bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: rcu: Tasks blocked on level-0 rcu_node (CPUs 0-1): P10325/1:b..l rcu: (detected by 0, t=10503 jiffies, g=57797, q=571 ncpus=2) task:syz-executor state:R running task stack:25736 pid:10325 tgid:10325 ppid:5806 task_flags:0x400000 flags:0x00004002 Call Trace: context_switch kernel/sched/core.c:5396 [inline] __schedule+0x16a2/0x4cb0 kernel/sched/core.c:6785 preempt_schedule_irq+0xb5/0x150 kernel/sched/core.c:7108 irqentry_exit+0x6f/0x90 kernel/entry/common.c:307 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702 RIP: 0010:unwind_next_frame+0x188/0x2390 arch/x86/kernel/unwind_orc.c:-1 Code: 8d 5e 35 48 89 d8 48 c1 e8 03 48 89 44 24 28 0f b6 04 28 84 c0 0f 85 3c 1b 00 00 4c 89 6c 24 50 4c 89 64 24 20 4c 89 7c 24 48 <48> 89 5c 24 10 0f b6 1b 48 8b 44 24 30 80 3c 28 00 4c 8b 7c 24 18 RSP: 0018:ffffc90004c771d8 EFLAGS: 00000246 RAX: 0000000000000000 RBX: ffffc90004c772dd RCX: 85f524de982a0900 RDX: 0000000000000000 RSI: ffffffff8be1b9a0 RDI: ffffffff8be1b960 RBP: dffffc0000000000 R08: 0000000000000000 R09: ffffffff81728af5 R10: ffffc90004c772f8 R11: ffffffff81ace5b0 R12: 1ffff9200098ee55 R13: ffffc90004c772f8 R14: ffffc90004c772a8 R15: ffffffff81728af5 arch_stack_walk+0x11c/0x150 arch/x86/kernel/stacktrace.c:25 stack_trace_save+0x9c/0xe0 kernel/stacktrace.c:122 save_stack+0xf7/0x1f0 mm/page_owner.c:156 __reset_page_owner+0x71/0x1f0 mm/page_owner.c:308 reset_page_owner include/linux/page_owner.h:25 [inline] free_pages_prepare mm/page_alloc.c:1248 [inline] __free_frozen_pages+0xc65/0xe60 mm/page_alloc.c:2706 discard_slab mm/slub.c:2717 [inline] __put_partials+0x161/0x1c0 mm/slub.c:3186 put_cpu_partial+0x17c/0x250 mm/slub.c:3261 __slab_free+0x2f7/0x400 mm/slub.c:4513 qlink_free mm/kasan/quarantine.c:163 [inline] qlist_free_all+0x97/0x140 mm/kasan/quarantine.c:179 kasan_quarantine_reduce+0x148/0x160 mm/kasan/quarantine.c:286 __kasan_slab_alloc+0x22/0x80 mm/kasan/common.c:329 kasan_slab_alloc include/linux/kasan.h:250 [inline] slab_post_alloc_hook mm/slub.c:4148 [inline] slab_alloc_node mm/slub.c:4197 [inline] kmem_cache_alloc_lru_noprof+0x1c6/0x3d0 mm/slub.c:4216 proc_alloc_inode+0x2a/0xc0 fs/proc/inode.c:57 alloc_inode+0x6a/0x1b0 fs/inode.c:346 new_inode+0x22/0x170 fs/inode.c:1145 proc_pid_make_inode+0x21/0x130 fs/proc/base.c:1953 proc_pid_make_base_inode fs/proc/base.c:2004 [inline] proc_pid_instantiate+0x53/0x2c0 fs/proc/base.c:3492 proc_pid_lookup+0x2fd/0x450 fs/proc/base.c:3536 proc_root_lookup+0x20/0x50 fs/proc/root.c:325 __lookup_slow+0x294/0x3d0 fs/namei.c:1817 lookup_slow+0x53/0x70 fs/namei.c:1834 walk_component+0x2d2/0x400 fs/namei.c:2138 link_path_walk+0x75b/0xea0 fs/namei.c:2503 path_lookupat+0x97/0x430 fs/namei.c:2662 filename_lookup+0x212/0x570 fs/namei.c:2692 do_readlinkat+0xd9/0x500 fs/stat.c:576 __do_sys_readlink fs/stat.c:613 [inline] __se_sys_readlink fs/stat.c:610 [inline] __x64_sys_readlink+0x7f/0x90 fs/stat.c:610 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7fdb4a3a3656 RSP: 002b:00007fff32862690 EFLAGS: 00000206 ORIG_RAX: 0000000000000059 RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007fdb4a3a3656 RDX: 0000000000001000 RSI: 00007fff32862690 RDI: 00007fdb4a43eb78 RBP: 00007fff32862690 R08: 0000000000000000 R09: 00007fdb4a43f214 R10: 00007fff32863720 R11: 0000000000000206 R12: 00007fff32863870 R13: 00007fff32863858 R14: 00007fff328637f0 R15: 00007fff328637e8 rcu: rcu_preempt kthread starved for 2163 jiffies! g57797 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=1 rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. rcu: RCU grace-period kthread stack dump: task:rcu_preempt state:R running task stack:27128 pid:16 tgid:16 ppid:2 task_flags:0x208040 flags:0x00004000 Call Trace: context_switch kernel/sched/core.c:5396 [inline] __schedule+0x16a2/0x4cb0 kernel/sched/core.c:6785 __schedule_loop kernel/sched/core.c:6863 [inline] schedule+0x165/0x360 kernel/sched/core.c:6878 schedule_timeout+0x12b/0x270 kernel/time/sleep_timeout.c:99 rcu_gp_fqs_loop+0x301/0x1540 kernel/rcu/tree.c:2054 rcu_gp_kthread+0x99/0x390 kernel/rcu/tree.c:2256 kthread+0x70e/0x8a0 kernel/kthread.c:464 ret_from_fork+0x3fc/0x770 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 rcu: Stack dump where RCU GP kthread last ran: Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 1312 Comm: kworker/u8:6 Not tainted 6.16.0-rc3-syzkaller-00042-g78f4e737a53e #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 Workqueue: events_unbound cfg80211_wiphy_work RIP: 0010:bytes_is_nonzero mm/kasan/generic.c:87 [inline] RIP: 0010:memory_is_nonzero mm/kasan/generic.c:104 [inline] RIP: 0010:memory_is_poisoned_n mm/kasan/generic.c:129 [inline] RIP: 0010:memory_is_poisoned mm/kasan/generic.c:161 [inline] RIP: 0010:check_region_inline mm/kasan/generic.c:180 [inline] RIP: 0010:kasan_check_range+0x9f/0x2c0 mm/kasan/generic.c:189 Code: 00 fc ff df 4d 8d 34 19 4d 89 f4 4d 29 dc 49 83 fc 10 7f 29 4d 85 e4 0f 84 41 01 00 00 4c 89 cb 48 f7 d3 4c 01 fb 41 80 3b 00 <0f> 85 de 01 00 00 49 ff c3 48 ff c3 75 ee e9 21 01 00 00 44 89 dd RSP: 0000:ffffc90000a077a8 EFLAGS: 00000246 RAX: c2950be5c4ffd301 RBX: fffffffffffffffe RCX: ffffffff84c0a2df RDX: 0000000000000001 RSI: 0000000000000028 RDI: ffffc90000a07858 RBP: 0000000000000000 R08: ffffc90000a0787f R09: 1ffff92000140f0f R10: dffffc0000000000 R11: fffff52000140f0e R12: 0000000000000005 R13: 00000000000000b8 R14: fffff52000140f10 R15: 1ffff92000140f0b FS: 0000000000000000(0000) GS:ffff888125d83000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00002000000e7030 CR3: 0000000023db6000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: __asan_memset+0x22/0x50 mm/kasan/shadow.c:84 __debug_check_no_obj_freed lib/debugobjects.c:1073 [inline] debug_check_no_obj_freed+0x4f/0x470 lib/debugobjects.c:1129 slab_free_hook mm/slub.c:2312 [inline] slab_free mm/slub.c:4643 [inline] kmem_cache_free+0x113/0x400 mm/slub.c:4745 skb_ext_del include/linux/skbuff.h:4892 [inline] nf_bridge_info_free net/bridge/br_netfilter_hooks.c:156 [inline] br_nf_dev_queue_xmit+0x4fe/0x2680 net/bridge/br_netfilter_hooks.c:854 NF_HOOK+0x618/0x6b0 include/linux/netfilter.h:317 br_nf_post_routing+0xb66/0xfe0 net/bridge/br_netfilter_hooks.c:969 nf_hook_entry_hookfn include/linux/netfilter.h:157 [inline] nf_hook_slow+0xc2/0x220 net/netfilter/core.c:623 nf_hook include/linux/netfilter.h:272 [inline] NF_HOOK+0x215/0x3c0 include/linux/netfilter.h:315 br_forward_finish+0xd3/0x130 net/bridge/br_forward.c:66 br_nf_hook_thresh net/bridge/br_netfilter_hooks.c:-1 [inline] br_nf_forward_finish+0xa40/0xe60 net/bridge/br_netfilter_hooks.c:665 NF_HOOK+0x618/0x6b0 include/linux/netfilter.h:317 br_nf_forward_ip+0x647/0x7e0 net/bridge/br_netfilter_hooks.c:719 nf_hook_entry_hookfn include/linux/netfilter.h:157 [inline] nf_hook_slow+0xc2/0x220 net/netfilter/core.c:623 nf_hook include/linux/netfilter.h:272 [inline] NF_HOOK+0x215/0x3c0 include/linux/netfilter.h:315 __br_forward+0x41e/0x600 net/bridge/br_forward.c:115 br_handle_frame_finish+0x14b4/0x19b0 net/bridge/br_input.c:221 br_nf_hook_thresh+0x3c3/0x4a0 net/bridge/br_netfilter_hooks.c:-1 br_nf_pre_routing_finish_ipv6+0x948/0xd00 net/bridge/br_netfilter_ipv6.c:-1 NF_HOOK include/linux/netfilter.h:317 [inline] br_nf_pre_routing_ipv6+0x37e/0x6b0 net/bridge/br_netfilter_ipv6.c:184 nf_hook_entry_hookfn include/linux/netfilter.h:157 [inline] nf_hook_bridge_pre net/bridge/br_input.c:283 [inline] br_handle_frame+0x97f/0x14c0 net/bridge/br_input.c:434 __netif_receive_skb_core+0x10de/0x4180 net/core/dev.c:5863 __netif_receive_skb_one_core net/core/dev.c:5975 [inline] __netif_receive_skb+0x72/0x380 net/core/dev.c:6090 process_backlog+0x60e/0x14f0 net/core/dev.c:6442 __napi_poll+0xc4/0x480 net/core/dev.c:7414 napi_poll net/core/dev.c:7478 [inline] net_rx_action+0x707/0xe30 net/core/dev.c:7605 handle_softirqs+0x286/0x870 kernel/softirq.c:579 do_softirq+0xec/0x180 kernel/softirq.c:480 __local_bh_enable_ip+0x17d/0x1c0 kernel/softirq.c:407 spin_unlock_bh include/linux/spinlock.h:396 [inline] cfg80211_inform_single_bss_data+0x13d2/0x1ac0 net/wireless/scan.c:2383 cfg80211_inform_bss_data+0x1fb/0x3b20 net/wireless/scan.c:3222 cfg80211_inform_bss_frame_data+0x3d7/0x730 net/wireless/scan.c:3313 ieee80211_bss_info_update+0x746/0x9e0 net/mac80211/scan.c:226 ieee80211_rx_bss_info net/mac80211/ibss.c:1094 [inline] ieee80211_rx_mgmt_probe_beacon net/mac80211/ibss.c:1573 [inline] ieee80211_ibss_rx_queued_mgmt+0xa36/0x2ae0 net/mac80211/ibss.c:1600 ieee80211_iface_process_skb net/mac80211/iface.c:1668 [inline] ieee80211_iface_work+0x806/0xfe0 net/mac80211/iface.c:1722 cfg80211_wiphy_work+0x2df/0x460 net/wireless/core.c:435 process_one_work kernel/workqueue.c:3238 [inline] process_scheduled_works+0xade/0x17b0 kernel/workqueue.c:3321 worker_thread+0x8a0/0xda0 kernel/workqueue.c:3402 kthread+0x70e/0x8a0 kernel/kthread.c:464 ret_from_fork+0x3fc/0x770 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 net_ratelimit: 14150 callbacks suppressed bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:ad:71:55:06:fb, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:ad:71:55:06:fb, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:ad:71:55:06:fb, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)