rcu: INFO: rcu_preempt self-detected stall on CPU rcu: 0-...!: (10499 ticks this GP) idle=f1d/1/0x4000000000000000 softirq=8774/8778 fqs=72 (t=10500 jiffies g=9413 q=725) rcu: rcu_preempt kthread starved for 10331 jiffies! g9413 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=1 rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. rcu: RCU grace-period kthread stack dump: task:rcu_preempt state:R running task stack:27000 pid: 15 ppid: 2 flags:0x00004000 Call Trace: context_switch kernel/sched/core.c:5029 [inline] __schedule+0x12c4/0x45b0 kernel/sched/core.c:6375 schedule+0x11b/0x1f0 kernel/sched/core.c:6458 schedule_timeout+0x1b9/0x300 kernel/time/timer.c:1914 rcu_gp_fqs_loop+0x2bf/0x1080 kernel/rcu/tree.c:1972 rcu_gp_kthread+0xa4/0x360 kernel/rcu/tree.c:2145 kthread+0x3f6/0x4f0 kernel/kthread.c:334 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:287 rcu: Stack dump where RCU GP kthread last ran: Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 PID: 4751 Comm: syz.4.132 Not tainted 5.15.179-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 RIP: 0010:latch_tree_find include/linux/rbtree_latch.h:208 [inline] RIP: 0010:bpf_ksym_find kernel/bpf/core.c:692 [inline] RIP: 0010:is_bpf_text_address+0x16d/0x260 kernel/bpf/core.c:726 Code: 3d 00 4d 8b 3f 4c 89 ff 4c 89 f6 e8 ed 56 f3 ff 4d 39 f7 73 43 e8 03 55 f3 ff 48 83 c3 08 48 89 d8 48 c1 e8 03 42 80 3c 20 00 <74> 08 48 89 df e8 39 47 3d 00 48 8b 1b 48 85 db 74 0a e8 dc 54 f3 RSP: 0018:ffffc90000dd0840 EFLAGS: 00000046 RAX: 1ffff110041b2a3f RBX: ffff888020d951f8 RCX: ffff888021a8d940 RDX: 0000000000010000 RSI: 00007f11ca23b359 RDI: ffffffffa00289f0 RBP: 0000000000000000 R08: ffffffff818d4774 R09: fffffbfff2131e19 R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 R13: 0000000000000000 R14: 00007f11ca23b359 R15: ffffffffa00289f0 FS: 000055557ff74500(0000) GS:ffff8880b8f00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007ffde02a5e80 CR3: 000000002298d000 CR4: 00000000003506e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: kernel_text_address kernel/extable.c:151 [inline] __kernel_text_address+0x94/0x100 kernel/extable.c:105 unwind_get_return_address+0x49/0x80 arch/x86/kernel/unwind_orc.c:323 arch_stack_walk+0xf3/0x140 arch/x86/kernel/stacktrace.c:26 stack_trace_save+0x113/0x1c0 kernel/stacktrace.c:122 kasan_save_stack mm/kasan/common.c:38 [inline] kasan_set_track mm/kasan/common.c:46 [inline] set_alloc_info mm/kasan/common.c:434 [inline] __kasan_slab_alloc+0x8e/0xc0 mm/kasan/common.c:467 kasan_slab_alloc include/linux/kasan.h:254 [inline] slab_post_alloc_hook+0x53/0x380 mm/slab.h:519 slab_alloc_node mm/slub.c:3220 [inline] slab_alloc mm/slub.c:3228 [inline] kmem_cache_alloc+0xf3/0x280 mm/slub.c:3233 __sigqueue_alloc+0x3be/0x4d0 kernel/signal.c:435 __send_signal+0x21f/0xd40 kernel/signal.c:1116 do_send_sig_info kernel/signal.c:1294 [inline] group_send_sig_info+0x260/0x2d0 kernel/signal.c:1442 do_bpf_send_signal+0x81/0x150 kernel/trace/bpf_trace.c:779 irq_work_single kernel/irq_work.c:155 [inline] irq_work_run_list+0x20b/0x370 kernel/irq_work.c:177 irq_work_run+0x63/0xe0 kernel/irq_work.c:186 __sysvec_irq_work+0x9a/0x250 arch/x86/kernel/irq_work.c:22 instr_sysvec_irq_work arch/x86/kernel/irq_work.c:17 [inline] sysvec_irq_work+0x98/0xc0 arch/x86/kernel/irq_work.c:17 asm_sysvec_irq_work+0x16/0x20 arch/x86/include/asm/idtentry.h:713 RIP: 0010:arch_static_branch arch/x86/include/asm/jump_label.h:27 [inline] RIP: 0010:static_key_false include/linux/jump_label.h:212 [inline] RIP: 0010:native_write_msr arch/x86/include/asm/msr.h:156 [inline] RIP: 0010:wrmsr arch/x86/include/asm/msr.h:263 [inline] RIP: 0010:native_apic_msr_write+0x35/0x50 arch/x86/include/asm/apic.h:208 Code: 74 2a 83 ff 30 74 25 eb 10 81 ff d0 00 00 00 74 1b 81 ff e0 00 00 00 74 13 c1 ef 04 81 c7 00 08 00 00 89 f9 89 f0 31 d2 0f 30 <66> 90 c3 89 f6 31 d2 e9 ef d3 fe 02 66 2e 0f 1f 84 00 00 00 00 00 RSP: 0018:ffffc9000320fca8 EFLAGS: 00000246 RAX: 00000000000000f6 RBX: ffffffff8c5cea10 RCX: 000000000000083f RDX: 0000000000000000 RSI: 00000000000000f6 RDI: 000000000000083f RBP: 0000000000000000 R08: dffffc0000000000 R09: ffffed10171e67a7 R10: 0000000000000000 R11: dffffc0000000001 R12: ffff8880b8f33b10 R13: 1ffff92000641f00 R14: dffffc0000000000 R15: 0000000000000020 arch_irq_work_raise+0x82/0xd0 arch/x86/kernel/irq_work.c:31 irq_work_queue+0xa3/0x150 kernel/irq_work.c:75 bpf_send_signal_common+0x2e6/0x450 kernel/trace/bpf_trace.c:820 ____bpf_send_signal kernel/trace/bpf_trace.c:829 [inline] bpf_send_signal+0x15/0x20 kernel/trace/bpf_trace.c:827 bpf_prog_7ba5217f62dcd359+0x38/0x610 bpf_dispatcher_nop_func include/linux/bpf.h:790 [inline] __bpf_prog_run include/linux/filter.h:628 [inline] bpf_prog_run include/linux/filter.h:635 [inline] __bpf_trace_run kernel/trace/bpf_trace.c:1878 [inline] bpf_trace_run2+0x19e/0x340 kernel/trace/bpf_trace.c:1915 __bpf_trace_sys_enter+0x60/0x70 include/trace/events/syscalls.h:18 trace_sys_enter include/trace/events/syscalls.h:18 [inline] syscall_trace_enter kernel/entry/common.c:77 [inline] __syscall_enter_from_user_work kernel/entry/common.c:96 [inline] syscall_enter_from_user_mode+0x202/0x240 kernel/entry/common.c:114 do_syscall_64+0x1e/0xb0 arch/x86/entry/common.c:76 entry_SYSCALL_64_after_hwframe+0x66/0xd0 RIP: 0033:0x7f11ca23b359 Code: 64 c7 00 16 00 00 00 b8 ff ff ff ff c3 0f 1f 40 00 90 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 c7 c0 0f 00 00 00 0f 05 <0f> 1f 80 00 00 00 00 48 81 ec 48 01 00 00 49 89 d0 64 48 8b 04 25 RSP: 002b:00007ffde02a5e80 EFLAGS: 00000206 ORIG_RAX: 000000000000000f RAX: ffffffffffffffda RBX: 00007f11c80c66c0 RCX: 00007f11ca23b359 RDX: 00007ffde02a5e80 RSI: 00007ffde02a5fb0 RDI: 0000000000000011 RBP: 0000000000000000 R08: 00000000ffffffff R09: 0000000000000000 R10: 0000000000021000 R11: 0000000000000206 R12: 00007ffde02a6570 R13: ffffffffffffffc0 R14: 0000000000001000 R15: 0000000000000000 NMI backtrace for cpu 0 CPU: 0 PID: 4771 Comm: syz.2.138 Not tainted 5.15.179-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x1e3/0x2d0 lib/dump_stack.c:106 nmi_cpu_backtrace+0x46a/0x4a0 lib/nmi_backtrace.c:111 nmi_trigger_cpumask_backtrace+0x181/0x2a0 lib/nmi_backtrace.c:62 trigger_single_cpu_backtrace include/linux/nmi.h:166 [inline] rcu_dump_cpu_stacks+0x223/0x390 kernel/rcu/tree_stall.h:349 print_cpu_stall+0x320/0x600 kernel/rcu/tree_stall.h:633 check_cpu_stall kernel/rcu/tree_stall.h:727 [inline] rcu_pending kernel/rcu/tree.c:3932 [inline] rcu_sched_clock_irq+0x8d9/0x1150 kernel/rcu/tree.c:2619 update_process_times+0x196/0x200 kernel/time/timer.c:1818 tick_sched_handle kernel/time/tick-sched.c:254 [inline] tick_sched_timer+0x386/0x550 kernel/time/tick-sched.c:1473 __run_hrtimer kernel/time/hrtimer.c:1688 [inline] __hrtimer_run_queues+0x55b/0xcf0 kernel/time/hrtimer.c:1752 hrtimer_interrupt+0x392/0x980 kernel/time/hrtimer.c:1814 local_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1097 [inline] __sysvec_apic_timer_interrupt+0x13b/0x4b0 arch/x86/kernel/apic/apic.c:1114 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1108 [inline] sysvec_apic_timer_interrupt+0x9b/0xc0 arch/x86/kernel/apic/apic.c:1108 asm_sysvec_apic_timer_interrupt+0x16/0x20 arch/x86/include/asm/idtentry.h:676 RIP: 0010:arch_static_branch arch/x86/include/asm/jump_label.h:27 [inline] RIP: 0010:static_key_false include/linux/jump_label.h:212 [inline] RIP: 0010:native_write_msr arch/x86/include/asm/msr.h:156 [inline] RIP: 0010:wrmsr arch/x86/include/asm/msr.h:263 [inline] RIP: 0010:native_apic_msr_write+0x35/0x50 arch/x86/include/asm/apic.h:208 Code: 74 2a 83 ff 30 74 25 eb 10 81 ff d0 00 00 00 74 1b 81 ff e0 00 00 00 74 13 c1 ef 04 81 c7 00 08 00 00 89 f9 89 f0 31 d2 0f 30 <66> 90 c3 89 f6 31 d2 e9 ef d3 fe 02 66 2e 0f 1f 84 00 00 00 00 00 RSP: 0018:ffffc90002e9fca8 EFLAGS: 00000246 RAX: 00000000000000f6 RBX: ffffffff8c5cea10 RCX: 000000000000083f RDX: 0000000000000000 RSI: 00000000000000f6 RDI: 000000000000083f RBP: 0000000000000000 R08: dffffc0000000000 R09: ffffed10171c67a7 R10: 0000000000000000 R11: dffffc0000000001 R12: ffff8880b8e33b10 R13: 1ffff920005d3f00 R14: dffffc0000000000 R15: 0000000000000020 arch_irq_work_raise+0x82/0xd0 arch/x86/kernel/irq_work.c:31 irq_work_queue+0xa3/0x150 kernel/irq_work.c:75 bpf_send_signal_common+0x2e6/0x450 kernel/trace/bpf_trace.c:820 ____bpf_send_signal kernel/trace/bpf_trace.c:829 [inline] bpf_send_signal+0x15/0x20 kernel/trace/bpf_trace.c:827 bpf_prog_7ba5217f62dcd359+0x38/0x610 bpf_dispatcher_nop_func include/linux/bpf.h:790 [inline] __bpf_prog_run include/linux/filter.h:628 [inline] bpf_prog_run include/linux/filter.h:635 [inline] __bpf_trace_run kernel/trace/bpf_trace.c:1878 [inline] bpf_trace_run2+0x19e/0x340 kernel/trace/bpf_trace.c:1915 __bpf_trace_sys_enter+0x60/0x70 include/trace/events/syscalls.h:18 trace_sys_enter include/trace/events/syscalls.h:18 [inline] syscall_trace_enter kernel/entry/common.c:77 [inline] __syscall_enter_from_user_work kernel/entry/common.c:96 [inline] syscall_enter_from_user_mode+0x202/0x240 kernel/entry/common.c:114 do_syscall_64+0x1e/0xb0 arch/x86/entry/common.c:76 entry_SYSCALL_64_after_hwframe+0x66/0xd0 RIP: 0033:0x7f53c02a9359 Code: 64 c7 00 16 00 00 00 b8 ff ff ff ff c3 0f 1f 40 00 90 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 c7 c0 0f 00 00 00 0f 05 <0f> 1f 80 00 00 00 00 48 81 ec 48 01 00 00 49 89 d0 64 48 8b 04 25 RSP: 002b:00007f53be175b40 EFLAGS: 00000246 ORIG_RAX: 000000000000000f RAX: ffffffffffffffda RBX: 00007f53c0525fa8 RCX: 00007f53c02a9359 RDX: 00007f53be175b40 RSI: 00007f53be175c70 RDI: 0000000000000011 RBP: 00007f53c0525fa0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f53c0525fac R13: 0000000000000000 R14: 00007ffe1b7c3910 R15: 00007ffe1b7c39f8