bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
rcu: INFO: rcu_preempt detected stalls on CPUs/tasks:
rcu: Tasks blocked on level-0 rcu_node (CPUs 0-1): P5182/1:b..l
rcu: (detected by 0, t=10503 jiffies, g=324729, q=1999 ncpus=2)
task:jbd2/sda1-8 state:R running task stack:23984 pid:5182 tgid:5182 ppid:2 flags:0x00004000
Call Trace:
context_switch kernel/sched/core.c:5369 [inline]
__schedule+0x1850/0x4c30 kernel/sched/core.c:6756
preempt_schedule_irq+0xfb/0x1c0 kernel/sched/core.c:7078
irqentry_exit+0x5e/0x90 kernel/entry/common.c:354
asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702
RIP: 0010:blk_mq_update_dispatch_busy block/blk-mq.c:1985 [inline]
RIP: 0010:blk_mq_dispatch_rq_list+0x1571/0x19d0 block/blk-mq.c:2208
Code: 8b 04 25 28 00 00 00 48 3b 84 24 00 01 00 00 0f 85 62 04 00 00 89 c8 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc 2a 73 f3 fc b1 01 eb af 48 8d 58 d8 49 89 dd 49 c1 ed 03 43 0f
RSP: 0018:ffffc900104df240 EFLAGS: 00000246
RAX: 0000000000000000 RBX: ffffc900104df401 RCX: ffff888033a29e00
RDX: ffff888033a29e00 RSI: 0000000000000000 RDI: 0000000000000000
RBP: ffffc900104df390 R08: ffffffff84a17189 R09: ffffffff84a16c2d
R10: 0000000000000003 R11: ffff888033a29e00 R12: ffffc900104df4c0
R13: ffff888025fdb988 R14: 0000000000000000 R15: dffffc0000000000
__blk_mq_do_dispatch_sched block/blk-mq-sched.c:170 [inline]
blk_mq_do_dispatch_sched block/blk-mq-sched.c:184 [inline]
__blk_mq_sched_dispatch_requests+0xb8a/0x1840 block/blk-mq-sched.c:309
blk_mq_sched_dispatch_requests+0xd6/0x190 block/blk-mq-sched.c:331
blk_mq_run_hw_queue+0x414/0x500 block/blk-mq.c:2354
blk_mq_flush_plug_list+0x118e/0x1870 block/blk-mq.c:2915
__blk_flush_plug+0x420/0x500 block/blk-core.c:1213
blk_finish_plug+0x5e/0x80 block/blk-core.c:1240
jbd2_journal_commit_transaction+0x3400/0x66d0 fs/jbd2/commit.c:790
kjournald2+0x41c/0x7b0 fs/jbd2/journal.c:201
kthread+0x2f0/0x390 kernel/kthread.c:389
ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
rcu: rcu_preempt kthread starved for 10335 jiffies! g324729 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=0
rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior.
rcu: RCU grace-period kthread stack dump:
task:rcu_preempt state:R running task stack:25720 pid:17 tgid:17 ppid:2 flags:0x00004000
Call Trace:
context_switch kernel/sched/core.c:5369 [inline]
__schedule+0x1850/0x4c30 kernel/sched/core.c:6756
__schedule_loop kernel/sched/core.c:6833 [inline]
schedule+0x14b/0x320 kernel/sched/core.c:6848
schedule_timeout+0x15a/0x290 kernel/time/sleep_timeout.c:99
rcu_gp_fqs_loop+0x2df/0x1330 kernel/rcu/tree.c:2045
rcu_gp_kthread+0xa7/0x3b0 kernel/rcu/tree.c:2247
kthread+0x2f0/0x390 kernel/kthread.c:389
ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
rcu: Stack dump where RCU GP kthread last ran:
CPU: 0 UID: 0 PID: 16 Comm: ksoftirqd/0 Not tainted 6.12.0-syzkaller-01782-gbf9aa14fc523 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024
RIP: 0010:nearest_obj mm/slab.h:326 [inline]
RIP: 0010:check_slab_allocation+0x74/0x110 mm/kasan/common.c:219
Code: 00 00 f5 48 0f 44 f0 48 89 f0 48 c1 e0 06 48 b9 00 00 00 00 80 08 05 00 48 01 c1 48 89 d8 48 29 c8 41 8b 7f 18 48 99 48 f7 ff <48> 89 d8 48 29 d0 0f b7 76 2a 81 e6 ff 7f 00 00 ff ce 0f af f7 48
RSP: 0018:ffffc900001564b0 EFLAGS: 00000206
RAX: 000000000000000e RBX: ffff88814e513e00 RCX: ffff88814e513000
RDX: 0000000000000000 RSI: ffffea00053944c0 RDI: 0000000000000100
RBP: 0000000000212110 R08: ffffffff81430f9c R09: 1ffffffff203b5ae
R10: dffffc0000000000 R11: fffffbfff203b5af R12: ffff88801e689b5c
R13: ffffea00053944c0 R14: ffffffff8a9d464b R15: ffff88801e689b40
FS: 0000000000000000(0000) GS:ffff8880b8600000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000561bb0c2fd88 CR3: 000000007e98c000 CR4: 00000000003526f0
DR0: fffffffffffffffe DR1: 0000000000000000 DR2: 0000000080000000
DR3: 0000000020000004 DR6: 00000000ffff0ff0 DR7: 0000000000000400
Call Trace:
kasan_slab_pre_free include/linux/kasan.h:195 [inline]
slab_free_hook mm/slub.c:2287 [inline]
slab_free mm/slub.c:4579 [inline]
kmem_cache_free+0x14c/0x420 mm/slub.c:4681
skb_ext_del include/linux/skbuff.h:4843 [inline]
nf_bridge_info_free net/bridge/br_netfilter_hooks.c:156 [inline]
br_nf_dev_queue_xmit+0x4cb/0x2390 net/bridge/br_netfilter_hooks.c:879
NF_HOOK+0x700/0x7c0 include/linux/netfilter.h:314
br_nf_post_routing+0xa20/0xe80 net/bridge/br_netfilter_hooks.c:994
nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline]
nf_hook_slow+0xc3/0x220 net/netfilter/core.c:626
nf_hook include/linux/netfilter.h:269 [inline]
NF_HOOK+0x2a7/0x460 include/linux/netfilter.h:312
br_forward_finish+0xd8/0x130 net/bridge/br_forward.c:66
br_nf_forward_finish+0xb49/0xfb0 net/bridge/br_netfilter_hooks.c:690
NF_HOOK+0x700/0x7c0 include/linux/netfilter.h:314
br_nf_forward_ip+0x61e/0x7b0 net/bridge/br_netfilter_hooks.c:744
nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline]
nf_hook_slow+0xc3/0x220 net/netfilter/core.c:626
nf_hook include/linux/netfilter.h:269 [inline]
NF_HOOK+0x2a7/0x460 include/linux/netfilter.h:312
__br_forward+0x489/0x660 net/bridge/br_forward.c:115
br_handle_frame_finish+0x18ba/0x1fe0 net/bridge/br_input.c:215
br_nf_hook_thresh+0x472/0x590
br_nf_pre_routing_finish_ipv6+0xaa0/0xdd0
NF_HOOK include/linux/netfilter.h:314 [inline]
br_nf_pre_routing_ipv6+0x379/0x770 net/bridge/br_netfilter_ipv6.c:184
nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline]
nf_hook_bridge_pre net/bridge/br_input.c:277 [inline]
br_handle_frame+0x9fd/0x1530 net/bridge/br_input.c:424
__netif_receive_skb_core+0x13e8/0x4570 net/core/dev.c:5564
__netif_receive_skb_one_core net/core/dev.c:5668 [inline]
__netif_receive_skb+0x12f/0x650 net/core/dev.c:5783
process_backlog+0x662/0x15b0 net/core/dev.c:6115
__napi_poll+0xcb/0x490 net/core/dev.c:6779
napi_poll net/core/dev.c:6848 [inline]
net_rx_action+0x89b/0x1240 net/core/dev.c:6970
handle_softirqs+0x2c5/0x980 kernel/softirq.c:554
run_ksoftirqd+0xca/0x130 kernel/softirq.c:943
smpboot_thread_fn+0x544/0xa30 kernel/smpboot.c:164
kthread+0x2f0/0x390 kernel/kthread.c:389
ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)