rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: rcu: Tasks blocked on level-0 rcu_node (CPUs 0-1): P21608/1:b..l rcu: (detected by 1, t=10503 jiffies, g=104637, q=709 ncpus=2) task:syz-executor state:R running task stack:23104 pid:21608 tgid:21608 ppid:1 flags:0x00004006 Call Trace: context_switch kernel/sched/core.c:5369 [inline] __schedule+0xe58/0x5ad0 kernel/sched/core.c:6756 preempt_schedule_irq+0x51/0x90 kernel/sched/core.c:7078 irqentry_exit+0x36/0x90 kernel/entry/common.c:354 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702 RIP: 0010:check_kcov_mode kernel/kcov.c:185 [inline] RIP: 0010:__sanitizer_cov_trace_pc+0x3b/0x70 kernel/kcov.c:217 Code: 6a 7e a9 00 01 ff 00 48 8b 34 24 74 1d f6 c4 01 74 43 a9 00 00 0f 00 75 3c a9 00 00 f0 00 75 35 8b 82 1c 16 00 00 85 c0 74 2b <8b> 82 f8 15 00 00 83 f8 02 75 20 48 8b 8a 00 16 00 00 8b 92 fc 15 RSP: 0018:ffffc90003967a08 EFLAGS: 00000246 RAX: 0000000080000000 RBX: ffffea0001fbd4c0 RCX: ffffffff81eaf0d0 RDX: ffff888034f40000 RSI: ffffffff81eaf146 RDI: 0000000000000005 RBP: 0000000000000000 R08: 0000000000000005 R09: 00000000000000f5 R10: 00000000000000ff R11: 0000000000000000 R12: 00000000ffffffff R13: 0000000000000000 R14: 00000000000000ff R15: ffff8880270355ac rcu_read_unlock include/linux/rcupdate.h:878 [inline] mod_memcg_page_state.part.0.constprop.0+0x1b6/0x620 include/linux/memcontrol.h:940 mod_memcg_page_state mm/vmalloc.c:3374 [inline] vfree+0x168/0x890 mm/vmalloc.c:3377 kcov_put kernel/kcov.c:439 [inline] kcov_put+0x2a/0x40 kernel/kcov.c:435 kcov_close+0xd/0x20 kernel/kcov.c:535 __fput+0x3f8/0xb60 fs/file_table.c:450 task_work_run+0x14e/0x250 kernel/task_work.c:239 exit_task_work include/linux/task_work.h:43 [inline] do_exit+0xadd/0x2d70 kernel/exit.c:938 do_group_exit+0xd3/0x2a0 kernel/exit.c:1087 get_signal+0x2576/0x2610 kernel/signal.c:3017 arch_do_signal_or_restart+0x90/0x7e0 arch/x86/kernel/signal.c:337 exit_to_user_mode_loop kernel/entry/common.c:111 [inline] exit_to_user_mode_prepare include/linux/entry-common.h:329 [inline] __syscall_exit_to_user_mode_work kernel/entry/common.c:207 [inline] syscall_exit_to_user_mode+0x150/0x2a0 kernel/entry/common.c:218 do_syscall_64+0xda/0x250 arch/x86/entry/common.c:89 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f6c40d7e6ea RSP: 002b:00007ffc992c9f08 EFLAGS: 00000206 ORIG_RAX: 0000000000000106 RAX: 0000000000000000 RBX: 0000000000000003 RCX: 00007f6c40d7e6ea RDX: 00007ffc992c9f10 RSI: 00007f6c40e299e2 RDI: 0000000000000003 RBP: 00007ffc992c9f10 R08: 0000000000000000 R09: 00007f6c41b09000 R10: 0000000000001000 R11: 0000000000000206 R12: 00007ffc992cb100 R13: 00007f6c40df3ab4 R14: 00000000000ec318 R15: 00007ffc992cb140 rcu: rcu_preempt kthread starved for 10550 jiffies! g104637 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=0 rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. rcu: RCU grace-period kthread stack dump: task:rcu_preempt state:R running task stack:27568 pid:17 tgid:17 ppid:2 flags:0x00004000 Call Trace: context_switch kernel/sched/core.c:5369 [inline] __schedule+0xe58/0x5ad0 kernel/sched/core.c:6756 __schedule_loop kernel/sched/core.c:6833 [inline] schedule+0xe7/0x350 kernel/sched/core.c:6848 schedule_timeout+0x124/0x280 kernel/time/sleep_timeout.c:99 rcu_gp_fqs_loop+0x1eb/0xb00 kernel/rcu/tree.c:2045 rcu_gp_kthread+0x271/0x380 kernel/rcu/tree.c:2247 kthread+0x2c1/0x3a0 kernel/kthread.c:389 ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 rcu: Stack dump where RCU GP kthread last ran: Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 16 Comm: ksoftirqd/0 Not tainted 6.13.0-rc1-syzkaller-00378-g62b5a46999c7 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 RIP: 0010:arch_local_irq_restore arch/x86/include/asm/irqflags.h:154 [inline] RIP: 0010:lock_is_held_type+0xf8/0x150 kernel/locking/lockdep.c:5923 Code: f0 41 0f 94 c5 48 c7 c7 e0 d3 4c 8b e8 91 16 00 00 b8 ff ff ff ff 65 0f c1 05 1c b1 e7 74 83 f8 01 75 2d 9c 58 f6 c4 02 75 43 <48> f7 04 24 00 02 00 00 74 01 fb 48 83 c4 08 44 89 e8 5b 5d 41 5c RSP: 0018:ffffc90000157338 EFLAGS: 00000046 RAX: 0000000000000046 RBX: ffff88801cace4e0 RCX: 0000000000000001 RDX: 0000000000000000 RSI: ffffffff8b4cd3e0 RDI: ffffffff8bb13940 RBP: ffffffff8ddba940 R08: 0000000000000005 R09: 0000000000000000 R10: 0000000000000001 R11: 0000000000000001 R12: ffff88801cacda00 R13: 0000000000000001 R14: 00000000ffffffff R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff8880b8600000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fcc2bbc2718 CR3: 000000000db7e000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: __find_rr_leaf+0x36d/0xe00 net/ipv6/route.c:800 find_rr_leaf net/ipv6/route.c:856 [inline] rt6_select net/ipv6/route.c:900 [inline] fib6_table_lookup+0x57e/0xa30 net/ipv6/route.c:2195 ip6_pol_route+0x1cd/0x1120 net/ipv6/route.c:2231 pol_lookup_func include/net/ip6_fib.h:616 [inline] fib6_rule_lookup+0x536/0x720 net/ipv6/fib6_rules.c:117 ip6_route_input_lookup net/ipv6/route.c:2300 [inline] ip6_route_input+0x60b/0xc10 net/ipv6/route.c:2596 ip6_rcv_finish_core.constprop.0+0x1a0/0x5d0 net/ipv6/ip6_input.c:66 ip6_rcv_finish net/ipv6/ip6_input.c:77 [inline] NF_HOOK include/linux/netfilter.h:314 [inline] NF_HOOK include/linux/netfilter.h:308 [inline] ipv6_rcv+0x1e4/0x680 net/ipv6/ip6_input.c:309 __netif_receive_skb_one_core+0x12e/0x1e0 net/core/dev.c:5672 __netif_receive_skb+0x1d/0x160 net/core/dev.c:5785 process_backlog+0x443/0x15f0 net/core/dev.c:6117 __napi_poll.constprop.0+0xb7/0x550 net/core/dev.c:6883 napi_poll net/core/dev.c:6952 [inline] net_rx_action+0xa94/0x1010 net/core/dev.c:7074 handle_softirqs+0x213/0x8f0 kernel/softirq.c:554 run_ksoftirqd kernel/softirq.c:943 [inline] run_ksoftirqd+0x3a/0x60 kernel/softirq.c:935 smpboot_thread_fn+0x661/0xa30 kernel/smpboot.c:164 kthread+0x2c1/0x3a0 kernel/kthread.c:389 ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 net_ratelimit: 6959 callbacks suppressed bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:46:43:f4:61:73, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:46:43:f4:61:73, vlan:0)