 [inline] run_sysvec_on_irqstack_cond arch/x86/include/asm/irq_stack.h:89 [inline] sysvec_call_function_single+0xbd/0x100 arch/x86/kernel/smp.c:243 asm_sysvec_call_function_single+0x12/0x20 arch/x86/include/asm/idtentry.h:639 __sanitizer_cov_trace_pc+0x0/0x60 kernel/kcov.c:797 __handle_mm_fault mm/memory.c:4486 [inline] handle_mm_fault+0x1d4a/0x55d0 mm/memory.c:4607 faultin_page mm/gup.c:885 [inline] __get_user_pages+0x642/0x1360 mm/gup.c:1097 __get_user_pages_locked mm/gup.c:1283 [inline] __get_user_pages_remote+0x18f/0x7a0 mm/gup.c:1810 get_user_pages_remote+0x63/0x90 mm/gup.c:1883 get_arg_page+0xba/0x200 fs/exec.c:222 copy_string_kernel+0x1b4/0x520 fs/exec.c:633 kernel_execve+0x25c/0x460 fs/exec.c:1956 call_usermodehelper_exec_async+0x2de/0x580 kernel/umh.c:110 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:296 irq event stamp: 20388061 hardirqs last enabled at (20388060): [] asm_sysvec_irq_work+0x12/0x20 arch/x86/include/asm/idtentry.h:657 hardirqs last disabled at (20388061): [] sysvec_apic_timer_interrupt+0xc/0x100 arch/x86/kernel/apic/apic.c:1091 softirqs last enabled at (18728082): [] asm_call_irq_on_stack+0xf/0x20 softirqs last disabled at (18728085): [] asm_call_irq_on_stack+0xf/0x20 other info that might help us debug this: Possible unsafe locking scenario: CPU0 ---- lock(rcu_node_0); lock(rcu_node_0); *** DEADLOCK *** 5 locks held by syz-executor.5/12980: #0: ffffffff8b43aa88 (vmap_purge_lock){+.+.}-{3:3}, at: _vm_unmap_aliases.part.0+0x368/0x4e0 mm/vmalloc.c:1766 #1: ffffffff8b43ac38 (free_vmap_area_lock){+.+.}-{2:2}, at: spin_lock include/linux/spinlock.h:354 [inline] #1: ffffffff8b43ac38 (free_vmap_area_lock){+.+.}-{2:2}, at: __cond_resched_lock+0xa0/0xf0 kernel/sched/core.c:6155 #2: ffffffff8b3378e0 (rcu_read_lock){....}-{1:2}, at: ieee80211_rx_napi+0x0/0x3d0 include/linux/skbuff.h:2558 #3: ffffffff8b3378e0 (rcu_read_lock){....}-{1:2}, at: sta_info_get_bss+0x81/0x3f0 net/mac80211/sta_info.c:194 #4: ffffffff8b33f998 (rcu_node_0){?.-.}-{2:2}, at: print_other_cpu_stall kernel/rcu/tree_stall.h:487 [inline] #4: ffffffff8b33f998 (rcu_node_0){?.-.}-{2:2}, at: check_cpu_stall kernel/rcu/tree_stall.h:646 [inline] #4: ffffffff8b33f998 (rcu_node_0){?.-.}-{2:2}, at: rcu_pending kernel/rcu/tree.c:3694 [inline] #4: ffffffff8b33f998 (rcu_node_0){?.-.}-{2:2}, at: rcu_sched_clock_irq.cold+0xbc/0xee8 kernel/rcu/tree.c:2567 stack backtrace: CPU: 1 PID: 12980 Comm: syz-executor.5 Not tainted 5.10.0-rc7-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x107/0x163 lib/dump_stack.c:118 print_usage_bug kernel/locking/lockdep.c:3740 [inline] valid_state kernel/locking/lockdep.c:3751 [inline] mark_lock_irq kernel/locking/lockdep.c:3954 [inline] mark_lock.cold+0x31/0x73 kernel/locking/lockdep.c:4411 mark_held_locks+0x9f/0xe0 kernel/locking/lockdep.c:4012 __trace_hardirqs_on_caller kernel/locking/lockdep.c:4030 [inline] lockdep_hardirqs_on_prepare kernel/locking/lockdep.c:4098 [inline] lockdep_hardirqs_on_prepare+0x135/0x400 kernel/locking/lockdep.c:4050 trace_hardirqs_on+0x5b/0x1c0 kernel/trace/trace_preemptirq.c:49 asm_sysvec_apic_timer_interrupt+0x12/0x20 arch/x86/include/asm/idtentry.h:631 RIP: 0010:arch_local_irq_restore arch/x86/include/asm/irqflags.h:85 [inline] RIP: 0010:lock_acquire kernel/locking/lockdep.c:5440 [inline] RIP: 0010:lock_acquire+0x2c7/0x740 kernel/locking/lockdep.c:5402 Code: 48 c7 c7 40 5f 4b 89 48 83 c4 20 e8 c3 65 8f 07 b8 ff ff ff ff 65 0f c1 05 56 d2 ab 7e 83 f8 01 0f 85 36 03 00 00 ff 34 24 9d 3a fe ff ff 65 ff 05 fd c0 ab 7e 48 8b 05 76 bf 82 0b e8 51 5a RSP: 0018:ffffc90000d90b08 EFLAGS: 00000246 RAX: 0000000000000001 RBX: 1ffff920001b2163 RCX: 0000000000000001 RDX: 1ffff1100dc92122 RSI: 0000000000000105 RDI: 0000000000000000 RBP: 0000000000000000 R08: 0000000000000000 R09: ffffffff8ebaf667 R10: fffffbfff1d75ecc R11: 0000000000000001 R12: 0000000000000002 R13: ffffffff8b3378e0 R14: 0000000000000000 R15: 0000000000000000 rcu_lock_acquire include/linux/rcupdate.h:248 [inline] rcu_read_lock include/linux/rcupdate.h:641 [inline] sta_info_get_bss+0xb2/0x3f0 net/mac80211/sta_info.c:198 __ieee80211_rx_handle_packet net/mac80211/rx.c:4638 [inline] ieee80211_rx_list+0xdd3/0x23d0 net/mac80211/rx.c:4759 ieee80211_rx_napi+0xf7/0x3d0 net/mac80211/rx.c:4780 ieee80211_rx include/net/mac80211.h:4502 [inline] ieee80211_tasklet_handler+0xd3/0x130 net/mac80211/main.c:235 tasklet_action_common.constprop.0+0x22f/0x2d0 kernel/softirq.c:560 __do_softirq+0x2a0/0x9f6 kernel/softirq.c:298 asm_call_irq_on_stack+0xf/0x20 __run_on_irqstack arch/x86/include/asm/irq_stack.h:26 [inline] run_on_irqstack_cond arch/x86/include/asm/irq_stack.h:77 [inline] do_softirq_own_stack+0xaa/0xd0 arch/x86/kernel/irq_64.c:77 invoke_softirq kernel/softirq.c:393 [inline] __irq_exit_rcu kernel/softirq.c:423 [inline] irq_exit_rcu+0x132/0x200 kernel/softirq.c:435 sysvec_apic_timer_interrupt+0x4d/0x100 arch/x86/kernel/apic/apic.c:1091 asm_sysvec_apic_timer_interrupt+0x12/0x20 arch/x86/include/asm/idtentry.h:631 RIP: 0010:__sanitizer_cov_trace_pc+0x30/0x60 kernel/kcov.c:197 Code: f0 01 00 65 8b 05 40 eb 91 7e a9 00 01 ff 00 48 8b 34 24 74 0f f6 c4 01 74 35 8b 82 5c 14 00 00 85 c0 74 2b 8b 82 38 14 00 00 <83> f8 02 75 20 48 8b 8a 40 14 00 00 8b 92 3c 14 00 00 48 8b 01 48 RSP: 0018:ffffc90002c5f698 EFLAGS: 00000246 RAX: 0000000000000002 RBX: 1ffff9200058bed8 RCX: ffffffff8164cb97 RDX: ffff88806e490000 RSI: ffffffff8164cba1 RDI: 0000000000000001 RBP: ffffc90002c5f770 R08: 0000000000000000 R09: ffffffff8cecae0f R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000001 R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000008 native_save_fl arch/x86/include/asm/irqflags.h:29 [inline] arch_local_save_flags arch/x86/include/asm/irqflags.h:79 [inline] smp_call_function_single+0x121/0x4b0 kernel/smp.c:485 smp_call_function_many_cond+0x25f/0x9d0 kernel/smp.c:648 smp_call_function_many kernel/smp.c:711 [inline] smp_call_function kernel/smp.c:733 [inline] on_each_cpu+0x4f/0x110 kernel/smp.c:832 flush_tlb_kernel_range+0x1a5/0x270 arch/x86/mm/tlb.c:951 __purge_vmap_area_lazy+0x7f7/0x1b70 mm/vmalloc.c:1371 _vm_unmap_aliases.part.0+0x3d6/0x4e0 mm/vmalloc.c:1768 _vm_unmap_aliases mm/vmalloc.c:1742 [inline] vm_unmap_aliases+0x42/0x50 mm/vmalloc.c:1791 change_page_attr_set_clr+0x241/0x500 arch/x86/mm/pat/set_memory.c:1732 change_page_attr_clear arch/x86/mm/pat/set_memory.c:1789 [inline] set_memory_ro+0x78/0xa0 arch/x86/mm/pat/set_memory.c:1935 bpf_jit_binary_lock_ro include/linux/filter.h:824 [inline] bpf_int_jit_compile+0xdfa/0x11b0 arch/x86/net/bpf_jit_comp.c:2093 bpf_prog_select_runtime+0x544/0x990 kernel/bpf/core.c:1817 bpf_migrate_filter+0x2dc/0x380 net/core/filter.c:1294 bpf_prepare_filter net/core/filter.c:1342 [inline] bpf_prog_create_from_user+0x51b/0x660 net/core/filter.c:1436 seccomp_prepare_filter kernel/seccomp.c:570 [inline] seccomp_prepare_user_filter kernel/seccomp.c:607 [inline] seccomp_set_mode_filter kernel/seccomp.c:1568 [inline] do_seccomp+0x387/0x25e0 kernel/seccomp.c:1688 do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 entry_SYSCALL_64_after_hwframe+0x44/0xa9 RIP: 0033:0x45e0f9 Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007fa72b20fc68 EFLAGS: 00000246 ORIG_RAX: 000000000000013d RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045e0f9 RDX: 0000000020000080 RSI: 0000000000000003 RDI: 0000000000000001 RBP: 000000000119bfc0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 000000000119bf8c R13: 00007fff97da436f R14: 00007fa72b2109c0 R15: 000000000119bf8c softirq: huh, entered softirq 6 TASKLET 00000000152e5867 with preempt_count 00000105, exited with 00000106?