rcu: INFO: rcu_preempt detected stalls on CPUs/tasks:
rcu: Tasks blocked on level-0 rcu_node (CPUs 0-1): P7612/1:b..l
rcu: (detected by 1, t=10503 jiffies, g=18617, q=296 ncpus=2)
task:syz.3.389 state:R running task stack:26456 pid:7612 tgid:7610 ppid:5860 task_flags:0x400040 flags:0x00080000
Call Trace:
context_switch kernel/sched/core.c:5256 [inline]
__schedule+0x1139/0x6150 kernel/sched/core.c:6863
preempt_schedule_irq+0x51/0x90 kernel/sched/core.c:7190
irqentry_exit+0x1d8/0x8c0 kernel/entry/common.c:216
asm_sysvec_reschedule_ipi+0x1a/0x20 arch/x86/include/asm/idtentry.h:702
RIP: 0010:__sanitizer_cov_trace_pc+0x56/0x70 kernel/kcov.c:222
Code: 00 f0 00 75 35 8b 82 6c 16 00 00 85 c0 74 2b 8b 82 48 16 00 00 83 f8 02 75 20 48 8b 8a 50 16 00 00 8b 92 4c 16 00 00 48 8b 01 <48> 83 c0 01 48 39 d0 73 07 48 89 01 48 89 34 c1 c3 cc cc cc cc 0f
RSP: 0018:ffffc9000581ee78 EFLAGS: 00000246
RAX: 000000000007ffff RBX: 0000000000000008 RCX: ffffc9000e0d4000
RDX: 0000000000080000 RSI: ffffffff8234def3 RDI: 0000000000000008
RBP: 0000000000000000 R08: 0000000000000001 R09: 0000000000000000
R10: 0000000000000001 R11: ffff88802b962ff0 R12: 0000000000001000
R13: dffffc0000000000 R14: 0000000000000000 R15: 0000000000000000
__nr_to_section+0x23/0xe0 include/linux/mmzone.h:1958
__pfn_to_section include/linux/mmzone.h:2100 [inline]
lookup_page_ext+0x46/0x100 mm/page_ext.c:251
page_ext_iter_begin include/linux/page_ext.h:132 [inline]
__update_page_owner_handle+0xd9/0x550 mm/page_owner.c:256
__set_page_owner+0x126/0x560 mm/page_owner.c:342
set_page_owner include/linux/page_owner.h:32 [inline]
post_alloc_hook+0x1af/0x220 mm/page_alloc.c:1846
prep_new_page mm/page_alloc.c:1854 [inline]
get_page_from_freelist+0xd0b/0x31a0 mm/page_alloc.c:3915
__alloc_frozen_pages_noprof+0x25f/0x2430 mm/page_alloc.c:5210
alloc_pages_mpol+0x1fb/0x550 mm/mempolicy.c:2486
folio_alloc_mpol_noprof+0x36/0x2f0 mm/mempolicy.c:2505
vma_alloc_folio_noprof+0xed/0x1e0 mm/mempolicy.c:2540
folio_prealloc mm/memory.c:1191 [inline]
wp_page_copy mm/memory.c:3719 [inline]
do_wp_page+0x1183/0x5010 mm/memory.c:4180
handle_pte_fault mm/memory.c:6289 [inline]
__handle_mm_fault+0x1bd2/0x2bb0 mm/memory.c:6411
handle_mm_fault+0x3fe/0xad0 mm/memory.c:6580
do_user_addr_fault+0x7a6/0x1370 arch/x86/mm/fault.c:1387
handle_page_fault arch/x86/mm/fault.c:1476 [inline]
exc_page_fault+0x64/0xc0 arch/x86/mm/fault.c:1532
asm_exc_page_fault+0x26/0x30 arch/x86/include/asm/idtentry.h:618
RIP: 0010:__put_user_nocheck_4+0x3/0x10 arch/x86/lib/putuser.S:104
Code: d9 0f 01 cb 89 01 31 c9 0f 01 ca e9 c7 c0 03 00 0f 1f 80 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 01 cb <89> 01 31 c9 0f 01 ca c3 cc cc cc cc 90 90 90 90 90 90 90 90 90 90
RSP: 0018:ffffc9000581f9e8 EFLAGS: 00050246
RAX: 0000000000000000 RBX: 0000000000000000 RCX: 000020000007e030
RDX: 0000000000080000 RSI: ffffffff893adf03 RDI: 0000000000000005
RBP: ffffc9000581fd88 R08: 0000000000000005 R09: 0000000000000000
R10: 0000000000000002 R11: 0000000000000000 R12: 0000000000000000
R13: 000020000007e000 R14: ffffc9000581fdcc R15: 0000000000000002
____sys_recvmsg+0x2ee/0x6b0 net/socket.c:2825
___sys_recvmsg+0x114/0x1a0 net/socket.c:2854
do_recvmmsg+0x2fe/0x750 net/socket.c:2949
__sys_recvmmsg net/socket.c:3023 [inline]
__do_sys_recvmmsg net/socket.c:3046 [inline]
__se_sys_recvmmsg net/socket.c:3039 [inline]
__x64_sys_recvmmsg+0x22a/0x280 net/socket.c:3039
do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
do_syscall_64+0xcd/0xf80 arch/x86/entry/syscall_64.c:94
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f035898f749
RSP: 002b:00007f03598cf038 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
RAX: ffffffffffffffda RBX: 00007f0358be6090 RCX: 00007f035898f749
RDX: 0000000000010106 RSI: 00002000000000c0 RDI: 0000000000000003
RBP: 00007f0358a13f91 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000000
R13: 00007f0358be6128 R14: 00007f0358be6090 R15: 00007ffd9a75e868
rcu: rcu_preempt kthread starved for 10558 jiffies! g18617 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=0
rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior.
rcu: RCU grace-period kthread stack dump:
task:rcu_preempt state:R running task stack:28296 pid:16 tgid:16 ppid:2 task_flags:0x208040 flags:0x00080000
Call Trace:
context_switch kernel/sched/core.c:5256 [inline]
__schedule+0x1139/0x6150 kernel/sched/core.c:6863
__schedule_loop kernel/sched/core.c:6945 [inline]
schedule+0xe7/0x3a0 kernel/sched/core.c:6960
schedule_timeout+0x123/0x290 kernel/time/sleep_timeout.c:99
rcu_gp_fqs_loop+0x1ea/0xaf0 kernel/rcu/tree.c:2083
rcu_gp_kthread+0x26d/0x380 kernel/rcu/tree.c:2285
kthread+0x3c5/0x780 kernel/kthread.c:463
ret_from_fork+0x983/0xb10 arch/x86/kernel/process.c:158
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:246
rcu: Stack dump where RCU GP kthread last ran:
Sending NMI from CPU 1 to CPUs 0:
NMI backtrace for cpu 0
CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G L syzkaller #0 PREEMPT(full)
Tainted: [L]=SOFTLOCKUP
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025
RIP: 0010:mark_lock+0x86/0x9f0 kernel/locking/lockdep.c:4774
Code: 14 0f 83 84 00 00 00 48 8d 04 80 48 8d 04 80 48 8d 04 c5 60 3a b9 95 4c 89 ea 48 23 50 60 b8 01 00 00 00 74 7d 48 8b 54 24 68 <65> 48 2b 15 da a3 18 12 0f 85 7e 07 00 00 48 8d 65 d8 5b 41 5c 41
RSP: 0018:ffffc90000007020 EFLAGS: 00000006
RAX: 0000000000000001 RBX: 0000000000000009 RCX: ffffffff95b93fd8
RDX: 0294bb9205a6cf00 RSI: ffffffff8e098698 RDI: ffffffff8e097b40
RBP: ffffc900000070c0 R08: 0000000000000000 R09: 0000000000000007
R10: 0000000000000000 R11: ffffffff8e098670 R12: ffffffff8e098698
R13: 0000000000000200 R14: ffffffff8e098698 R15: ffffffff8e097b40
FS: 0000000000000000(0000) GS:ffff8881248fa000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fb8bb3733e0 CR3: 000000002afb9000 CR4: 00000000003526f0
Call Trace:
mark_usage kernel/locking/lockdep.c:4674 [inline]
__lock_acquire+0x436/0x2890 kernel/locking/lockdep.c:5191
lock_acquire kernel/locking/lockdep.c:5868 [inline]
lock_acquire+0x179/0x330 kernel/locking/lockdep.c:5825
rcu_lock_acquire include/linux/rcupdate.h:331 [inline]
rcu_read_lock include/linux/rcupdate.h:867 [inline]
nf_hook+0xc3/0x780 include/linux/netfilter.h:242
NF_HOOK include/linux/netfilter.h:316 [inline]
__br_forward+0x1be/0x5b0 net/bridge/br_forward.c:115
deliver_clone net/bridge/br_forward.c:131 [inline]
maybe_deliver+0xf1/0x180 net/bridge/br_forward.c:191
br_flood+0x17c/0x650 net/bridge/br_forward.c:238
br_handle_frame_finish+0x1117/0x1f00 net/bridge/br_input.c:229
br_nf_hook_thresh+0x307/0x410 net/bridge/br_netfilter_hooks.c:1167
br_nf_pre_routing_finish_ipv6+0x76a/0xfc0 net/bridge/br_netfilter_ipv6.c:154
NF_HOOK include/linux/netfilter.h:318 [inline]
br_nf_pre_routing_ipv6+0x3cd/0x8c0 net/bridge/br_netfilter_ipv6.c:184
br_nf_pre_routing+0x860/0x15b0 net/bridge/br_netfilter_hooks.c:508
nf_hook_entry_hookfn include/linux/netfilter.h:158 [inline]
nf_hook_bridge_pre net/bridge/br_input.c:291 [inline]
br_handle_frame+0xb28/0x14e0 net/bridge/br_input.c:442
__netif_receive_skb_core.constprop.0+0x6b3/0x35b0 net/core/dev.c:6024
__netif_receive_skb_one_core+0xb0/0x1e0 net/core/dev.c:6135
__netif_receive_skb+0x1d/0x160 net/core/dev.c:6250
process_backlog+0x4a2/0x1650 net/core/dev.c:6602
__napi_poll.constprop.0+0xb3/0x540 net/core/dev.c:7666
napi_poll net/core/dev.c:7729 [inline]
net_rx_action+0x9f9/0xfa0 net/core/dev.c:7881
handle_softirqs+0x219/0x950 kernel/softirq.c:622
__do_softirq kernel/softirq.c:656 [inline]
invoke_softirq kernel/softirq.c:496 [inline]
__irq_exit_rcu+0x109/0x170 kernel/softirq.c:723
irq_exit_rcu+0x9/0x30 kernel/softirq.c:739
instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1056 [inline]
sysvec_apic_timer_interrupt+0xa4/0xc0 arch/x86/kernel/apic/apic.c:1056
asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:697
RIP: 0010:pv_native_safe_halt+0xf/0x20 arch/x86/kernel/paravirt.c:82
Code: 16 60 02 c3 cc cc cc cc 0f 1f 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 66 90 0f 00 2d 13 c9 12 00 fb f4 cc 35 03 00 66 2e 0f 1f 84 00 00 00 00 00 66 90 90 90 90 90 90
RSP: 0018:ffffffff8e007df8 EFLAGS: 000002c6
RAX: 00000000015811d1 RBX: 0000000000000000 RCX: ffffffff8b7796d9
RDX: 0000000000000000 RSI: ffffffff8dacbd61 RDI: ffffffff8bf2a880
RBP: fffffbfff1c12f68 R08: 0000000000000001 R09: ffffed101708673d
R10: ffff8880b84339eb R11: ffffffff8e098670 R12: 0000000000000000
R13: ffffffff8e097b40 R14: ffffffff908881d0 R15: 0000000000000000
arch_safe_halt arch/x86/include/asm/paravirt.h:107 [inline]
default_idle+0x13/0x20 arch/x86/kernel/process.c:767
default_idle_call+0x6c/0xb0 kernel/sched/idle.c:122
cpuidle_idle_call kernel/sched/idle.c:191 [inline]
do_idle+0x38d/0x510 kernel/sched/idle.c:332
cpu_startup_entry+0x4f/0x60 kernel/sched/idle.c:430
rest_init+0x16b/0x2b0 init/main.c:757
start_kernel+0x3ef/0x4d0 init/main.c:1206
x86_64_start_reservations+0x18/0x30 arch/x86/kernel/head64.c:310
x86_64_start_kernel+0x130/0x190 arch/x86/kernel/head64.c:291
common_startup_64+0x13e/0x148
net_ratelimit: 5234 callbacks suppressed
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:72:a7:d6:e9:f7:76, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:72:a7:d6:e9:f7:76, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
net_ratelimit: 5234 callbacks suppressed
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:72:a7:d6:e9:f7:76, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:72:a7:d6:e9:f7:76, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)