bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: rcu: Tasks blocked on level-0 rcu_node (CPUs 0-1): P5182/1:b..l rcu: (detected by 0, t=10503 jiffies, g=324729, q=1999 ncpus=2) task:jbd2/sda1-8 state:R running task stack:23984 pid:5182 tgid:5182 ppid:2 flags:0x00004000 Call Trace: context_switch kernel/sched/core.c:5369 [inline] __schedule+0x1850/0x4c30 kernel/sched/core.c:6756 preempt_schedule_irq+0xfb/0x1c0 kernel/sched/core.c:7078 irqentry_exit+0x5e/0x90 kernel/entry/common.c:354 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702 RIP: 0010:blk_mq_update_dispatch_busy block/blk-mq.c:1985 [inline] RIP: 0010:blk_mq_dispatch_rq_list+0x1571/0x19d0 block/blk-mq.c:2208 Code: 8b 04 25 28 00 00 00 48 3b 84 24 00 01 00 00 0f 85 62 04 00 00 89 c8 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc 2a 73 f3 fc b1 01 eb af 48 8d 58 d8 49 89 dd 49 c1 ed 03 43 0f RSP: 0018:ffffc900104df240 EFLAGS: 00000246 RAX: 0000000000000000 RBX: ffffc900104df401 RCX: ffff888033a29e00 RDX: ffff888033a29e00 RSI: 0000000000000000 RDI: 0000000000000000 RBP: ffffc900104df390 R08: ffffffff84a17189 R09: ffffffff84a16c2d R10: 0000000000000003 R11: ffff888033a29e00 R12: ffffc900104df4c0 R13: ffff888025fdb988 R14: 0000000000000000 R15: dffffc0000000000 __blk_mq_do_dispatch_sched block/blk-mq-sched.c:170 [inline] blk_mq_do_dispatch_sched block/blk-mq-sched.c:184 [inline] __blk_mq_sched_dispatch_requests+0xb8a/0x1840 block/blk-mq-sched.c:309 blk_mq_sched_dispatch_requests+0xd6/0x190 block/blk-mq-sched.c:331 blk_mq_run_hw_queue+0x414/0x500 block/blk-mq.c:2354 blk_mq_flush_plug_list+0x118e/0x1870 block/blk-mq.c:2915 __blk_flush_plug+0x420/0x500 block/blk-core.c:1213 blk_finish_plug+0x5e/0x80 block/blk-core.c:1240 jbd2_journal_commit_transaction+0x3400/0x66d0 fs/jbd2/commit.c:790 kjournald2+0x41c/0x7b0 fs/jbd2/journal.c:201 kthread+0x2f0/0x390 kernel/kthread.c:389 ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 rcu: rcu_preempt kthread starved for 10335 jiffies! g324729 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=0 rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. rcu: RCU grace-period kthread stack dump: task:rcu_preempt state:R running task stack:25720 pid:17 tgid:17 ppid:2 flags:0x00004000 Call Trace: context_switch kernel/sched/core.c:5369 [inline] __schedule+0x1850/0x4c30 kernel/sched/core.c:6756 __schedule_loop kernel/sched/core.c:6833 [inline] schedule+0x14b/0x320 kernel/sched/core.c:6848 schedule_timeout+0x15a/0x290 kernel/time/sleep_timeout.c:99 rcu_gp_fqs_loop+0x2df/0x1330 kernel/rcu/tree.c:2045 rcu_gp_kthread+0xa7/0x3b0 kernel/rcu/tree.c:2247 kthread+0x2f0/0x390 kernel/kthread.c:389 ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 rcu: Stack dump where RCU GP kthread last ran: CPU: 0 UID: 0 PID: 16 Comm: ksoftirqd/0 Not tainted 6.12.0-syzkaller-01782-gbf9aa14fc523 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 RIP: 0010:nearest_obj mm/slab.h:326 [inline] RIP: 0010:check_slab_allocation+0x74/0x110 mm/kasan/common.c:219 Code: 00 00 f5 48 0f 44 f0 48 89 f0 48 c1 e0 06 48 b9 00 00 00 00 80 08 05 00 48 01 c1 48 89 d8 48 29 c8 41 8b 7f 18 48 99 48 f7 ff <48> 89 d8 48 29 d0 0f b7 76 2a 81 e6 ff 7f 00 00 ff ce 0f af f7 48 RSP: 0018:ffffc900001564b0 EFLAGS: 00000206 RAX: 000000000000000e RBX: ffff88814e513e00 RCX: ffff88814e513000 RDX: 0000000000000000 RSI: ffffea00053944c0 RDI: 0000000000000100 RBP: 0000000000212110 R08: ffffffff81430f9c R09: 1ffffffff203b5ae R10: dffffc0000000000 R11: fffffbfff203b5af R12: ffff88801e689b5c R13: ffffea00053944c0 R14: ffffffff8a9d464b R15: ffff88801e689b40 FS: 0000000000000000(0000) GS:ffff8880b8600000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000561bb0c2fd88 CR3: 000000007e98c000 CR4: 00000000003526f0 DR0: fffffffffffffffe DR1: 0000000000000000 DR2: 0000000080000000 DR3: 0000000020000004 DR6: 00000000ffff0ff0 DR7: 0000000000000400 Call Trace: kasan_slab_pre_free include/linux/kasan.h:195 [inline] slab_free_hook mm/slub.c:2287 [inline] slab_free mm/slub.c:4579 [inline] kmem_cache_free+0x14c/0x420 mm/slub.c:4681 skb_ext_del include/linux/skbuff.h:4843 [inline] nf_bridge_info_free net/bridge/br_netfilter_hooks.c:156 [inline] br_nf_dev_queue_xmit+0x4cb/0x2390 net/bridge/br_netfilter_hooks.c:879 NF_HOOK+0x700/0x7c0 include/linux/netfilter.h:314 br_nf_post_routing+0xa20/0xe80 net/bridge/br_netfilter_hooks.c:994 nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline] nf_hook_slow+0xc3/0x220 net/netfilter/core.c:626 nf_hook include/linux/netfilter.h:269 [inline] NF_HOOK+0x2a7/0x460 include/linux/netfilter.h:312 br_forward_finish+0xd8/0x130 net/bridge/br_forward.c:66 br_nf_forward_finish+0xb49/0xfb0 net/bridge/br_netfilter_hooks.c:690 NF_HOOK+0x700/0x7c0 include/linux/netfilter.h:314 br_nf_forward_ip+0x61e/0x7b0 net/bridge/br_netfilter_hooks.c:744 nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline] nf_hook_slow+0xc3/0x220 net/netfilter/core.c:626 nf_hook include/linux/netfilter.h:269 [inline] NF_HOOK+0x2a7/0x460 include/linux/netfilter.h:312 __br_forward+0x489/0x660 net/bridge/br_forward.c:115 br_handle_frame_finish+0x18ba/0x1fe0 net/bridge/br_input.c:215 br_nf_hook_thresh+0x472/0x590 br_nf_pre_routing_finish_ipv6+0xaa0/0xdd0 NF_HOOK include/linux/netfilter.h:314 [inline] br_nf_pre_routing_ipv6+0x379/0x770 net/bridge/br_netfilter_ipv6.c:184 nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline] nf_hook_bridge_pre net/bridge/br_input.c:277 [inline] br_handle_frame+0x9fd/0x1530 net/bridge/br_input.c:424 __netif_receive_skb_core+0x13e8/0x4570 net/core/dev.c:5564 __netif_receive_skb_one_core net/core/dev.c:5668 [inline] __netif_receive_skb+0x12f/0x650 net/core/dev.c:5783 process_backlog+0x662/0x15b0 net/core/dev.c:6115 __napi_poll+0xcb/0x490 net/core/dev.c:6779 napi_poll net/core/dev.c:6848 [inline] net_rx_action+0x89b/0x1240 net/core/dev.c:6970 handle_softirqs+0x2c5/0x980 kernel/softirq.c:554 run_ksoftirqd+0xca/0x130 kernel/softirq.c:943 smpboot_thread_fn+0x544/0xa30 kernel/smpboot.c:164 kthread+0x2f0/0x390 kernel/kthread.c:389 ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)