rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: rcu: (detected by 1, t=10502 jiffies, g=8121, q=1477 ncpus=2) rcu: All QSes seen, last rcu_preempt kthread activity 4740 (4294954240-4294949500), jiffies_till_next_fqs=1, root ->qsmask 0x0 rcu: rcu_preempt kthread starved for 4740 jiffies! g8121 f0x2 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=0 rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. rcu: RCU grace-period kthread stack dump: task:rcu_preempt state:R running task stack:0 pid:17 tgid:17 ppid:2 flags:0x00000008 Call trace: __switch_to+0x414/0x788 arch/arm64/kernel/process.c:701 (T) context_switch kernel/sched/core.c:5328 [inline] __schedule+0x16e0/0x27d0 kernel/sched/core.c:6693 __schedule_loop kernel/sched/core.c:6770 [inline] schedule+0xbc/0x238 kernel/sched/core.c:6785 schedule_timeout+0x1cc/0x33c kernel/time/timer.c:2615 rcu_gp_fqs_loop+0x2cc/0x16e8 kernel/rcu/tree.c:2045 rcu_gp_kthread+0xc0/0x308 kernel/rcu/tree.c:2247 kthread+0x288/0x310 kernel/kthread.c:389 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:862 rcu: Stack dump where RCU GP kthread last ran: Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 16 Comm: ksoftirqd/0 Not tainted 6.12.0-syzkaller-g7b1d1d4cfac0 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : __sanitizer_cov_trace_pc+0x0/0x84 kernel/kcov.c:210 lr : br_nf_post_routing+0x814/0xd10 net/bridge/br_netfilter_hooks.c:983 sp : ffff800097936520 x29: ffff800097936550 x28: ffff00019671a474 x27: 0000000000000002 x26: 1fffe00032ce3488 x25: 0000000000000002 x24: ffff00019671a440 x23: 000000000000000a x22: 000000000000dd86 x21: ffff00019671b210 x20: dfff800000000000 x19: ffff00019671a3c0 x18: ffff8000979de080 x17: 0000000000020010 x16: ffff800080585eb0 x15: 0000000000000001 x14: ffff80008f8205d8 x13: dfff800000000000 x12: 00000000204d9f87 x11: 000000002f762151 x10: 0000000000ff0100 x9 : 0000000000000000 x8 : ffff0000c19e5ac0 x7 : ffff80008a448c8c x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000002 x2 : 0000000000000008 x1 : 0000000000000002 x0 : 0000000000000003 Call trace: __sanitizer_cov_trace_pc+0x0/0x84 kernel/audit_tree.c:174 (P) br_nf_post_routing+0x814/0xd10 net/bridge/br_netfilter_hooks.c:983 (L) nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline] nf_hook_slow+0xc8/0x234 net/netfilter/core.c:626 nf_hook include/linux/netfilter.h:269 [inline] NF_HOOK+0x258/0x408 include/linux/netfilter.h:312 br_forward_finish+0xd4/0x11c net/bridge/br_forward.c:66 br_nf_forward_finish+0x8fc/0xc94 net/bridge/br_netfilter_hooks.c:690 NF_HOOK+0x6a0/0x750 include/linux/netfilter.h:314 br_nf_forward_ip+0x540/0x6b0 net/bridge/br_netfilter_hooks.c:744 br_nf_forward+0x6d0/0x1634 nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline] nf_hook_slow+0xc8/0x234 net/netfilter/core.c:626 nf_hook include/linux/netfilter.h:269 [inline] NF_HOOK+0x258/0x408 include/linux/netfilter.h:312 __br_forward+0x2f0/0x45c net/bridge/br_forward.c:115 deliver_clone net/bridge/br_forward.c:131 [inline] maybe_deliver+0xc8/0x178 net/bridge/br_forward.c:190 br_flood+0x28c/0x5c4 net/bridge/br_forward.c:236 br_handle_frame_finish+0x1258/0x18c4 net/bridge/br_input.c:215 br_nf_hook_thresh+0x38c/0x480 br_nf_pre_routing_finish_ipv6+0x890/0xbac NF_HOOK include/linux/netfilter.h:314 [inline] br_nf_pre_routing_ipv6+0x2d4/0x64c net/bridge/br_netfilter_ipv6.c:184 br_nf_pre_routing+0x42c/0x113c net/bridge/br_netfilter_hooks.c:533 nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline] nf_hook_bridge_pre net/bridge/br_input.c:277 [inline] br_handle_frame+0x80c/0x1124 net/bridge/br_input.c:424 __netif_receive_skb_core+0xf3c/0x373c net/core/dev.c:5564 __netif_receive_skb_one_core net/core/dev.c:5668 [inline] __netif_receive_skb+0x114/0x3c8 net/core/dev.c:5783 process_backlog+0x640/0x123c net/core/dev.c:6115 __napi_poll+0xb4/0x3fc net/core/dev.c:6779 napi_poll net/core/dev.c:6848 [inline] net_rx_action+0x6a8/0xf4c net/core/dev.c:6970 handle_softirqs+0x2e0/0xbf8 kernel/softirq.c:554 run_ksoftirqd+0x70/0xc0 kernel/softirq.c:949 smpboot_thread_fn+0x4b0/0x90c kernel/smpboot.c:164 kthread+0x288/0x310 kernel/kthread.c:389 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:862 net_ratelimit: 30957 callbacks suppressed bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:62:23:98:aa:47:70, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:62:23:98:aa:47:70, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) net_ratelimit: 31266 callbacks suppressed bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:62:23:98:aa:47:70, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:62:23:98:aa:47:70, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:62:23:98:aa:47:70, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)