bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: rcu: Tasks blocked on level-0 rcu_node (CPUs 0-1): P5830/1:b..l rcu: (detected by 0, t=10502 jiffies, g=13633, q=685 ncpus=1) task:syz-executor state:R running task stack:23656 pid:5830 tgid:5830 ppid:5826 task_flags:0x400140 flags:0x00080000 Call Trace: context_switch kernel/sched/core.c:5256 [inline] __schedule+0x1139/0x6150 kernel/sched/core.c:6863 preempt_schedule_irq+0x51/0x90 kernel/sched/core.c:7190 irqentry_exit+0x1d8/0x8c0 kernel/entry/common.c:216 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:697 RIP: 0010:lock_is_held_type+0x107/0x150 kernel/locking/lockdep.c:5945 Code: 00 00 b8 ff ff ff ff 65 0f c1 05 5c 00 3d 08 83 f8 01 75 2d 9c 58 f6 c4 02 75 43 48 f7 04 24 00 02 00 00 74 01 fb 48 83 c4 08 <44> 89 e8 5b 5d 41 5c 41 5d 41 5e 41 5f e9 87 2c 03 00 45 31 ed eb RSP: 0018:ffffc90003e57668 EFLAGS: 00000282 RAX: 0000000000000046 RBX: ffff888030b248d0 RCX: 0000000000000001 RDX: 0000000000000000 RSI: ffffffff8daa4b9c RDI: ffffffff8bf2b500 RBP: ffffffff8e3c9520 R08: 0000000000000006 R09: 0000000000000000 R10: 0000000000001000 R11: ffff888030b24830 R12: ffff888030b23d00 R13: 0000000000000001 R14: 00000000ffffffff R15: 0000000000000004 lookup_page_ext+0x6e/0x100 mm/page_ext.c:254 page_ext_iter_begin include/linux/page_ext.h:132 [inline] __page_table_check_zero+0x150/0x4a0 mm/page_table_check.c:139 page_table_check_free include/linux/page_table_check.h:43 [inline] free_pages_prepare mm/page_alloc.c:1407 [inline] __free_frozen_pages+0x7d0/0x1170 mm/page_alloc.c:2943 discard_slab mm/slub.c:3346 [inline] __put_partials+0x130/0x170 mm/slub.c:3886 qlink_free mm/kasan/quarantine.c:163 [inline] qlist_free_all+0x4c/0xf0 mm/kasan/quarantine.c:179 kasan_quarantine_reduce+0x195/0x1e0 mm/kasan/quarantine.c:286 __kasan_slab_alloc+0x69/0x90 mm/kasan/common.c:350 kasan_slab_alloc include/linux/kasan.h:253 [inline] slab_post_alloc_hook mm/slub.c:4953 [inline] slab_alloc_node mm/slub.c:5263 [inline] kmem_cache_alloc_noprof+0x25e/0x770 mm/slub.c:5270 vm_area_dup+0x27/0x8d0 mm/vma_init.c:123 dup_mmap+0x6a4/0x20e0 mm/mmap.c:1773 dup_mm kernel/fork.c:1529 [inline] copy_mm kernel/fork.c:1581 [inline] copy_process+0x3b9f/0x7430 kernel/fork.c:2221 kernel_clone+0xfc/0x910 kernel/fork.c:2651 __do_sys_clone+0xce/0x120 kernel/fork.c:2792 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xcd/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f3d58585f13 RSP: 002b:00007ffca888ba08 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f3d58585f13 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 RBP: 0000000000000001 R08: 0000000000000000 R09: 0000000000000001 R10: 0000555562ef97d0 R11: 0000000000000246 R12: 0000000000000000 R13: 00000000000927c0 R14: 000000000001b968 R15: 00007ffca888bba0 rcu: rcu_preempt kthread starved for 8730 jiffies! g13633 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=0 rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. rcu: RCU grace-period kthread stack dump: task:rcu_preempt state:R running task stack:28216 pid:16 tgid:16 ppid:2 task_flags:0x208040 flags:0x00080000 Call Trace: context_switch kernel/sched/core.c:5256 [inline] __schedule+0x1139/0x6150 kernel/sched/core.c:6863 __schedule_loop kernel/sched/core.c:6945 [inline] schedule+0xe7/0x3a0 kernel/sched/core.c:6960 schedule_timeout+0x123/0x290 kernel/time/sleep_timeout.c:99 rcu_gp_fqs_loop+0x1ea/0xaf0 kernel/rcu/tree.c:2083 rcu_gp_kthread+0x26d/0x380 kernel/rcu/tree.c:2285 kthread+0x3c5/0x780 kernel/kthread.c:463 ret_from_fork+0x983/0xb10 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:246 rcu: Stack dump where RCU GP kthread last ran: CPU: 0 UID: 0 PID: 3409 Comm: kworker/R-bat_e Tainted: G L syzkaller #0 PREEMPT(full) Tainted: [L]=SOFTLOCKUP Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 Workqueue: bat_events batadv_tt_purge RIP: 0010:__sanitizer_cov_trace_pc+0x0/0x70 kernel/kcov.c:210 Code: e6 6f 57 00 48 89 df 5b e9 8d 21 5d 00 be 03 00 00 00 5b e9 82 23 ec 02 66 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1e fa 48 8b 34 24 65 48 8b 15 28 d5 f3 11 65 8b 05 39 d5 f3 RSP: 0018:ffffc90000006870 EFLAGS: 00000296 RAX: 0000000000000000 RBX: 0000000000000001 RCX: 0000000000000003 RDX: 000000000000000d RSI: 0000000000000001 RDI: ffff88802a3a7cc8 RBP: ffff88802a3a7cc8 R08: 0000000000000005 R09: 0000000000000000 R10: 0000000000000000 R11: ffff8880319f66b0 R12: 000000000000000d R13: 0000000000000003 R14: 1ffff92000000d2c R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff8881248fc000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f9973c00218 CR3: 000000007e106000 CR4: 00000000003526f0 Call Trace: rt6_score_route+0x1e/0xa70 net/ipv6/route.c:753 find_match+0x222/0x15d0 net/ipv6/route.c:785 __find_rr_leaf+0x140/0xe00 net/ipv6/route.c:868 find_rr_leaf net/ipv6/route.c:889 [inline] rt6_select net/ipv6/route.c:933 [inline] fib6_table_lookup+0x57c/0xa30 net/ipv6/route.c:2244 ip6_pol_route+0x1cc/0x1250 net/ipv6/route.c:2280 pol_lookup_func include/net/ip6_fib.h:617 [inline] fib6_rule_lookup+0x536/0x720 net/ipv6/fib6_rules.c:120 ip6_route_input_lookup net/ipv6/route.c:2349 [inline] ip6_route_input+0x662/0xc70 net/ipv6/route.c:2652 ip6_rcv_finish_core.constprop.0+0x1a0/0x5d0 net/ipv6/ip6_input.c:66 ip6_rcv_finish+0x130/0x580 net/ipv6/ip6_input.c:77 ip_sabotage_in+0x21e/0x290 net/bridge/br_netfilter_hooks.c:990 nf_hook_entry_hookfn include/linux/netfilter.h:158 [inline] nf_hook_slow+0xbe/0x200 net/netfilter/core.c:623 nf_hook.constprop.0+0x424/0x750 include/linux/netfilter.h:273 NF_HOOK include/linux/netfilter.h:316 [inline] ipv6_rcv+0xa4/0x650 net/ipv6/ip6_input.c:311 __netif_receive_skb_one_core+0x12d/0x1e0 net/core/dev.c:6139 __netif_receive_skb+0x1d/0x160 net/core/dev.c:6252 netif_receive_skb_internal net/core/dev.c:6338 [inline] netif_receive_skb+0x137/0x760 net/core/dev.c:6397 NF_HOOK include/linux/netfilter.h:318 [inline] NF_HOOK include/linux/netfilter.h:312 [inline] br_pass_frame_up+0x346/0x490 net/bridge/br_input.c:70 br_handle_frame_finish+0x10e8/0x1f00 net/bridge/br_input.c:235 br_nf_hook_thresh+0x307/0x410 net/bridge/br_netfilter_hooks.c:1167 br_nf_pre_routing_finish_ipv6+0x76a/0xfc0 net/bridge/br_netfilter_ipv6.c:154 NF_HOOK include/linux/netfilter.h:318 [inline] br_nf_pre_routing_ipv6+0x3cd/0x8c0 net/bridge/br_netfilter_ipv6.c:184 br_nf_pre_routing+0x860/0x15b0 net/bridge/br_netfilter_hooks.c:508 nf_hook_entry_hookfn include/linux/netfilter.h:158 [inline] nf_hook_bridge_pre net/bridge/br_input.c:291 [inline] br_handle_frame+0xb28/0x14e0 net/bridge/br_input.c:442 __netif_receive_skb_core.constprop.0+0x6b3/0x35b0 net/core/dev.c:6026 __netif_receive_skb_one_core+0xb0/0x1e0 net/core/dev.c:6137 __netif_receive_skb+0x1d/0x160 net/core/dev.c:6252 process_backlog+0x4a2/0x1650 net/core/dev.c:6604 __napi_poll.constprop.0+0xb3/0x540 net/core/dev.c:7668 napi_poll net/core/dev.c:7731 [inline] net_rx_action+0x9f9/0xfa0 net/core/dev.c:7883 handle_softirqs+0x219/0x950 kernel/softirq.c:622 do_softirq kernel/softirq.c:523 [inline] do_softirq+0xb2/0xf0 kernel/softirq.c:510 __local_bh_enable_ip+0x100/0x120 kernel/softirq.c:450 spin_unlock_bh include/linux/spinlock.h:396 [inline] batadv_tt_global_purge net/batman-adv/translation-table.c:2250 [inline] batadv_tt_purge+0x25f/0xb80 net/batman-adv/translation-table.c:3510 process_one_work+0x9ba/0x1b20 kernel/workqueue.c:3257 process_scheduled_works kernel/workqueue.c:3340 [inline] rescuer_thread+0x8c5/0xf10 kernel/workqueue.c:3528 kthread+0x3c5/0x780 kernel/kthread.c:463 ret_from_fork+0x983/0xb10 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:246 net_ratelimit: 8353 callbacks suppressed bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:29:e9:83:13:69, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) net_ratelimit: 11275 callbacks suppressed bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:29:e9:83:13:69, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:29:e9:83:13:69, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:29:e9:83:13:69, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)