rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: rcu: Tasks blocked on level-0 rcu_node (CPUs 0-1): P7612/1:b..l rcu: (detected by 1, t=10503 jiffies, g=18617, q=296 ncpus=2) task:syz.3.389 state:R running task stack:26456 pid:7612 tgid:7610 ppid:5860 task_flags:0x400040 flags:0x00080000 Call Trace: context_switch kernel/sched/core.c:5256 [inline] __schedule+0x1139/0x6150 kernel/sched/core.c:6863 preempt_schedule_irq+0x51/0x90 kernel/sched/core.c:7190 irqentry_exit+0x1d8/0x8c0 kernel/entry/common.c:216 asm_sysvec_reschedule_ipi+0x1a/0x20 arch/x86/include/asm/idtentry.h:702 RIP: 0010:__sanitizer_cov_trace_pc+0x56/0x70 kernel/kcov.c:222 Code: 00 f0 00 75 35 8b 82 6c 16 00 00 85 c0 74 2b 8b 82 48 16 00 00 83 f8 02 75 20 48 8b 8a 50 16 00 00 8b 92 4c 16 00 00 48 8b 01 <48> 83 c0 01 48 39 d0 73 07 48 89 01 48 89 34 c1 c3 cc cc cc cc 0f RSP: 0018:ffffc9000581ee78 EFLAGS: 00000246 RAX: 000000000007ffff RBX: 0000000000000008 RCX: ffffc9000e0d4000 RDX: 0000000000080000 RSI: ffffffff8234def3 RDI: 0000000000000008 RBP: 0000000000000000 R08: 0000000000000001 R09: 0000000000000000 R10: 0000000000000001 R11: ffff88802b962ff0 R12: 0000000000001000 R13: dffffc0000000000 R14: 0000000000000000 R15: 0000000000000000 __nr_to_section+0x23/0xe0 include/linux/mmzone.h:1958 __pfn_to_section include/linux/mmzone.h:2100 [inline] lookup_page_ext+0x46/0x100 mm/page_ext.c:251 page_ext_iter_begin include/linux/page_ext.h:132 [inline] __update_page_owner_handle+0xd9/0x550 mm/page_owner.c:256 __set_page_owner+0x126/0x560 mm/page_owner.c:342 set_page_owner include/linux/page_owner.h:32 [inline] post_alloc_hook+0x1af/0x220 mm/page_alloc.c:1846 prep_new_page mm/page_alloc.c:1854 [inline] get_page_from_freelist+0xd0b/0x31a0 mm/page_alloc.c:3915 __alloc_frozen_pages_noprof+0x25f/0x2430 mm/page_alloc.c:5210 alloc_pages_mpol+0x1fb/0x550 mm/mempolicy.c:2486 folio_alloc_mpol_noprof+0x36/0x2f0 mm/mempolicy.c:2505 vma_alloc_folio_noprof+0xed/0x1e0 mm/mempolicy.c:2540 folio_prealloc mm/memory.c:1191 [inline] wp_page_copy mm/memory.c:3719 [inline] do_wp_page+0x1183/0x5010 mm/memory.c:4180 handle_pte_fault mm/memory.c:6289 [inline] __handle_mm_fault+0x1bd2/0x2bb0 mm/memory.c:6411 handle_mm_fault+0x3fe/0xad0 mm/memory.c:6580 do_user_addr_fault+0x7a6/0x1370 arch/x86/mm/fault.c:1387 handle_page_fault arch/x86/mm/fault.c:1476 [inline] exc_page_fault+0x64/0xc0 arch/x86/mm/fault.c:1532 asm_exc_page_fault+0x26/0x30 arch/x86/include/asm/idtentry.h:618 RIP: 0010:__put_user_nocheck_4+0x3/0x10 arch/x86/lib/putuser.S:104 Code: d9 0f 01 cb 89 01 31 c9 0f 01 ca e9 c7 c0 03 00 0f 1f 80 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 01 cb <89> 01 31 c9 0f 01 ca c3 cc cc cc cc 90 90 90 90 90 90 90 90 90 90 RSP: 0018:ffffc9000581f9e8 EFLAGS: 00050246 RAX: 0000000000000000 RBX: 0000000000000000 RCX: 000020000007e030 RDX: 0000000000080000 RSI: ffffffff893adf03 RDI: 0000000000000005 RBP: ffffc9000581fd88 R08: 0000000000000005 R09: 0000000000000000 R10: 0000000000000002 R11: 0000000000000000 R12: 0000000000000000 R13: 000020000007e000 R14: ffffc9000581fdcc R15: 0000000000000002 ____sys_recvmsg+0x2ee/0x6b0 net/socket.c:2825 ___sys_recvmsg+0x114/0x1a0 net/socket.c:2854 do_recvmmsg+0x2fe/0x750 net/socket.c:2949 __sys_recvmmsg net/socket.c:3023 [inline] __do_sys_recvmmsg net/socket.c:3046 [inline] __se_sys_recvmmsg net/socket.c:3039 [inline] __x64_sys_recvmmsg+0x22a/0x280 net/socket.c:3039 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xcd/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f035898f749 RSP: 002b:00007f03598cf038 EFLAGS: 00000246 ORIG_RAX: 000000000000012b RAX: ffffffffffffffda RBX: 00007f0358be6090 RCX: 00007f035898f749 RDX: 0000000000010106 RSI: 00002000000000c0 RDI: 0000000000000003 RBP: 00007f0358a13f91 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000000 R13: 00007f0358be6128 R14: 00007f0358be6090 R15: 00007ffd9a75e868 rcu: rcu_preempt kthread starved for 10558 jiffies! g18617 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=0 rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. rcu: RCU grace-period kthread stack dump: task:rcu_preempt state:R running task stack:28296 pid:16 tgid:16 ppid:2 task_flags:0x208040 flags:0x00080000 Call Trace: context_switch kernel/sched/core.c:5256 [inline] __schedule+0x1139/0x6150 kernel/sched/core.c:6863 __schedule_loop kernel/sched/core.c:6945 [inline] schedule+0xe7/0x3a0 kernel/sched/core.c:6960 schedule_timeout+0x123/0x290 kernel/time/sleep_timeout.c:99 rcu_gp_fqs_loop+0x1ea/0xaf0 kernel/rcu/tree.c:2083 rcu_gp_kthread+0x26d/0x380 kernel/rcu/tree.c:2285 kthread+0x3c5/0x780 kernel/kthread.c:463 ret_from_fork+0x983/0xb10 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:246 rcu: Stack dump where RCU GP kthread last ran: Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G L syzkaller #0 PREEMPT(full) Tainted: [L]=SOFTLOCKUP Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 RIP: 0010:mark_lock+0x86/0x9f0 kernel/locking/lockdep.c:4774 Code: 14 0f 83 84 00 00 00 48 8d 04 80 48 8d 04 80 48 8d 04 c5 60 3a b9 95 4c 89 ea 48 23 50 60 b8 01 00 00 00 74 7d 48 8b 54 24 68 <65> 48 2b 15 da a3 18 12 0f 85 7e 07 00 00 48 8d 65 d8 5b 41 5c 41 RSP: 0018:ffffc90000007020 EFLAGS: 00000006 RAX: 0000000000000001 RBX: 0000000000000009 RCX: ffffffff95b93fd8 RDX: 0294bb9205a6cf00 RSI: ffffffff8e098698 RDI: ffffffff8e097b40 RBP: ffffc900000070c0 R08: 0000000000000000 R09: 0000000000000007 R10: 0000000000000000 R11: ffffffff8e098670 R12: ffffffff8e098698 R13: 0000000000000200 R14: ffffffff8e098698 R15: ffffffff8e097b40 FS: 0000000000000000(0000) GS:ffff8881248fa000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fb8bb3733e0 CR3: 000000002afb9000 CR4: 00000000003526f0 Call Trace: mark_usage kernel/locking/lockdep.c:4674 [inline] __lock_acquire+0x436/0x2890 kernel/locking/lockdep.c:5191 lock_acquire kernel/locking/lockdep.c:5868 [inline] lock_acquire+0x179/0x330 kernel/locking/lockdep.c:5825 rcu_lock_acquire include/linux/rcupdate.h:331 [inline] rcu_read_lock include/linux/rcupdate.h:867 [inline] nf_hook+0xc3/0x780 include/linux/netfilter.h:242 NF_HOOK include/linux/netfilter.h:316 [inline] __br_forward+0x1be/0x5b0 net/bridge/br_forward.c:115 deliver_clone net/bridge/br_forward.c:131 [inline] maybe_deliver+0xf1/0x180 net/bridge/br_forward.c:191 br_flood+0x17c/0x650 net/bridge/br_forward.c:238 br_handle_frame_finish+0x1117/0x1f00 net/bridge/br_input.c:229 br_nf_hook_thresh+0x307/0x410 net/bridge/br_netfilter_hooks.c:1167 br_nf_pre_routing_finish_ipv6+0x76a/0xfc0 net/bridge/br_netfilter_ipv6.c:154 NF_HOOK include/linux/netfilter.h:318 [inline] br_nf_pre_routing_ipv6+0x3cd/0x8c0 net/bridge/br_netfilter_ipv6.c:184 br_nf_pre_routing+0x860/0x15b0 net/bridge/br_netfilter_hooks.c:508 nf_hook_entry_hookfn include/linux/netfilter.h:158 [inline] nf_hook_bridge_pre net/bridge/br_input.c:291 [inline] br_handle_frame+0xb28/0x14e0 net/bridge/br_input.c:442 __netif_receive_skb_core.constprop.0+0x6b3/0x35b0 net/core/dev.c:6024 __netif_receive_skb_one_core+0xb0/0x1e0 net/core/dev.c:6135 __netif_receive_skb+0x1d/0x160 net/core/dev.c:6250 process_backlog+0x4a2/0x1650 net/core/dev.c:6602 __napi_poll.constprop.0+0xb3/0x540 net/core/dev.c:7666 napi_poll net/core/dev.c:7729 [inline] net_rx_action+0x9f9/0xfa0 net/core/dev.c:7881 handle_softirqs+0x219/0x950 kernel/softirq.c:622 __do_softirq kernel/softirq.c:656 [inline] invoke_softirq kernel/softirq.c:496 [inline] __irq_exit_rcu+0x109/0x170 kernel/softirq.c:723 irq_exit_rcu+0x9/0x30 kernel/softirq.c:739 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1056 [inline] sysvec_apic_timer_interrupt+0xa4/0xc0 arch/x86/kernel/apic/apic.c:1056 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:697 RIP: 0010:pv_native_safe_halt+0xf/0x20 arch/x86/kernel/paravirt.c:82 Code: 16 60 02 c3 cc cc cc cc 0f 1f 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 66 90 0f 00 2d 13 c9 12 00 fb f4 cc 35 03 00 66 2e 0f 1f 84 00 00 00 00 00 66 90 90 90 90 90 90 RSP: 0018:ffffffff8e007df8 EFLAGS: 000002c6 RAX: 00000000015811d1 RBX: 0000000000000000 RCX: ffffffff8b7796d9 RDX: 0000000000000000 RSI: ffffffff8dacbd61 RDI: ffffffff8bf2a880 RBP: fffffbfff1c12f68 R08: 0000000000000001 R09: ffffed101708673d R10: ffff8880b84339eb R11: ffffffff8e098670 R12: 0000000000000000 R13: ffffffff8e097b40 R14: ffffffff908881d0 R15: 0000000000000000 arch_safe_halt arch/x86/include/asm/paravirt.h:107 [inline] default_idle+0x13/0x20 arch/x86/kernel/process.c:767 default_idle_call+0x6c/0xb0 kernel/sched/idle.c:122 cpuidle_idle_call kernel/sched/idle.c:191 [inline] do_idle+0x38d/0x510 kernel/sched/idle.c:332 cpu_startup_entry+0x4f/0x60 kernel/sched/idle.c:430 rest_init+0x16b/0x2b0 init/main.c:757 start_kernel+0x3ef/0x4d0 init/main.c:1206 x86_64_start_reservations+0x18/0x30 arch/x86/kernel/head64.c:310 x86_64_start_kernel+0x130/0x190 arch/x86/kernel/head64.c:291 common_startup_64+0x13e/0x148 net_ratelimit: 5234 callbacks suppressed bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:72:a7:d6:e9:f7:76, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:72:a7:d6:e9:f7:76, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) net_ratelimit: 5234 callbacks suppressed bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:72:a7:d6:e9:f7:76, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:72:a7:d6:e9:f7:76, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)