rcu: INFO: rcu_preempt detected stalls on CPUs/tasks:
rcu: Tasks blocked on level-0 rcu_node (CPUs 0-1): P5111/1:b..l P5840/1:b..l P7337/1:b..l
rcu: (detected by 0, t=10503 jiffies, g=12913, q=780 ncpus=2)
task:syz.2.409 state:R running task stack:25792 pid:7337 tgid:7325 ppid:5853 flags:0x00004004
Call Trace:
context_switch kernel/sched/core.c:5328 [inline]
__schedule+0x18af/0x4bd0 kernel/sched/core.c:6690
preempt_schedule_common+0x84/0xd0 kernel/sched/core.c:6869
preempt_schedule+0xe1/0xf0 kernel/sched/core.c:6893
preempt_schedule_thunk+0x1a/0x30 arch/x86/entry/thunk.S:12
__raw_spin_unlock include/linux/spinlock_api_smp.h:143 [inline]
_raw_spin_unlock+0x3e/0x50 kernel/locking/spinlock.c:186
spin_unlock include/linux/spinlock.h:391 [inline]
zap_pte_range mm/memory.c:1691 [inline]
zap_pmd_range mm/memory.c:1739 [inline]
zap_pud_range mm/memory.c:1768 [inline]
zap_p4d_range mm/memory.c:1789 [inline]
unmap_page_range+0x36b1/0x40e0 mm/memory.c:1810
unmap_vmas+0x3cc/0x5f0 mm/memory.c:1900
exit_mmap+0x275/0xc40 mm/mmap.c:1912
__mmput+0x115/0x390 kernel/fork.c:1347
exit_mm+0x220/0x310 kernel/exit.c:571
do_exit+0x9b2/0x28e0 kernel/exit.c:926
do_group_exit+0x207/0x2c0 kernel/exit.c:1088
get_signal+0x16a3/0x1740 kernel/signal.c:2917
arch_do_signal_or_restart+0x96/0x860 arch/x86/kernel/signal.c:337
exit_to_user_mode_loop kernel/entry/common.c:111 [inline]
exit_to_user_mode_prepare include/linux/entry-common.h:328 [inline]
__syscall_exit_to_user_mode_work kernel/entry/common.c:207 [inline]
syscall_exit_to_user_mode+0xc9/0x370 kernel/entry/common.c:218
do_syscall_64+0x100/0x230 arch/x86/entry/common.c:89
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f07a277e719
RSP: 002b:00007f07a34bb0e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca
RAX: fffffffffffffe00 RBX: 00007f07a2936138 RCX: 00007f07a277e719
RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f07a2936138
RBP: 00007f07a2936130 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 00007f07a293613c
R13: 0000000000000000 R14: 00007ffc384c45d0 R15: 00007ffc384c46b8
task:syz-executor state:R running task stack:20376 pid:5840 tgid:5840 ppid:5834 flags:0x00004002
Call Trace:
context_switch kernel/sched/core.c:5328 [inline]
__schedule+0x18af/0x4bd0 kernel/sched/core.c:6690
preempt_schedule_irq+0xfb/0x1c0 kernel/sched/core.c:7012
irqentry_exit+0x5e/0x90 kernel/entry/common.c:354
asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702
RIP: 0010:preempt_count arch/x86/include/asm/preempt.h:26 [inline]
RIP: 0010:preempt_count_add+0x36/0x190 kernel/sched/core.c:5791
Code: c7 c0 40 39 3d 9a 48 c1 e8 03 49 bf 00 00 00 00 00 fc ff df 42 0f b6 04 38 84 c0 0f 85 ed 00 00 00 83 3d 1c 0b da 18 00 75 07 <65> 8b 05 9b a9 a0 7e 65 01 1d 94 a9 a0 7e 48 c7 c0 40 39 3d 9a 48
RSP: 0018:ffffc90003cc7130 EFLAGS: 00000246
RAX: 0000000000000004 RBX: 0000000000000001 RCX: ffffffff9a3d3903
RDX: dffffc0000000000 RSI: ffffc90003cc8000 RDI: 0000000000000001
RBP: ffffc90003cc72b8 R08: ffffc90003cc7201 R09: 0000000000000000
R10: ffffc90003cc7280 R11: fffff52000798e5c R12: dffffc0000000000
R13: ffffc90003cc7280 R14: ffffffff81417f18 R15: dffffc0000000000
unwind_next_frame+0xb0/0x22d0 arch/x86/kernel/unwind_orc.c:479
__unwind_start+0x59a/0x740 arch/x86/kernel/unwind_orc.c:760
unwind_start arch/x86/include/asm/unwind.h:64 [inline]
arch_stack_walk+0xe5/0x150 arch/x86/kernel/stacktrace.c:24
stack_trace_save+0x118/0x1d0 kernel/stacktrace.c:122
save_stack+0xfb/0x1f0 mm/page_owner.c:156
__reset_page_owner+0x76/0x430 mm/page_owner.c:297
reset_page_owner include/linux/page_owner.h:25 [inline]
free_pages_prepare mm/page_alloc.c:1108 [inline]
free_unref_page+0xcfb/0xf20 mm/page_alloc.c:2638
discard_slab mm/slub.c:2677 [inline]
__put_partials+0xeb/0x130 mm/slub.c:3145
put_cpu_partial+0x17c/0x250 mm/slub.c:3220
__slab_free+0x2ea/0x3d0 mm/slub.c:4449
qlink_free mm/kasan/quarantine.c:163 [inline]
qlist_free_all+0x9a/0x140 mm/kasan/quarantine.c:179
kasan_quarantine_reduce+0x14f/0x170 mm/kasan/quarantine.c:286
__kasan_kmalloc+0x23/0xb0 mm/kasan/common.c:385
kasan_kmalloc include/linux/kasan.h:257 [inline]
__do_kmalloc_node mm/slub.c:4264 [inline]
__kmalloc_noprof+0x1fc/0x400 mm/slub.c:4276
kmalloc_noprof include/linux/slab.h:882 [inline]
kzalloc_noprof include/linux/slab.h:1014 [inline]
tomoyo_encode2 security/tomoyo/realpath.c:45 [inline]
tomoyo_encode+0x26f/0x540 security/tomoyo/realpath.c:80
tomoyo_realpath_from_path+0x59e/0x5e0 security/tomoyo/realpath.c:283
tomoyo_get_realpath security/tomoyo/file.c:151 [inline]
tomoyo_path_perm+0x2b7/0x740 security/tomoyo/file.c:822
security_inode_getattr+0x130/0x330 security/security.c:2373
vfs_getattr+0x45/0x430 fs/stat.c:204
vfs_statx_path fs/stat.c:251 [inline]
vfs_statx+0x199/0x490 fs/stat.c:315
vfs_fstatat+0x145/0x190 fs/stat.c:341
__do_sys_newfstatat fs/stat.c:505 [inline]
__se_sys_newfstatat fs/stat.c:499 [inline]
__x64_sys_newfstatat+0x11d/0x1a0 fs/stat.c:499
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7fed2097cf2a
RSP: 002b:00007ffd0b282af8 EFLAGS: 00000286 ORIG_RAX: 0000000000000106
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fed2097cf2a
RDX: 00007ffd0b282b20 RSI: 00007ffd0b282bb0 RDI: 00000000ffffff9c
RBP: 00007ffd0b282bb0 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000100 R11: 0000000000000286 R12: 00007ffd0b283c30
R13: 00007fed209f123c R14: 0000000000019606 R15: 00007ffd0b283c70
task:kworker/u8:8 state:R running task stack:20976 pid:5111 tgid:5111 ppid:2 flags:0x00004000
Workqueue: writeback wb_workfn (flush-8:0)
Call Trace:
context_switch kernel/sched/core.c:5328 [inline]
__schedule+0x18af/0x4bd0 kernel/sched/core.c:6690
preempt_schedule_irq+0xfb/0x1c0 kernel/sched/core.c:7012
irqentry_exit+0x5e/0x90 kernel/entry/common.c:354
asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702
RIP: 0010:lock_is_held_type+0x13b/0x190
Code: 75 44 48 c7 04 24 00 00 00 00 9c 8f 04 24 f7 04 24 00 02 00 00 75 4c 41 f7 c4 00 02 00 00 74 01 fb 65 48 8b 04 25 28 00 00 00 <48> 3b 44 24 08 75 42 89 d8 48 83 c4 10 5b 41 5c 41 5d 41 5e 41 5f
RSP: 0018:ffffc9000f8fe8d8 EFLAGS: 00000206
RAX: 63e2ab263bd1a400 RBX: 0000000000000001 RCX: 0000000080000000
RDX: 0000000000000000 RSI: ffffffff8c0adc40 RDI: ffffffff8c610420
RBP: 0000000000000005 R08: ffffffff820b68ce R09: 1ffffffff2859900
R10: dffffc0000000000 R11: fffffbfff2859901 R12: 0000000000000246
R13: ffff888035248000 R14: 00000000ffffffff R15: ffffffff8e937da0
lookup_page_ext mm/page_ext.c:254 [inline]
page_ext_get+0x192/0x2a0 mm/page_ext.c:526
__page_table_check_zero+0xb1/0x350 mm/page_table_check.c:148
page_table_check_free include/linux/page_table_check.h:41 [inline]
free_pages_prepare mm/page_alloc.c:1109 [inline]
free_unref_page+0xd0f/0xf20 mm/page_alloc.c:2638
discard_slab mm/slub.c:2677 [inline]
__put_partials+0xeb/0x130 mm/slub.c:3145
put_cpu_partial+0x17c/0x250 mm/slub.c:3220
__slab_free+0x2ea/0x3d0 mm/slub.c:4449
qlink_free mm/kasan/quarantine.c:163 [inline]
qlist_free_all+0x9a/0x140 mm/kasan/quarantine.c:179
kasan_quarantine_reduce+0x14f/0x170 mm/kasan/quarantine.c:286
__kasan_slab_alloc+0x23/0x80 mm/kasan/common.c:329
kasan_slab_alloc include/linux/kasan.h:247 [inline]
slab_post_alloc_hook mm/slub.c:4085 [inline]
slab_alloc_node mm/slub.c:4134 [inline]
kmem_cache_alloc_noprof+0x135/0x2a0 mm/slub.c:4141
ext4_init_io_end+0x29/0x130 fs/ext4/page-io.c:277
ext4_do_writepages+0xc16/0x3d20 fs/ext4/inode.c:2672
ext4_writepages+0x213/0x3c0 fs/ext4/inode.c:2813
do_writepages+0x35d/0x870 mm/page-writeback.c:2683
__writeback_single_inode+0x14f/0x10d0 fs/fs-writeback.c:1658
writeback_sb_inodes+0x80c/0x1370 fs/fs-writeback.c:1954
__writeback_inodes_wb+0x11b/0x260 fs/fs-writeback.c:2025
wb_writeback+0x42f/0xbd0 fs/fs-writeback.c:2136
wb_check_old_data_flush fs/fs-writeback.c:2240 [inline]
wb_do_writeback fs/fs-writeback.c:2293 [inline]
wb_workfn+0xba1/0x1090 fs/fs-writeback.c:2321
process_one_work kernel/workqueue.c:3229 [inline]
process_scheduled_works+0xa63/0x1850 kernel/workqueue.c:3310
worker_thread+0x870/0xd30 kernel/workqueue.c:3391
kthread+0x2f0/0x390 kernel/kthread.c:389
ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
rcu: rcu_preempt kthread starved for 10595 jiffies! g12913 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=1
rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior.
rcu: RCU grace-period kthread stack dump:
task:rcu_preempt state:R running task stack:25136 pid:17 tgid:17 ppid:2 flags:0x00004000
Call Trace:
context_switch kernel/sched/core.c:5328 [inline]
__schedule+0x18af/0x4bd0 kernel/sched/core.c:6690
__schedule_loop kernel/sched/core.c:6767 [inline]
schedule+0x14b/0x320 kernel/sched/core.c:6782
schedule_timeout+0x1be/0x310 kernel/time/timer.c:2615
rcu_gp_fqs_loop+0x2df/0x1330 kernel/rcu/tree.c:2045
rcu_gp_kthread+0xa7/0x3b0 kernel/rcu/tree.c:2247
kthread+0x2f0/0x390 kernel/kthread.c:389
ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
rcu: Stack dump where RCU GP kthread last ran:
Sending NMI from CPU 0 to CPUs 1:
NMI backtrace for cpu 1
CPU: 1 UID: 0 PID: 6762 Comm: kworker/u8:14 Not tainted 6.12.0-rc5-syzkaller-00184-g5ccdcdf186ae #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
Workqueue: events_unbound cfg80211_wiphy_work
RIP: 0010:__find_rr_leaf+0x14a/0x8e0 net/ipv6/route.c:801
Code: 89 84 24 98 00 00 00 48 89 5c 24 40 4c 89 74 24 48 4d 85 f6 74 3d 49 8d 9c 24 90 00 00 00 48 89 d8 48 c1 e8 03 42 0f b6 04 38 <84> c0 0f 85 9b 04 00 00 44 8b 2b 44 89 ef 8b 5c 24 74 89 de e8 bd
RSP: 0018:ffffc90000a17400 EFLAGS: 00000a02
RAX: 0000000000000000 RBX: ffff8880124f5490 RCX: ffff88802818da00
RDX: 0000000000000100 RSI: 0000000000000001 RDI: 0000000000000000
RBP: ffffc90000a17578 R08: ffffffff8a6ca560 R09: ffffc90000a176b0
R10: ffffc90000a176a0 R11: fffff52000142ea2 R12: ffff8880124f5400
R13: 0000000000000000 R14: ffffc90000a17680 R15: dffffc0000000000
FS: 0000000000000000(0000) GS:ffff8880b8700000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fffc571bf80 CR3: 0000000064b08000 CR4: 00000000003526f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
find_rr_leaf net/ipv6/route.c:853 [inline]
rt6_select net/ipv6/route.c:897 [inline]
fib6_table_lookup+0x413/0xbb0 net/ipv6/route.c:2195
ip6_pol_route+0x273/0x15d0 net/ipv6/route.c:2231
pol_lookup_func include/net/ip6_fib.h:616 [inline]
fib6_rule_lookup+0x58c/0x790 net/ipv6/fib6_rules.c:117
ip6_route_input_lookup net/ipv6/route.c:2300 [inline]
ip6_route_input+0x859/0xd90 net/ipv6/route.c:2596
ip6_rcv_finish+0x144/0x180 net/ipv6/ip6_input.c:77
ip_sabotage_in+0x203/0x290 net/bridge/br_netfilter_hooks.c:1018
nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline]
nf_hook_slow+0xc3/0x220 net/netfilter/core.c:626
nf_hook include/linux/netfilter.h:269 [inline]
NF_HOOK+0x29e/0x450 include/linux/netfilter.h:312
__netif_receive_skb_one_core net/core/dev.c:5670 [inline]
__netif_receive_skb+0x1ea/0x650 net/core/dev.c:5783
netif_receive_skb_internal net/core/dev.c:5869 [inline]
netif_receive_skb+0x1e8/0x890 net/core/dev.c:5928
NF_HOOK+0x9e/0x400 include/linux/netfilter.h:314
br_handle_frame_finish+0x18ed/0x1fe0
br_nf_hook_thresh+0x472/0x590
br_nf_pre_routing_finish_ipv6+0xaa0/0xdd0
NF_HOOK include/linux/netfilter.h:314 [inline]
br_nf_pre_routing_ipv6+0x379/0x770 net/bridge/br_netfilter_ipv6.c:184
nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline]
nf_hook_bridge_pre net/bridge/br_input.c:277 [inline]
br_handle_frame+0x9fd/0x1530 net/bridge/br_input.c:424
__netif_receive_skb_core+0x13e8/0x4570 net/core/dev.c:5564
__netif_receive_skb_one_core net/core/dev.c:5668 [inline]
__netif_receive_skb+0x12f/0x650 net/core/dev.c:5783
process_backlog+0x662/0x15b0 net/core/dev.c:6115
__napi_poll+0xcb/0x490 net/core/dev.c:6779
napi_poll net/core/dev.c:6848 [inline]
net_rx_action+0x89b/0x1240 net/core/dev.c:6970
handle_softirqs+0x2c5/0x980 kernel/softirq.c:554
do_softirq+0x11b/0x1e0 kernel/softirq.c:455
__local_bh_enable_ip+0x1bb/0x200 kernel/softirq.c:382
ieee80211_rx_bss_info net/mac80211/ibss.c:1172 [inline]
ieee80211_rx_mgmt_probe_beacon net/mac80211/ibss.c:1579 [inline]
ieee80211_ibss_rx_queued_mgmt+0x1b14/0x2d70 net/mac80211/ibss.c:1606
ieee80211_iface_process_skb net/mac80211/iface.c:1603 [inline]
ieee80211_iface_work+0x8a5/0xf20 net/mac80211/iface.c:1657
cfg80211_wiphy_work+0x2db/0x490 net/wireless/core.c:440
process_one_work kernel/workqueue.c:3229 [inline]
process_scheduled_works+0xa63/0x1850 kernel/workqueue.c:3310
worker_thread+0x870/0xd30 kernel/workqueue.c:3391
kthread+0x2f0/0x390 kernel/kthread.c:389
ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
net_ratelimit: 20153 callbacks suppressed
bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:cd:eb:91:32:74, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:cd:eb:91:32:74, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:cd:eb:91:32:74, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
net_ratelimit: 29462 callbacks suppressed
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:cd:eb:91:32:74, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:cd:eb:91:32:74, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:cd:eb:91:32:74, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)