bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: rcu: Tasks blocked on level-0 rcu_node (CPUs 0-1): P18313/1:b..l rcu: (detected by 0, t=10503 jiffies, g=61657, q=2837 ncpus=2) task:syz.3.3558 state:R running task stack:25640 pid:18313 tgid:18308 ppid:16230 task_flags:0x400140 flags:0x00080001 Call Trace: context_switch kernel/sched/core.c:5325 [inline] __schedule+0x1798/0x4cc0 kernel/sched/core.c:6929 preempt_schedule_common+0x83/0xd0 kernel/sched/core.c:7113 preempt_schedule+0xae/0xc0 kernel/sched/core.c:7137 preempt_schedule_thunk+0x16/0x30 arch/x86/entry/thunk.S:12 __local_bh_enable_ip+0x13e/0x1c0 kernel/softirq.c:457 local_bh_enable include/linux/bottom_half.h:33 [inline] xdp_test_run_batch net/bpf/test_run.c:368 [inline] bpf_test_run_xdp_live+0x1872/0x1b20 net/bpf/test_run.c:390 bpf_prog_test_run_xdp+0x75b/0x10e0 net/bpf/test_run.c:1331 bpf_prog_test_run+0x2c7/0x340 kernel/bpf/syscall.c:4673 __sys_bpf+0x562/0x860 kernel/bpf/syscall.c:6152 __do_sys_bpf kernel/bpf/syscall.c:6244 [inline] __se_sys_bpf kernel/bpf/syscall.c:6242 [inline] __x64_sys_bpf+0x7c/0x90 kernel/bpf/syscall.c:6242 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xfa/0xfa0 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f2b92f8efc9 RSP: 002b:00007f2b93dd8038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 RAX: ffffffffffffffda RBX: 00007f2b931e6090 RCX: 00007f2b92f8efc9 RDX: 0000000000000048 RSI: 0000200000000600 RDI: 000000000000000a RBP: 00007f2b93011f91 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007f2b931e6128 R14: 00007f2b931e6090 R15: 00007ffc866bd468 rcu: rcu_preempt kthread starved for 983 jiffies! g61657 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=1 rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. rcu: RCU grace-period kthread stack dump: task:rcu_preempt state:R running task stack:26856 pid:16 tgid:16 ppid:2 task_flags:0x208040 flags:0x00080000 Call Trace: context_switch kernel/sched/core.c:5325 [inline] __schedule+0x1798/0x4cc0 kernel/sched/core.c:6929 __schedule_loop kernel/sched/core.c:7011 [inline] schedule+0x165/0x360 kernel/sched/core.c:7026 schedule_timeout+0x12b/0x270 kernel/time/sleep_timeout.c:99 rcu_gp_fqs_loop+0x301/0x1540 kernel/rcu/tree.c:2083 rcu_gp_kthread+0x99/0x390 kernel/rcu/tree.c:2285 kthread+0x711/0x8a0 kernel/kthread.c:463 ret_from_fork+0x4bc/0x870 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 rcu: Stack dump where RCU GP kthread last ran: Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 2 Comm: kthreadd Not tainted syzkaller #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 RIP: 0010:check_kcov_mode kernel/kcov.c:183 [inline] RIP: 0010:__sanitizer_cov_trace_pc+0x2f/0x70 kernel/kcov.c:217 Code: 8b 04 24 65 48 8b 0c 25 08 b0 91 92 65 8b 15 28 6c d1 10 81 e2 00 01 ff 00 74 11 81 fa 00 01 00 00 75 35 83 b9 7c 16 00 00 00 <74> 2c 8b 91 58 16 00 00 83 fa 02 75 21 48 8b 91 60 16 00 00 48 8b RSP: 0018:ffffc90000a08a88 EFLAGS: 00000246 RAX: ffffffff89655aa3 RBX: fffffff0a3da8801 RCX: ffff88801c2a9e40 RDX: 0000000000000100 RSI: 0000000000000000 RDI: 0000000000000000 RBP: ffff888044f6a648 R08: 0000000000000003 R09: 0000000000000004 R10: dffffc0000000000 R11: fffff52000141154 R12: dffffc0000000000 R13: 0019999999999998 R14: 0000000000000000 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff888125e05000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007ffde4458118 CR3: 00000000772ba000 CR4: 00000000003526f0 Call Trace: pie_calculate_probability+0x433/0x7e0 net/sched/sch_pie.c:404 fq_pie_timer+0x288/0x5b0 net/sched/sch_fq_pie.c:402 call_timer_fn+0x17e/0x5f0 kernel/time/timer.c:1747 expire_timers kernel/time/timer.c:1798 [inline] __run_timers kernel/time/timer.c:2372 [inline] __run_timer_base+0x61a/0x860 kernel/time/timer.c:2384 run_timer_base kernel/time/timer.c:2393 [inline] run_timer_softirq+0xb7/0x180 kernel/time/timer.c:2403 handle_softirqs+0x286/0x870 kernel/softirq.c:622 __do_softirq kernel/softirq.c:656 [inline] invoke_softirq kernel/softirq.c:496 [inline] __irq_exit_rcu+0xca/0x1f0 kernel/softirq.c:723 irq_exit_rcu+0x9/0x30 kernel/softirq.c:739 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1052 [inline] sysvec_apic_timer_interrupt+0xa6/0xc0 arch/x86/kernel/apic/apic.c:1052 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:697 RIP: 0010:preempt_count_sub+0x3f/0x170 kernel/sched/core.c:5821 Code: 9c 99 48 c1 e8 03 0f b6 04 18 84 c0 0f 85 d1 00 00 00 83 3d f2 c0 0c 18 00 75 25 65 8b 05 d9 7d 01 11 89 c1 81 e1 ff ff ff 7f <39> cf 7f 2a 81 ff ff 00 00 00 0f 93 c1 84 c0 0f 95 c0 08 c8 74 5e RSP: 0018:ffffc900000775c0 EFLAGS: 00000202 RAX: 0000000080000001 RBX: dffffc0000000000 RCX: 0000000000000001 RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000001 RBP: 0000000000000000 R08: ffff8880b87401c3 R09: 1ffff110170e8038 R10: dffffc0000000000 R11: ffffed10170e8039 R12: ffffffff8da0ddd8 R13: ffff8880b87401c0 R14: ffff88813fffbb80 R15: 0000000000000000 __free_frozen_pages+0x691/0xd30 mm/page_alloc.c:2935 discard_slab mm/slub.c:3310 [inline] __put_partials+0x146/0x170 mm/slub.c:3857 put_cpu_partial+0x1f2/0x2e0 mm/slub.c:3932 __slab_free+0x2b9/0x390 mm/slub.c:5906 qlink_free mm/kasan/quarantine.c:163 [inline] qlist_free_all+0x97/0x140 mm/kasan/quarantine.c:179 kasan_quarantine_reduce+0x148/0x160 mm/kasan/quarantine.c:286 __kasan_kmalloc+0x22/0xb0 mm/kasan/common.c:408 kasan_kmalloc include/linux/kasan.h:262 [inline] __kmalloc_cache_noprof+0x3d5/0x6f0 mm/slub.c:5748 kmalloc_noprof include/linux/slab.h:957 [inline] kzalloc_noprof include/linux/slab.h:1094 [inline] set_kthread_struct+0xbb/0x340 kernel/kthread.c:125 copy_process+0x10c4/0x3c00 kernel/fork.c:2110 kernel_clone+0x21e/0x840 kernel/fork.c:2609 kernel_thread+0x10d/0x160 kernel/fork.c:2670 create_kthread kernel/kthread.c:486 [inline] kthreadd+0x575/0x770 kernel/kthread.c:846 ret_from_fork+0x4bc/0x870 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 net_ratelimit: 14342 callbacks suppressed bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:ea:ff:e4:61:f2:70, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:ea:ff:e4:61:f2:70, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) net_ratelimit: 16499 callbacks suppressed bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:ea:ff:e4:61:f2:70, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:ea:ff:e4:61:f2:70, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)