bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
rcu: INFO: rcu_preempt detected stalls on CPUs/tasks:
rcu: Tasks blocked on level-0 rcu_node (CPUs 0-1): P7903/1:b..l P7902/1:b..l
rcu: (detected by 0, t=10502 jiffies, g=22137, q=924 ncpus=1)
task:syz.0.501 state:R running task stack:27464 pid:7902 tgid:7899 ppid:5833 task_flags:0x400140 flags:0x00080000
Call Trace:
context_switch kernel/sched/core.c:5325 [inline]
__schedule+0x1190/0x5de0 kernel/sched/core.c:6929
preempt_schedule_irq+0x51/0x90 kernel/sched/core.c:7256
irqentry_exit+0x36/0x90 kernel/entry/common.c:211
asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:697
RIP: 0010:native_save_fl arch/x86/include/asm/irqflags.h:26 [inline]
RIP: 0010:arch_local_save_flags arch/x86/include/asm/irqflags.h:109 [inline]
RIP: 0010:arch_local_irq_save arch/x86/include/asm/irqflags.h:127 [inline]
RIP: 0010:lock_is_held_type+0x54/0x150 kernel/locking/lockdep.c:5936
Code: ab 43 08 85 c0 0f 85 ce 00 00 00 65 4c 8b 25 fb 69 43 08 41 8b 94 24 2c 0b 00 00 85 d2 0f 85 b6 00 00 00 48 89 fd 41 89 f6 9c <8f> 04 24 fa 48 c7 c7 a8 8e b1 8d 4d 8d ac 24 30 0b 00 00 45 31 ff
RSP: 0018:ffffc9000b16fa28 EFLAGS: 00000246
RAX: 0000000000000000 RBX: ffff88807c828000 RCX: 0000000000000001
RDX: 0000000000000000 RSI: 00000000ffffffff RDI: ffffffff8e3c45e0
RBP: ffffffff8e3c45e0 R08: 0000000000000005 R09: 0000000000000000
R10: 0000000000000001 R11: 0000000000000001 R12: ffff888027861e40
R13: 00000000ffffffff R14: 00000000ffffffff R15: ffff8880295812a0
task_css.constprop.0+0xcd/0x130 include/linux/cgroup.h:459
count_memcg_events_mm include/linux/memcontrol.h:992 [inline]
count_memcg_event_mm include/linux/memcontrol.h:1001 [inline]
mm_account_fault mm/memory.c:6370 [inline]
handle_mm_fault+0x25c/0xd10 mm/memory.c:6531
faultin_page mm/gup.c:1126 [inline]
__get_user_pages+0x54e/0x3530 mm/gup.c:1428
populate_vma_page_range+0x267/0x3f0 mm/gup.c:1860
__mm_populate+0x1d8/0x380 mm/gup.c:1963
mm_populate include/linux/mm.h:3478 [inline]
vm_mmap_pgoff+0x37f/0x470 mm/util.c:586
ksys_mmap_pgoff+0x7d/0x5c0 mm/mmap.c:604
__do_sys_mmap arch/x86/kernel/sys_x86_64.c:89 [inline]
__se_sys_mmap arch/x86/kernel/sys_x86_64.c:82 [inline]
__x64_sys_mmap+0x125/0x190 arch/x86/kernel/sys_x86_64.c:82
do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
do_syscall_64+0xcd/0xfa0 arch/x86/entry/syscall_64.c:94
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f1717b8f7c9
RSP: 002b:00007f1718a0b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000009
RAX: ffffffffffffffda RBX: 00007f1717de6090 RCX: 00007f1717b8f7c9
RDX: 0000000000000036 RSI: 0000000000400008 RDI: 0000000000000000
RBP: 00007f1717c13f91 R08: 0000000000000002 R09: 0000000000008000
R10: 0000000001009b72 R11: 0000000000000246 R12: 0000000000000000
R13: 00007f1717de6128 R14: 00007f1717de6090 R15: 00007ffd248c0968
task:syz-executor state:R running task stack:28536 pid:7903 tgid:7903 ppid:5832 task_flags:0x400040 flags:0x00080000
Call Trace:
context_switch kernel/sched/core.c:5325 [inline]
__schedule+0x1190/0x5de0 kernel/sched/core.c:6929
preempt_schedule_irq+0x51/0x90 kernel/sched/core.c:7256
irqentry_exit+0x36/0x90 kernel/entry/common.c:211
asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:697
RIP: 0010:orc_ip arch/x86/kernel/unwind_orc.c:80 [inline]
RIP: 0010:__orc_find+0x70/0xf0 arch/x86/kernel/unwind_orc.c:102
Code: ec 72 4e 4c 89 e2 48 29 ea 48 89 d6 48 c1 ea 3f 48 c1 fe 02 48 01 f2 48 d1 fa 48 8d 5c 95 00 48 89 da 48 c1 ea 03 0f b6 34 0a <48> 89 da 83 e2 07 83 c2 03 40 38 f2 7c 05 40 84 f6 75 4b 48 63 13
RSP: 0018:ffffc900043ff7b8 EFLAGS: 00000a06
RAX: ffffffff9114d3f8 RBX: ffffffff90927958 RCX: dffffc0000000000
RDX: 1ffffffff2124f2b RSI: 0000000000000000 RDI: ffffffff90927954
RBP: ffffffff90927958 R08: ffffffff9114d416 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000006281 R12: ffffffff90927958
R13: ffffffff81628162 R14: ffffffff90927954 R15: ffffffff90927954
orc_find arch/x86/kernel/unwind_orc.c:227 [inline]
unwind_next_frame+0x2ec/0x20a0 arch/x86/kernel/unwind_orc.c:494
__unwind_start+0x45f/0x7f0 arch/x86/kernel/unwind_orc.c:758
unwind_start arch/x86/include/asm/unwind.h:64 [inline]
arch_stack_walk+0x73/0x100 arch/x86/kernel/stacktrace.c:24
stack_trace_save+0x8e/0xc0 kernel/stacktrace.c:122
kasan_save_stack+0x33/0x60 mm/kasan/common.c:56
kasan_save_track+0x14/0x30 mm/kasan/common.c:77
unpoison_slab_object mm/kasan/common.c:342 [inline]
__kasan_slab_alloc+0x89/0x90 mm/kasan/common.c:368
kasan_slab_alloc include/linux/kasan.h:252 [inline]
slab_post_alloc_hook mm/slub.c:4978 [inline]
slab_alloc_node mm/slub.c:5288 [inline]
kmem_cache_alloc_lru_noprof+0x254/0x6e0 mm/slub.c:5307
__d_alloc+0x32/0xae0 fs/dcache.c:1690
d_alloc+0x4a/0x1e0 fs/dcache.c:1769
lookup_one_qstr_excl+0x175/0x250 fs/namei.c:1701
filename_create+0x1e7/0x4a0 fs/namei.c:4227
do_symlinkat+0xbe/0x310 fs/namei.c:4836
__do_sys_symlinkat fs/namei.c:4859 [inline]
__se_sys_symlinkat fs/namei.c:4856 [inline]
__x64_sys_symlinkat+0x93/0xc0 fs/namei.c:4856
do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
do_syscall_64+0xcd/0xfa0 arch/x86/entry/syscall_64.c:94
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f6d7bf8ed47
RSP: 002b:00007ffd44ce0f08 EFLAGS: 00000206 ORIG_RAX: 000000000000010a
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f6d7bf8ed47
RDX: 00007f6d7c0158c3 RSI: 00000000ffffff9c RDI: 00007f6d7c014390
RBP: 00007ffd44ce0f4c R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000085
R13: 000000000000005c R14: 000000000003a142 R15: 00007ffd44ce0fa0
rcu: rcu_preempt kthread starved for 8704 jiffies! g22137 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=0
rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior.
rcu: RCU grace-period kthread stack dump:
task:rcu_preempt state:R running task stack:28440 pid:16 tgid:16 ppid:2 task_flags:0x208040 flags:0x00080000
Call Trace:
context_switch kernel/sched/core.c:5325 [inline]
__schedule+0x1190/0x5de0 kernel/sched/core.c:6929
__schedule_loop kernel/sched/core.c:7011 [inline]
schedule+0xe7/0x3a0 kernel/sched/core.c:7026
schedule_timeout+0x123/0x290 kernel/time/sleep_timeout.c:99
rcu_gp_fqs_loop+0x1ea/0xaf0 kernel/rcu/tree.c:2083
rcu_gp_kthread+0x26d/0x380 kernel/rcu/tree.c:2285
kthread+0x3c5/0x780 kernel/kthread.c:463
ret_from_fork+0x675/0x7d0 arch/x86/kernel/process.c:158
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245
rcu: Stack dump where RCU GP kthread last ran:
CPU: 0 UID: 0 PID: 3410 Comm: kworker/R-bat_e Not tainted syzkaller #0 PREEMPT(full)
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025
Workqueue: bat_events batadv_bla_periodic_work
RIP: 0010:lock_release+0x6/0x2f0 kernel/locking/lockdep.c:5876
Code: 44 24 1c 44 8b 4c 24 18 4c 8b 54 24 10 44 8b 5c 24 0c eb 8c 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 41 57 <41> 56 41 55 41 54 49 89 f4 53 48 89 fb 48 83 ec 18 65 48 8b 05 b9
RSP: 0018:ffffc90000006f08 EFLAGS: 00000202
RAX: 0000000000000001 RBX: ffffc90000007310 RCX: ffffc90000008001
RDX: 0000000000000000 RSI: ffffffff816bb704 RDI: ffffffff8e3c45e0
RBP: 0000000000000001 R08: 0000000000000001 R09: 0000000000000000
R10: 0000000000000000 R11: 00000000000123d5 R12: ffffc90000006fd8
R13: ffffc90000006f88 R14: ffffc90000007310 R15: ffffc90000006fbc
FS: 0000000000000000(0000) GS:ffff888124a0d000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000055d620df8f28 CR3: 000000000e182000 CR4: 00000000003526f0
Call Trace:
rcu_lock_release include/linux/rcupdate.h:341 [inline]
rcu_read_unlock include/linux/rcupdate.h:897 [inline]
class_rcu_destructor include/linux/rcupdate.h:1195 [inline]
unwind_next_frame+0x3f9/0x20a0 arch/x86/kernel/unwind_orc.c:479
arch_stack_walk+0x94/0x100 arch/x86/kernel/stacktrace.c:25
stack_trace_save+0x8e/0xc0 kernel/stacktrace.c:122
kasan_save_stack+0x33/0x60 mm/kasan/common.c:56
kasan_save_track+0x14/0x30 mm/kasan/common.c:77
unpoison_slab_object mm/kasan/common.c:342 [inline]
__kasan_slab_alloc+0x89/0x90 mm/kasan/common.c:368
kasan_slab_alloc include/linux/kasan.h:252 [inline]
slab_post_alloc_hook mm/slub.c:4978 [inline]
slab_alloc_node mm/slub.c:5288 [inline]
kmem_cache_alloc_noprof+0x250/0x6e0 mm/slub.c:5295
skb_clone+0x190/0x3f0 net/core/skbuff.c:2050
deliver_clone net/bridge/br_forward.c:125 [inline]
br_flood+0x37c/0x650 net/bridge/br_forward.c:250
br_handle_frame_finish+0x1117/0x1f00 net/bridge/br_input.c:229
br_nf_hook_thresh+0x307/0x410 net/bridge/br_netfilter_hooks.c:1167
br_nf_pre_routing_finish_ipv6+0x76a/0xfc0 net/bridge/br_netfilter_ipv6.c:154
NF_HOOK include/linux/netfilter.h:318 [inline]
br_nf_pre_routing_ipv6+0x3cd/0x8c0 net/bridge/br_netfilter_ipv6.c:184
br_nf_pre_routing+0x860/0x15b0 net/bridge/br_netfilter_hooks.c:508
nf_hook_entry_hookfn include/linux/netfilter.h:158 [inline]
nf_hook_bridge_pre net/bridge/br_input.c:291 [inline]
br_handle_frame+0xb28/0x14e0 net/bridge/br_input.c:442
__netif_receive_skb_core.constprop.0+0xa25/0x4bd0 net/core/dev.c:5966
__netif_receive_skb_one_core+0xb0/0x1e0 net/core/dev.c:6077
__netif_receive_skb+0x1d/0x160 net/core/dev.c:6192
process_backlog+0x439/0x15e0 net/core/dev.c:6544
__napi_poll.constprop.0+0xba/0x550 net/core/dev.c:7594
napi_poll net/core/dev.c:7657 [inline]
net_rx_action+0x97f/0xef0 net/core/dev.c:7784
handle_softirqs+0x219/0x8e0 kernel/softirq.c:622
do_softirq kernel/softirq.c:523 [inline]
do_softirq+0xb2/0xf0 kernel/softirq.c:510
__local_bh_enable_ip+0x100/0x120 kernel/softirq.c:450
spin_unlock_bh include/linux/spinlock.h:396 [inline]
batadv_bla_purge_backbone_gw+0x274/0x520 net/batman-adv/bridge_loop_avoidance.c:1260
batadv_bla_periodic_work+0x62/0xa00 net/batman-adv/bridge_loop_avoidance.c:1446
process_one_work+0x9cf/0x1b70 kernel/workqueue.c:3263
process_scheduled_works kernel/workqueue.c:3346 [inline]
rescuer_thread+0x620/0xea0 kernel/workqueue.c:3523
kthread+0x3c5/0x780 kernel/kthread.c:463
ret_from_fork+0x675/0x7d0 arch/x86/kernel/process.c:158
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245
net_ratelimit: 9205 callbacks suppressed
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:d9:b4:c9:6d:d0, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:d9:b4:c9:6d:d0, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
net_ratelimit: 10115 callbacks suppressed
bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:d9:b4:c9:6d:d0, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:d9:b4:c9:6d:d0, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)