bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: rcu: Tasks blocked on level-0 rcu_node (CPUs 0-1): P5842/2:b..l rcu: (detected by 1, t=10502 jiffies, g=16757, q=656 ncpus=2) task:syz-executor state:R running task stack:20224 pid:5842 tgid:5842 ppid:5825 task_flags:0x400140 flags:0x00000002 Call Trace: context_switch kernel/sched/core.c:5378 [inline] __schedule+0x190e/0x4c90 kernel/sched/core.c:6765 preempt_schedule_irq+0xfb/0x1c0 kernel/sched/core.c:7087 irqentry_exit+0x5e/0x90 kernel/entry/common.c:354 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702 RIP: 0010:lock_is_held include/linux/lockdep.h:249 [inline] RIP: 0010:lockdep_tasklist_lock_is_held+0x15/0x20 kernel/fork.c:156 Code: e8 40 fd 87 0a 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa e8 07 6e 41 00 48 c7 c7 58 b0 80 8e be ff ff ff ff 06 01 88 0a 66 0f 1f 44 00 00 90 90 90 90 90 90 90 90 90 90 90 RSP: 0018:ffffc90004237d58 EFLAGS: 00000293 RAX: ffffffff81804ff9 RBX: 0000000000000001 RCX: ffff88807cbc3c00 RDX: 0000000000000000 RSI: 00000000ffffffff RDI: ffffffff8e80b058 RBP: ffff88803114c248 R08: ffffffff818b67bb R09: 1ffffffff28a9308 R10: dffffc0000000000 R11: fffffbfff28a9309 R12: ffffffff81858cd6 R13: 0000000000000001 R14: 0000000000000000 R15: ffffc90004237e40 pid_task+0x74/0x140 kernel/pid.c:414 kill_pid_info_type+0xdb/0x1f0 kernel/signal.c:1456 kill_pid_info kernel/signal.c:1472 [inline] kill_proc_info+0xd6/0x180 kernel/signal.c:1479 kill_something_info kernel/signal.c:1576 [inline] __do_sys_kill kernel/signal.c:3957 [inline] __se_sys_kill+0xc2/0x450 kernel/signal.c:3951 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7fe9c6529567 RSP: 002b:00007fe9c68cfda8 EFLAGS: 00000217 ORIG_RAX: 000000000000003e RAX: ffffffffffffffda RBX: 000000000000009d RCX: 00007fe9c6529567 RDX: 0000000000000108 RSI: 0000000000000009 RDI: 000000000000009d RBP: 00007fe9c68cfdec R08: 000000000fc81aaf R09: 0000000000000000 R10: 00007fe9c7420038 R11: 0000000000000217 R12: 000000000000002d R13: 0000000000000064 R14: 000000000002b088 R15: 00007fe9c68cfe40 rcu: rcu_preempt kthread starved for 6867 jiffies! g16757 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x402 ->cpu=0 rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. rcu: RCU grace-period kthread stack dump: task:rcu_preempt state:I stack:25784 pid:17 tgid:17 ppid:2 task_flags:0x208040 flags:0x00004000 Call Trace: context_switch kernel/sched/core.c:5378 [inline] __schedule+0x190e/0x4c90 kernel/sched/core.c:6765 preempt_schedule_common+0x84/0xd0 kernel/sched/core.c:6944 preempt_schedule+0xe1/0xf0 kernel/sched/core.c:6968 preempt_schedule_thunk+0x1a/0x30 arch/x86/entry/thunk.S:12 __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:152 [inline] _raw_spin_unlock_irqrestore+0x130/0x140 kernel/locking/spinlock.c:194 __debug_object_init+0x27c/0x470 lib/debugobjects.c:755 init_timer_on_stack_key+0x3d/0x110 kernel/time/timer.c:858 schedule_timeout+0x131/0x290 kernel/time/sleep_timeout.c:96 rcu_gp_fqs_loop+0x2df/0x1330 kernel/rcu/tree.c:2024 rcu_gp_kthread+0xa7/0x3b0 kernel/rcu/tree.c:2226 kthread+0x7a9/0x920 kernel/kthread.c:464 ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 rcu: Stack dump where RCU GP kthread last ran: Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 3515 Comm: kworker/u8:7 Not tainted 6.14.0-rc4-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 Workqueue: events_unbound cfg80211_wiphy_work RIP: 0010:on_stack arch/x86/include/asm/stacktrace.h:58 [inline] RIP: 0010:stack_access_ok arch/x86/kernel/unwind_orc.c:393 [inline] RIP: 0010:deref_stack_reg arch/x86/kernel/unwind_orc.c:403 [inline] RIP: 0010:unwind_next_frame+0xb89/0x22d0 arch/x86/kernel/unwind_orc.c:585 Code: 5c 24 40 49 8b 6d 08 49 8d 5d 10 49 89 df 49 c1 ef 03 43 80 3c 27 00 74 08 48 89 df e8 40 d8 bb 00 4c 8b 74 24 08 4d 8b 66 10 <48> b8 00 00 00 00 00 fc ff df 48 8b 4c 24 20 0f b6 04 01 84 c0 0f RSP: 0018:ffffc900000065f0 EFLAGS: 00000246 RAX: 1ffff92000000cd9 RBX: ffffc900000066d0 RCX: ffffffff905071c8 RDX: ffffffff90c7ad0e RSI: 0000000000000002 RDI: 0000000000000001 RBP: ffffc90000000000 R08: 0000000000000001 R09: ffffc900000067b0 R10: ffffc90000006710 R11: ffffffff81ad49b0 R12: ffffc90000008000 R13: ffffc900000066c0 R14: ffffc900000066c0 R15: 1ffff92000000cda FS: 0000000000000000(0000) GS:ffff8880b8600000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00004000000ba030 CR3: 0000000061f6c000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: arch_stack_walk+0x11c/0x150 arch/x86/kernel/stacktrace.c:25 stack_trace_save+0x118/0x1d0 kernel/stacktrace.c:122 kasan_save_stack mm/kasan/common.c:47 [inline] kasan_save_track+0x3f/0x80 mm/kasan/common.c:68 kasan_save_free_info+0x40/0x50 mm/kasan/generic.c:576 poison_slab_object mm/kasan/common.c:247 [inline] __kasan_slab_free+0x59/0x70 mm/kasan/common.c:264 kasan_slab_free include/linux/kasan.h:233 [inline] slab_free_hook mm/slub.c:2353 [inline] slab_free mm/slub.c:4609 [inline] kmem_cache_free+0x195/0x410 mm/slub.c:4711 kfree_skb_reason include/linux/skbuff.h:1271 [inline] kfree_skb include/linux/skbuff.h:1280 [inline] ip6_mc_input+0x974/0xb70 net/ipv6/ip6_input.c:591 ip_sabotage_in+0x203/0x290 net/bridge/br_netfilter_hooks.c:993 nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline] nf_hook_slow+0xc3/0x220 net/netfilter/core.c:626 nf_hook include/linux/netfilter.h:269 [inline] NF_HOOK+0x29e/0x450 include/linux/netfilter.h:312 __netif_receive_skb_one_core net/core/dev.c:5899 [inline] __netif_receive_skb+0x1ea/0x650 net/core/dev.c:6012 netif_receive_skb_internal net/core/dev.c:6098 [inline] netif_receive_skb+0x1e8/0x890 net/core/dev.c:6157 NF_HOOK+0x9e/0x400 include/linux/netfilter.h:314 br_handle_frame_finish+0x1905/0x2000 br_nf_hook_thresh+0x472/0x590 br_nf_pre_routing_finish_ipv6+0xaa0/0xdd0 NF_HOOK include/linux/netfilter.h:314 [inline] br_nf_pre_routing_ipv6+0x379/0x770 net/bridge/br_netfilter_ipv6.c:184 nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline] nf_hook_bridge_pre net/bridge/br_input.c:282 [inline] br_handle_frame+0x9f3/0x1530 net/bridge/br_input.c:433 __netif_receive_skb_core+0x13e7/0x4540 net/core/dev.c:5793 __netif_receive_skb_one_core net/core/dev.c:5897 [inline] __netif_receive_skb+0x12f/0x650 net/core/dev.c:6012 process_backlog+0x662/0x15b0 net/core/dev.c:6360 __napi_poll+0xcb/0x490 net/core/dev.c:7194 napi_poll net/core/dev.c:7263 [inline] net_rx_action+0x89b/0x1240 net/core/dev.c:7385 handle_softirqs+0x2d4/0x9b0 kernel/softirq.c:561 do_softirq+0x11b/0x1e0 kernel/softirq.c:462 __local_bh_enable_ip+0x1bb/0x200 kernel/softirq.c:389 spin_unlock_bh include/linux/spinlock.h:396 [inline] cfg80211_inform_single_bss_data+0x162d/0x1ee0 net/wireless/scan.c:2383 cfg80211_inform_bss_data+0x3c3/0x5820 net/wireless/scan.c:3222 cfg80211_inform_bss_frame_data+0x3bb/0x720 net/wireless/scan.c:3317 ieee80211_bss_info_update+0x8a7/0xbc0 net/mac80211/scan.c:226 ieee80211_rx_bss_info net/mac80211/ibss.c:1102 [inline] ieee80211_rx_mgmt_probe_beacon net/mac80211/ibss.c:1581 [inline] ieee80211_ibss_rx_queued_mgmt+0x1993/0x2e00 net/mac80211/ibss.c:1608 ieee80211_iface_process_skb net/mac80211/iface.c:1611 [inline] ieee80211_iface_work+0x8dc/0xf90 net/mac80211/iface.c:1665 cfg80211_wiphy_work+0x2f0/0x490 net/wireless/core.c:435 process_one_work kernel/workqueue.c:3236 [inline] process_scheduled_works+0xabe/0x18e0 kernel/workqueue.c:3317 worker_thread+0x870/0xd30 kernel/workqueue.c:3398 kthread+0x7a9/0x920 kernel/kthread.c:464 ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 net_ratelimit: 31549 callbacks suppressed bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:26:ea:3f:d2:79:0f, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) net_ratelimit: 31193 callbacks suppressed bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)