rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: rcu: Tasks blocked on level-0 rcu_node (CPUs 0-1): P2921/1:b..l P7007/1:b..l rcu: (detected by 1, t=10502 jiffies, g=24217, q=557 ncpus=2) task:syz-executor.4 state:R running task stack:24672 pid:7007 tgid:7007 ppid:5728 flags:0x00004006 Call Trace: context_switch kernel/sched/core.c:5408 [inline] __schedule+0x17e8/0x4a20 kernel/sched/core.c:6745 preempt_schedule_irq+0xfb/0x1c0 kernel/sched/core.c:7067 irqentry_exit+0x5e/0x90 kernel/entry/common.c:354 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702 RIP: 0010:lock_acquire+0x264/0x550 kernel/locking/lockdep.c:5758 Code: 2b 00 74 08 4c 89 f7 e8 1a 80 89 00 f6 44 24 61 02 0f 85 85 01 00 00 41 f7 c7 00 02 00 00 74 01 fb 48 c7 44 24 40 0e 36 e0 45 <4b> c7 44 25 00 00 00 00 00 43 c7 44 25 09 00 00 00 00 43 c7 44 25 RSP: 0018:ffffc900034bfac0 EFLAGS: 00000206 RAX: 0000000000000001 RBX: 1ffff92000697f64 RCX: 0000000000000001 RDX: dffffc0000000000 RSI: ffffffff8bcacbe0 RDI: ffffffff8c1ff0c0 RBP: ffffc900034bfc18 R08: ffffffff92fa8587 R09: 1ffffffff25f50b0 R10: dffffc0000000000 R11: fffffbfff25f50b1 R12: 1ffff92000697f60 R13: dffffc0000000000 R14: ffffc900034bfb20 R15: 0000000000000246 rcu_lock_acquire include/linux/rcupdate.h:329 [inline] rcu_read_lock include/linux/rcupdate.h:781 [inline] page_ext_get+0x3d/0x2a0 mm/page_ext.c:521 __reset_page_owner+0x2f/0x3f0 mm/page_owner.c:290 reset_page_owner include/linux/page_owner.h:25 [inline] free_pages_prepare mm/page_alloc.c:1088 [inline] free_unref_page+0xd22/0xea0 mm/page_alloc.c:2565 vfree+0x186/0x2e0 mm/vmalloc.c:3346 xskq_destroy+0x40/0x60 net/xdp/xsk_queue.c:64 xsk_release+0x700/0x930 net/xdp/xsk.c:1127 __sock_release net/socket.c:659 [inline] sock_close+0xbe/0x240 net/socket.c:1421 __fput+0x408/0x8b0 fs/file_table.c:422 __do_sys_close fs/open.c:1555 [inline] __se_sys_close fs/open.c:1540 [inline] __x64_sys_close+0x7f/0x110 fs/open.c:1540 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f26d987bdda RSP: 002b:00007fffe4137f90 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 00007f26d987bdda RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000005 RBP: 00007f26d99ad980 R08: 0000001b30b20000 R09: 0000000000000008 R10: 000000008136425f R11: 0000000000000293 R12: 000000000002c07e R13: 00007f26d99ac1fc R14: 00007fffe4138090 R15: 0000000000000032 task:kworker/u8:8 state:R running task stack:20408 pid:2921 tgid:2921 ppid:2 flags:0x00004000 Workqueue: bat_events batadv_nc_worker Call Trace: context_switch kernel/sched/core.c:5408 [inline] __schedule+0x17e8/0x4a20 kernel/sched/core.c:6745 preempt_schedule_irq+0xfb/0x1c0 kernel/sched/core.c:7067 irqentry_exit+0x5e/0x90 kernel/entry/common.c:354 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702 RIP: 0010:get_current arch/x86/include/asm/current.h:49 [inline] RIP: 0010:write_comp_data kernel/kcov.c:235 [inline] RIP: 0010:__sanitizer_cov_trace_const_cmp4+0x8/0x90 kernel/kcov.c:304 Code: 44 0a 20 e9 65 26 1a 0a 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 4c 8b 04 24 <65> 48 8b 14 25 00 d5 03 00 65 8b 05 30 ba 6d 7e a9 00 01 ff 00 74 RSP: 0018:ffffc90009cc7b50 EFLAGS: 00000246 RAX: 0000000000000001 RBX: 0000000000000001 RCX: ffff88802bbe5a00 RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000 RBP: 0000000000000000 R08: ffffffff8b50bd8e R09: 1ffffffff25f50b0 R10: dffffc0000000000 R11: fffffbfff25f50b1 R12: ffff88805d84cca0 R13: 0000000000000093 R14: ffff888024f0d5c0 R15: dffffc0000000000 rcu_read_unlock include/linux/rcupdate.h:810 [inline] batadv_nc_purge_orig_hash net/batman-adv/network-coding.c:412 [inline] batadv_nc_worker+0x1fe/0x610 net/batman-adv/network-coding.c:719 process_one_work kernel/workqueue.c:3231 [inline] process_scheduled_works+0xa2e/0x1830 kernel/workqueue.c:3312 worker_thread+0x86d/0xd70 kernel/workqueue.c:3393 kthread+0x2f2/0x390 kernel/kthread.c:389 ret_from_fork+0x4d/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 rcu: rcu_preempt kthread starved for 10393 jiffies! g24217 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=0 rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. rcu: RCU grace-period kthread stack dump: task:rcu_preempt state:R running task stack:25232 pid:17 tgid:17 ppid:2 flags:0x00004000 Call Trace: context_switch kernel/sched/core.c:5408 [inline] __schedule+0x17e8/0x4a20 kernel/sched/core.c:6745 __schedule_loop kernel/sched/core.c:6822 [inline] schedule+0x14b/0x320 kernel/sched/core.c:6837 schedule_timeout+0x1be/0x310 kernel/time/timer.c:2581 rcu_gp_fqs_loop+0x2df/0x1330 kernel/rcu/tree.c:2000 rcu_gp_kthread+0xa7/0x3b0 kernel/rcu/tree.c:2202 kthread+0x2f2/0x390 kernel/kthread.c:389 ret_from_fork+0x4d/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 rcu: Stack dump where RCU GP kthread last ran: Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 PID: 7019 Comm: syz-executor.0 Not tainted 6.10.0-rc1-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 RIP: 0010:get_page_table_check mm/page_table_check.c:55 [inline] RIP: 0010:__page_table_check_zero+0x121/0x340 mm/page_table_check.c:145 Code: 0f 87 e6 00 00 00 e8 3e 85 8e ff 4c 89 fd 44 89 f1 48 d3 ed 31 ff 48 89 ee e8 0b 8a 8e ff 48 85 ed 0f 85 e3 00 00 00 4d 85 e4 <0f> 84 1f 01 00 00 48 8b 2d 92 a0 3e 0c 4c 01 e5 48 89 ef be 04 00 RSP: 0018:ffffc9000c4d7540 EFLAGS: 00000282 RAX: 0000000000000002 RBX: dffffc0000000000 RCX: ffff888065249e00 RDX: ffffc9000a52d000 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 0000000000000000 R08: ffffffff82079155 R09: 1ffff11002c4a159 R10: dffffc0000000000 R11: ffffed1002c4a15a R12: ffff888016250ad0 R13: 1ffffffff2901be0 R14: 0000000000000003 R15: 0000000000000001 FS: 00007faf8b1866c0(0000) GS:ffff8880b9400000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000001b33229000 CR3: 000000002d246000 CR4: 0000000000350ef0 Call Trace: page_table_check_free include/linux/page_table_check.h:41 [inline] free_pages_prepare mm/page_alloc.c:1089 [inline] free_unref_page+0xd36/0xea0 mm/page_alloc.c:2565 __slab_free+0x31b/0x3d0 mm/slub.c:4347 qlink_free mm/kasan/quarantine.c:163 [inline] qlist_free_all+0x9e/0x140 mm/kasan/quarantine.c:179 kasan_quarantine_reduce+0x14f/0x170 mm/kasan/quarantine.c:286 __kasan_kmalloc+0x23/0xb0 mm/kasan/common.c:378 kasan_kmalloc include/linux/kasan.h:211 [inline] kmalloc_trace_noprof+0x19c/0x2c0 mm/slub.c:4152 kmalloc_noprof include/linux/slab.h:660 [inline] disk_seqf_start block/genhd.c:806 [inline] show_partition_start+0x72/0x180 block/genhd.c:849 seq_read_iter+0x3d2/0xd60 fs/seq_file.c:225 proc_reg_read_iter+0x1c5/0x290 fs/proc/inode.c:299 copy_splice_read+0x664/0xb60 fs/splice.c:365 do_splice_read fs/splice.c:985 [inline] splice_direct_to_actor+0x4b9/0xc90 fs/splice.c:1089 do_splice_direct_actor fs/splice.c:1207 [inline] do_splice_direct+0x28c/0x3e0 fs/splice.c:1233 do_sendfile+0x56d/0xe10 fs/read_write.c:1295 __do_sys_sendfile64 fs/read_write.c:1356 [inline] __se_sys_sendfile64+0x100/0x1e0 fs/read_write.c:1348 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7faf8a47cee9 Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007faf8b1860c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 RAX: ffffffffffffffda RBX: 00007faf8a5abf80 RCX: 00007faf8a47cee9 RDX: 0000000020002080 RSI: 0000000000000007 RDI: 0000000000000008 RBP: 00007faf8a4c949e R08: 0000000000000000 R09: 0000000000000000 R10: 000000000000023b R11: 0000000000000246 R12: 0000000000000000 R13: 000000000000000b R14: 00007faf8a5abf80 R15: 00007fff94c37458