bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: rcu: Tasks blocked on level-0 rcu_node (CPUs 0-1): P5833/1:b..l rcu: (detected by 0, t=10502 jiffies, g=36533, q=556 ncpus=1) task:udevd state:R running task stack:24728 pid:5833 tgid:5833 ppid:5200 task_flags:0x400140 flags:0x00080001 Call Trace: context_switch kernel/sched/core.c:5325 [inline] __schedule+0x1190/0x5de0 kernel/sched/core.c:6929 preempt_schedule_irq+0x51/0x90 kernel/sched/core.c:7256 irqentry_exit+0x36/0x90 kernel/entry/common.c:211 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:697 RIP: 0010:lock_acquire+0x62/0x350 kernel/locking/lockdep.c:5872 Code: dd 08 12 83 f8 07 0f 87 bc 02 00 00 89 c0 48 0f a3 05 a2 f9 e9 0e 0f 82 74 02 00 00 8b 35 fa 29 ea 0e 85 f6 0f 85 8d 00 00 00 <48> 8b 44 24 30 65 48 2b 05 b9 dc 08 12 0f 85 c7 02 00 00 48 83 c4 RSP: 0018:ffffc9000408f920 EFLAGS: 00000206 RAX: 0000000000000046 RBX: ffffffff8e3c45e0 RCX: 00000000ef9d33e4 RDX: 0000000000000000 RSI: ffffffff8da0398a RDI: ffffffff8bf078c0 RBP: 0000000000000002 R08: 0ac0d5affe09d4ff R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000001 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 rcu_lock_acquire include/linux/rcupdate.h:331 [inline] rcu_read_lock include/linux/rcupdate.h:867 [inline] class_rcu_constructor include/linux/rcupdate.h:1195 [inline] unwind_next_frame+0xd1/0x20a0 arch/x86/kernel/unwind_orc.c:479 arch_stack_walk+0x94/0x100 arch/x86/kernel/stacktrace.c:25 stack_trace_save+0x8e/0xc0 kernel/stacktrace.c:122 kasan_save_stack+0x33/0x60 mm/kasan/common.c:56 kasan_save_track+0x14/0x30 mm/kasan/common.c:77 poison_kmalloc_redzone mm/kasan/common.c:400 [inline] __kasan_kmalloc+0xaa/0xb0 mm/kasan/common.c:417 kmalloc_noprof include/linux/slab.h:957 [inline] slab_free_hook mm/slub.c:2495 [inline] slab_free mm/slub.c:6642 [inline] kmem_cache_free+0x147/0x6c0 mm/slub.c:6752 file_free fs/file_table.c:79 [inline] __fput+0x68d/0xb70 fs/file_table.c:481 fput_close_sync+0x118/0x210 fs/file_table.c:573 __do_sys_close fs/open.c:1589 [inline] __se_sys_close fs/open.c:1574 [inline] __x64_sys_close+0x8b/0x120 fs/open.c:1574 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xcd/0xfa0 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7fdde04a7407 RSP: 002b:00007ffdbcd503c0 EFLAGS: 00000202 ORIG_RAX: 0000000000000003 RAX: ffffffffffffffda RBX: 00007fdde0bf5880 RCX: 00007fdde04a7407 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 RBP: 00007fdde0bf56e8 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000000 R13: 00007ffdbcd50480 R14: 0000000000000000 R15: 0000000000000000 rcu: rcu_preempt kthread starved for 242 jiffies! g36533 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=0 rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. rcu: RCU grace-period kthread stack dump: task:rcu_preempt state:R running task stack:27720 pid:16 tgid:16 ppid:2 task_flags:0x208040 flags:0x00080000 Call Trace: context_switch kernel/sched/core.c:5325 [inline] __schedule+0x1190/0x5de0 kernel/sched/core.c:6929 __schedule_loop kernel/sched/core.c:7011 [inline] schedule+0xe7/0x3a0 kernel/sched/core.c:7026 schedule_timeout+0x123/0x290 kernel/time/sleep_timeout.c:99 rcu_gp_fqs_loop+0x1ea/0xaf0 kernel/rcu/tree.c:2083 rcu_gp_kthread+0x26d/0x380 kernel/rcu/tree.c:2285 kthread+0x3c5/0x780 kernel/kthread.c:463 ret_from_fork+0x675/0x7d0 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 rcu: Stack dump where RCU GP kthread last ran: CPU: 0 UID: 0 PID: 3409 Comm: kworker/R-bat_e Not tainted syzkaller #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 Workqueue: bat_events batadv_dat_purge RIP: 0010:xt_get_this_cpu_counter include/linux/netfilter/x_tables.h:426 [inline] RIP: 0010:xt_get_this_cpu_counter include/linux/netfilter/x_tables.h:423 [inline] RIP: 0010:ip6t_do_table+0xee0/0x1c30 net/ipv6/netfilter/ip6_tables.c:320 Code: fc ff df 48 89 f9 48 c1 e9 03 80 3c 01 00 0f 85 fa 0b 00 00 48 89 54 24 08 48 8b 9d 98 00 00 00 e8 85 0b 3e 01 48 8b 54 24 08 <83> f8 07 41 89 c4 0f 87 88 0b 00 00 4a 8d 3c e5 e0 fe cc 8d 48 b8 RSP: 0018:ffffc90000007430 EFLAGS: 00000292 RAX: 0000000000000000 RBX: 0000607edb26f000 RCX: 1ffff11005db141b RDX: ffff88802ed8a0cc RSI: ffffffff8bf07840 RDI: ffffffff8bf07880 RBP: ffff88802ed8a040 R08: 0000000000000005 R09: 0000000000000001 R10: 0000000000000002 R11: ffff88809f5cd5b8 R12: 0000000000000004 R13: ffff88802ed8a0e8 R14: dffffc0000000000 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff888124a0d000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00005624cff50e30 CR3: 00000000772a2000 CR4: 00000000003526f0 Call Trace: ip6table_mangle_hook+0xc3/0x770 net/ipv6/netfilter/ip6table_mangle.c:73 nf_hook_entry_hookfn include/linux/netfilter.h:158 [inline] nf_hook_slow+0xbe/0x200 net/netfilter/core.c:623 nf_hook include/linux/netfilter.h:273 [inline] NF_HOOK include/linux/netfilter.h:316 [inline] br_nf_pre_routing_ipv6+0x514/0x8c0 net/bridge/br_netfilter_ipv6.c:184 br_nf_pre_routing+0x860/0x15b0 net/bridge/br_netfilter_hooks.c:508 nf_hook_entry_hookfn include/linux/netfilter.h:158 [inline] nf_hook_bridge_pre net/bridge/br_input.c:291 [inline] br_handle_frame+0xb28/0x14e0 net/bridge/br_input.c:442 __netif_receive_skb_core.constprop.0+0xa25/0x4bd0 net/core/dev.c:5966 __netif_receive_skb_one_core+0xb0/0x1e0 net/core/dev.c:6077 __netif_receive_skb+0x1d/0x160 net/core/dev.c:6192 process_backlog+0x439/0x15e0 net/core/dev.c:6544 __napi_poll.constprop.0+0xba/0x550 net/core/dev.c:7594 napi_poll net/core/dev.c:7657 [inline] net_rx_action+0x97f/0xef0 net/core/dev.c:7784 handle_softirqs+0x219/0x8e0 kernel/softirq.c:622 do_softirq kernel/softirq.c:523 [inline] do_softirq+0xb2/0xf0 kernel/softirq.c:510 __local_bh_enable_ip+0x100/0x120 kernel/softirq.c:450 spin_unlock_bh include/linux/spinlock.h:396 [inline] __batadv_dat_purge.part.0+0x279/0x3a0 net/batman-adv/distributed-arp-table.c:185 __batadv_dat_purge net/batman-adv/distributed-arp-table.c:166 [inline] batadv_dat_purge+0x4b/0xa0 net/batman-adv/distributed-arp-table.c:204 process_one_work+0x9cf/0x1b70 kernel/workqueue.c:3263 process_scheduled_works kernel/workqueue.c:3346 [inline] rescuer_thread+0x620/0xea0 kernel/workqueue.c:3523 kthread+0x3c5/0x780 kernel/kthread.c:463 ret_from_fork+0x675/0x7d0 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 net_ratelimit: 20553 callbacks suppressed bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:99:f4:0a:f6:4f, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:99:f4:0a:f6:4f, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:99:f4:0a:f6:4f, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:99:f4:0a:f6:4f, vlan:0) net_ratelimit: 24784 callbacks suppressed bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:99:f4:0a:f6:4f, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:99:f4:0a:f6:4f, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:99:f4:0a:f6:4f, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)