bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
rcu: INFO: rcu_preempt detected stalls on CPUs/tasks:
rcu: Tasks blocked on level-0 rcu_node (CPUs 0-1): P9562/1:b..l
rcu: (detected by 0, t=10503 jiffies, g=28477, q=51962 ncpus=2)
task:syz.3.1372 state:R running task stack:25960 pid:9562 tgid:9560 ppid:5851 task_flags:0x40044c flags:0x00004002
Call Trace:
context_switch kernel/sched/core.c:5313 [inline]
__schedule+0x16f5/0x4d00 kernel/sched/core.c:6696
preempt_schedule_irq+0xb5/0x150 kernel/sched/core.c:7019
irqentry_exit+0x6f/0x90 kernel/entry/common.c:307
asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702
RIP: 0010:native_save_fl arch/x86/include/asm/irqflags.h:19 [inline]
RIP: 0010:arch_local_save_flags arch/x86/include/asm/irqflags.h:109 [inline]
RIP: 0010:arch_local_irq_save arch/x86/include/asm/irqflags.h:127 [inline]
RIP: 0010:lock_acquire+0xbf/0x360 kernel/locking/lockdep.c:5867
Code: 84 fa 00 00 00 65 8b 05 ef 7b 01 11 85 c0 0f 85 eb 00 00 00 65 48 8b 04 25 08 80 9f 92 83 b8 ec 0a 00 00 00 0f 85 d5 00 00 00 <48> c7 44 24 30 00 00 00 00 9c 8f 44 24 30 4c 89 74 24 10 4d 89 fe
RSP: 0018:ffffc9002c09ecd8 EFLAGS: 00000246
RAX: ffff888053825a00 RBX: 0000000000000000 RCX: 4f78acdbe0e56300
RDX: 0000000000000000 RSI: ffffffff8172ac82 RDI: 1ffffffff1c27de4
RBP: ffffffff8172ac65 R08: 0000000000000000 R09: 0000000000000000
R10: ffffc9002c09ee98 R11: ffffffff81ad0f60 R12: 0000000000000002
R13: ffffffff8e13ef20 R14: 0000000000000000 R15: 0000000000000000
rcu_lock_acquire include/linux/rcupdate.h:331 [inline]
rcu_read_lock include/linux/rcupdate.h:841 [inline]
class_rcu_constructor include/linux/rcupdate.h:1155 [inline]
unwind_next_frame+0xc2/0x2390 arch/x86/kernel/unwind_orc.c:479
arch_stack_walk+0x11c/0x150 arch/x86/kernel/stacktrace.c:25
stack_trace_save+0x9c/0xe0 kernel/stacktrace.c:122
save_stack+0xf5/0x1f0 mm/page_owner.c:156
__reset_page_owner+0x71/0x1f0 mm/page_owner.c:308
reset_page_owner include/linux/page_owner.h:25 [inline]
free_pages_prepare mm/page_alloc.c:1248 [inline]
free_unref_folios+0xc66/0x14d0 mm/page_alloc.c:2763
folios_put_refs+0x559/0x640 mm/swap.c:992
folio_batch_release include/linux/pagevec.h:101 [inline]
shmem_undo_range+0x49e/0x14b0 mm/shmem.c:1125
shmem_truncate_range mm/shmem.c:1237 [inline]
shmem_evict_inode+0x272/0xa70 mm/shmem.c:1365
evict+0x501/0x9c0 fs/inode.c:810
__dentry_kill+0x209/0x660 fs/dcache.c:669
dput+0x19f/0x2b0 fs/dcache.c:911
__fput+0x68e/0xa70 fs/file_table.c:476
task_work_run+0x1d1/0x260 kernel/task_work.c:227
exit_task_work include/linux/task_work.h:40 [inline]
do_exit+0x6b5/0x2300 kernel/exit.c:959
do_group_exit+0x21c/0x2d0 kernel/exit.c:1100
get_signal+0x1286/0x1340 kernel/signal.c:3034
arch_do_signal_or_restart+0x9a/0x750 arch/x86/kernel/signal.c:337
exit_to_user_mode_loop+0x75/0x110 kernel/entry/common.c:111
exit_to_user_mode_prepare include/linux/entry-common.h:330 [inline]
syscall_exit_to_user_mode_work include/linux/entry-common.h:414 [inline]
syscall_exit_to_user_mode include/linux/entry-common.h:449 [inline]
do_syscall_64+0x2bd/0x3b0 arch/x86/entry/syscall_64.c:100
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f77c7f8e929
RSP: 002b:00007f77c8d82038 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
RAX: 0000000000010106 RBX: 00007f77c81b6080 RCX: 00007f77c7f8e929
RDX: 0000000000010106 RSI: 00002000000000c0 RDI: 0000000000000003
RBP: 00007f77c8010b39 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000000
R13: 0000000000000000 R14: 00007f77c81b6080 R15: 00007ffc458457d8
rcu: rcu_preempt kthread starved for 214 jiffies! g28477 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=1
rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior.
rcu: RCU grace-period kthread stack dump:
task:rcu_preempt state:R running task stack:27320 pid:16 tgid:16 ppid:2 task_flags:0x208040 flags:0x00004000
Call Trace:
context_switch kernel/sched/core.c:5313 [inline]
__schedule+0x16f5/0x4d00 kernel/sched/core.c:6696
__schedule_loop kernel/sched/core.c:6774 [inline]
schedule+0x165/0x360 kernel/sched/core.c:6789
schedule_timeout+0x12b/0x270 kernel/time/sleep_timeout.c:99
rcu_gp_fqs_loop+0x301/0x1540 kernel/rcu/tree.c:2060
rcu_gp_kthread+0x99/0x390 kernel/rcu/tree.c:2262
kthread+0x70e/0x8a0 kernel/kthread.c:464
ret_from_fork+0x3fc/0x770 arch/x86/kernel/process.c:148
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245
rcu: Stack dump where RCU GP kthread last ran:
Sending NMI from CPU 0 to CPUs 1:
NMI backtrace for cpu 1
CPU: 1 UID: 0 PID: 3399 Comm: kworker/R-bat_e Not tainted 6.16.0-rc2-next-20250619-syzkaller #0 PREEMPT(full)
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
Workqueue: bat_events batadv_tt_purge
RIP: 0010:ip6_packet_match net/ipv6/netfilter/ip6_tables.c:57 [inline]
RIP: 0010:ip6t_do_table+0x52e/0x1560 net/ipv6/netfilter/ip6_tables.c:306
Code: f7 49 23 5e 28 4c 09 eb 31 ff 48 89 de e8 8a 25 88 f7 49 8d 96 84 00 00 00 48 89 d0 48 c1 e8 03 49 bd 00 00 00 00 00 fc ff df <48> 89 44 24 68 42 0f b6 04 28 84 c0 48 89 54 24 20 0f 85 96 0b 00
RSP: 0018:ffffc90000a07cc0 EFLAGS: 00000a07
RAX: 1ffff1100fb85666 RBX: 0000000000000000 RCX: ffff8880302e5a00
RDX: ffff88807dc2b334 RSI: 0000000000000000 RDI: 0000000000000000
RBP: ffffc90000a07eb0 R08: ffffc90000a07e2f R09: 0000000000000000
R10: ffffc90000a07e10 R11: fffff52000140fc6 R12: ffff888096d0e710
R13: dffffc0000000000 R14: ffff88807dc2b2b0 R15: ffff888096d0e720
FS: 0000000000000000(0000) GS:ffff888125d28000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000555590e325c8 CR3: 000000002580c000 CR4: 00000000003526f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
ip6t_mangle_out net/ipv6/netfilter/ip6table_mangle.c:49 [inline]
ip6table_mangle_hook+0x264/0x6c0 net/ipv6/netfilter/ip6table_mangle.c:72
nf_hook_entry_hookfn include/linux/netfilter.h:157 [inline]
nf_hook_slow+0xc5/0x220 net/netfilter/core.c:623
nf_hook include/linux/netfilter.h:272 [inline]
NF_HOOK include/linux/netfilter.h:315 [inline]
ndisc_send_skb+0x12c0/0x1400 net/ipv6/ndisc.c:513
ndisc_send_na+0x6d7/0x890 net/ipv6/ndisc.c:578
ndisc_recv_ns+0x885/0x1160 net/ipv6/ndisc.c:962
icmpv6_rcv+0x139a/0x1c80 net/ipv6/icmp.c:988
ip6_protocol_deliver_rcu+0xe0b/0x15c0 net/ipv6/ip6_input.c:436
ip6_input_finish+0xde/0x190 net/ipv6/ip6_input.c:480
NF_HOOK+0x30c/0x3a0 include/linux/netfilter.h:317
ip6_input+0x16a/0x270 net/ipv6/ip6_input.c:491
ip6_mc_input+0x79a/0xbe0 net/ipv6/ip6_input.c:588
NF_HOOK+0x30c/0x3a0 include/linux/netfilter.h:317
__netif_receive_skb_one_core net/core/dev.c:5975 [inline]
__netif_receive_skb+0xd3/0x380 net/core/dev.c:6088
process_backlog+0x60e/0x14f0 net/core/dev.c:6440
__napi_poll+0xc4/0x480 net/core/dev.c:7453
napi_poll net/core/dev.c:7517 [inline]
net_rx_action+0x707/0xe30 net/core/dev.c:7644
handle_softirqs+0x286/0x870 kernel/softirq.c:579
do_softirq+0xec/0x180 kernel/softirq.c:480
__local_bh_enable_ip+0x17d/0x1c0 kernel/softirq.c:407
spin_unlock_bh include/linux/spinlock.h:396 [inline]
batadv_tt_global_purge net/batman-adv/translation-table.c:2250 [inline]
batadv_tt_purge+0x4d1/0x9e0 net/batman-adv/translation-table.c:3510
process_one_work kernel/workqueue.c:3239 [inline]
process_scheduled_works+0xae1/0x17b0 kernel/workqueue.c:3322
rescuer_thread+0x53c/0xdd0 kernel/workqueue.c:3499
kthread+0x70e/0x8a0 kernel/kthread.c:464
ret_from_fork+0x3fc/0x770 arch/x86/kernel/process.c:148
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245
net_ratelimit: 15736 callbacks suppressed
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:9a:0f:3a:2f:f0:9f, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:9a:0f:3a:2f:f0:9f, vlan:0)
net_ratelimit: 19434 callbacks suppressed
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:9a:0f:3a:2f:f0:9f, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)