bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: rcu: Tasks blocked on level-0 rcu_node (CPUs 0-1): P10378/1:b..l rcu: (detected by 0, t=10503 jiffies, g=47949, q=437 ncpus=2) task:syz.1.1333 state:R running task stack:23704 pid:10378 tgid:10371 ppid:5844 task_flags:0x400040 flags:0x00080007 Call Trace: context_switch kernel/sched/core.c:5325 [inline] __schedule+0x1798/0x4cc0 kernel/sched/core.c:6929 preempt_schedule_irq+0xb5/0x150 kernel/sched/core.c:7256 irqentry_exit+0x6f/0x90 kernel/entry/common.c:211 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:697 RIP: 0010:lock_release+0x8f/0x3e0 kernel/locking/lockdep.c:5881 Code: 44 02 00 00 65 8b 05 20 cd f3 10 85 c0 0f 85 35 02 00 00 65 4c 8b 3c 25 08 30 91 92 41 83 bf 2c 0b 00 00 00 0f 85 1e 02 00 00 <49> 81 3e 40 e3 54 93 0f 84 11 02 00 00 48 c7 44 24 20 00 00 00 00 RSP: 0018:ffffc9000be2ed68 EFLAGS: 00000246 RAX: 0000000000000000 RBX: 0000000000000001 RCX: 1c329117bbcf0600 RDX: ffffc9000f8e9000 RSI: ffffffff8bc073c0 RDI: ffffffff8bc07380 RBP: 0000000000000000 R08: 0000000000000000 R09: ffffffff8230fdd2 R10: dffffc0000000000 R11: fffff940002951b7 R12: 0000000000000000 R13: ffffffff82310147 R14: ffffffff8e13d2e0 R15: ffff88802e90dac0 rcu_lock_release include/linux/rcupdate.h:341 [inline] rcu_read_unlock include/linux/rcupdate.h:897 [inline] page_ext_put+0xa3/0xc0 mm/page_ext.c:552 __reset_page_owner+0x67/0x1f0 mm/page_owner.c:300 reset_page_owner include/linux/page_owner.h:25 [inline] free_pages_prepare mm/page_alloc.c:1394 [inline] __free_frozen_pages+0xbc4/0xd30 mm/page_alloc.c:2906 discard_slab mm/slub.c:3317 [inline] __put_partials+0x146/0x170 mm/slub.c:3864 put_cpu_partial+0x1f2/0x2e0 mm/slub.c:3939 __slab_free+0x2b9/0x390 mm/slub.c:5913 qlink_free mm/kasan/quarantine.c:163 [inline] qlist_free_all+0x97/0x140 mm/kasan/quarantine.c:179 kasan_quarantine_reduce+0x148/0x160 mm/kasan/quarantine.c:286 __kasan_slab_alloc+0x22/0x80 mm/kasan/common.c:352 kasan_slab_alloc include/linux/kasan.h:252 [inline] slab_post_alloc_hook mm/slub.c:4962 [inline] slab_alloc_node mm/slub.c:5272 [inline] __do_kmalloc_node mm/slub.c:5633 [inline] __kmalloc_node_noprof+0x51e/0x800 mm/slub.c:5640 kmalloc_array_node_noprof include/linux/slab.h:1075 [inline] alloc_slab_obj_exts+0x3d/0xc0 mm/slub.c:2123 __memcg_slab_post_alloc_hook+0x31d/0x7d0 mm/memcontrol.c:3173 memcg_slab_post_alloc_hook mm/slub.c:2329 [inline] slab_post_alloc_hook mm/slub.c:4973 [inline] slab_alloc_node mm/slub.c:5272 [inline] kmem_cache_alloc_node_noprof+0x4e4/0x710 mm/slub.c:5324 __alloc_skb+0x112/0x2d0 net/core/skbuff.c:660 alloc_skb include/linux/skbuff.h:1383 [inline] alloc_skb_with_frags+0xca/0x890 net/core/skbuff.c:6671 sock_alloc_send_pskb+0x84d/0x980 net/core/sock.c:2965 unix_dgram_sendmsg+0x461/0x1850 net/unix/af_unix.c:2153 sock_sendmsg_nosec net/socket.c:727 [inline] __sock_sendmsg+0x21c/0x270 net/socket.c:742 sock_write_iter+0x279/0x360 net/socket.c:1195 io_write+0xb33/0x1700 io_uring/rw.c:1174 __io_issue_sqe+0x181/0x4b0 io_uring/io_uring.c:1824 io_issue_sqe+0x165/0x1060 io_uring/io_uring.c:1847 io_queue_sqe io_uring/io_uring.c:2074 [inline] io_req_task_submit+0x148/0x220 io_uring/io_uring.c:1466 io_poll_task_func+0xaa0/0xdb0 io_uring/poll.c:-1 io_handle_tw_list+0x1f5/0x4c0 io_uring/io_uring.c:1151 tctx_task_work_run+0x99/0x370 io_uring/io_uring.c:1216 tctx_task_work+0x3f/0x90 io_uring/io_uring.c:1234 task_work_run+0x1d4/0x260 kernel/task_work.c:227 get_signal+0x11ec/0x1340 kernel/signal.c:2807 arch_do_signal_or_restart+0xa0/0x790 arch/x86/kernel/signal.c:337 exit_to_user_mode_loop+0x72/0x130 kernel/entry/common.c:40 exit_to_user_mode_prepare include/linux/irq-entry-common.h:225 [inline] syscall_exit_to_user_mode_work include/linux/entry-common.h:175 [inline] syscall_exit_to_user_mode include/linux/entry-common.h:210 [inline] do_syscall_64+0x2bd/0xfa0 arch/x86/entry/syscall_64.c:100 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f233958efc9 RSP: 002b:00007f233a480038 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa RAX: 0000000000000800 RBX: 00007f23397e6180 RCX: 00007f233958efc9 RDX: 000000000000b238 RSI: 0000000000003513 RDI: 000000000000000e RBP: 00007f2339611f91 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000020 R11: 0000000000000246 R12: 0000000000000000 R13: 00007f23397e6218 R14: 00007f23397e6180 R15: 00007f233990fa28 rcu: rcu_preempt kthread starved for 6951 jiffies! g47949 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=1 rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. rcu: RCU grace-period kthread stack dump: task:rcu_preempt state:R running task stack:27288 pid:16 tgid:16 ppid:2 task_flags:0x208040 flags:0x00080000 Call Trace: context_switch kernel/sched/core.c:5325 [inline] __schedule+0x1798/0x4cc0 kernel/sched/core.c:6929 __schedule_loop kernel/sched/core.c:7011 [inline] schedule+0x165/0x360 kernel/sched/core.c:7026 schedule_timeout+0x12b/0x270 kernel/time/sleep_timeout.c:99 rcu_gp_fqs_loop+0x301/0x1540 kernel/rcu/tree.c:2083 rcu_gp_kthread+0x99/0x390 kernel/rcu/tree.c:2285 kthread+0x711/0x8a0 kernel/kthread.c:463 ret_from_fork+0x4bc/0x870 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 rcu: Stack dump where RCU GP kthread last ran: Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Not tainted syzkaller #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 RIP: 0010:pv_native_safe_halt+0x13/0x20 arch/x86/kernel/paravirt.c:82 Code: cc cc cc cc cc cc cc 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 66 90 0f 00 2d 33 b1 1b 00 f3 0f 1e fa fb f4 c8 e6 02 00 cc cc cc cc cc cc cc cc 90 90 90 90 90 90 90 90 90 RSP: 0018:ffffc90000197de0 EFLAGS: 000002c6 RAX: e768e131be953900 RBX: ffffffff8196bc07 RCX: e768e131be953900 RDX: 0000000000000001 RSI: ffffffff8d7e80d5 RDI: ffffffff8bc073e0 RBP: ffffc90000197f10 R08: ffff8880b8732fdb R09: 1ffff110170e65fb R10: dffffc0000000000 R11: ffffed10170e65fc R12: ffffffff8f9dfc70 R13: 0000000000000001 R14: 0000000000000001 R15: 1ffff1100385ab58 FS: 0000000000000000(0000) GS:ffff888125e0d000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007ffc04c51858 CR3: 000000002871a000 CR4: 00000000003526f0 Call Trace: arch_safe_halt arch/x86/include/asm/paravirt.h:107 [inline] default_idle+0x13/0x20 arch/x86/kernel/process.c:767 default_idle_call+0x73/0xb0 kernel/sched/idle.c:122 cpuidle_idle_call kernel/sched/idle.c:190 [inline] do_idle+0x1e7/0x510 kernel/sched/idle.c:330 cpu_startup_entry+0x44/0x60 kernel/sched/idle.c:428 start_secondary+0x101/0x110 arch/x86/kernel/smpboot.c:315 common_startup_64+0x13e/0x147 net_ratelimit: 19778 callbacks suppressed bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:2a:0b:95:b3:86, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:2a:0b:95:b3:86, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)