bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: rcu: Tasks blocked on level-0 rcu_node (CPUs 0-1): P11321/1:b..l rcu: (detected by 1, t=10502 jiffies, g=44397, q=2024 ncpus=2) task:syz.0.1429 state:R running task stack:25352 pid:11321 tgid:11319 ppid:5828 task_flags:0x40054c flags:0x00004006 Call Trace: context_switch kernel/sched/core.c:5396 [inline] __schedule+0x16a2/0x4cb0 kernel/sched/core.c:6785 preempt_schedule_irq+0xb5/0x150 kernel/sched/core.c:7108 irqentry_exit+0x6f/0x90 kernel/entry/common.c:307 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702 RIP: 0010:__rcu_read_lock+0x32/0x60 kernel/rcu/tree_plugin.h:416 Code: 1c 25 08 c0 99 92 48 81 c3 44 04 00 00 48 89 d8 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df 0f b6 04 08 84 c0 75 18 ff 03 8b 03 <3d> 00 00 00 40 7d 07 5b e9 41 fa ba 09 cc 90 0f 0b 90 eb f3 89 d9 RSP: 0018:ffffc9000b6c7050 EFLAGS: 00000202 RAX: 0000000000000001 RBX: ffff888030124044 RCX: dffffc0000000000 RDX: 0000000000000000 RSI: ffffffff8be1b960 RDI: 00007f53dad8e929 RBP: 0000000000000001 R08: 0000000000000022 R09: ffffffff81728af5 R10: ffffc9000b6c7138 R11: ffffffff81ace5d0 R12: ffff888030123c00 R13: 0000000000000000 R14: 00007f53dad8e929 R15: 1ffff920016d8e26 rcu_read_lock include/linux/rcupdate.h:839 [inline] class_rcu_constructor include/linux/rcupdate.h:1155 [inline] is_module_text_address+0x16/0x1e0 kernel/module/main.c:3817 kernel_text_address+0x94/0xe0 kernel/extable.c:119 __kernel_text_address+0xd/0x40 kernel/extable.c:79 unwind_get_return_address+0x4d/0x90 arch/x86/kernel/unwind_orc.c:369 arch_stack_walk+0xfc/0x150 arch/x86/kernel/stacktrace.c:26 stack_trace_save+0x9c/0xe0 kernel/stacktrace.c:122 kasan_save_stack mm/kasan/common.c:47 [inline] kasan_save_track+0x3e/0x80 mm/kasan/common.c:68 kasan_save_free_info+0x46/0x50 mm/kasan/generic.c:576 poison_slab_object mm/kasan/common.c:247 [inline] __kasan_slab_free+0x62/0x70 mm/kasan/common.c:264 kasan_slab_free include/linux/kasan.h:233 [inline] slab_free_hook mm/slub.c:2381 [inline] slab_free mm/slub.c:4643 [inline] kfree+0x18e/0x440 mm/slub.c:4842 snd_seq_port_disconnect+0x58d/0x630 sound/core/seq/seq_ports.c:649 snd_seq_ioctl_unsubscribe_port+0x333/0x710 sound/core/seq/seq_clientmgr.c:1596 snd_seq_oss_midi_close+0x3c2/0x620 sound/core/seq/oss/seq_oss_midi.c:414 snd_seq_oss_midi_cleanup+0x55/0xf0 sound/core/seq/oss/seq_oss_midi.c:283 snd_seq_oss_release+0xfb/0x2e0 sound/core/seq/oss/seq_oss_init.c:410 odev_release+0x53/0x70 sound/core/seq/oss/seq_oss.c:144 __fput+0x44c/0xa70 fs/file_table.c:465 task_work_run+0x1d4/0x260 kernel/task_work.c:227 exit_task_work include/linux/task_work.h:40 [inline] do_exit+0x6b5/0x22e0 kernel/exit.c:964 do_group_exit+0x21c/0x2d0 kernel/exit.c:1105 get_signal+0x125e/0x1310 kernel/signal.c:3034 arch_do_signal_or_restart+0x9a/0x750 arch/x86/kernel/signal.c:337 exit_to_user_mode_loop+0x75/0x110 kernel/entry/common.c:111 exit_to_user_mode_prepare include/linux/entry-common.h:330 [inline] syscall_exit_to_user_mode_work include/linux/entry-common.h:414 [inline] syscall_exit_to_user_mode include/linux/entry-common.h:449 [inline] do_syscall_64+0x2bd/0x3b0 arch/x86/entry/syscall_64.c:100 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f53dad8e929 RSP: 002b:00007f53dbcc3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 RAX: 00000000000038fc RBX: 00007f53dafb5fa0 RCX: 00007f53dad8e929 RDX: 0000000000000002 RSI: 0000200000000840 RDI: 000000000000000d RBP: 00007f53dae10b39 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000000 R14: 00007f53dafb5fa0 R15: 00007ffeb0183af8 rcu: rcu_preempt kthread starved for 2877 jiffies! g44397 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=0 rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. rcu: RCU grace-period kthread stack dump: task:rcu_preempt state:R running task stack:25928 pid:16 tgid:16 ppid:2 task_flags:0x208040 flags:0x00004000 Call Trace: context_switch kernel/sched/core.c:5396 [inline] __schedule+0x16a2/0x4cb0 kernel/sched/core.c:6785 __schedule_loop kernel/sched/core.c:6863 [inline] schedule+0x165/0x360 kernel/sched/core.c:6878 schedule_timeout+0x12b/0x270 kernel/time/sleep_timeout.c:99 rcu_gp_fqs_loop+0x301/0x1540 kernel/rcu/tree.c:2054 rcu_gp_kthread+0x99/0x390 kernel/rcu/tree.c:2256 kthread+0x711/0x8a0 kernel/kthread.c:464 ret_from_fork+0x3fc/0x770 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 rcu: Stack dump where RCU GP kthread last ran: Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Not tainted 6.16.0-rc4-syzkaller-00108-g17bbde2e1716 #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 RIP: 0010:check_kcov_mode kernel/kcov.c:183 [inline] RIP: 0010:write_comp_data kernel/kcov.c:246 [inline] RIP: 0010:__sanitizer_cov_trace_const_cmp4+0x2f/0x90 kernel/kcov.c:314 Code: 8b 04 24 65 48 8b 14 25 08 c0 99 92 65 8b 0d 48 6e d9 10 81 e1 00 01 ff 00 74 11 81 f9 00 01 00 00 75 5b 83 ba 3c 16 00 00 00 <74> 52 8b 8a 18 16 00 00 83 f9 03 75 47 48 8b 8a 20 16 00 00 44 8b RSP: 0018:ffffc900000070f8 EFLAGS: 00000246 RAX: ffffffff8a179362 RBX: ffff888059f204c8 RCX: 0000000000000100 RDX: ffffffff8de95280 RSI: 00000000fffffffd RDI: 00000000fffffffd RBP: 1ffff1100b3e4099 R08: ffffc90000007400 R09: ffffc90000007410 R10: ffffc90000007260 R11: fffff52000000e4e R12: dffffc0000000000 R13: 0000000000000003 R14: 1ffff1100b3e409b R15: 00000000fffffffd FS: 0000000000000000(0000) GS:ffff888125c84000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f9c66602dd0 CR3: 000000007858a000 CR4: 00000000003526f0 Call Trace: find_match+0x1d2/0xc90 net/ipv6/route.c:790 __find_rr_leaf+0x23a/0x6d0 net/ipv6/route.c:869 find_rr_leaf net/ipv6/route.c:890 [inline] rt6_select net/ipv6/route.c:934 [inline] fib6_table_lookup+0x39f/0xa80 net/ipv6/route.c:2232 ip6_pol_route+0x222/0x1180 net/ipv6/route.c:2268 pol_lookup_func include/net/ip6_fib.h:617 [inline] fib6_rule_lookup+0x52f/0x6f0 net/ipv6/fib6_rules.c:120 ip6_route_input_lookup net/ipv6/route.c:2337 [inline] ip6_route_input+0x6ce/0xa50 net/ipv6/route.c:2640 ip6_rcv_finish+0x141/0x2d0 net/ipv6/ip6_input.c:77 NF_HOOK+0x309/0x3a0 include/linux/netfilter.h:317 __netif_receive_skb_one_core net/core/dev.c:5977 [inline] __netif_receive_skb+0xd3/0x380 net/core/dev.c:6090 process_backlog+0x60e/0x14f0 net/core/dev.c:6442 __napi_poll+0xc4/0x480 net/core/dev.c:7414 napi_poll net/core/dev.c:7478 [inline] net_rx_action+0x707/0xe30 net/core/dev.c:7605 handle_softirqs+0x283/0x870 kernel/softirq.c:579 __do_softirq kernel/softirq.c:613 [inline] invoke_softirq kernel/softirq.c:453 [inline] __irq_exit_rcu+0xca/0x1f0 kernel/softirq.c:680 irq_exit_rcu+0x9/0x30 kernel/softirq.c:696 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1050 [inline] sysvec_apic_timer_interrupt+0xa6/0xc0 arch/x86/kernel/apic/apic.c:1050 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702 RIP: 0010:pv_native_safe_halt+0x13/0x20 arch/x86/kernel/paravirt.c:82 Code: c3 dd 02 00 cc cc cc 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 66 90 0f 00 2d 63 45 28 00 f3 0f 1e fa fb f4 98 dd 02 00 cc cc cc cc cc cc cc cc 90 90 90 90 90 90 90 90 90 RSP: 0018:ffffffff8de07d80 EFLAGS: 000002c2 RAX: 7836f1c8037fc400 RBX: ffffffff81974c88 RCX: 7836f1c8037fc400 RDX: 0000000000000001 RSI: ffffffff8d96e99a RDI: ffffffff8be1b980 RBP: ffffffff8de07ea8 R08: ffff8880b8632f5b R09: 1ffff110170c65eb R10: dffffc0000000000 R11: ffffed10170c65ec R12: ffffffff8f9fe0f0 R13: 0000000000000000 R14: 0000000000000000 R15: 1ffffffff1bd2a50 arch_safe_halt arch/x86/include/asm/paravirt.h:107 [inline] default_idle+0x13/0x20 arch/x86/kernel/process.c:749 default_idle_call+0x74/0xb0 kernel/sched/idle.c:117 cpuidle_idle_call kernel/sched/idle.c:185 [inline] do_idle+0x1e8/0x510 kernel/sched/idle.c:325 cpu_startup_entry+0x44/0x60 kernel/sched/idle.c:423 rest_init+0x2de/0x300 init/main.c:745 start_kernel+0x47d/0x500 init/main.c:1102 x86_64_start_reservations+0x24/0x30 arch/x86/kernel/head64.c:307 x86_64_start_kernel+0x143/0x1c0 arch/x86/kernel/head64.c:288 common_startup_64+0x13e/0x147 net_ratelimit: 15157 callbacks suppressed bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) net_ratelimit: 17512 callbacks suppressed bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)