bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:70:f1:33:ae:40, vlan:0) rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: rcu: Tasks blocked on level-0 rcu_node (CPUs 0-1): P5129/1:b..l P5807/1:b..l rcu: (detected by 1, t=10502 jiffies, g=18881, q=276 ncpus=2) task:syz-executor state:R running task stack:24232 pid:5807 ppid:5799 flags:0x00004004 Call Trace: context_switch kernel/sched/core.c:5381 [inline] __schedule+0x1553/0x45a0 kernel/sched/core.c:6700 preempt_schedule_common+0x82/0xc0 kernel/sched/core.c:6867 preempt_schedule+0xc0/0xd0 kernel/sched/core.c:6891 preempt_schedule_thunk+0x1a/0x30 arch/x86/entry/thunk_64.S:45 __raw_spin_unlock include/linux/spinlock_api_smp.h:143 [inline] _raw_spin_unlock+0x3a/0x40 kernel/locking/spinlock.c:186 spin_unlock include/linux/spinlock.h:391 [inline] zap_pte_range mm/memory.c:1523 [inline] zap_pmd_range mm/memory.c:1571 [inline] zap_pud_range mm/memory.c:1600 [inline] zap_p4d_range mm/memory.c:1621 [inline] unmap_page_range+0x2315/0x3000 mm/memory.c:1642 unmap_vmas+0x286/0x3f0 mm/memory.c:1732 exit_mmap+0x238/0xb90 mm/mmap.c:3302 __mmput+0x118/0x3c0 kernel/fork.c:1356 exit_mm+0x1f2/0x2c0 kernel/exit.c:569 do_exit+0x8dd/0x2460 kernel/exit.c:870 do_group_exit+0x21b/0x2d0 kernel/exit.c:1024 get_signal+0x12fc/0x13f0 kernel/signal.c:2902 arch_do_signal_or_restart+0xc2/0x800 arch/x86/kernel/signal.c:310 exit_to_user_mode_loop+0x70/0x110 kernel/entry/common.c:174 exit_to_user_mode_prepare+0xee/0x180 kernel/entry/common.c:210 __syscall_exit_to_user_mode_work kernel/entry/common.c:291 [inline] syscall_exit_to_user_mode+0x1a/0x50 kernel/entry/common.c:302 do_syscall_64+0x61/0xa0 arch/x86/entry/common.c:82 entry_SYSCALL_64_after_hwframe+0x68/0xd2 RIP: 0033:0x7f0476557997 RSP: 002b:00007fff0ecdbc60 EFLAGS: 00000202 ORIG_RAX: 000000000000003d RAX: fffffffffffffe00 RBX: 000055556d4b2500 RCX: 00007f0476557997 RDX: 0000000040000000 RSI: 00007fff0ecdbcbc RDI: ffffffffffffffff RBP: 00007fff0ecdbcbc R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000008 R13: 0000000000000003 R14: 00007fff0ecdbf18 R15: 0000000000000000 task:klogd state:R running task stack:24232 pid:5129 ppid:1 flags:0x00004002 Call Trace: context_switch kernel/sched/core.c:5381 [inline] __schedule+0x1553/0x45a0 kernel/sched/core.c:6700 preempt_schedule_irq+0xbf/0x150 kernel/sched/core.c:7010 irqentry_exit+0x67/0x70 kernel/entry/common.c:438 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:687 RIP: 0010:check_region_inline mm/kasan/generic.c:169 [inline] RIP: 0010:kasan_check_range+0x10/0x290 mm/kasan/generic.c:187 Code: c0 c3 0f 0b b8 ea ff ff ff c3 0f 0b b8 ea ff ff ff c3 cc cc cc cc cc cc cc cc 66 0f 1f 00 b0 01 48 85 f6 0f 84 b4 01 00 00 55 <41> 57 41 56 41 55 41 54 53 4c 8d 04 37 49 39 f8 0f 82 13 02 00 00 RSP: 0018:ffffc900032e7560 EFLAGS: 00000202 RAX: ffffffff81ea4001 RBX: 0000000000000003 RCX: ffffffff81ea4113 RDX: 0000000000000000 RSI: 0000000000000004 RDI: ffff8880190ed71c RBP: 0000000000000000 R08: ffff8880190ed71b R09: 1ffff1100321dae3 R10: dffffc0000000000 R11: ffffed100321dae4 R12: ffff8880190ed71c R13: 1ffffffff2e66d30 R14: ffff8880190ed6d8 R15: 0000000000000003 instrument_atomic_read include/linux/instrumented.h:68 [inline] atomic_read include/linux/atomic/atomic-instrumented.h:32 [inline] __page_table_check_zero+0x1f3/0x4b0 mm/page_table_check.c:157 page_table_check_free include/linux/page_table_check.h:41 [inline] free_pages_prepare mm/page_alloc.c:1182 [inline] free_unref_page_prepare+0x7c1/0x8c0 mm/page_alloc.c:2365 free_unref_page+0x32/0x2e0 mm/page_alloc.c:2458 discard_slab mm/slub.c:2127 [inline] __unfreeze_partials+0x1cf/0x210 mm/slub.c:2667 put_cpu_partial+0x17c/0x250 mm/slub.c:2743 __slab_free+0x319/0x400 mm/slub.c:3700 qlink_free mm/kasan/quarantine.c:166 [inline] qlist_free_all+0x75/0xd0 mm/kasan/quarantine.c:185 kasan_quarantine_reduce+0x143/0x160 mm/kasan/quarantine.c:292 ____kasan_kmalloc mm/kasan/common.c:341 [inline] __kasan_kmalloc+0x22/0xa0 mm/kasan/common.c:384 kasan_kmalloc include/linux/kasan.h:198 [inline] __do_kmalloc_node mm/slab_common.c:1007 [inline] __kmalloc_node_track_caller+0xb2/0x230 mm/slab_common.c:1027 kmalloc_reserve+0x116/0x240 net/core/skbuff.c:584 __alloc_skb+0x138/0x2c0 net/core/skbuff.c:653 alloc_skb include/linux/skbuff.h:1316 [inline] alloc_skb_with_frags+0xca/0x7b0 net/core/skbuff.c:6334 sock_alloc_send_pskb+0x883/0x9a0 net/core/sock.c:2821 unix_dgram_sendmsg+0x5a2/0x16d0 net/unix/af_unix.c:2001 sock_sendmsg_nosec net/socket.c:730 [inline] __sock_sendmsg net/socket.c:745 [inline] __sys_sendto+0x4a9/0x6b0 net/socket.c:2200 __do_sys_sendto net/socket.c:2212 [inline] __se_sys_sendto net/socket.c:2208 [inline] __x64_sys_sendto+0xde/0xf0 net/socket.c:2208 do_syscall_x64 arch/x86/entry/common.c:46 [inline] do_syscall_64+0x55/0xa0 arch/x86/entry/common.c:76 entry_SYSCALL_64_after_hwframe+0x68/0xd2 RIP: 0033:0x7f0134666407 RSP: 002b:00007ffde37466b0 EFLAGS: 00000202 ORIG_RAX: 000000000000002c RAX: ffffffffffffffda RBX: 00007f0134516c80 RCX: 00007f0134666407 RDX: 00000000000000a0 RSI: 00007ffde37467f0 RDI: 0000000000000003 RBP: 00007ffde3746c20 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000004000 R11: 0000000000000202 R12: 00007ffde3746c38 R13: 00007ffde37467f0 R14: 0000000000000085 R15: 00007ffde37467f0 rcu: rcu_preempt kthread starved for 4872 jiffies! g18881 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=0 rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. rcu: RCU grace-period kthread stack dump: task:rcu_preempt state:R running task stack:27144 pid:17 ppid:2 flags:0x00004000 Call Trace: context_switch kernel/sched/core.c:5381 [inline] __schedule+0x1553/0x45a0 kernel/sched/core.c:6700 schedule+0xbd/0x170 kernel/sched/core.c:6774 schedule_timeout+0x188/0x2d0 kernel/time/timer.c:2168 rcu_gp_fqs_loop+0x313/0x1590 kernel/rcu/tree.c:1667 rcu_gp_kthread+0x9d/0x3b0 kernel/rcu/tree.c:1866 kthread+0x2fa/0x390 kernel/kthread.c:388 ret_from_fork+0x48/0x80 arch/x86/kernel/process.c:152 ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:293 rcu: Stack dump where RCU GP kthread last ran: Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 PID: 7106 Comm: syz.2.362 Not tainted syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 RIP: 0010:skb_ext_find include/linux/skbuff.h:4835 [inline] RIP: 0010:nf_bridge_info_get include/linux/netfilter_bridge.h:30 [inline] RIP: 0010:nf_bridge_update_protocol net/bridge/br_netfilter_hooks.c:252 [inline] RIP: 0010:br_nf_dev_queue_xmit+0x1ff/0x1b80 net/bridge/br_netfilter_hooks.c:866 Code: 44 ed 48 8b 44 24 38 42 0f b6 04 30 84 c0 4c 89 f5 0f 85 22 13 00 00 48 8b 04 24 0f b6 18 89 de 83 e6 01 31 ff e8 91 13 1d f8 c3 01 75 0a e8 f7 10 1d f8 45 31 f6 eb 43 e8 ed 10 1d f8 49 8d RSP: 0018:ffffc900000069e0 EFLAGS: 00000246 RAX: ffffffff896a10ff RBX: 0000000000000001 RCX: 0000000000000100 RDX: ffff8880211fda00 RSI: 0000000000000001 RDI: 0000000000000000 RBP: dffffc0000000000 R08: ffffffff8e8b14ef R09: 1ffffffff1d1629d R10: dffffc0000000000 R11: fffffbfff1d1629e R12: ffff88804dd1b512 R13: 00000000000005dc R14: dffffc0000000000 R15: ffff88804dd1aa00 FS: 00007fdf6c9986c0(0000) GS:ffff8880b8e00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000055556d4cda28 CR3: 000000002d4e5000 CR4: 00000000003506f0 DR0: 0000200000000300 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 Call Trace: NF_HOOK+0x66e/0x700 include/linux/netfilter.h:304 br_nf_post_routing+0xb41/0xfb0 net/bridge/br_netfilter_hooks.c:977 nf_hook_entry_hookfn include/linux/netfilter.h:144 [inline] nf_hook_slow+0xbd/0x200 net/netfilter/core.c:626 nf_hook include/linux/netfilter.h:259 [inline] NF_HOOK+0x23e/0x3e0 include/linux/netfilter.h:302 br_forward_finish+0xd3/0x130 net/bridge/br_forward.c:66 br_nf_hook_thresh net/bridge/br_netfilter_hooks.c:1184 [inline] br_nf_forward_finish+0xa51/0xe80 net/bridge/br_netfilter_hooks.c:684 NF_HOOK+0x66e/0x700 include/linux/netfilter.h:304 br_nf_forward_ip+0xcc1/0x1110 net/bridge/br_netfilter_hooks.c:754 nf_hook_entry_hookfn include/linux/netfilter.h:144 [inline] nf_hook_slow+0xbd/0x200 net/netfilter/core.c:626 nf_hook include/linux/netfilter.h:259 [inline] NF_HOOK+0x23e/0x3e0 include/linux/netfilter.h:302 __br_forward+0x433/0x610 net/bridge/br_forward.c:115 br_handle_frame_finish+0x13c5/0x18f0 net/bridge/br_input.c:215 br_nf_hook_thresh+0x3cd/0x4a0 net/bridge/br_netfilter_hooks.c:1184 br_nf_pre_routing_finish_ipv6+0x9dc/0xd00 net/bridge/br_netfilter_ipv6.c:-1 NF_HOOK include/linux/netfilter.h:304 [inline] br_nf_pre_routing_ipv6+0x349/0x6b0 net/bridge/br_netfilter_ipv6.c:184 nf_hook_entry_hookfn include/linux/netfilter.h:144 [inline] nf_hook_bridge_pre net/bridge/br_input.c:277 [inline] br_handle_frame+0x1245/0x14d0 net/bridge/br_input.c:424 __netif_receive_skb_core+0xfab/0x3af0 net/core/dev.c:5540 __netif_receive_skb_one_core net/core/dev.c:5644 [inline] __netif_receive_skb+0x74/0x290 net/core/dev.c:5760 process_backlog+0x391/0x6f0 net/core/dev.c:6088 __napi_poll+0xc0/0x460 net/core/dev.c:6650 napi_poll net/core/dev.c:6717 [inline] net_rx_action+0x616/0xc40 net/core/dev.c:6853 handle_softirqs+0x280/0x820 kernel/softirq.c:578 __do_softirq kernel/softirq.c:612 [inline] invoke_softirq kernel/softirq.c:452 [inline] __irq_exit_rcu+0xd3/0x190 kernel/softirq.c:661 irq_exit_rcu+0x9/0x20 kernel/softirq.c:673 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1088 [inline] sysvec_apic_timer_interrupt+0xa4/0xc0 arch/x86/kernel/apic/apic.c:1088 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:687 RIP: 0010:get_current arch/x86/include/asm/current.h:41 [inline] RIP: 0010:__sanitizer_cov_trace_pc+0x8/0x60 kernel/kcov.c:215 Code: 00 00 f3 0f 1e fa 53 48 89 fb e8 13 00 00 00 48 8b 3d 1c f5 03 0d 48 89 de 5b e9 e3 67 57 00 cc cc cc f3 0f 1e fa 48 8b 04 24 <65> 48 8b 0d b0 93 7c 7e 65 8b 15 b1 93 7c 7e 81 e2 00 01 ff 00 74 RSP: 0018:ffffc9000c547058 EFLAGS: 00000246 RAX: ffffffff819d5683 RBX: 0000000000000000 RCX: 0000000000000002 RDX: ffff8880211fda00 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 0000000000000000 R08: 0000000000000004 R09: 0000000000000004 R10: ffff88805f8a9aa4 R11: ffffed100bf155ad R12: dffffc0000000000 R13: ffff888076964400 R14: ffff888024539300 R15: 0000000000000000 states_equal+0x403/0x25b0 kernel/bpf/verifier.c:16386 is_state_visited kernel/bpf/verifier.c:16826 [inline] do_check+0x1f3d/0xdbf0 kernel/bpf/verifier.c:17092 do_check_common+0xadb/0x13e0 kernel/bpf/verifier.c:19712 do_check_main kernel/bpf/verifier.c:19775 [inline] bpf_check+0x658e/0xeba0 kernel/bpf/verifier.c:20443 bpf_prog_load+0x1163/0x1670 kernel/bpf/syscall.c:2753 __sys_bpf+0x5ba/0x890 kernel/bpf/syscall.c:5477 __do_sys_bpf kernel/bpf/syscall.c:5581 [inline] __se_sys_bpf kernel/bpf/syscall.c:5579 [inline] __x64_sys_bpf+0x7c/0x90 kernel/bpf/syscall.c:5579 do_syscall_x64 arch/x86/entry/common.c:46 [inline] do_syscall_64+0x55/0xa0 arch/x86/entry/common.c:76 entry_SYSCALL_64_after_hwframe+0x68/0xd2 RIP: 0033:0x7fdf6bb9c819 Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fdf6c998028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 RAX: ffffffffffffffda RBX: 00007fdf6be15fa0 RCX: 00007fdf6bb9c819 RDX: 0000000000000094 RSI: 0000200000000840 RDI: 0000000000000005 RBP: 00007fdf6bc32c91 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007fdf6be16038 R14: 00007fdf6be15fa0 R15: 00007ffe869a7d18 net_ratelimit: 776 callbacks suppressed bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:70:f1:33:ae:40, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:70:f1:33:ae:40, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:70:f1:33:ae:40, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:70:f1:33:ae:40, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:70:f1:33:ae:40, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) net_ratelimit: 5929 callbacks suppressed bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:70:f1:33:ae:40, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:70:f1:33:ae:40, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:70:f1:33:ae:40, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:70:f1:33:ae:40, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)