rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: rcu: Tasks blocked on level-0 rcu_node (CPUs 0-1): P6105/1:b..l rcu: (detected by 0, t=10502 jiffies, g=14689, q=804 ncpus=2) task:udevd state:R running task stack:0 pid:6105 tgid:6105 ppid:1 task_flags:0x400140 flags:0x00000008 Call trace: __switch_to+0x414/0x834 arch/arm64/kernel/process.c:735 (T) context_switch kernel/sched/core.c:5382 [inline] __schedule+0x13b0/0x28d4 kernel/sched/core.c:6767 preempt_schedule_irq+0x80/0x188 kernel/sched/core.c:7090 arm64_preempt_schedule_irq+0x44/0x58 arch/arm64/kernel/entry-common.c:301 __el1_irq arch/arm64/kernel/entry-common.c:586 [inline] el1_interrupt+0x3c/0x54 arch/arm64/kernel/entry-common.c:598 el1h_64_irq_handler+0x18/0x24 arch/arm64/kernel/entry-common.c:603 el1h_64_irq+0x6c/0x70 arch/arm64/kernel/entry.S:596 __daif_local_irq_restore arch/arm64/include/asm/irqflags.h:175 [inline] (P) arch_local_irq_restore arch/arm64/include/asm/irqflags.h:195 [inline] (P) seqcount_lockdep_reader_access+0xd8/0xf8 include/linux/seqlock.h:74 (P) read_seqbegin include/linux/seqlock.h:836 [inline] read_seqbegin_or_lock include/linux/seqlock.h:1130 [inline] prepend_path+0xf4/0x88c fs/d_path.c:166 d_absolute_path+0xa0/0x148 fs/d_path.c:234 tomoyo_get_absolute_path security/tomoyo/realpath.c:101 [inline] tomoyo_realpath_from_path+0x258/0x4d4 security/tomoyo/realpath.c:271 tomoyo_get_realpath security/tomoyo/file.c:151 [inline] tomoyo_path_perm+0x1c4/0x3dc security/tomoyo/file.c:822 tomoyo_inode_getattr+0x28/0x38 security/tomoyo/tomoyo.c:123 security_inode_getattr+0x118/0x300 security/security.c:2377 vfs_getattr fs/stat.c:256 [inline] vfs_statx_path fs/stat.c:296 [inline] vfs_statx+0x12c/0x4c8 fs/stat.c:353 vfs_fstatat+0xd4/0x150 fs/stat.c:372 __do_sys_newfstatat fs/stat.c:536 [inline] __se_sys_newfstatat fs/stat.c:530 [inline] __arm64_sys_newfstatat+0x108/0x18c fs/stat.c:530 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x58/0x17c arch/arm64/kernel/entry-common.c:767 el0t_64_sync_handler+0x78/0x108 arch/arm64/kernel/entry-common.c:786 el0t_64_sync+0x198/0x19c arch/arm64/kernel/entry.S:600 rcu: rcu_preempt kthread starved for 245 jiffies! g14689 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=1 rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. rcu: RCU grace-period kthread stack dump: task:rcu_preempt state:R running task stack:0 pid:16 tgid:16 ppid:2 task_flags:0x208040 flags:0x00000010 Call trace: __switch_to+0x414/0x834 arch/arm64/kernel/process.c:735 (T) context_switch kernel/sched/core.c:5382 [inline] __schedule+0x13b0/0x28d4 kernel/sched/core.c:6767 __schedule_loop kernel/sched/core.c:6845 [inline] schedule+0xb4/0x230 kernel/sched/core.c:6860 schedule_timeout+0x128/0x270 kernel/time/sleep_timeout.c:99 rcu_gp_fqs_loop+0x2b8/0x14e8 kernel/rcu/tree.c:2046 rcu_gp_kthread+0xc0/0x2f8 kernel/rcu/tree.c:2248 kthread+0x5fc/0x75c kernel/kthread.c:464 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:847 rcu: Stack dump where RCU GP kthread last ran: Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 616 Comm: kworker/u8:5 Not tainted 6.15.0-rc7-syzkaller-gd7fa1af5b33e #0 PREEMPT Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 Workqueue: events_unbound cfg80211_wiphy_work pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : should_resched arch/arm64/include/asm/preempt.h:79 [inline] pc : __local_bh_enable_ip+0x1f0/0x35c kernel/softirq.c:414 lr : __local_bh_enable_ip+0x1ec/0x35c kernel/softirq.c:412 sp : ffff800080016360 x29: ffff800080016370 x28: ffff700010002c94 x27: ffff0000efa70000 x26: 1fffe0001df4e000 x25: ffff0000ccb7f800 x24: 0000000000000001 x23: dfff800000000000 x22: 1fffe00018f967a1 x21: ffff8000890c9f80 x20: 0000000000000200 x19: ffff0000c7cb3d08 x18: 1fffe0003386f276 x17: 0000000000020010 x16: ffff80008051cacc x15: 0000000000000001 x14: 1fffffbff7ef4ca6 x13: 0000000000000000 x12: 0000000000000000 x11: ffff800092d38c40 x10: 0000000000000003 x9 : 0000000000000000 x8 : 0000000000390e5c x7 : ffff8000890cec48 x6 : 0000000000000000 x5 : 0000000000000001 x4 : 0000000000000001 x3 : 0000000000000010 x2 : 0000000000000002 x1 : ffff80008e9058f1 x0 : ffff80010d10c000 Call trace: __daif_local_irq_enable arch/arm64/include/asm/irqflags.h:26 [inline] (P) arch_local_irq_enable arch/arm64/include/asm/irqflags.h:48 [inline] (P) __local_bh_enable_ip+0x1f0/0x35c kernel/softirq.c:412 (P) local_bh_enable+0x28/0x34 include/linux/bottom_half.h:33 rcu_read_unlock_bh include/linux/rcupdate.h:910 [inline] __dev_queue_xmit+0x1750/0x31f0 net/core/dev.c:4656 dev_queue_xmit include/linux/netdevice.h:3350 [inline] br_dev_queue_push_xmit+0x578/0x72c net/bridge/br_forward.c:53 br_nf_dev_queue_xmit+0x490/0x2050 net/bridge/br_netfilter_hooks.c:-1 NF_HOOK+0x56c/0x5fc include/linux/netfilter.h:314 br_nf_post_routing+0x8f4/0xd14 net/bridge/br_netfilter_hooks.c:969 nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline] nf_hook_slow+0xb4/0x21c net/netfilter/core.c:626 nf_hook include/linux/netfilter.h:269 [inline] NF_HOOK+0x1c4/0x354 include/linux/netfilter.h:312 br_forward_finish+0xd4/0x11c net/bridge/br_forward.c:66 br_nf_hook_thresh net/bridge/br_netfilter_hooks.c:-1 [inline] br_nf_forward_finish+0x848/0xbb4 net/bridge/br_netfilter_hooks.c:665 NF_HOOK+0x56c/0x5fc include/linux/netfilter.h:314 br_nf_forward_ip+0x53c/0x69c net/bridge/br_netfilter_hooks.c:719 br_nf_forward+0x6c0/0x15e4 net/bridge/br_netfilter_hooks.c:776 nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline] nf_hook_slow+0xb4/0x21c net/netfilter/core.c:626 nf_hook include/linux/netfilter.h:269 [inline] NF_HOOK+0x1c4/0x354 include/linux/netfilter.h:312 __br_forward+0x2d8/0x43c net/bridge/br_forward.c:115 deliver_clone net/bridge/br_forward.c:131 [inline] maybe_deliver+0xc8/0x178 net/bridge/br_forward.c:190 br_flood+0x294/0x5e8 net/bridge/br_forward.c:237 br_handle_frame_finish+0xff8/0x1460 net/bridge/br_input.c:220 br_nf_hook_thresh+0x304/0x3c8 net/bridge/br_netfilter_hooks.c:-1 br_nf_pre_routing_finish_ipv6+0x87c/0xb98 net/bridge/br_netfilter_ipv6.c:-1 NF_HOOK include/linux/netfilter.h:314 [inline] br_nf_pre_routing_ipv6+0x2c4/0x5ac net/bridge/br_netfilter_ipv6.c:184 br_nf_pre_routing+0x578/0x1130 net/bridge/br_netfilter_hooks.c:508 nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline] nf_hook_bridge_pre net/bridge/br_input.c:282 [inline] br_handle_frame+0x7b0/0x10b8 net/bridge/br_input.c:433 __netif_receive_skb_core+0xeac/0x39bc net/core/dev.c:5773 __netif_receive_skb_one_core net/core/dev.c:5885 [inline] __netif_receive_skb+0x78/0x2a8 net/core/dev.c:6000 process_backlog+0x60c/0x10e4 net/core/dev.c:6352 __napi_poll+0xb4/0x3fc net/core/dev.c:7324 napi_poll net/core/dev.c:7388 [inline] net_rx_action+0x5d4/0xcc8 net/core/dev.c:7510 handle_softirqs+0x328/0xc88 kernel/softirq.c:579 __do_softirq+0x14/0x20 kernel/softirq.c:613 ____do_softirq+0x14/0x20 arch/arm64/kernel/irq.c:81 call_on_irq_stack+0x24/0x30 arch/arm64/kernel/entry.S:891 do_softirq_own_stack+0x20/0x2c arch/arm64/kernel/irq.c:86 do_softirq+0x90/0xf8 kernel/softirq.c:480 __local_bh_enable_ip+0x240/0x35c kernel/softirq.c:407 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x3c/0x4c kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] cfg80211_put_bss+0x1d4/0x228 net/wireless/scan.c:3346 ieee80211_rx_bss_put+0x50/0x68 net/mac80211/scan.c:37 ieee80211_rx_bss_info net/mac80211/ibss.c:1174 [inline] ieee80211_rx_mgmt_probe_beacon net/mac80211/ibss.c:1581 [inline] ieee80211_ibss_rx_queued_mgmt+0x152c/0x240c net/mac80211/ibss.c:1608 ieee80211_iface_process_skb net/mac80211/iface.c:1625 [inline] ieee80211_iface_work+0x694/0xd20 net/mac80211/iface.c:1679 cfg80211_wiphy_work+0x2a8/0x48c net/wireless/core.c:435 process_one_work+0x7e8/0x156c kernel/workqueue.c:3238 process_scheduled_works kernel/workqueue.c:3319 [inline] worker_thread+0x958/0xed8 kernel/workqueue.c:3400 kthread+0x5fc/0x75c kernel/kthread.c:464 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:847 net_ratelimit: 41303 callbacks suppressed bridge0: received packet on veth0_to_bridge with own address as source address (addr:26:28:fa:7b:12:d7, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:26:28:fa:7b:12:d7, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:26:28:fa:7b:12:d7, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:26:28:fa:7b:12:d7, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:26:28:fa:7b:12:d7, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:26:28:fa:7b:12:d7, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:26:28:fa:7b:12:d7, vlan:0) net_ratelimit: 41108 callbacks suppressed bridge0: received packet on veth0_to_bridge with own address as source address (addr:26:28:fa:7b:12:d7, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:26:28:fa:7b:12:d7, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:26:28:fa:7b:12:d7, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:26:28:fa:7b:12:d7, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:26:28:fa:7b:12:d7, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:26:28:fa:7b:12:d7, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:26:28:fa:7b:12:d7, vlan:0)