rcu: INFO: rcu_preempt detected stalls on CPUs/tasks:
rcu: Tasks blocked on level-0 rcu_node (CPUs 0-1): P21608/1:b..l
rcu: (detected by 1, t=10503 jiffies, g=104637, q=709 ncpus=2)
task:syz-executor state:R
running task stack:23104 pid:21608 tgid:21608 ppid:1 flags:0x00004006
Call Trace:
context_switch kernel/sched/core.c:5369 [inline]
__schedule+0xe58/0x5ad0 kernel/sched/core.c:6756
preempt_schedule_irq+0x51/0x90 kernel/sched/core.c:7078
irqentry_exit+0x36/0x90 kernel/entry/common.c:354
asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702
RIP: 0010:check_kcov_mode kernel/kcov.c:185 [inline]
RIP: 0010:__sanitizer_cov_trace_pc+0x3b/0x70 kernel/kcov.c:217
Code: 6a 7e a9 00 01 ff 00 48 8b 34 24 74 1d f6 c4 01 74 43 a9 00 00 0f 00 75 3c a9 00 00 f0 00 75 35 8b 82 1c 16 00 00 85 c0 74 2b <8b> 82 f8 15 00 00 83 f8 02 75 20 48 8b 8a 00 16 00 00 8b 92 fc 15
RSP: 0018:ffffc90003967a08 EFLAGS: 00000246
RAX: 0000000080000000 RBX: ffffea0001fbd4c0 RCX: ffffffff81eaf0d0
RDX: ffff888034f40000 RSI: ffffffff81eaf146 RDI: 0000000000000005
RBP: 0000000000000000 R08: 0000000000000005 R09: 00000000000000f5
R10: 00000000000000ff R11: 0000000000000000 R12: 00000000ffffffff
R13: 0000000000000000 R14: 00000000000000ff R15: ffff8880270355ac
rcu_read_unlock include/linux/rcupdate.h:878 [inline]
mod_memcg_page_state.part.0.constprop.0+0x1b6/0x620 include/linux/memcontrol.h:940
mod_memcg_page_state mm/vmalloc.c:3374 [inline]
vfree+0x168/0x890 mm/vmalloc.c:3377
kcov_put kernel/kcov.c:439 [inline]
kcov_put+0x2a/0x40 kernel/kcov.c:435
kcov_close+0xd/0x20 kernel/kcov.c:535
__fput+0x3f8/0xb60 fs/file_table.c:450
task_work_run+0x14e/0x250 kernel/task_work.c:239
exit_task_work include/linux/task_work.h:43 [inline]
do_exit+0xadd/0x2d70 kernel/exit.c:938
do_group_exit+0xd3/0x2a0 kernel/exit.c:1087
get_signal+0x2576/0x2610 kernel/signal.c:3017
arch_do_signal_or_restart+0x90/0x7e0 arch/x86/kernel/signal.c:337
exit_to_user_mode_loop kernel/entry/common.c:111 [inline]
exit_to_user_mode_prepare include/linux/entry-common.h:329 [inline]
__syscall_exit_to_user_mode_work kernel/entry/common.c:207 [inline]
syscall_exit_to_user_mode+0x150/0x2a0 kernel/entry/common.c:218
do_syscall_64+0xda/0x250 arch/x86/entry/common.c:89
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f6c40d7e6ea
RSP: 002b:00007ffc992c9f08 EFLAGS: 00000206 ORIG_RAX: 0000000000000106
RAX: 0000000000000000 RBX: 0000000000000003 RCX: 00007f6c40d7e6ea
RDX: 00007ffc992c9f10 RSI: 00007f6c40e299e2 RDI: 0000000000000003
RBP: 00007ffc992c9f10 R08: 0000000000000000 R09: 00007f6c41b09000
R10: 0000000000001000 R11: 0000000000000206 R12: 00007ffc992cb100
R13: 00007f6c40df3ab4 R14: 00000000000ec318 R15: 00007ffc992cb140
rcu: rcu_preempt kthread starved for 10550 jiffies! g104637 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=0
rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior.
rcu: RCU grace-period kthread stack dump:
task:rcu_preempt state:R running task stack:27568 pid:17 tgid:17 ppid:2 flags:0x00004000
Call Trace:
context_switch kernel/sched/core.c:5369 [inline]
__schedule+0xe58/0x5ad0 kernel/sched/core.c:6756
__schedule_loop kernel/sched/core.c:6833 [inline]
schedule+0xe7/0x350 kernel/sched/core.c:6848
schedule_timeout+0x124/0x280 kernel/time/sleep_timeout.c:99
rcu_gp_fqs_loop+0x1eb/0xb00 kernel/rcu/tree.c:2045
rcu_gp_kthread+0x271/0x380 kernel/rcu/tree.c:2247
kthread+0x2c1/0x3a0 kernel/kthread.c:389
ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
rcu: Stack dump where RCU GP kthread last ran:
Sending NMI from CPU 1 to CPUs 0:
NMI backtrace for cpu 0
CPU: 0 UID: 0 PID: 16 Comm: ksoftirqd/0 Not tainted 6.13.0-rc1-syzkaller-00378-g62b5a46999c7 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
RIP: 0010:arch_local_irq_restore arch/x86/include/asm/irqflags.h:154 [inline]
RIP: 0010:lock_is_held_type+0xf8/0x150 kernel/locking/lockdep.c:5923
Code: f0 41 0f 94 c5 48 c7 c7 e0 d3 4c 8b e8 91 16 00 00 b8 ff ff ff ff 65 0f c1 05 1c b1 e7 74 83 f8 01 75 2d 9c 58 f6 c4 02 75 43 <48> f7 04 24 00 02 00 00 74 01 fb 48 83 c4 08 44 89 e8 5b 5d 41 5c
RSP: 0018:ffffc90000157338 EFLAGS: 00000046
RAX: 0000000000000046 RBX: ffff88801cace4e0 RCX: 0000000000000001
RDX: 0000000000000000 RSI: ffffffff8b4cd3e0 RDI: ffffffff8bb13940
RBP: ffffffff8ddba940 R08: 0000000000000005 R09: 0000000000000000
R10: 0000000000000001 R11: 0000000000000001 R12: ffff88801cacda00
R13: 0000000000000001 R14: 00000000ffffffff R15: 0000000000000000
FS: 0000000000000000(0000) GS:ffff8880b8600000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fcc2bbc2718 CR3: 000000000db7e000 CR4: 00000000003526f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
__find_rr_leaf+0x36d/0xe00 net/ipv6/route.c:800
find_rr_leaf net/ipv6/route.c:856 [inline]
rt6_select net/ipv6/route.c:900 [inline]
fib6_table_lookup+0x57e/0xa30 net/ipv6/route.c:2195
ip6_pol_route+0x1cd/0x1120 net/ipv6/route.c:2231
pol_lookup_func include/net/ip6_fib.h:616 [inline]
fib6_rule_lookup+0x536/0x720 net/ipv6/fib6_rules.c:117
ip6_route_input_lookup net/ipv6/route.c:2300 [inline]
ip6_route_input+0x60b/0xc10 net/ipv6/route.c:2596
ip6_rcv_finish_core.constprop.0+0x1a0/0x5d0 net/ipv6/ip6_input.c:66
ip6_rcv_finish net/ipv6/ip6_input.c:77 [inline]
NF_HOOK include/linux/netfilter.h:314 [inline]
NF_HOOK include/linux/netfilter.h:308 [inline]
ipv6_rcv+0x1e4/0x680 net/ipv6/ip6_input.c:309
__netif_receive_skb_one_core+0x12e/0x1e0 net/core/dev.c:5672
__netif_receive_skb+0x1d/0x160 net/core/dev.c:5785
process_backlog+0x443/0x15f0 net/core/dev.c:6117
__napi_poll.constprop.0+0xb7/0x550 net/core/dev.c:6883
napi_poll net/core/dev.c:6952 [inline]
net_rx_action+0xa94/0x1010 net/core/dev.c:7074
handle_softirqs+0x213/0x8f0 kernel/softirq.c:554
run_ksoftirqd kernel/softirq.c:943 [inline]
run_ksoftirqd+0x3a/0x60 kernel/softirq.c:935
smpboot_thread_fn+0x661/0xa30 kernel/smpboot.c:164
kthread+0x2c1/0x3a0 kernel/kthread.c:389
ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
net_ratelimit: 6959 callbacks suppressed
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:46:43:f4:61:73, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:46:43:f4:61:73, vlan:0)