bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: rcu: Tasks blocked on level-0 rcu_node (CPUs 0-1): P6447/1:b..l rcu: (detected by 1, t=10502 jiffies, g=24137, q=673 ncpus=2) task:syz-executor state:R running task stack:19616 pid:6447 tgid:6447 ppid:1 flags:0x00004004 Call Trace: context_switch kernel/sched/core.c:5369 [inline] __schedule+0x1850/0x4c30 kernel/sched/core.c:6756 preempt_schedule_irq+0xfb/0x1c0 kernel/sched/core.c:7078 irqentry_exit+0x5e/0x90 kernel/entry/common.c:354 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702 RIP: 0010:lock_release+0x658/0xa30 kernel/locking/lockdep.c:5874 Code: 3c 3b 00 74 08 4c 89 f7 e8 85 ff 8a 00 f6 84 24 91 00 00 00 02 75 77 41 f7 c5 00 02 00 00 74 01 fb 48 c7 44 24 60 0e 36 e0 45 <4b> c7 04 27 00 00 00 00 4b c7 44 27 08 00 00 00 00 65 48 8b 04 25 RSP: 0018:ffffc900051370e0 EFLAGS: 00000206 RAX: 0000000000000001 RBX: 1ffff92000a26e2e RCX: ffffc90005137103 RDX: 0000000000000001 RSI: ffffffff8c0aaae0 RDI: ffffffff8c5fb0e0 RBP: ffffc90005137218 R08: ffffffff90197e77 R09: 1ffffffff2032fce R10: dffffc0000000000 R11: fffffbfff2032fcf R12: 1ffff92000a26e28 R13: 0000000000000246 R14: ffffc90005137170 R15: dffffc0000000000 rcu_lock_release include/linux/rcupdate.h:347 [inline] rcu_read_unlock include/linux/rcupdate.h:880 [inline] percpu_ref_put_many include/linux/percpu-refcount.h:337 [inline] percpu_ref_put+0xfa/0x180 include/linux/percpu-refcount.h:351 __mem_cgroup_uncharge_folios+0xdf/0x1c0 mm/memcontrol.c:4734 mem_cgroup_uncharge_folios include/linux/memcontrol.h:677 [inline] folios_put_refs+0x764/0x860 mm/swap.c:961 free_pages_and_swap_cache+0x2ea/0x690 mm/swap_state.c:332 __tlb_batch_free_encoded_pages mm/mmu_gather.c:136 [inline] tlb_batch_pages_flush mm/mmu_gather.c:149 [inline] tlb_flush_mmu_free mm/mmu_gather.c:366 [inline] tlb_flush_mmu+0x3a3/0x680 mm/mmu_gather.c:373 tlb_finish_mmu+0xd4/0x200 mm/mmu_gather.c:465 exit_mmap+0x496/0xc20 mm/mmap.c:1681 __mmput+0x115/0x3c0 kernel/fork.c:1348 exit_mm+0x220/0x310 kernel/exit.c:570 do_exit+0x9ad/0x28e0 kernel/exit.c:925 do_group_exit+0x207/0x2c0 kernel/exit.c:1087 get_signal+0x16b2/0x1750 kernel/signal.c:3017 arch_do_signal_or_restart+0x96/0x860 arch/x86/kernel/signal.c:337 exit_to_user_mode_loop kernel/entry/common.c:111 [inline] exit_to_user_mode_prepare include/linux/entry-common.h:329 [inline] __syscall_exit_to_user_mode_work kernel/entry/common.c:207 [inline] syscall_exit_to_user_mode+0xce/0x340 kernel/entry/common.c:218 do_syscall_64+0x100/0x230 arch/x86/entry/common.c:89 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f42c817bf97 RSP: 002b:00007f42c849fd90 EFLAGS: 00000293 ORIG_RAX: 000000000000003d RAX: fffffffffffffe00 RBX: 0000000000000094 RCX: 00007f42c817bf97 RDX: 0000000040000000 RSI: 00007f42c849fdec RDI: 00000000ffffffff RBP: 00007f42c849fdec R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000005 R13: 0000555563436590 R14: 00007f42c849fe40 R15: 000000000000002f rcu: rcu_preempt kthread starved for 1666 jiffies! g24137 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=0 rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. rcu: RCU grace-period kthread stack dump: task:rcu_preempt state:R running task stack:26264 pid:17 tgid:17 ppid:2 flags:0x00004000 Call Trace: context_switch kernel/sched/core.c:5369 [inline] __schedule+0x1850/0x4c30 kernel/sched/core.c:6756 __schedule_loop kernel/sched/core.c:6833 [inline] schedule+0x14b/0x320 kernel/sched/core.c:6848 schedule_timeout+0x15a/0x290 kernel/time/sleep_timeout.c:99 rcu_gp_fqs_loop+0x2df/0x1330 kernel/rcu/tree.c:2045 rcu_gp_kthread+0xa7/0x3b0 kernel/rcu/tree.c:2247 kthread+0x2f0/0x390 kernel/kthread.c:389 ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 rcu: Stack dump where RCU GP kthread last ran: Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 5822 Comm: syz-executor Not tainted 6.13.0-rc5-syzkaller-00004-gccb98ccef0e5 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 RIP: 0010:kasan_check_range+0x1b8/0x290 mm/kasan/generic.c:189 Code: 4d 01 fb 48 8d 5d 07 48 85 ed 48 0f 49 dd 48 83 e3 f8 48 29 dd 74 12 41 80 3b 00 0f 85 a6 00 00 00 49 ff c3 48 ff cd 75 ee 5b <41> 5c 41 5e 41 5f 5d c3 cc cc cc cc 40 84 ed 75 5f f7 c5 00 ff 00 RSP: 0018:ffffc90003fa7348 EFLAGS: 00000056 RAX: 0000000000000001 RBX: 0000000000000021 RCX: ffffffff817ac174 RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffffffff942a4880 RBP: 0000000000000000 R08: ffffffff942a4887 R09: 1ffffffff2854910 R10: dffffc0000000000 R11: fffffbfff2854911 R12: ffff8880250ce4c4 R13: ffff8880250cda00 R14: dffffc0000000001 R15: fffffbfff2854911 FS: 000055555b732500(0000) GS:ffff8880b8600000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f63ea200218 CR3: 00000000327b0000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: instrument_atomic_read include/linux/instrumented.h:68 [inline] _test_bit include/asm-generic/bitops/instrumented-non-atomic.h:141 [inline] __lock_acquire+0xc94/0x2100 kernel/locking/lockdep.c:5196 lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5849 rcu_lock_acquire include/linux/rcupdate.h:337 [inline] rcu_read_lock include/linux/rcupdate.h:849 [inline] page_ext_get+0x3d/0x2a0 mm/page_ext.c:525 __page_table_check_zero+0xb1/0x350 mm/page_table_check.c:148 page_table_check_free include/linux/page_table_check.h:41 [inline] free_pages_prepare mm/page_alloc.c:1128 [inline] free_unref_page+0xd53/0x1010 mm/page_alloc.c:2659 discard_slab mm/slub.c:2688 [inline] __put_partials+0x160/0x1c0 mm/slub.c:3157 put_cpu_partial+0x17c/0x250 mm/slub.c:3232 __slab_free+0x290/0x380 mm/slub.c:4483 qlink_free mm/kasan/quarantine.c:163 [inline] qlist_free_all+0x9a/0x140 mm/kasan/quarantine.c:179 kasan_quarantine_reduce+0x14f/0x170 mm/kasan/quarantine.c:286 __kasan_slab_alloc+0x23/0x80 mm/kasan/common.c:329 kasan_slab_alloc include/linux/kasan.h:250 [inline] slab_post_alloc_hook mm/slub.c:4119 [inline] slab_alloc_node mm/slub.c:4168 [inline] __do_kmalloc_node mm/slub.c:4297 [inline] __kmalloc_noprof+0x236/0x4c0 mm/slub.c:4310 kmalloc_noprof include/linux/slab.h:905 [inline] kzalloc_noprof include/linux/slab.h:1037 [inline] lsm_blob_alloc security/security.c:684 [inline] lsm_cred_alloc security/security.c:701 [inline] security_prepare_creds+0x53/0x360 security/security.c:3232 prepare_creds+0x467/0x640 kernel/cred.c:242 copy_creds+0x109/0x9c0 kernel/cred.c:312 copy_process+0x9df/0x3d50 kernel/fork.c:2258 kernel_clone+0x226/0x8e0 kernel/fork.c:2806 __do_sys_clone3 kernel/fork.c:3110 [inline] __se_sys_clone3+0x2d8/0x360 kernel/fork.c:3089 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f63ee7ba589 Code: 1b 08 00 48 8d 3d fc 1b 08 00 e8 12 29 f6 ff 66 90 b8 ea ff ff ff 48 85 ff 74 2c 48 85 d2 74 27 49 89 c8 b8 b3 01 00 00 0f 05 <48> 85 c0 7c 18 74 01 c3 31 ed 48 83 e4 f0 4c 89 c7 ff d2 48 89 c7 RSP: 002b:00007ffef30021d8 EFLAGS: 00000206 ORIG_RAX: 00000000000001b3 RAX: ffffffffffffffda RBX: 00007f63ee783f30 RCX: 00007f63ee7ba589 RDX: 00007f63ee783f30 RSI: 0000000000000058 RDI: 00007ffef3002240 RBP: 00007ffef30022a0 R08: 00007ffef30022a0 R09: 0000000000000000 R10: 0000000000000008 R11: 0000000000000206 R12: ffffffffffffffa8 R13: 0000000000000009 R14: 00007ffef3002240 R15: 00007ffef3002710 net_ratelimit: 19918 callbacks suppressed bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:51:d4:c3:ae:26, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:51:d4:c3:ae:26, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:51:d4:c3:ae:26, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:51:d4:c3:ae:26, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:51:d4:c3:ae:26, vlan:0) net_ratelimit: 22452 callbacks suppressed bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:51:d4:c3:ae:26, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:51:d4:c3:ae:26, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:51:d4:c3:ae:26, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:51:d4:c3:ae:26, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:51:d4:c3:ae:26, vlan:0)