bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
rcu: INFO: rcu_preempt detected stalls on CPUs/tasks:
rcu: Tasks blocked on level-0 rcu_node (CPUs 0-1): P8686/1:b..l
rcu: (detected by 1, t=10503 jiffies, g=27565, q=813 ncpus=2)
task:syz.3.1098 state:R running task stack:26272 pid:8686 tgid:8685 ppid:5235 flags:0x00000000
Call Trace:
context_switch kernel/sched/core.c:5328 [inline]
__schedule+0x18af/0x4bd0 kernel/sched/core.c:6690
preempt_schedule_irq+0xfb/0x1c0 kernel/sched/core.c:7012
irqentry_exit+0x5e/0x90 kernel/entry/common.c:354
asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702
RIP: 0010:__nr_to_section include/linux/mmzone.h:1881 [inline]
RIP: 0010:__pfn_to_section include/linux/mmzone.h:1989 [inline]
RIP: 0010:lookup_page_ext mm/page_ext.c:251 [inline]
RIP: 0010:page_ext_get+0x138/0x2a0 mm/page_ext.c:526
Code: 44 9a e8 0b 39 f3 ff 48 8b 05 24 6b 39 18 48 85 c0 74 41 4c 89 e1 48 c1 e9 16 48 8d 1c c8 48 89 d8 48 c1 e8 03 42 80 3c 38 00 <74> 08 48 89 df e8 de 38 f3 ff 48 8b 1b 48 85 db 74 1f 4c 89 e5 48
RSP: 0018:ffffc90004e87210 EFLAGS: 00000246
RAX: 1ffff11047ffdea8 RBX: ffff88823ffef540 RCX: 0000000000000000
RDX: ffffc90009221000 RSI: 00000000021ff9c0 RDI: 000000ffffffffc0
RBP: 000000ffffffffc0 R08: ffffffff820b7bee R09: 1ffffffff285d100
R10: dffffc0000000000 R11: fffffbfff285d101 R12: 0000000000087fe7
R13: 0000000000000001 R14: ffffffff820b7b20 R15: dffffc0000000000
__set_page_owner+0x9e/0x800 mm/page_owner.c:322
set_page_owner include/linux/page_owner.h:32 [inline]
post_alloc_hook+0x1f3/0x230 mm/page_alloc.c:1537
prep_new_page mm/page_alloc.c:1545 [inline]
get_page_from_freelist+0x3123/0x3270 mm/page_alloc.c:3493
__alloc_pages_noprof+0x292/0x710 mm/page_alloc.c:4769
alloc_pages_mpol_noprof+0x3e8/0x680 mm/mempolicy.c:2265
folio_alloc_mpol_noprof+0x36/0x50 mm/mempolicy.c:2283
shmem_alloc_folio mm/shmem.c:1788 [inline]
shmem_alloc_and_add_folio+0x49b/0x13d0 mm/shmem.c:1827
shmem_get_folio_gfp+0x5a9/0x20a0 mm/shmem.c:2349
shmem_get_folio mm/shmem.c:2455 [inline]
shmem_write_begin+0x17e/0x460 mm/shmem.c:3060
generic_perform_write+0x344/0x6d0 mm/filemap.c:4056
shmem_file_write_iter+0xf9/0x120 mm/shmem.c:3235
new_sync_write fs/read_write.c:590 [inline]
vfs_write+0xa6d/0xc90 fs/read_write.c:683
ksys_write+0x183/0x2b0 fs/read_write.c:736
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f40fdd7cadf
RSP: 002b:00007f40febb3df0 EFLAGS: 00000293 ORIG_RAX: 0000000000000001
RAX: ffffffffffffffda RBX: 0000000000080000 RCX: 00007f40fdd7cadf
RDX: 0000000000080000 RSI: 00007f40f3400000 RDI: 0000000000000003
RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000546
R10: 00000000000003d2 R11: 0000000000000293 R12: 0000000000000003
R13: 00007f40febb3ef0 R14: 00007f40febb3eb0 R15: 00007f40f3400000
rcu: rcu_preempt kthread starved for 7946 jiffies! g27565 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=1
rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior.
rcu: RCU grace-period kthread stack dump:
task:rcu_preempt state:R running task stack:25296 pid:17 tgid:17 ppid:2 flags:0x00004000
Call Trace:
context_switch kernel/sched/core.c:5328 [inline]
__schedule+0x18af/0x4bd0 kernel/sched/core.c:6690
__schedule_loop kernel/sched/core.c:6767 [inline]
schedule+0x14b/0x320 kernel/sched/core.c:6782
schedule_timeout+0x15a/0x290 kernel/time/sleep_timeout.c:99
rcu_gp_fqs_loop+0x2df/0x1330 kernel/rcu/tree.c:2045
rcu_gp_kthread+0xa7/0x3b0 kernel/rcu/tree.c:2247
kthread+0x2f0/0x390 kernel/kthread.c:389
ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
rcu: Stack dump where RCU GP kthread last ran:
CPU: 1 UID: 0 PID: 52 Comm: kworker/1:1 Not tainted 6.12.0-rc3-next-20241015-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
Workqueue: events_power_efficient neigh_periodic_work
RIP: 0010:unwind_next_frame+0xadf/0x22d0 arch/x86/kernel/unwind_orc.c:581
Code: 03 42 0f b6 04 20 84 c0 0f 85 6a 16 00 00 48 89 d8 48 c1 e8 03 42 0f b6 04 20 84 c0 0f 85 7c 16 00 00 48 0f bf 02 48 01 04 24 <49> 8d 6f 01 48 8b 44 24 70 42 0f b6 04 20 84 c0 0f 85 39 11 00 00
RSP: 0018:ffffc90000a18230 EFLAGS: 00000286
RAX: 0000000000000060 RBX: ffffffff90a3c7eb RCX: ffffffff902e460c
RDX: ffffffff90a3c7ea RSI: ffffffff90a3c7ea RDI: 0000000000000001
RBP: ffffc90000a183b0 R08: 0000000000000001 R09: 0000000000000000
R10: ffffc90000a18360 R11: fffff52000143078 R12: dffffc0000000000
R13: ffffc90000a18360 R14: ffffc90000a18398 R15: ffffffff90a3c7ee
FS: 0000000000000000(0000) GS:ffff8880b8700000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007ffd21ecbc08 CR3: 000000005eee8000 CR4: 00000000003526f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
__unwind_start+0x59a/0x740 arch/x86/kernel/unwind_orc.c:760
unwind_start arch/x86/include/asm/unwind.h:64 [inline]
arch_stack_walk+0xe5/0x150 arch/x86/kernel/stacktrace.c:24
stack_trace_save+0x118/0x1d0 kernel/stacktrace.c:122
kasan_save_stack mm/kasan/common.c:47 [inline]
kasan_save_track+0x3f/0x80 mm/kasan/common.c:68
kasan_save_free_info+0x40/0x50 mm/kasan/generic.c:582
poison_slab_object mm/kasan/common.c:247 [inline]
__kasan_slab_free+0x59/0x70 mm/kasan/common.c:264
kasan_slab_free include/linux/kasan.h:233 [inline]
slab_free_hook mm/slub.c:2329 [inline]
slab_free mm/slub.c:4588 [inline]
kmem_cache_free+0x1a2/0x440 mm/slub.c:4690
kfree_skb_reason include/linux/skbuff.h:1262 [inline]
kfree_skb include/linux/skbuff.h:1271 [inline]
ip6_mc_input+0xa1f/0xc30 net/ipv6/ip6_input.c:587
NF_HOOK+0x3a4/0x450 include/linux/netfilter.h:314
__netif_receive_skb_one_core net/core/dev.c:5668 [inline]
__netif_receive_skb+0x1ea/0x650 net/core/dev.c:5781
process_backlog+0x662/0x15b0 net/core/dev.c:6113
__napi_poll+0xcb/0x490 net/core/dev.c:6777
napi_poll net/core/dev.c:6846 [inline]
net_rx_action+0x89b/0x1240 net/core/dev.c:6968
handle_softirqs+0x2c5/0x980 kernel/softirq.c:554
do_softirq+0x11b/0x1e0 kernel/softirq.c:455
__local_bh_enable_ip+0x1bb/0x200 kernel/softirq.c:382
neigh_periodic_work+0xb35/0xd50 net/core/neighbour.c:1019
process_one_work kernel/workqueue.c:3229 [inline]
process_scheduled_works+0xa63/0x1850 kernel/workqueue.c:3310
worker_thread+0x870/0xd30 kernel/workqueue.c:3391
kthread+0x2f0/0x390 kernel/kthread.c:389
ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
net_ratelimit: 24760 callbacks suppressed
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)