bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:cf:33:26:0e:3e, vlan:0) rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: rcu: Tasks blocked on level-0 rcu_node (CPUs 0-1): P14018/1:b..l P5929/1:b..l P14061/1:b..l P2/1:b..l rcu: (detected by 1, t=10502 jiffies, g=65937, q=2030 ncpus=2) task:kthreadd state:R running task stack:24704 pid:2 tgid:2 ppid:0 task_flags:0x208040 flags:0x00004000 Call Trace: context_switch kernel/sched/core.c:5357 [inline] __schedule+0x1798/0x4cc0 kernel/sched/core.c:6961 preempt_schedule_irq+0xb5/0x150 kernel/sched/core.c:7288 irqentry_exit+0x6f/0x90 kernel/entry/common.c:197 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702 RIP: 0010:lock_release+0x2c7/0x3e0 kernel/locking/lockdep.c:5893 Code: 20 00 02 00 00 75 56 f7 c3 00 02 00 00 74 01 fb 65 48 8b 05 1b a1 03 11 48 3b 44 24 28 0f 85 8b 00 00 00 48 83 c4 30 5b 41 5c <41> 5d 41 5e 41 5f 5d e9 3d 1e e1 09 cc 90 0f 0b 90 e9 5d fd ff ff RSP: 0018:ffffc90000077270 EFLAGS: 00000286 RAX: 509714ebfbc97d00 RBX: ffffffff903ff001 RCX: 509714ebfbc97d00 RDX: ffffc90000077301 RSI: ffffffff8be34be0 RDI: ffffffff8be34ba0 RBP: dffffc0000000000 R08: ffffc90000077898 R09: 0000000000000000 R10: ffffc900000773b8 R11: fffff5200000ee79 R12: ffffc900000778a8 R13: ffffffff8172c195 R14: ffffffff8e139ee0 R15: ffffffff8172c195 rcu_lock_release include/linux/rcupdate.h:341 [inline] rcu_read_unlock include/linux/rcupdate.h:871 [inline] class_rcu_destructor include/linux/rcupdate.h:1155 [inline] unwind_next_frame+0x19a9/0x2390 arch/x86/kernel/unwind_orc.c:680 arch_stack_walk+0x11c/0x150 arch/x86/kernel/stacktrace.c:25 stack_trace_save+0x9c/0xe0 kernel/stacktrace.c:122 save_stack+0xf5/0x1f0 mm/page_owner.c:156 __reset_page_owner+0x71/0x1f0 mm/page_owner.c:308 reset_page_owner include/linux/page_owner.h:25 [inline] free_pages_prepare mm/page_alloc.c:1395 [inline] __free_frozen_pages+0xbc4/0xd30 mm/page_alloc.c:2895 discard_slab mm/slub.c:2753 [inline] __put_partials+0x156/0x1a0 mm/slub.c:3218 put_cpu_partial+0x17c/0x250 mm/slub.c:3293 __slab_free+0x2d5/0x3c0 mm/slub.c:4550 qlink_free mm/kasan/quarantine.c:163 [inline] qlist_free_all+0x97/0x140 mm/kasan/quarantine.c:179 kasan_quarantine_reduce+0x148/0x160 mm/kasan/quarantine.c:286 __kasan_slab_alloc+0x22/0x80 mm/kasan/common.c:349 kasan_slab_alloc include/linux/kasan.h:250 [inline] slab_post_alloc_hook mm/slub.c:4180 [inline] slab_alloc_node mm/slub.c:4229 [inline] kmem_cache_alloc_noprof+0x1c1/0x3c0 mm/slub.c:4236 copy_sighand+0x50/0x230 kernel/fork.c:1607 copy_process+0x165f/0x3c00 kernel/fork.c:2169 kernel_clone+0x21e/0x840 kernel/fork.c:2605 kernel_thread+0x10c/0x160 kernel/fork.c:2667 create_kthread kernel/kthread.c:486 [inline] kthreadd+0x575/0x770 kernel/kthread.c:846 ret_from_fork+0x3f9/0x770 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 task:syz-executor state:R running task stack:24456 pid:14061 tgid:14061 ppid:5847 task_flags:0x400000 flags:0x00004002 Call Trace: context_switch kernel/sched/core.c:5357 [inline] __schedule+0x1798/0x4cc0 kernel/sched/core.c:6961 preempt_schedule_irq+0xb5/0x150 kernel/sched/core.c:7288 irqentry_exit+0x6f/0x90 kernel/entry/common.c:197 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702 RIP: 0010:deref_stack_reg arch/x86/kernel/unwind_orc.c:406 [inline] RIP: 0010:unwind_next_frame+0xc52/0x2390 arch/x86/kernel/unwind_orc.c:585 Code: 96 c0 20 c8 3c 01 0f 85 df 0c 00 00 48 89 df e8 84 23 00 00 48 89 c3 48 bd 00 00 00 00 00 fc ff df 48 8b 44 24 30 80 3c 28 00 <4c> 8b 7c 24 18 74 08 4c 89 ff e8 9f 57 b0 00 49 89 1f 48 8b 44 24 RSP: 0018:ffffc9000c6b7418 EFLAGS: 00000246 RAX: 1ffff920018d6ea6 RBX: ffffffff8212c91d RCX: 1ffff920018d6e01 RDX: ffffffff903f8496 RSI: 0000000000000002 RDI: ffffc9000c6b7e10 RBP: dffffc0000000000 R08: 0000000000000001 R09: 0000000000000000 R10: ffffc9000c6b7538 R11: ffffffff81ac38c0 R12: ffffc9000c6b8000 R13: 1ffff920018d6e9f R14: ffffc9000c6b74e8 R15: ffffc9000c6b0000 arch_stack_walk+0x11c/0x150 arch/x86/kernel/stacktrace.c:25 stack_trace_save+0x9c/0xe0 kernel/stacktrace.c:122 save_stack+0xf5/0x1f0 mm/page_owner.c:156 __set_page_owner+0x8d/0x4a0 mm/page_owner.c:329 set_page_owner include/linux/page_owner.h:32 [inline] post_alloc_hook+0x240/0x2a0 mm/page_alloc.c:1851 prep_new_page mm/page_alloc.c:1859 [inline] get_page_from_freelist+0x21e4/0x22c0 mm/page_alloc.c:3858 __alloc_frozen_pages_noprof+0x181/0x370 mm/page_alloc.c:5148 alloc_pages_mpol+0x232/0x4a0 mm/mempolicy.c:2416 alloc_frozen_pages_noprof mm/mempolicy.c:2487 [inline] alloc_pages_noprof+0xa9/0x190 mm/mempolicy.c:2507 vm_area_alloc_pages mm/vmalloc.c:3642 [inline] __vmalloc_area_node mm/vmalloc.c:3720 [inline] __vmalloc_node_range_noprof+0x97d/0x12f0 mm/vmalloc.c:3893 vmalloc_user_noprof+0xad/0xf0 mm/vmalloc.c:4046 kcov_ioctl+0x55/0x640 kernel/kcov.c:716 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:598 [inline] __se_sys_ioctl+0xf9/0x170 fs/ioctl.c:584 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f021df8e7eb RSP: 002b:00007ffd3cc4d5f0 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 0000000000080000 RCX: 00007f021df8e7eb RDX: 0000000000080000 RSI: ffffffff80086301 RDI: 00000000000000db RBP: 00007f021e1b6308 R08: 00000000000000da R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000003 R14: 0000000000000009 R15: 0000000000000000 task:kworker/0:3 state:R running task stack:23048 pid:5929 tgid:5929 ppid:2 task_flags:0x4208060 flags:0x00004000 Workqueue: events_power_efficient gc_worker Call Trace: context_switch kernel/sched/core.c:5357 [inline] __schedule+0x1798/0x4cc0 kernel/sched/core.c:6961 preempt_schedule_irq+0xb5/0x150 kernel/sched/core.c:7288 irqentry_exit+0x6f/0x90 kernel/entry/common.c:197 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702 RIP: 0010:__sanitizer_cov_trace_const_cmp4+0x83/0x90 kernel/kcov.c:316 Code: 8d 52 28 4d 39 ca 77 22 89 ff 89 f6 49 ff c0 4c 89 01 48 c7 44 11 08 05 00 00 00 48 89 7c 11 10 48 89 74 11 18 48 89 44 11 20 88 e2 be 09 cc 0f 1f 80 00 00 00 00 90 90 90 90 90 90 90 90 90 RSP: 0018:ffffc900044d7918 EFLAGS: 00000293 RAX: ffffffff89aeaf59 RBX: 0000000000000000 RCX: 0000000000000000 RDX: ffff888030411e00 RSI: 0000000000000000 RDI: 0000000000000000 RBP: ffffc900044d7a70 R08: 0000000000000000 R09: 0000000000000000 R10: dffffc0000000000 R11: fffffbfff1f47627 R12: ffff8880b8639700 R13: ffff8880550f9018 R14: dffffc0000000000 R15: 0000000000040000 rcu_read_lock include/linux/rcupdate.h:842 [inline] gc_worker+0x299/0x1380 net/netfilter/nf_conntrack_core.c:1546 process_one_work kernel/workqueue.c:3236 [inline] process_scheduled_works+0xae1/0x17b0 kernel/workqueue.c:3319 worker_thread+0x8a0/0xda0 kernel/workqueue.c:3400 kthread+0x711/0x8a0 kernel/kthread.c:463 ret_from_fork+0x3f9/0x770 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 task:syz.5.1656 state:R running task stack:25488 pid:14018 tgid:14013 ppid:13204 task_flags:0x40054c flags:0x00004004 Call Trace: context_switch kernel/sched/core.c:5357 [inline] __schedule+0x1798/0x4cc0 kernel/sched/core.c:6961 preempt_schedule_common+0x83/0xd0 kernel/sched/core.c:7145 preempt_schedule+0xae/0xc0 kernel/sched/core.c:7169 preempt_schedule_thunk+0x16/0x30 arch/x86/entry/thunk.S:12 __raw_spin_unlock include/linux/spinlock_api_smp.h:143 [inline] _raw_spin_unlock+0x3f/0x50 kernel/locking/spinlock.c:186 spin_unlock include/linux/spinlock.h:391 [inline] zap_pte_range mm/memory.c:1884 [inline] zap_pmd_range mm/memory.c:1946 [inline] zap_pud_range mm/memory.c:1975 [inline] zap_p4d_range mm/memory.c:1996 [inline] unmap_page_range+0x3a7f/0x4370 mm/memory.c:2017 unmap_single_vma mm/memory.c:2060 [inline] unmap_vmas+0x399/0x580 mm/memory.c:2104 exit_mmap+0x248/0xb50 mm/mmap.c:1280 __mmput+0x118/0x420 kernel/fork.c:1130 exit_mm+0x1da/0x2c0 kernel/exit.c:582 do_exit+0x648/0x2300 kernel/exit.c:949 do_group_exit+0x21c/0x2d0 kernel/exit.c:1102 get_signal+0x1286/0x1340 kernel/signal.c:3034 arch_do_signal_or_restart+0x9a/0x750 arch/x86/kernel/signal.c:337 exit_to_user_mode_loop+0x75/0x110 kernel/entry/common.c:40 exit_to_user_mode_prepare include/linux/irq-entry-common.h:225 [inline] syscall_exit_to_user_mode_work include/linux/entry-common.h:175 [inline] syscall_exit_to_user_mode include/linux/entry-common.h:210 [inline] do_syscall_64+0x2bd/0x3b0 arch/x86/entry/syscall_64.c:100 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f2983f8ebe9 RSP: 002b:00007f2984d460e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca RAX: fffffffffffffe00 RBX: 00007f29841b6188 RCX: 00007f2983f8ebe9 RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f29841b6188 RBP: 00007f29841b6180 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007f29841b6218 R14: 00007fff46299260 R15: 00007fff46299348 rcu: rcu_preempt kthread starved for 7045 jiffies! g65937 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=0 rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. rcu: RCU grace-period kthread stack dump: task:rcu_preempt state:R running task stack:27264 pid:16 tgid:16 ppid:2 task_flags:0x208040 flags:0x00004000 Call Trace: context_switch kernel/sched/core.c:5357 [inline] __schedule+0x1798/0x4cc0 kernel/sched/core.c:6961 __schedule_loop kernel/sched/core.c:7043 [inline] schedule+0x165/0x360 kernel/sched/core.c:7058 schedule_timeout+0x12b/0x270 kernel/time/sleep_timeout.c:99 rcu_gp_fqs_loop+0x301/0x1540 kernel/rcu/tree.c:2083 rcu_gp_kthread+0x99/0x390 kernel/rcu/tree.c:2285 kthread+0x711/0x8a0 kernel/kthread.c:463 ret_from_fork+0x3f9/0x770 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 rcu: Stack dump where RCU GP kthread last ran: Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Not tainted 6.17.0-rc1-next-20250814-syzkaller #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 RIP: 0010:unwind_next_frame+0x117c/0x2390 arch/x86/kernel/unwind_orc.c:641 Code: 0f b6 04 2f 84 c0 0f 85 f9 0f 00 00 c6 03 00 4c 8b 64 24 10 4c 8b 7c 24 28 48 8b 44 24 40 0f b6 04 28 84 c0 0f 85 8a 0d 00 00 <41> 0f b6 04 2f 84 c0 0f 85 a1 0d 00 00 0f b7 32 c1 ee 04 83 e6 0f RSP: 0018:ffffc90000006bd8 EFLAGS: 00000246 RAX: 0000000000000000 RBX: ffffc90000006ce0 RCX: 0000000000000000 RDX: ffffffff9040c41a RSI: 0000000000000000 RDI: ffffc90000006d08 RBP: dffffc0000000000 R08: ffffc90000006d07 R09: 0000000000000000 R10: ffffc90000006cf8 R11: fffff52000000da1 R12: ffffc90000007018 R13: ffffc90000006cf8 R14: ffffc90000006ca8 R15: 1ffffffff2081883 FS: 0000000000000000(0000) GS:ffff888125c0f000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fcdeb177a67 CR3: 00000000316a6000 CR4: 00000000003526f0 Call Trace: arch_stack_walk+0x11c/0x150 arch/x86/kernel/stacktrace.c:25 stack_trace_save+0x9c/0xe0 kernel/stacktrace.c:122 kasan_save_stack mm/kasan/common.c:56 [inline] kasan_save_track+0x3e/0x80 mm/kasan/common.c:77 unpoison_slab_object mm/kasan/common.c:339 [inline] __kasan_slab_alloc+0x6c/0x80 mm/kasan/common.c:365 kasan_slab_alloc include/linux/kasan.h:250 [inline] slab_post_alloc_hook mm/slub.c:4180 [inline] slab_alloc_node mm/slub.c:4229 [inline] kmem_cache_alloc_noprof+0x1c1/0x3c0 mm/slub.c:4236 skb_clone+0x212/0x3a0 net/core/skbuff.c:2049 deliver_clone net/bridge/br_forward.c:125 [inline] maybe_deliver+0x98/0x160 net/bridge/br_forward.c:190 br_flood+0x31a/0x6a0 net/bridge/br_forward.c:237 br_handle_frame_finish+0x14b4/0x19b0 net/bridge/br_input.c:221 br_nf_hook_thresh+0x3c6/0x4a0 net/bridge/br_netfilter_hooks.c:-1 br_nf_pre_routing_finish_ipv6+0x948/0xd00 net/bridge/br_netfilter_ipv6.c:-1 NF_HOOK include/linux/netfilter.h:318 [inline] br_nf_pre_routing_ipv6+0x37e/0x6b0 net/bridge/br_netfilter_ipv6.c:184 nf_hook_entry_hookfn include/linux/netfilter.h:158 [inline] nf_hook_bridge_pre net/bridge/br_input.c:283 [inline] br_handle_frame+0x97f/0x14c0 net/bridge/br_input.c:434 __netif_receive_skb_core+0x10b9/0x4020 net/core/dev.c:5866 __netif_receive_skb_one_core net/core/dev.c:5977 [inline] __netif_receive_skb+0x72/0x380 net/core/dev.c:6092 process_backlog+0x60e/0x14f0 net/core/dev.c:6444 __napi_poll+0xc7/0x360 net/core/dev.c:7494 napi_poll net/core/dev.c:7557 [inline] net_rx_action+0x707/0xe30 net/core/dev.c:7684 handle_softirqs+0x286/0x870 kernel/softirq.c:579 __do_softirq kernel/softirq.c:613 [inline] invoke_softirq kernel/softirq.c:453 [inline] __irq_exit_rcu+0xca/0x1f0 kernel/softirq.c:680 irq_exit_rcu+0x9/0x30 kernel/softirq.c:696 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1050 [inline] sysvec_apic_timer_interrupt+0xa6/0xc0 arch/x86/kernel/apic/apic.c:1050 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702 RIP: 0010:pv_native_safe_halt+0x13/0x20 arch/x86/kernel/paravirt.c:82 Code: cc cc cc cc cc cc cc 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 66 90 0f 00 2d 93 86 0c 00 f3 0f 1e fa fb f4 48 e8 02 00 cc cc cc cc cc cc cc cc 90 90 90 90 90 90 90 90 90 RSP: 0018:ffffffff8de07d80 EFLAGS: 000002c6 RAX: bdc9c6cd0113d300 RBX: ffffffff81968368 RCX: bdc9c6cd0113d300 RDX: 0000000000000001 RSI: ffffffff8be34be0 RDI: ffffffff81968368 RBP: ffffffff8de07eb8 R08: ffff8880b8632f9b R09: 1ffff110170c65f3 R10: dffffc0000000000 R11: ffffed10170c65f4 R12: ffffffff8fa3b130 R13: 0000000000000000 R14: 0000000000000000 R15: 1ffffffff1bd2a40 arch_safe_halt arch/x86/include/asm/paravirt.h:107 [inline] default_idle+0x13/0x20 arch/x86/kernel/process.c:757 default_idle_call+0x74/0xb0 kernel/sched/idle.c:122 cpuidle_idle_call kernel/sched/idle.c:190 [inline] do_idle+0x1e8/0x510 kernel/sched/idle.c:330 cpu_startup_entry+0x44/0x60 kernel/sched/idle.c:428 rest_init+0x2de/0x300 init/main.c:756 start_kernel+0x3a9/0x410 init/main.c:1109 x86_64_start_reservations+0x24/0x30 arch/x86/kernel/head64.c:307 x86_64_start_kernel+0x143/0x1c0 arch/x86/kernel/head64.c:288 common_startup_64+0x13e/0x147 net_ratelimit: 25511 callbacks suppressed bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:cf:33:26:0e:3e, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:36:cf:33:26:0e:3e, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)