bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:d4:7d:bd:78:87, vlan:0) rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: rcu: Tasks blocked on level-0 rcu_node (CPUs 0-1): P23533/1:b..l rcu: (detected by 0, t=10503 jiffies, g=120649, q=3771 ncpus=2) task:syz.3.4363 state:R running task stack:24312 pid:23533 tgid:23533 ppid:17621 task_flags:0x400040 flags:0x00080002 Call Trace: context_switch kernel/sched/core.c:5256 [inline] __schedule+0x149b/0x4fd0 kernel/sched/core.c:6863 preempt_schedule_common+0x83/0xd0 kernel/sched/core.c:7047 preempt_schedule_thunk+0x16/0x30 arch/x86/entry/thunk.S:12 __local_bh_enable_ip+0xe1/0x130 kernel/softirq.c:457 spin_unlock_bh include/linux/spinlock.h:396 [inline] nl80211_netlink_notify+0x6f4/0x840 net/wireless/nl80211.c:21529 notifier_call_chain+0x19d/0x3a0 kernel/notifier.c:85 blocking_notifier_call_chain+0x6a/0x90 kernel/notifier.c:380 netlink_release+0x1214/0x1aa0 net/netlink/af_netlink.c:761 __sock_release net/socket.c:662 [inline] sock_close+0xc3/0x240 net/socket.c:1455 __fput+0x44c/0xa70 fs/file_table.c:468 task_work_run+0x1d4/0x260 kernel/task_work.c:233 resume_user_mode_work include/linux/resume_user_mode.h:50 [inline] __exit_to_user_mode_loop kernel/entry/common.c:44 [inline] exit_to_user_mode_loop+0xef/0x4e0 kernel/entry/common.c:75 __exit_to_user_mode_prepare include/linux/irq-entry-common.h:226 [inline] syscall_exit_to_user_mode_prepare include/linux/irq-entry-common.h:256 [inline] syscall_exit_to_user_mode_work include/linux/entry-common.h:159 [inline] syscall_exit_to_user_mode include/linux/entry-common.h:194 [inline] do_syscall_64+0x2c1/0xf80 arch/x86/entry/syscall_64.c:100 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7fc1f9b8f749 RSP: 002b:00007ffdda06d8a8 EFLAGS: 00000246 ORIG_RAX: 00000000000001b4 RAX: 0000000000000000 RBX: 00007fc1f9de7da0 RCX: 00007fc1f9b8f749 RDX: 0000000000000000 RSI: 000000000000001e RDI: 0000000000000003 RBP: 00007fc1f9de7da0 R08: 0000000000000214 R09: 0000001eda06db9f R10: 00007fc1f9de7cb0 R11: 0000000000000246 R12: 00000000000ab68b R13: 00007fc1f9de6270 R14: ffffffffffffffff R15: 00007ffdda06d9c0 rcu: rcu_preempt kthread starved for 1435 jiffies! g120649 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=1 rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. rcu: RCU grace-period kthread stack dump: task:rcu_preempt state:R running task stack:27808 pid:16 tgid:16 ppid:2 task_flags:0x208040 flags:0x00080000 Call Trace: context_switch kernel/sched/core.c:5256 [inline] __schedule+0x149b/0x4fd0 kernel/sched/core.c:6863 __schedule_loop kernel/sched/core.c:6945 [inline] schedule+0x165/0x360 kernel/sched/core.c:6960 schedule_timeout+0x12b/0x270 kernel/time/sleep_timeout.c:99 rcu_gp_fqs_loop+0x301/0x1540 kernel/rcu/tree.c:2083 rcu_gp_kthread+0x99/0x390 kernel/rcu/tree.c:2285 kthread+0x711/0x8a0 kernel/kthread.c:463 ret_from_fork+0x510/0xa50 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:246 rcu: Stack dump where RCU GP kthread last ran: Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 156 Comm: kworker/u8:6 Not tainted syzkaller #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 Workqueue: events_unbound toggle_allocation_gate RIP: 0010:match_held_lock+0x2/0xb0 kernel/locking/lockdep.c:5305 Code: 0f b9 3a 90 31 db 48 89 d8 5b 41 5e 41 5f c3 cc cc cc cc cc 0f 1f 40 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 41 56 <53> bb 01 00 00 00 48 39 77 10 74 6a 81 7f 20 00 00 20 00 72 5f 48 RSP: 0018:ffffc90000a08318 EFLAGS: 00000083 RAX: 0000000000000007 RBX: ffff88801d77e6d8 RCX: 0000000000000101 RDX: ffff88801d77db80 RSI: ffffffff8df41aa0 RDI: ffff88801d77e6d8 RBP: 00000000ffffffff R08: ffffc90000a085e0 R09: ffffc90000a085f0 R10: ffffc90000a08440 R11: fffff5200014108a R12: 0000000000000246 R13: ffff88801d77db80 R14: ffffffff8df41aa0 R15: 0000000000000001 FS: 0000000000000000(0000) GS:ffff888125f1c000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000555555e7b5c8 CR3: 000000000dd3a000 CR4: 00000000003526f0 Call Trace: __lock_is_held kernel/locking/lockdep.c:5601 [inline] lock_is_held_type+0x8a/0x150 kernel/locking/lockdep.c:5940 __find_rr_leaf+0x345/0x6d0 net/ipv6/route.c:833 find_rr_leaf net/ipv6/route.c:889 [inline] rt6_select net/ipv6/route.c:933 [inline] fib6_table_lookup+0x39f/0xa80 net/ipv6/route.c:2244 ip6_pol_route+0x22c/0x11a0 net/ipv6/route.c:2280 pol_lookup_func include/net/ip6_fib.h:617 [inline] fib6_rule_lookup+0x52f/0x6f0 net/ipv6/fib6_rules.c:120 ip6_route_input_lookup net/ipv6/route.c:2349 [inline] ip6_route_input+0x6de/0xad0 net/ipv6/route.c:2652 ip6_rcv_finish+0x141/0x2e0 net/ipv6/ip6_input.c:77 NF_HOOK+0x30c/0x3a0 include/linux/netfilter.h:318 __netif_receive_skb_one_core net/core/dev.c:6151 [inline] __netif_receive_skb+0xd3/0x380 net/core/dev.c:6264 process_backlog+0x54f/0x1340 net/core/dev.c:6616 __napi_poll+0xae/0x320 net/core/dev.c:7680 napi_poll net/core/dev.c:7743 [inline] net_rx_action+0x64a/0xe00 net/core/dev.c:7895 handle_softirqs+0x22b/0x7c0 kernel/softirq.c:622 __do_softirq kernel/softirq.c:656 [inline] invoke_softirq kernel/softirq.c:496 [inline] __irq_exit_rcu+0x60/0x150 kernel/softirq.c:723 irq_exit_rcu+0x9/0x30 kernel/softirq.c:739 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1056 [inline] sysvec_apic_timer_interrupt+0xa6/0xc0 arch/x86/kernel/apic/apic.c:1056 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:697 RIP: 0010:csd_lock_wait kernel/smp.c:342 [inline] RIP: 0010:smp_call_function_many_cond+0xcc5/0x1260 kernel/smp.c:877 Code: 45 8b 2c 24 44 89 ee 83 e6 01 31 ff e8 d4 97 0b 00 41 83 e5 01 49 bd 00 00 00 00 00 fc ff df 75 07 e8 7f 93 0b 00 eb 38 f3 90 <42> 0f b6 04 2b 84 c0 75 11 41 f7 04 24 01 00 00 00 74 1e e8 63 93 RSP: 0018:ffffc90002f476a0 EFLAGS: 00000293 RAX: ffffffff81b5654d RBX: 1ffff110170c856d RCX: ffff88801d77db80 RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000 RBP: ffffc90002f477e0 R08: ffffffff8f823877 R09: 1ffffffff1f0470e R10: dffffc0000000000 R11: fffffbfff1f0470f R12: ffff8880b8642b68 R13: dffffc0000000000 R14: ffff8880b873bb00 R15: 0000000000000000 on_each_cpu_cond_mask+0x3f/0x80 kernel/smp.c:1043 on_each_cpu include/linux/smp.h:71 [inline] smp_text_poke_sync_each_cpu arch/x86/kernel/alternative.c:2711 [inline] smp_text_poke_batch_finish+0x5f9/0x1130 arch/x86/kernel/alternative.c:2921 arch_jump_label_transform_apply+0x1c/0x30 arch/x86/kernel/jump_label.c:146 static_key_enable_cpuslocked+0x128/0x240 kernel/jump_label.c:210 static_key_enable+0x1a/0x20 kernel/jump_label.c:223 toggle_allocation_gate+0xad/0x240 mm/kfence/core.c:874 process_one_work kernel/workqueue.c:3257 [inline] process_scheduled_works+0xad1/0x1770 kernel/workqueue.c:3340 worker_thread+0x8a0/0xda0 kernel/workqueue.c:3421 kthread+0x711/0x8a0 kernel/kthread.c:463 ret_from_fork+0x510/0xa50 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:246 net_ratelimit: 14597 callbacks suppressed bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:d4:7d:bd:78:87, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:d4:7d:bd:78:87, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:d4:7d:bd:78:87, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:d4:7d:bd:78:87, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:d4:7d:bd:78:87, vlan:0) net_ratelimit: 17908 callbacks suppressed bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:d4:7d:bd:78:87, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:d4:7d:bd:78:87, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:d4:7d:bd:78:87, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:d4:7d:bd:78:87, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:d4:7d:bd:78:87, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)