bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: rcu: Tasks blocked on level-0 rcu_node (CPUs 0-1): P3319/1:b..l rcu: (detected by 0, t=10502 jiffies, g=95109, q=503 ncpus=2) task:kworker/u8:8 state:R running task stack:23680 pid:3319 tgid:3319 ppid:2 flags:0x00004000 Workqueue: bat_events batadv_iv_send_outstanding_bat_ogm_packet Call Trace: context_switch kernel/sched/core.c:5188 [inline] __schedule+0xe37/0x5490 kernel/sched/core.c:6529 preempt_schedule_irq+0x51/0x90 kernel/sched/core.c:6851 irqentry_exit+0x36/0x90 kernel/entry/common.c:354 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702 RIP: 0010:lock_acquire+0x1f2/0x560 kernel/locking/lockdep.c:5727 Code: c1 05 6a 1f 9a 7e 83 f8 01 0f 85 ea 02 00 00 9c 58 f6 c4 02 0f 85 d5 02 00 00 48 85 ed 74 01 fb 48 b8 00 00 00 00 00 fc ff df <48> 01 c3 48 c7 03 00 00 00 00 48 c7 43 08 00 00 00 00 48 8b 84 24 RSP: 0018:ffffc9000a1bfa70 EFLAGS: 00000206 RAX: dffffc0000000000 RBX: 1ffff92001437f50 RCX: 0000000000000001 RDX: 0000000000000001 RSI: ffffffff8b2cc880 RDI: ffffffff8b90c740 RBP: 0000000000000200 R08: 0000000000000000 R09: fffffbfff2859cd8 R10: ffffffff942ce6c7 R11: 0000000000000000 R12: 0000000000000000 R13: 0000000000000000 R14: ffffffff8dbb5160 R15: 0000000000000000 rcu_lock_acquire include/linux/rcupdate.h:326 [inline] rcu_read_lock include/linux/rcupdate.h:838 [inline] batadv_iv_ogm_slide_own_bcast_window net/batman-adv/bat_iv_ogm.c:754 [inline] batadv_iv_ogm_schedule_buff+0x5ac/0x1500 net/batman-adv/bat_iv_ogm.c:825 batadv_iv_ogm_schedule net/batman-adv/bat_iv_ogm.c:868 [inline] batadv_iv_ogm_schedule net/batman-adv/bat_iv_ogm.c:861 [inline] batadv_iv_send_outstanding_bat_ogm_packet+0x31e/0x8d0 net/batman-adv/bat_iv_ogm.c:1712 process_one_work+0x9c5/0x1b40 kernel/workqueue.c:3231 process_scheduled_works kernel/workqueue.c:3312 [inline] worker_thread+0x6c8/0xf20 kernel/workqueue.c:3390 kthread+0x2c1/0x3a0 kernel/kthread.c:389 ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 rcu: rcu_preempt kthread starved for 10511 jiffies! g95109 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=1 rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. rcu: RCU grace-period kthread stack dump: task:rcu_preempt state:R running task stack:27680 pid:17 tgid:17 ppid:2 flags:0x00004000 Call Trace: context_switch kernel/sched/core.c:5188 [inline] __schedule+0xe37/0x5490 kernel/sched/core.c:6529 __schedule_loop kernel/sched/core.c:6606 [inline] schedule+0xe7/0x350 kernel/sched/core.c:6621 schedule_timeout+0x136/0x2a0 kernel/time/timer.c:2581 rcu_gp_fqs_loop+0x1eb/0xb00 kernel/rcu/tree.c:2034 rcu_gp_kthread+0x271/0x380 kernel/rcu/tree.c:2236 kthread+0x2c1/0x3a0 kernel/kthread.c:389 ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 rcu: Stack dump where RCU GP kthread last ran: Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 12179 Comm: syz.3.1642 Not tainted 6.10.0-syzkaller-11840-g933069701c1b #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 RIP: 0010:stack_access_ok+0x2/0x270 arch/x86/kernel/unwind_orc.c:389 Code: 30 ff ff ff e9 6f fe ff ff 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 41 57 <41> 56 41 55 41 54 55 48 89 f5 53 48 89 fb 4c 8d 63 08 48 83 ec 10 RSP: 0018:ffffc90000a17a70 EFLAGS: 00000246 RAX: ffffc9000359f4d0 RBX: ffffc90000a17b00 RCX: ffffffff813ce689 RDX: 0000000000000008 RSI: ffffc9000359f4d0 RDI: ffffc90000a17b00 RBP: 0000000000000002 R08: 0000000000000001 R09: 0000000000000004 R10: 0000000000000002 R11: 0000000000000000 R12: ffffffff9123e7ba R13: ffffc9000359f4d8 R14: ffffffff9123e7be R15: 0000000000000002 FS: 00007fd5521ff6c0(0000) GS:ffff8880b9300000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fd5521fefa8 CR3: 00000000610b0000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: deref_stack_reg arch/x86/kernel/unwind_orc.c:403 [inline] unwind_next_frame+0xd9b/0x23a0 arch/x86/kernel/unwind_orc.c:585 arch_stack_walk+0x100/0x170 arch/x86/kernel/stacktrace.c:25 stack_trace_save+0x95/0xd0 kernel/stacktrace.c:122 kasan_save_stack+0x33/0x60 mm/kasan/common.c:47 kasan_save_track+0x14/0x30 mm/kasan/common.c:68 kasan_save_free_info+0x3b/0x60 mm/kasan/generic.c:579 poison_slab_object+0xf7/0x160 mm/kasan/common.c:240 __kasan_slab_free+0x32/0x50 mm/kasan/common.c:256 kasan_slab_free include/linux/kasan.h:184 [inline] slab_free_hook mm/slub.c:2252 [inline] slab_free mm/slub.c:4473 [inline] kmem_cache_free+0x12f/0x3a0 mm/slub.c:4548 __skb_ext_put+0x129/0x2e0 net/core/skbuff.c:7015 skb_ext_put include/linux/skbuff.h:4752 [inline] skb_ext_put include/linux/skbuff.h:4749 [inline] skb_release_head_state+0x1ca/0x2b0 net/core/skbuff.c:1180 skb_release_all net/core/skbuff.c:1186 [inline] __kfree_skb net/core/skbuff.c:1202 [inline] sk_skb_reason_drop+0xf5/0x210 net/core/skbuff.c:1240 kfree_skb_reason include/linux/skbuff.h:1260 [inline] kfree_skb include/linux/skbuff.h:1269 [inline] ip6_mc_input+0x7af/0xfd0 net/ipv6/ip6_input.c:589 dst_input include/net/dst.h:460 [inline] dst_input include/net/dst.h:458 [inline] ip6_rcv_finish+0x3a2/0x5b0 net/ipv6/ip6_input.c:79 ip_sabotage_in+0x21e/0x2a0 net/bridge/br_netfilter_hooks.c:1008 nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline] nf_hook_slow+0xbb/0x200 net/netfilter/core.c:626 nf_hook.constprop.0+0x42e/0x750 include/linux/netfilter.h:269 NF_HOOK include/linux/netfilter.h:312 [inline] ipv6_rcv+0xa4/0x680 net/ipv6/ip6_input.c:310 __netif_receive_skb_one_core+0x12e/0x1e0 net/core/dev.c:5660 __netif_receive_skb+0x1d/0x160 net/core/dev.c:5774 netif_receive_skb_internal net/core/dev.c:5860 [inline] netif_receive_skb+0x13f/0x7b0 net/core/dev.c:5920 NF_HOOK include/linux/netfilter.h:314 [inline] NF_HOOK include/linux/netfilter.h:308 [inline] br_pass_frame_up+0x346/0x490 net/bridge/br_input.c:70 br_handle_frame_finish+0xdcf/0x1c80 net/bridge/br_input.c:221 br_nf_hook_thresh+0x303/0x410 net/bridge/br_netfilter_hooks.c:1185 br_nf_pre_routing_finish_ipv6+0x76a/0xfb0 net/bridge/br_netfilter_ipv6.c:154 NF_HOOK include/linux/netfilter.h:314 [inline] br_nf_pre_routing_ipv6+0x3ce/0x8c0 net/bridge/br_netfilter_ipv6.c:184 br_nf_pre_routing+0x860/0x15b0 net/bridge/br_netfilter_hooks.c:531 nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline] nf_hook_bridge_pre net/bridge/br_input.c:277 [inline] br_handle_frame+0x9eb/0x1490 net/bridge/br_input.c:424 __netif_receive_skb_core.constprop.0+0xa3d/0x4330 net/core/dev.c:5554 __netif_receive_skb_one_core+0xb1/0x1e0 net/core/dev.c:5658 __netif_receive_skb+0x1d/0x160 net/core/dev.c:5774 process_backlog+0x443/0x15f0 net/core/dev.c:6107 __napi_poll.constprop.0+0xb7/0x550 net/core/dev.c:6771 napi_poll net/core/dev.c:6840 [inline] net_rx_action+0xa92/0x1010 net/core/dev.c:6962 handle_softirqs+0x216/0x8f0 kernel/softirq.c:554 __do_softirq kernel/softirq.c:588 [inline] invoke_softirq kernel/softirq.c:428 [inline] __irq_exit_rcu kernel/softirq.c:637 [inline] irq_exit_rcu+0xbb/0x120 kernel/softirq.c:649 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1043 [inline] sysvec_apic_timer_interrupt+0x95/0xb0 arch/x86/kernel/apic/apic.c:1043 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702 RIP: 0010:finish_task_switch.isra.0+0x220/0xcc0 kernel/sched/core.c:5062 Code: a9 0a 00 00 44 8b 0d c7 75 8c 0e 45 85 c9 0f 85 c0 01 00 00 48 89 df e8 ae f8 ff ff e8 29 cf 36 00 fb 65 48 8b 1d 70 da a8 7e <48> 8d bb f8 15 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 RSP: 0018:ffffc9000359f580 EFLAGS: 00000202 RAX: 000000000084c67f RBX: ffff8880221d5a00 RCX: 1ffffffff2862684 RDX: 0000000000000000 RSI: ffffffff8b2cc580 RDI: ffffffff8b90c740 RBP: ffffc9000359f5c8 R08: 0000000000000001 R09: fffffbfff2859ced R10: ffffffff942ce76f R11: 0000000000000000 R12: ffff8880b933fb98 R13: ffff888079403c00 R14: 0000000000000000 R15: ffff8880b923ee00 context_switch kernel/sched/core.c:5191 [inline] __schedule+0xe3f/0x5490 kernel/sched/core.c:6529 preempt_schedule_common+0x44/0xc0 kernel/sched/core.c:6708 preempt_schedule_thunk+0x1a/0x30 arch/x86/entry/thunk.S:12 __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:152 [inline] _raw_spin_unlock_irqrestore+0x61/0x80 kernel/locking/spinlock.c:194 __unix_dgram_recvmsg+0x32a/0xe50 net/unix/af_unix.c:2469 unix_dgram_recvmsg+0xd0/0x110 net/unix/af_unix.c:2544 sock_recvmsg_nosec net/socket.c:1046 [inline] ____sys_recvmsg+0x5fe/0x6b0 net/socket.c:2814 ___sys_recvmsg+0x115/0x1a0 net/socket.c:2858 do_recvmmsg+0x2ba/0x750 net/socket.c:2952 __sys_recvmmsg net/socket.c:3031 [inline] __do_sys_recvmmsg net/socket.c:3054 [inline] __se_sys_recvmmsg net/socket.c:3047 [inline] __x64_sys_recvmmsg+0x239/0x290 net/socket.c:3047 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7fd552775f19 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fd5521ff048 EFLAGS: 00000246 ORIG_RAX: 000000000000012b RAX: ffffffffffffffda RBX: 00007fd552906038 RCX: 00007fd552775f19 RDX: 0000000000010106 RSI: 00000000200000c0 RDI: 0000000000000003 RBP: 00007fd5527e4e68 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000000 R13: 000000000000006e R14: 00007fd552906038 R15: 00007fff99f6cb78 net_ratelimit: 8914 callbacks suppressed bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) net_ratelimit: 11189 callbacks suppressed bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)