bridge0: received packet on veth0_to_bridge with own address as source address (addr:c6:31:6c:85:eb:8c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: rcu: Tasks blocked on level-0 rcu_node (CPUs 0-1): P5199/1:b..l P26750/1:b..l P23207/1:b..l P65/1:b..l rcu: (detected by 0, t=10502 jiffies, g=163057, q=558 ncpus=1) task:kworker/u8:5 state:R running task stack:23512 pid:65 tgid:65 ppid:2 task_flags:0x4208060 flags:0x00004000 Workqueue: events_unbound cfg80211_wiphy_work Call Trace: context_switch kernel/sched/core.c:5382 [inline] __schedule+0x116f/0x5de0 kernel/sched/core.c:6767 preempt_schedule_common+0x44/0xc0 kernel/sched/core.c:6947 preempt_schedule_thunk+0x16/0x30 arch/x86/entry/thunk.S:12 __local_bh_enable_ip+0x107/0x120 kernel/softirq.c:414 spin_unlock_bh include/linux/spinlock.h:396 [inline] ieee80211_check_fast_xmit+0x393/0x18c0 net/mac80211/tx.c:3272 sta_info_insert_finish net/mac80211/sta_info.c:934 [inline] sta_info_insert_rcu+0x14d7/0x1b70 net/mac80211/sta_info.c:967 ieee80211_ibss_finish_sta+0x21f/0x3b0 net/mac80211/ibss.c:576 ieee80211_ibss_add_sta+0x3a8/0x730 net/mac80211/ibss.c:632 ieee80211_update_sta_info net/mac80211/ibss.c:1008 [inline] ieee80211_rx_bss_info net/mac80211/ibss.c:1100 [inline] ieee80211_rx_mgmt_probe_beacon net/mac80211/ibss.c:1581 [inline] ieee80211_ibss_rx_queued_mgmt+0x2751/0x2fd0 net/mac80211/ibss.c:1608 ieee80211_iface_process_skb net/mac80211/iface.c:1622 [inline] ieee80211_iface_work+0xbf4/0x1020 net/mac80211/iface.c:1676 cfg80211_wiphy_work+0x3dc/0x550 net/wireless/core.c:435 process_one_work+0x9cc/0x1b70 kernel/workqueue.c:3238 process_scheduled_works kernel/workqueue.c:3319 [inline] worker_thread+0x6c8/0xf10 kernel/workqueue.c:3400 kthread+0x3c2/0x780 kernel/kthread.c:464 ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:153 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 task:syz-executor state:R running task stack:25672 pid:23207 tgid:23207 ppid:5826 task_flags:0x40050c flags:0x00004004 Call Trace: context_switch kernel/sched/core.c:5382 [inline] __schedule+0x116f/0x5de0 kernel/sched/core.c:6767 preempt_schedule_common+0x44/0xc0 kernel/sched/core.c:6947 preempt_schedule_thunk+0x16/0x30 arch/x86/entry/thunk.S:12 __raw_spin_unlock include/linux/spinlock_api_smp.h:143 [inline] _raw_spin_unlock+0x3e/0x50 kernel/locking/spinlock.c:186 spin_unlock include/linux/spinlock.h:391 [inline] zap_pte_range mm/memory.c:1761 [inline] zap_pmd_range mm/memory.c:1823 [inline] zap_pud_range mm/memory.c:1852 [inline] zap_p4d_range mm/memory.c:1873 [inline] unmap_page_range+0xf08/0x4320 mm/memory.c:1894 unmap_single_vma+0x194/0x2a0 mm/memory.c:1940 unmap_vmas+0x22c/0x490 mm/memory.c:1984 exit_mmap+0x1b9/0xb90 mm/mmap.c:1284 __mmput+0x12a/0x410 kernel/fork.c:1379 mmput+0x62/0x70 kernel/fork.c:1401 exit_mm kernel/exit.c:589 [inline] do_exit+0x9d1/0x2c30 kernel/exit.c:940 do_group_exit+0xd3/0x2a0 kernel/exit.c:1102 get_signal+0x2673/0x26d0 kernel/signal.c:3034 arch_do_signal_or_restart+0x8f/0x7d0 arch/x86/kernel/signal.c:337 exit_to_user_mode_loop kernel/entry/common.c:111 [inline] exit_to_user_mode_prepare include/linux/entry-common.h:329 [inline] __syscall_exit_to_user_mode_work kernel/entry/common.c:207 [inline] syscall_exit_to_user_mode+0x150/0x2a0 kernel/entry/common.c:218 do_syscall_64+0xda/0x260 arch/x86/entry/syscall_64.c:100 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f17c4f83393 RSP: 002b:00007ffc38d92dc8 EFLAGS: 00000202 ORIG_RAX: 000000000000003d RAX: fffffffffffffe00 RBX: 0000000000005abe RCX: 00007f17c4f83393 RDX: 0000000040000000 RSI: 00007ffc38d92ddc RDI: 00000000ffffffff RBP: 00007ffc38d92ddc R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000008 R13: 0000000000000003 R14: 0000000000000009 R15: 0000000000000000 task:syz.3.5770 state:R running task stack:25672 pid:26750 tgid:26750 ppid:23463 task_flags:0x400040 flags:0x00004006 Call Trace: context_switch kernel/sched/core.c:5382 [inline] __schedule+0x116f/0x5de0 kernel/sched/core.c:6767 preempt_schedule_common+0x44/0xc0 kernel/sched/core.c:6947 preempt_schedule_thunk+0x16/0x30 arch/x86/entry/thunk.S:12 __local_bh_enable_ip+0x107/0x120 kernel/softirq.c:414 spin_unlock_bh include/linux/spinlock.h:396 [inline] nl80211_netlink_notify net/wireless/nl80211.c:20282 [inline] nl80211_netlink_notify+0x61c/0x970 net/wireless/nl80211.c:20233 notifier_call_chain+0xb9/0x410 kernel/notifier.c:85 blocking_notifier_call_chain kernel/notifier.c:380 [inline] blocking_notifier_call_chain+0x69/0xa0 kernel/notifier.c:368 netlink_release+0x186b/0x2020 net/netlink/af_netlink.c:764 __sock_release+0xb0/0x270 net/socket.c:647 sock_close+0x1c/0x30 net/socket.c:1391 __fput+0x3ff/0xb70 fs/file_table.c:465 task_work_run+0x14d/0x240 kernel/task_work.c:227 resume_user_mode_work include/linux/resume_user_mode.h:50 [inline] exit_to_user_mode_loop kernel/entry/common.c:114 [inline] exit_to_user_mode_prepare include/linux/entry-common.h:329 [inline] __syscall_exit_to_user_mode_work kernel/entry/common.c:207 [inline] syscall_exit_to_user_mode+0x27b/0x2a0 kernel/entry/common.c:218 do_syscall_64+0xda/0x260 arch/x86/entry/syscall_64.c:100 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f26cd58d169 RSP: 002b:00007ffd6ff06e58 EFLAGS: 00000246 ORIG_RAX: 00000000000001b4 RAX: 0000000000000000 RBX: 00007f26cd7a7ba0 RCX: 00007f26cd58d169 RDX: 0000000000000000 RSI: 000000000000001e RDI: 0000000000000003 RBP: 00007f26cd7a7ba0 R08: 00000000000359dc R09: 0000001e6ff0714f R10: 00000000003ca400 R11: 0000000000000246 R12: 0000000000176e13 R13: 00007ffd6ff06f50 R14: ffffffffffffffff R15: 00007ffd6ff06f70 task:klogd state:R running task stack:24664 pid:5199 tgid:5199 ppid:1 task_flags:0x400100 flags:0x00000002 Call Trace: context_switch kernel/sched/core.c:5382 [inline] __schedule+0x116f/0x5de0 kernel/sched/core.c:6767 preempt_schedule_irq+0x51/0x90 kernel/sched/core.c:7090 irqentry_exit+0x36/0x90 kernel/entry/common.c:354 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702 RIP: 0010:lock_acquire+0x62/0x350 kernel/locking/lockdep.c:5870 Code: 51 0e 12 83 f8 07 0f 87 bc 02 00 00 89 c0 48 0f a3 05 72 54 ee 0e 0f 82 74 02 00 00 8b 35 ea 83 ee 0e 85 f6 0f 85 8d 00 00 00 <48> 8b 44 24 30 65 48 2b 05 49 51 0e 12 0f 85 c7 02 00 00 48 83 c4 RSP: 0018:ffffc900030573f0 EFLAGS: 00000206 RAX: 0000000000000046 RBX: ffffffff8e3c1580 RCX: 00000000ef9d33e4 RDX: 0000000000000000 RSI: ffffffff8dbc59c7 RDI: ffffffff8bf451c0 RBP: 0000000000000002 R08: 0ac0d5affe09d4ff R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 rcu_lock_acquire include/linux/rcupdate.h:331 [inline] rcu_read_lock include/linux/rcupdate.h:841 [inline] class_rcu_constructor include/linux/rcupdate.h:1155 [inline] unwind_next_frame+0xd1/0x20a0 arch/x86/kernel/unwind_orc.c:479 __unwind_start+0x45f/0x7f0 arch/x86/kernel/unwind_orc.c:758 unwind_start arch/x86/include/asm/unwind.h:64 [inline] arch_stack_walk+0x73/0x100 arch/x86/kernel/stacktrace.c:24 stack_trace_save+0x8e/0xc0 kernel/stacktrace.c:122 kasan_save_stack+0x33/0x60 mm/kasan/common.c:47 kasan_save_track+0x14/0x30 mm/kasan/common.c:68 poison_kmalloc_redzone mm/kasan/common.c:377 [inline] __kasan_kmalloc+0xaa/0xb0 mm/kasan/common.c:394 kasan_kmalloc include/linux/kasan.h:260 [inline] __do_kmalloc_node mm/slub.c:4331 [inline] __kmalloc_node_track_caller_noprof+0x221/0x510 mm/slub.c:4350 kmalloc_reserve+0xef/0x2c0 net/core/skbuff.c:599 __alloc_skb+0x166/0x380 net/core/skbuff.c:668 alloc_skb include/linux/skbuff.h:1340 [inline] alloc_skb_with_frags+0xe0/0x860 net/core/skbuff.c:6639 sock_alloc_send_pskb+0x7fb/0x990 net/core/sock.c:2949 unix_dgram_sendmsg+0x463/0x1910 net/unix/af_unix.c:2007 sock_sendmsg_nosec net/socket.c:712 [inline] __sock_sendmsg net/socket.c:727 [inline] __sys_sendto+0x495/0x510 net/socket.c:2180 __do_sys_sendto net/socket.c:2187 [inline] __se_sys_sendto net/socket.c:2183 [inline] __x64_sys_sendto+0xe0/0x1c0 net/socket.c:2183 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xcd/0x260 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f138605d9b5 RSP: 002b:00007ffea9382978 EFLAGS: 00000246 ORIG_RAX: 000000000000002c RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007f138605d9b5 RDX: 000000000000005b RSI: 000055c666a4f200 RDI: 0000000000000003 RBP: 000055c666a47910 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000004000 R11: 0000000000000246 R12: 0000000000000013 R13: 00007f13861eb212 R14: 00007ffea9382a78 R15: 0000000000000000 rcu: rcu_preempt kthread starved for 565 jiffies! g163057 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=0 rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. rcu: RCU grace-period kthread stack dump: task:rcu_preempt state:R running task stack:27608 pid:16 tgid:16 ppid:2 task_flags:0x208040 flags:0x00004000 Call Trace: context_switch kernel/sched/core.c:5382 [inline] __schedule+0x116f/0x5de0 kernel/sched/core.c:6767 __schedule_loop kernel/sched/core.c:6845 [inline] schedule+0xe7/0x3a0 kernel/sched/core.c:6860 schedule_timeout+0x123/0x290 kernel/time/sleep_timeout.c:99 rcu_gp_fqs_loop+0x1ea/0xb00 kernel/rcu/tree.c:2046 rcu_gp_kthread+0x270/0x380 kernel/rcu/tree.c:2248 kthread+0x3c2/0x780 kernel/kthread.c:464 ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:153 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 rcu: Stack dump where RCU GP kthread last ran: CPU: 0 UID: 0 PID: 3402 Comm: kworker/R-bat_e Not tainted 6.15.0-rc1-syzkaller-00025-gbec7dcbc242c #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 Workqueue: bat_events batadv_tt_purge RIP: 0010:__in6_dev_get include/net/addrconf.h:347 [inline] RIP: 0010:ip6_ignore_linkdown include/net/addrconf.h:443 [inline] RIP: 0010:find_match+0x13a/0x15d0 net/ipv6/route.c:781 Code: 80 3c 02 00 0f 85 ac 11 00 00 48 b8 00 00 00 00 00 fc ff df 4d 8b 7d 00 49 8d bf c0 00 00 00 48 89 fa 48 c1 ea 03 80 3c 02 00 <0f> 85 93 11 00 00 4d 8b bf c0 00 00 00 e8 64 96 54 01 31 ff 89 c6 RSP: 0018:ffffc900000073c0 EFLAGS: 00000246 RAX: dffffc0000000000 RBX: 0000000000000003 RCX: ffffffff8a1b4fbc RDX: 1ffff1100d20f018 RSI: ffffffff8a1b4fff RDI: ffff8880690780c0 RBP: ffffc900000074c8 R08: 0000000000000001 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: ffff8880a1ef18cf R13: ffff8880a1ef18b8 R14: 1ffff92000000e87 R15: ffff888069078000 FS: 0000000000000000(0000) GS:ffff8881249b9000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007ff5ecce0bd0 CR3: 000000007b46c000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: __find_rr_leaf+0x140/0xe00 net/ipv6/route.c:869 find_rr_leaf net/ipv6/route.c:890 [inline] rt6_select net/ipv6/route.c:934 [inline] fib6_table_lookup+0x57c/0xa30 net/ipv6/route.c:2229 ip6_pol_route+0x1cc/0x1230 net/ipv6/route.c:2265 pol_lookup_func include/net/ip6_fib.h:616 [inline] fib6_rule_lookup+0x536/0x720 net/ipv6/fib6_rules.c:120 ip6_route_input_lookup net/ipv6/route.c:2334 [inline] ip6_route_input+0x662/0xc00 net/ipv6/route.c:2630 ip6_rcv_finish_core.constprop.0+0x1a0/0x5d0 net/ipv6/ip6_input.c:66 ip6_rcv_finish net/ipv6/ip6_input.c:77 [inline] NF_HOOK include/linux/netfilter.h:314 [inline] NF_HOOK include/linux/netfilter.h:308 [inline] ipv6_rcv+0x1e8/0x680 net/ipv6/ip6_input.c:309 __netif_receive_skb_one_core+0x12d/0x1e0 net/core/dev.c:5894 __netif_receive_skb+0x1d/0x160 net/core/dev.c:6007 process_backlog+0x442/0x15e0 net/core/dev.c:6359 __napi_poll.constprop.0+0xb7/0x550 net/core/dev.c:7331 napi_poll net/core/dev.c:7395 [inline] net_rx_action+0xa97/0x1010 net/core/dev.c:7517 handle_softirqs+0x216/0x8e0 kernel/softirq.c:579 do_softirq kernel/softirq.c:480 [inline] do_softirq+0xb2/0xf0 kernel/softirq.c:467 __local_bh_enable_ip+0x100/0x120 kernel/softirq.c:407 spin_unlock_bh include/linux/spinlock.h:396 [inline] batadv_tt_global_purge net/batman-adv/translation-table.c:2250 [inline] batadv_tt_purge+0x25f/0xb80 net/batman-adv/translation-table.c:3510 process_one_work+0x9cc/0x1b70 kernel/workqueue.c:3238 process_scheduled_works kernel/workqueue.c:3319 [inline] rescuer_thread+0x620/0xea0 kernel/workqueue.c:3496 kthread+0x3c2/0x780 kernel/kthread.c:464 ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:153 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 net_ratelimit: 5010 callbacks suppressed bridge0: received packet on veth0_to_bridge with own address as source address (addr:c6:31:6c:85:eb:8c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:c6:31:6c:85:eb:8c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:c6:31:6c:85:eb:8c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) net_ratelimit: 6902 callbacks suppressed bridge0: received packet on veth0_to_bridge with own address as source address (addr:c6:31:6c:85:eb:8c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:c6:31:6c:85:eb:8c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:c6:31:6c:85:eb:8c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)