bridge0: received packet on veth0_to_bridge with own address as source address (addr:c6:31:6c:85:eb:8c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
rcu: INFO: rcu_preempt detected stalls on CPUs/tasks:
rcu: Tasks blocked on level-0 rcu_node (CPUs 0-1): P5199/1:b..l P26750/1:b..l P23207/1:b..l P65/1:b..l
rcu: (detected by 0, t=10502 jiffies, g=163057, q=558 ncpus=1)
task:kworker/u8:5 state:R running task stack:23512 pid:65 tgid:65 ppid:2 task_flags:0x4208060 flags:0x00004000
Workqueue: events_unbound cfg80211_wiphy_work
Call Trace:
context_switch kernel/sched/core.c:5382 [inline]
__schedule+0x116f/0x5de0 kernel/sched/core.c:6767
preempt_schedule_common+0x44/0xc0 kernel/sched/core.c:6947
preempt_schedule_thunk+0x16/0x30 arch/x86/entry/thunk.S:12
__local_bh_enable_ip+0x107/0x120 kernel/softirq.c:414
spin_unlock_bh include/linux/spinlock.h:396 [inline]
ieee80211_check_fast_xmit+0x393/0x18c0 net/mac80211/tx.c:3272
sta_info_insert_finish net/mac80211/sta_info.c:934 [inline]
sta_info_insert_rcu+0x14d7/0x1b70 net/mac80211/sta_info.c:967
ieee80211_ibss_finish_sta+0x21f/0x3b0 net/mac80211/ibss.c:576
ieee80211_ibss_add_sta+0x3a8/0x730 net/mac80211/ibss.c:632
ieee80211_update_sta_info net/mac80211/ibss.c:1008 [inline]
ieee80211_rx_bss_info net/mac80211/ibss.c:1100 [inline]
ieee80211_rx_mgmt_probe_beacon net/mac80211/ibss.c:1581 [inline]
ieee80211_ibss_rx_queued_mgmt+0x2751/0x2fd0 net/mac80211/ibss.c:1608
ieee80211_iface_process_skb net/mac80211/iface.c:1622 [inline]
ieee80211_iface_work+0xbf4/0x1020 net/mac80211/iface.c:1676
cfg80211_wiphy_work+0x3dc/0x550 net/wireless/core.c:435
process_one_work+0x9cc/0x1b70 kernel/workqueue.c:3238
process_scheduled_works kernel/workqueue.c:3319 [inline]
worker_thread+0x6c8/0xf10 kernel/workqueue.c:3400
kthread+0x3c2/0x780 kernel/kthread.c:464
ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:153
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245
task:syz-executor state:R running task stack:25672 pid:23207 tgid:23207 ppid:5826 task_flags:0x40050c flags:0x00004004
Call Trace:
context_switch kernel/sched/core.c:5382 [inline]
__schedule+0x116f/0x5de0 kernel/sched/core.c:6767
preempt_schedule_common+0x44/0xc0 kernel/sched/core.c:6947
preempt_schedule_thunk+0x16/0x30 arch/x86/entry/thunk.S:12
__raw_spin_unlock include/linux/spinlock_api_smp.h:143 [inline]
_raw_spin_unlock+0x3e/0x50 kernel/locking/spinlock.c:186
spin_unlock include/linux/spinlock.h:391 [inline]
zap_pte_range mm/memory.c:1761 [inline]
zap_pmd_range mm/memory.c:1823 [inline]
zap_pud_range mm/memory.c:1852 [inline]
zap_p4d_range mm/memory.c:1873 [inline]
unmap_page_range+0xf08/0x4320 mm/memory.c:1894
unmap_single_vma+0x194/0x2a0 mm/memory.c:1940
unmap_vmas+0x22c/0x490 mm/memory.c:1984
exit_mmap+0x1b9/0xb90 mm/mmap.c:1284
__mmput+0x12a/0x410 kernel/fork.c:1379
mmput+0x62/0x70 kernel/fork.c:1401
exit_mm kernel/exit.c:589 [inline]
do_exit+0x9d1/0x2c30 kernel/exit.c:940
do_group_exit+0xd3/0x2a0 kernel/exit.c:1102
get_signal+0x2673/0x26d0 kernel/signal.c:3034
arch_do_signal_or_restart+0x8f/0x7d0 arch/x86/kernel/signal.c:337
exit_to_user_mode_loop kernel/entry/common.c:111 [inline]
exit_to_user_mode_prepare include/linux/entry-common.h:329 [inline]
__syscall_exit_to_user_mode_work kernel/entry/common.c:207 [inline]
syscall_exit_to_user_mode+0x150/0x2a0 kernel/entry/common.c:218
do_syscall_64+0xda/0x260 arch/x86/entry/syscall_64.c:100
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f17c4f83393
RSP: 002b:00007ffc38d92dc8 EFLAGS: 00000202 ORIG_RAX: 000000000000003d
RAX: fffffffffffffe00 RBX: 0000000000005abe RCX: 00007f17c4f83393
RDX: 0000000040000000 RSI: 00007ffc38d92ddc RDI: 00000000ffffffff
RBP: 00007ffc38d92ddc R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000008
R13: 0000000000000003 R14: 0000000000000009 R15: 0000000000000000
task:syz.3.5770 state:R running task stack:25672 pid:26750 tgid:26750 ppid:23463 task_flags:0x400040 flags:0x00004006
Call Trace:
context_switch kernel/sched/core.c:5382 [inline]
__schedule+0x116f/0x5de0 kernel/sched/core.c:6767
preempt_schedule_common+0x44/0xc0 kernel/sched/core.c:6947
preempt_schedule_thunk+0x16/0x30 arch/x86/entry/thunk.S:12
__local_bh_enable_ip+0x107/0x120 kernel/softirq.c:414
spin_unlock_bh include/linux/spinlock.h:396 [inline]
nl80211_netlink_notify net/wireless/nl80211.c:20282 [inline]
nl80211_netlink_notify+0x61c/0x970 net/wireless/nl80211.c:20233
notifier_call_chain+0xb9/0x410 kernel/notifier.c:85
blocking_notifier_call_chain kernel/notifier.c:380 [inline]
blocking_notifier_call_chain+0x69/0xa0 kernel/notifier.c:368
netlink_release+0x186b/0x2020 net/netlink/af_netlink.c:764
__sock_release+0xb0/0x270 net/socket.c:647
sock_close+0x1c/0x30 net/socket.c:1391
__fput+0x3ff/0xb70 fs/file_table.c:465
task_work_run+0x14d/0x240 kernel/task_work.c:227
resume_user_mode_work include/linux/resume_user_mode.h:50 [inline]
exit_to_user_mode_loop kernel/entry/common.c:114 [inline]
exit_to_user_mode_prepare include/linux/entry-common.h:329 [inline]
__syscall_exit_to_user_mode_work kernel/entry/common.c:207 [inline]
syscall_exit_to_user_mode+0x27b/0x2a0 kernel/entry/common.c:218
do_syscall_64+0xda/0x260 arch/x86/entry/syscall_64.c:100
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f26cd58d169
RSP: 002b:00007ffd6ff06e58 EFLAGS: 00000246 ORIG_RAX: 00000000000001b4
RAX: 0000000000000000 RBX: 00007f26cd7a7ba0 RCX: 00007f26cd58d169
RDX: 0000000000000000 RSI: 000000000000001e RDI: 0000000000000003
RBP: 00007f26cd7a7ba0 R08: 00000000000359dc R09: 0000001e6ff0714f
R10: 00000000003ca400 R11: 0000000000000246 R12: 0000000000176e13
R13: 00007ffd6ff06f50 R14: ffffffffffffffff R15: 00007ffd6ff06f70
task:klogd state:R running task stack:24664 pid:5199 tgid:5199 ppid:1 task_flags:0x400100 flags:0x00000002
Call Trace:
context_switch kernel/sched/core.c:5382 [inline]
__schedule+0x116f/0x5de0 kernel/sched/core.c:6767
preempt_schedule_irq+0x51/0x90 kernel/sched/core.c:7090
irqentry_exit+0x36/0x90 kernel/entry/common.c:354
asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702
RIP: 0010:lock_acquire+0x62/0x350 kernel/locking/lockdep.c:5870
Code: 51 0e 12 83 f8 07 0f 87 bc 02 00 00 89 c0 48 0f a3 05 72 54 ee 0e 0f 82 74 02 00 00 8b 35 ea 83 ee 0e 85 f6 0f 85 8d 00 00 00 <48> 8b 44 24 30 65 48 2b 05 49 51 0e 12 0f 85 c7 02 00 00 48 83 c4
RSP: 0018:ffffc900030573f0 EFLAGS: 00000206
RAX: 0000000000000046 RBX: ffffffff8e3c1580 RCX: 00000000ef9d33e4
RDX: 0000000000000000 RSI: ffffffff8dbc59c7 RDI: ffffffff8bf451c0
RBP: 0000000000000002 R08: 0ac0d5affe09d4ff R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
rcu_lock_acquire include/linux/rcupdate.h:331 [inline]
rcu_read_lock include/linux/rcupdate.h:841 [inline]
class_rcu_constructor include/linux/rcupdate.h:1155 [inline]
unwind_next_frame+0xd1/0x20a0 arch/x86/kernel/unwind_orc.c:479
__unwind_start+0x45f/0x7f0 arch/x86/kernel/unwind_orc.c:758
unwind_start arch/x86/include/asm/unwind.h:64 [inline]
arch_stack_walk+0x73/0x100 arch/x86/kernel/stacktrace.c:24
stack_trace_save+0x8e/0xc0 kernel/stacktrace.c:122
kasan_save_stack+0x33/0x60 mm/kasan/common.c:47
kasan_save_track+0x14/0x30 mm/kasan/common.c:68
poison_kmalloc_redzone mm/kasan/common.c:377 [inline]
__kasan_kmalloc+0xaa/0xb0 mm/kasan/common.c:394
kasan_kmalloc include/linux/kasan.h:260 [inline]
__do_kmalloc_node mm/slub.c:4331 [inline]
__kmalloc_node_track_caller_noprof+0x221/0x510 mm/slub.c:4350
kmalloc_reserve+0xef/0x2c0 net/core/skbuff.c:599
__alloc_skb+0x166/0x380 net/core/skbuff.c:668
alloc_skb include/linux/skbuff.h:1340 [inline]
alloc_skb_with_frags+0xe0/0x860 net/core/skbuff.c:6639
sock_alloc_send_pskb+0x7fb/0x990 net/core/sock.c:2949
unix_dgram_sendmsg+0x463/0x1910 net/unix/af_unix.c:2007
sock_sendmsg_nosec net/socket.c:712 [inline]
__sock_sendmsg net/socket.c:727 [inline]
__sys_sendto+0x495/0x510 net/socket.c:2180
__do_sys_sendto net/socket.c:2187 [inline]
__se_sys_sendto net/socket.c:2183 [inline]
__x64_sys_sendto+0xe0/0x1c0 net/socket.c:2183
do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
do_syscall_64+0xcd/0x260 arch/x86/entry/syscall_64.c:94
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f138605d9b5
RSP: 002b:00007ffea9382978 EFLAGS: 00000246 ORIG_RAX: 000000000000002c
RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007f138605d9b5
RDX: 000000000000005b RSI: 000055c666a4f200 RDI: 0000000000000003
RBP: 000055c666a47910 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000004000 R11: 0000000000000246 R12: 0000000000000013
R13: 00007f13861eb212 R14: 00007ffea9382a78 R15: 0000000000000000
rcu: rcu_preempt kthread starved for 565 jiffies! g163057 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=0
rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior.
rcu: RCU grace-period kthread stack dump:
task:rcu_preempt state:R running task stack:27608 pid:16 tgid:16 ppid:2 task_flags:0x208040 flags:0x00004000
Call Trace:
context_switch kernel/sched/core.c:5382 [inline]
__schedule+0x116f/0x5de0 kernel/sched/core.c:6767
__schedule_loop kernel/sched/core.c:6845 [inline]
schedule+0xe7/0x3a0 kernel/sched/core.c:6860
schedule_timeout+0x123/0x290 kernel/time/sleep_timeout.c:99
rcu_gp_fqs_loop+0x1ea/0xb00 kernel/rcu/tree.c:2046
rcu_gp_kthread+0x270/0x380 kernel/rcu/tree.c:2248
kthread+0x3c2/0x780 kernel/kthread.c:464
ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:153
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245
rcu: Stack dump where RCU GP kthread last ran:
CPU: 0 UID: 0 PID: 3402 Comm: kworker/R-bat_e Not tainted 6.15.0-rc1-syzkaller-00025-gbec7dcbc242c #0 PREEMPT(full)
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025
Workqueue: bat_events batadv_tt_purge
RIP: 0010:__in6_dev_get include/net/addrconf.h:347 [inline]
RIP: 0010:ip6_ignore_linkdown include/net/addrconf.h:443 [inline]
RIP: 0010:find_match+0x13a/0x15d0 net/ipv6/route.c:781
Code: 80 3c 02 00 0f 85 ac 11 00 00 48 b8 00 00 00 00 00 fc ff df 4d 8b 7d 00 49 8d bf c0 00 00 00 48 89 fa 48 c1 ea 03 80 3c 02 00 <0f> 85 93 11 00 00 4d 8b bf c0 00 00 00 e8 64 96 54 01 31 ff 89 c6
RSP: 0018:ffffc900000073c0 EFLAGS: 00000246
RAX: dffffc0000000000 RBX: 0000000000000003 RCX: ffffffff8a1b4fbc
RDX: 1ffff1100d20f018 RSI: ffffffff8a1b4fff RDI: ffff8880690780c0
RBP: ffffc900000074c8 R08: 0000000000000001 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000000 R12: ffff8880a1ef18cf
R13: ffff8880a1ef18b8 R14: 1ffff92000000e87 R15: ffff888069078000
FS: 0000000000000000(0000) GS:ffff8881249b9000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007ff5ecce0bd0 CR3: 000000007b46c000 CR4: 00000000003526f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
__find_rr_leaf+0x140/0xe00 net/ipv6/route.c:869
find_rr_leaf net/ipv6/route.c:890 [inline]
rt6_select net/ipv6/route.c:934 [inline]
fib6_table_lookup+0x57c/0xa30 net/ipv6/route.c:2229
ip6_pol_route+0x1cc/0x1230 net/ipv6/route.c:2265
pol_lookup_func include/net/ip6_fib.h:616 [inline]
fib6_rule_lookup+0x536/0x720 net/ipv6/fib6_rules.c:120
ip6_route_input_lookup net/ipv6/route.c:2334 [inline]
ip6_route_input+0x662/0xc00 net/ipv6/route.c:2630
ip6_rcv_finish_core.constprop.0+0x1a0/0x5d0 net/ipv6/ip6_input.c:66
ip6_rcv_finish net/ipv6/ip6_input.c:77 [inline]
NF_HOOK include/linux/netfilter.h:314 [inline]
NF_HOOK include/linux/netfilter.h:308 [inline]
ipv6_rcv+0x1e8/0x680 net/ipv6/ip6_input.c:309
__netif_receive_skb_one_core+0x12d/0x1e0 net/core/dev.c:5894
__netif_receive_skb+0x1d/0x160 net/core/dev.c:6007
process_backlog+0x442/0x15e0 net/core/dev.c:6359
__napi_poll.constprop.0+0xb7/0x550 net/core/dev.c:7331
napi_poll net/core/dev.c:7395 [inline]
net_rx_action+0xa97/0x1010 net/core/dev.c:7517
handle_softirqs+0x216/0x8e0 kernel/softirq.c:579
do_softirq kernel/softirq.c:480 [inline]
do_softirq+0xb2/0xf0 kernel/softirq.c:467
__local_bh_enable_ip+0x100/0x120 kernel/softirq.c:407
spin_unlock_bh include/linux/spinlock.h:396 [inline]
batadv_tt_global_purge net/batman-adv/translation-table.c:2250 [inline]
batadv_tt_purge+0x25f/0xb80 net/batman-adv/translation-table.c:3510
process_one_work+0x9cc/0x1b70 kernel/workqueue.c:3238
process_scheduled_works kernel/workqueue.c:3319 [inline]
rescuer_thread+0x620/0xea0 kernel/workqueue.c:3496
kthread+0x3c2/0x780 kernel/kthread.c:464
ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:153
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245
net_ratelimit: 5010 callbacks suppressed
bridge0: received packet on veth0_to_bridge with own address as source address (addr:c6:31:6c:85:eb:8c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:c6:31:6c:85:eb:8c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:c6:31:6c:85:eb:8c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
net_ratelimit: 6902 callbacks suppressed
bridge0: received packet on veth0_to_bridge with own address as source address (addr:c6:31:6c:85:eb:8c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:c6:31:6c:85:eb:8c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:c6:31:6c:85:eb:8c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)