bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0)
rcu: INFO: rcu_preempt detected stalls on CPUs/tasks:
rcu: Tasks blocked on level-0 rcu_node (CPUs 0-1): P20400/1:b..l P22270/1:b..l
rcu: (detected by 0, t=10503 jiffies, g=127117, q=571 ncpus=2)
task:kworker/1:7 state:R running task stack:24128 pid:22270 tgid:22270 ppid:2 task_flags:0x4208060 flags:0x00080000
Workqueue: events ovs_dp_masks_rebalance
Call Trace:
context_switch kernel/sched/core.c:5260 [inline]
__schedule+0x14ea/0x5050 kernel/sched/core.c:6867
preempt_schedule_irq+0x4d/0xa0 kernel/sched/core.c:7194
irqentry_exit+0x597/0x620 kernel/entry/common.c:216
asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:697
RIP: 0010:lock_acquire+0x221/0x330 kernel/locking/lockdep.c:5872
Code: ff ff ff e8 41 c0 f6 09 f7 44 24 08 00 02 00 00 0f 84 3a ff ff ff 65 48 8b 05 2b 61 52 11 48 3b 44 24 58 75 33 fb 48 83 c4 60 <5b> 41 5c 41 5d 41 5e 41 5f 5d e9 50 a4 f9 09 cc 48 8d 3d 58 17 52
RSP: 0018:ffffc900054b7378 EFLAGS: 00000286
RAX: 87974799d2e31f00 RBX: 0000000000000000 RCX: 0000000000000046
RDX: 00000000444e1742 RSI: ffffffff8df34c9c RDI: ffffffff8c073a00
RBP: ffffffff81759195 R08: ffffffff81759195 R09: ffffffff8e55a360
R10: ffffc900054b74d8 R11: ffffffff81afb170 R12: 0000000000000002
R13: ffffffff8e55a360 R14: 0000000000000000 R15: 0000000000000246
rcu_lock_acquire include/linux/rcupdate.h:331 [inline]
rcu_read_lock include/linux/rcupdate.h:867 [inline]
class_rcu_constructor include/linux/rcupdate.h:1195 [inline]
unwind_next_frame+0xc2/0x23c0 arch/x86/kernel/unwind_orc.c:495
arch_stack_walk+0x11b/0x150 arch/x86/kernel/stacktrace.c:25
stack_trace_save+0xa9/0x100 kernel/stacktrace.c:122
save_stack+0x122/0x230 mm/page_owner.c:165
__reset_page_owner+0x71/0x1f0 mm/page_owner.c:320
reset_page_owner include/linux/page_owner.h:25 [inline]
free_pages_prepare mm/page_alloc.c:1433 [inline]
__free_frozen_pages+0xbf8/0xd70 mm/page_alloc.c:2973
discard_slab mm/slub.c:3346 [inline]
__put_partials+0x146/0x170 mm/slub.c:3886
__slab_free+0x294/0x320 mm/slub.c:5956
qlink_free mm/kasan/quarantine.c:163 [inline]
qlist_free_all+0x97/0x100 mm/kasan/quarantine.c:179
kasan_quarantine_reduce+0x148/0x160 mm/kasan/quarantine.c:286
__kasan_slab_alloc+0x22/0x80 mm/kasan/common.c:350
kasan_slab_alloc include/linux/kasan.h:253 [inline]
slab_post_alloc_hook mm/slub.c:4953 [inline]
slab_alloc_node mm/slub.c:5263 [inline]
__do_kmalloc_node mm/slub.c:5656 [inline]
__kmalloc_noprof+0x3c2/0x7e0 mm/slub.c:5669
kmalloc_noprof include/linux/slab.h:961 [inline]
kmalloc_array_noprof include/linux/slab.h:1003 [inline]
ovs_flow_masks_rebalance+0xf4/0xc30 net/openvswitch/flow_table.c:1113
ovs_dp_masks_rebalance+0x56/0xe0 net/openvswitch/datapath.c:2564
process_one_work kernel/workqueue.c:3257 [inline]
process_scheduled_works+0xaec/0x17a0 kernel/workqueue.c:3340
worker_thread+0xda6/0x1360 kernel/workqueue.c:3421
kthread+0x726/0x8b0 kernel/kthread.c:463
ret_from_fork+0x51b/0xa40 arch/x86/kernel/process.c:158
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:246
task:kworker/1:4 state:R running task stack:24056 pid:20400 tgid:20400 ppid:2 task_flags:0x4208060 flags:0x00080000
Workqueue: events ipvlan_process_multicast
Call Trace:
context_switch kernel/sched/core.c:5260 [inline]
__schedule+0x14ea/0x5050 kernel/sched/core.c:6867
preempt_schedule_common+0x82/0xd0 kernel/sched/core.c:7051
preempt_schedule_thunk+0x16/0x30 arch/x86/entry/thunk.S:12
__local_bh_enable_ip+0xe1/0x130 kernel/softirq.c:457
local_bh_enable include/linux/bottom_half.h:33 [inline]
ipvlan_process_multicast+0x946/0xdf0 drivers/net/ipvlan/ipvlan_core.c:280
process_one_work kernel/workqueue.c:3257 [inline]
process_scheduled_works+0xaec/0x17a0 kernel/workqueue.c:3340
worker_thread+0xda6/0x1360 kernel/workqueue.c:3421
kthread+0x726/0x8b0 kernel/kthread.c:463
ret_from_fork+0x51b/0xa40 arch/x86/kernel/process.c:158
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:246
rcu: rcu_preempt kthread starved for 418 jiffies! g127117 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=1
rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior.
rcu: RCU grace-period kthread stack dump:
task:rcu_preempt state:R running task stack:27448 pid:16 tgid:16 ppid:2 task_flags:0x208040 flags:0x00080000
Call Trace:
context_switch kernel/sched/core.c:5260 [inline]
__schedule+0x14ea/0x5050 kernel/sched/core.c:6867
__schedule_loop kernel/sched/core.c:6949 [inline]
schedule+0x164/0x360 kernel/sched/core.c:6964
schedule_timeout+0x158/0x2c0 kernel/time/sleep_timeout.c:99
rcu_gp_fqs_loop+0x312/0x1560 kernel/rcu/tree.c:2083
rcu_gp_kthread+0x9d/0x3b0 kernel/rcu/tree.c:2285
kthread+0x726/0x8b0 kernel/kthread.c:463
ret_from_fork+0x51b/0xa40 arch/x86/kernel/process.c:158
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:246
rcu: Stack dump where RCU GP kthread last ran:
Sending NMI from CPU 0 to CPUs 1:
NMI backtrace for cpu 1
CPU: 1 UID: 0 PID: 3408 Comm: kworker/R-bat_e Not tainted syzkaller #0 PREEMPT(full)
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026
Workqueue: bat_events batadv_dat_purge
RIP: 0010:arch_irqs_disabled_flags arch/x86/include/asm/irqflags.h:146 [inline]
RIP: 0010:arch_irqs_disabled arch/x86/include/asm/irqflags.h:153 [inline]
RIP: 0010:lock_acquire+0x12e/0x330 kernel/locking/lockdep.c:5871
Code: 00 00 48 83 c4 28 48 c7 c7 9c 4c f3 8d e8 5a dc f6 09 b8 ff ff ff ff 65 0f c1 05 ad a7 52 11 83 f8 01 0f 85 ae 00 00 00 9c 58 00 02 00 00 0f 85 c1 00 00 00 f7 44 24 08 00 02 00 00 0f 85 c6
RSP: 0018:ffffc90000a08b90 EFLAGS: 00000046
RAX: 0000000000000046 RBX: 0000000000000000 RCX: 0000000080000101
RDX: 000000005a44979c RSI: ffffffff8df34c9c RDI: ffffffff8c073a00
RBP: ffffffff896cb7ab R08: ffffffff896cb7ab R09: ffffffff8e55a360
R10: ffff888037d10c80 R11: ffffed1006fa2192 R12: 0000000000000002
R13: ffffffff8e55a360 R14: 0000000000000000 R15: 0000000000000246
FS: 0000000000000000(0000) GS:ffff8881257f5000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00005555853194e8 CR3: 000000000e346000 CR4: 00000000003526f0
Call Trace:
rcu_lock_acquire include/linux/rcupdate.h:331 [inline]
rcu_read_lock include/linux/rcupdate.h:867 [inline]
process_backlog+0x69c/0x1950 net/core/dev.c:6616
__napi_poll+0xae/0x340 net/core/dev.c:7681
napi_poll net/core/dev.c:7744 [inline]
net_rx_action+0x627/0xf70 net/core/dev.c:7896
handle_softirqs+0x22a/0x7c0 kernel/softirq.c:622
do_softirq+0x76/0xd0 kernel/softirq.c:523
__local_bh_enable_ip+0xf8/0x130 kernel/softirq.c:450
spin_unlock_bh include/linux/spinlock.h:396 [inline]
__batadv_dat_purge net/batman-adv/distributed-arp-table.c:185 [inline]
batadv_dat_purge+0x2da/0x3c0 net/batman-adv/distributed-arp-table.c:204
process_one_work kernel/workqueue.c:3257 [inline]
process_scheduled_works+0xaec/0x17a0 kernel/workqueue.c:3340
rescuer_thread+0xcba/0x1390 kernel/workqueue.c:3528
kthread+0x726/0x8b0 kernel/kthread.c:463
ret_from_fork+0x51b/0xa40 arch/x86/kernel/process.c:158
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:246
net_ratelimit: 17822 callbacks suppressed
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:9a:87:b0:e0:63:7d, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:9a:87:b0:e0:63:7d, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:9a:87:b0:e0:63:7d, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:9a:87:b0:e0:63:7d, vlan:0)
net_ratelimit: 18954 callbacks suppressed
bridge0: received packet on veth0_to_bridge with own address as source address (addr:9a:87:b0:e0:63:7d, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:9a:87:b0:e0:63:7d, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:9a:87:b0:e0:63:7d, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:9a:87:b0:e0:63:7d, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0)