bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: rcu: Tasks blocked on level-0 rcu_node (CPUs 0-1): P5838/1:b..l P8684/1:b..l rcu: (detected by 1, t=10502 jiffies, g=33209, q=62 ncpus=1) task:syz.1.630 state:R running task stack:23600 pid:8684 tgid:8684 ppid:5848 task_flags:0x400640 flags:0x00004002 Call Trace: context_switch kernel/sched/core.c:5378 [inline] __schedule+0xf43/0x5890 kernel/sched/core.c:6765 preempt_schedule_irq+0x51/0x90 kernel/sched/core.c:7087 irqentry_exit+0x36/0x90 kernel/entry/common.c:354 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702 RIP: 0010:native_irq_disable arch/x86/include/asm/irqflags.h:37 [inline] RIP: 0010:arch_local_irq_disable arch/x86/include/asm/irqflags.h:92 [inline] RIP: 0010:arch_local_irq_save arch/x86/include/asm/irqflags.h:124 [inline] RIP: 0010:lock_is_held_type+0x57/0x150 kernel/locking/lockdep.c:5919 Code: 85 c0 0f 85 ce 00 00 00 65 4c 8b 25 a3 74 ae 74 41 8b 94 24 ec 0a 00 00 85 d2 0f 85 b6 00 00 00 48 89 fd 41 89 f6 9c 8f 04 24 48 c7 c7 40 ff 6c 8b 45 31 ff e8 09 17 00 00 4d 8d ac 24 f0 0a RSP: 0018:ffffc9000b4deb18 EFLAGS: 00000246 RAX: 0000000000000000 RBX: ffff88802627bc00 RCX: 0000000000000001 RDX: 0000000000000000 RSI: 00000000ffffffff RDI: ffffffff8e216958 RBP: ffffffff8e216958 R08: 0000000000000000 R09: fffffbfff2dd8598 R10: ffffffff96ec2cc7 R11: 0000000000000002 R12: ffff88802627bc00 R13: 00000000ffffffff R14: 00000000ffffffff R15: ffffffff8224161f lock_is_held include/linux/lockdep.h:249 [inline] task_css include/linux/cgroup.h:434 [inline] mem_cgroup_from_task mm/memcontrol.c:892 [inline] get_mem_cgroup_from_mm+0x1d1/0x5f0 mm/memcontrol.c:945 __mem_cgroup_charge+0x1a/0x1e0 mm/memcontrol.c:4513 mem_cgroup_charge include/linux/memcontrol.h:644 [inline] shmem_alloc_and_add_folio+0x50a/0xc10 mm/shmem.c:1912 shmem_get_folio_gfp+0x689/0x1530 mm/shmem.c:2545 shmem_fault+0x200/0xae0 mm/shmem.c:2746 __do_fault+0x10a/0x490 mm/memory.c:4989 do_read_fault mm/memory.c:5409 [inline] do_fault mm/memory.c:5543 [inline] do_pte_missing+0xecf/0x3e10 mm/memory.c:4059 handle_pte_fault mm/memory.c:5888 [inline] __handle_mm_fault+0x103c/0x2a40 mm/memory.c:6031 handle_mm_fault+0x3fa/0xaa0 mm/memory.c:6200 faultin_page mm/gup.c:1196 [inline] __get_user_pages+0x773/0x36f0 mm/gup.c:1491 __get_user_pages_locked mm/gup.c:1757 [inline] get_dump_page+0xff/0x230 mm/gup.c:2275 dump_user_range+0x134/0x910 fs/coredump.c:944 elf_core_dump+0x287c/0x3a50 fs/binfmt_elf.c:2129 do_coredump+0x3166/0x4410 fs/coredump.c:759 get_signal+0x230b/0x26c0 kernel/signal.c:3021 arch_do_signal_or_restart+0x90/0x7e0 arch/x86/kernel/signal.c:337 exit_to_user_mode_loop kernel/entry/common.c:111 [inline] exit_to_user_mode_prepare include/linux/entry-common.h:329 [inline] irqentry_exit_to_user_mode+0x13f/0x280 kernel/entry/common.c:231 asm_exc_page_fault+0x26/0x30 arch/x86/include/asm/idtentry.h:623 RIP: 0033:0x7fd19b78d171 RSP: 002b:ffffffffffffffd0 EFLAGS: 00010217 RAX: 0000000000000000 RBX: 00007fd19b9a6160 RCX: 00007fd19b78d169 RDX: 0000000000000000 RSI: ffffffffffffffd0 RDI: 0000000009004000 RBP: 00007fd19b80e2a0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000000 R13: 0000000000000001 R14: 00007fd19b9a6160 R15: 00007fffb64731a8 task:syz-executor state:R running task stack:22176 pid:5838 tgid:5838 ppid:1 task_flags:0x400140 flags:0x00000006 Call Trace: context_switch kernel/sched/core.c:5378 [inline] __schedule+0xf43/0x5890 kernel/sched/core.c:6765 preempt_schedule_irq+0x51/0x90 kernel/sched/core.c:7087 irqentry_exit+0x36/0x90 kernel/entry/common.c:354 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702 RIP: 0010:lock_acquire.part.0+0x155/0x380 kernel/locking/lockdep.c:5816 Code: b8 ff ff ff ff 65 0f c1 05 50 c8 6b 7e 83 f8 01 0f 85 d0 01 00 00 9c 58 f6 c4 02 0f 85 e5 01 00 00 48 85 ed 0f 85 b6 01 00 00 <48> b8 00 00 00 00 00 fc ff df 48 01 c3 48 c7 03 00 00 00 00 48 c7 RSP: 0018:ffffc90003dd7758 EFLAGS: 00000206 RAX: 0000000000000046 RBX: 1ffff920007baeec RCX: 0000000094b2c764 RDX: 0000000000000001 RSI: ffffffff8b6cff80 RDI: ffffffff8bd35960 RBP: 0000000000000200 R08: 0000000000000000 R09: fffffbfff2dd8598 R10: ffffffff96ec2cc7 R11: 0000000000000001 R12: 0000000000000000 R13: ffffffff8e1bd140 R14: 0000000000000000 R15: 0000000000000000 rcu_lock_acquire include/linux/rcupdate.h:337 [inline] rcu_read_lock include/linux/rcupdate.h:849 [inline] page_ext_get+0x3a/0x310 mm/page_ext.c:525 __page_table_check_zero+0xbf/0x360 mm/page_table_check.c:148 page_table_check_free include/linux/page_table_check.h:41 [inline] free_pages_prepare mm/page_alloc.c:1128 [inline] free_frozen_pages+0x6c2/0xfb0 mm/page_alloc.c:2660 __put_partials+0x14c/0x170 mm/slub.c:3153 qlink_free mm/kasan/quarantine.c:163 [inline] qlist_free_all+0x4e/0x120 mm/kasan/quarantine.c:179 kasan_quarantine_reduce+0x195/0x1e0 mm/kasan/quarantine.c:286 __kasan_slab_alloc+0x69/0x90 mm/kasan/common.c:329 kasan_slab_alloc include/linux/kasan.h:250 [inline] slab_post_alloc_hook mm/slub.c:4115 [inline] slab_alloc_node mm/slub.c:4164 [inline] kmem_cache_alloc_noprof+0x226/0x3d0 mm/slub.c:4171 lsm_file_alloc security/security.c:733 [inline] security_file_alloc+0x34/0x2b0 security/security.c:2858 init_file+0x93/0x4c0 fs/file_table.c:156 alloc_empty_file+0x91/0x1e0 fs/file_table.c:237 path_openat+0xe1/0x2d80 fs/namei.c:3975 do_filp_open+0x20c/0x470 fs/namei.c:4016 do_sys_openat2+0x17a/0x1e0 fs/open.c:1428 do_sys_open fs/open.c:1443 [inline] __do_sys_openat fs/open.c:1459 [inline] __se_sys_openat fs/open.c:1454 [inline] __x64_sys_openat+0x175/0x210 fs/open.c:1454 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f640538ca61 RSP: 002b:00007ffd97d0a170 EFLAGS: 00000287 ORIG_RAX: 0000000000000101 RAX: ffffffffffffffda RBX: 0000000000000255 RCX: 00007f640538ca61 RDX: 0000000000090800 RSI: 00007f640540e5c0 RDI: 00000000ffffff9c RBP: 00007ffd97d0a21c R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000287 R12: 0000000000000099 R13: 0000000000000000 R14: 0000000000054dd5 R15: 00007ffd97d0a270 rcu: rcu_preempt kthread starved for 702 jiffies! g33209 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=1 rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. rcu: RCU grace-period kthread stack dump: task:rcu_preempt state:R running task stack:27552 pid:18 tgid:18 ppid:2 task_flags:0x208040 flags:0x00004000 Call Trace: context_switch kernel/sched/core.c:5378 [inline] __schedule+0xf43/0x5890 kernel/sched/core.c:6765 __schedule_loop kernel/sched/core.c:6842 [inline] schedule+0xe7/0x350 kernel/sched/core.c:6857 schedule_timeout+0x124/0x280 kernel/time/sleep_timeout.c:99 rcu_gp_fqs_loop+0x1eb/0xb00 kernel/rcu/tree.c:2024 rcu_gp_kthread+0x271/0x380 kernel/rcu/tree.c:2226 kthread+0x3af/0x750 kernel/kthread.c:464 ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 rcu: Stack dump where RCU GP kthread last ran: CPU: 1 UID: 0 PID: 3402 Comm: kworker/R-bat_e Not tainted 6.14.0-rc7-syzkaller-00074-ga7f2e10ecd8f #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 Workqueue: bat_events batadv_nc_worker RIP: 0010:ip_sabotage_in+0x0/0x290 net/bridge/br_netfilter_hooks.c:982 Code: eb f7 e9 84 fb ff ff 4c 89 f7 e8 7b 1d eb f7 e9 d6 fe ff ff 66 0f 1f 44 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1e fa 41 55 41 54 49 89 d4 55 53 48 89 f3 48 83 ec 08 e8 97 RSP: 0018:ffffc90000a28a58 EFLAGS: 00000246 RAX: 1ffff1100652f9c1 RBX: ffff88803297ce00 RCX: ffffffff8976ebb3 RDX: ffffc90000a28ae8 RSI: ffff8880b2989dc0 RDI: 0000000000000000 RBP: ffff88803297ce00 R08: 0000000000000004 R09: 0000000000000000 R10: 0000000000000004 R11: 0000000000000003 R12: 0000000000000000 R13: ffff8880b2989dc0 R14: ffffffff8a3112a0 R15: dffffc0000000000 FS: 0000000000000000(0000) GS:ffff8880b8700000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fffb6472f00 CR3: 0000000032552000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline] nf_hook_slow+0xbb/0x200 net/netfilter/core.c:626 nf_hook.constprop.0+0x42e/0x750 include/linux/netfilter.h:269 NF_HOOK include/linux/netfilter.h:312 [inline] ipv6_rcv+0xa4/0x680 net/ipv6/ip6_input.c:309 __netif_receive_skb_one_core+0x12e/0x1e0 net/core/dev.c:5896 __netif_receive_skb+0x1d/0x160 net/core/dev.c:6009 process_backlog+0x443/0x15f0 net/core/dev.c:6357 __napi_poll.constprop.0+0xb7/0x550 net/core/dev.c:7191 napi_poll net/core/dev.c:7260 [inline] net_rx_action+0xa94/0x1010 net/core/dev.c:7382 handle_softirqs+0x213/0x8f0 kernel/softirq.c:561 do_softirq kernel/softirq.c:462 [inline] do_softirq+0xb2/0xf0 kernel/softirq.c:449 __local_bh_enable_ip+0x100/0x120 kernel/softirq.c:389 spin_unlock_bh include/linux/spinlock.h:396 [inline] batadv_nc_purge_paths+0x1c6/0x390 net/batman-adv/network-coding.c:471 batadv_nc_worker+0x913/0x1060 net/batman-adv/network-coding.c:720 process_one_work+0x9c5/0x1ba0 kernel/workqueue.c:3238 process_scheduled_works kernel/workqueue.c:3319 [inline] rescuer_thread+0x616/0xe80 kernel/workqueue.c:3496 kthread+0x3af/0x750 kernel/kthread.c:464 ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 net_ratelimit: 8932 callbacks suppressed bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:84:ea:93:aa:f0, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:84:ea:93:aa:f0, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:84:ea:93:aa:f0, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) net_ratelimit: 10390 callbacks suppressed bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:84:ea:93:aa:f0, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:84:ea:93:aa:f0, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:32:84:ea:93:aa:f0, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)