bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: rcu: Tasks blocked on level-0 rcu_node (CPUs 0-1): P8686/1:b..l rcu: (detected by 1, t=10503 jiffies, g=27565, q=813 ncpus=2) task:syz.3.1098 state:R running task stack:26272 pid:8686 tgid:8685 ppid:5235 flags:0x00000000 Call Trace: context_switch kernel/sched/core.c:5328 [inline] __schedule+0x18af/0x4bd0 kernel/sched/core.c:6690 preempt_schedule_irq+0xfb/0x1c0 kernel/sched/core.c:7012 irqentry_exit+0x5e/0x90 kernel/entry/common.c:354 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702 RIP: 0010:__nr_to_section include/linux/mmzone.h:1881 [inline] RIP: 0010:__pfn_to_section include/linux/mmzone.h:1989 [inline] RIP: 0010:lookup_page_ext mm/page_ext.c:251 [inline] RIP: 0010:page_ext_get+0x138/0x2a0 mm/page_ext.c:526 Code: 44 9a e8 0b 39 f3 ff 48 8b 05 24 6b 39 18 48 85 c0 74 41 4c 89 e1 48 c1 e9 16 48 8d 1c c8 48 89 d8 48 c1 e8 03 42 80 3c 38 00 <74> 08 48 89 df e8 de 38 f3 ff 48 8b 1b 48 85 db 74 1f 4c 89 e5 48 RSP: 0018:ffffc90004e87210 EFLAGS: 00000246 RAX: 1ffff11047ffdea8 RBX: ffff88823ffef540 RCX: 0000000000000000 RDX: ffffc90009221000 RSI: 00000000021ff9c0 RDI: 000000ffffffffc0 RBP: 000000ffffffffc0 R08: ffffffff820b7bee R09: 1ffffffff285d100 R10: dffffc0000000000 R11: fffffbfff285d101 R12: 0000000000087fe7 R13: 0000000000000001 R14: ffffffff820b7b20 R15: dffffc0000000000 __set_page_owner+0x9e/0x800 mm/page_owner.c:322 set_page_owner include/linux/page_owner.h:32 [inline] post_alloc_hook+0x1f3/0x230 mm/page_alloc.c:1537 prep_new_page mm/page_alloc.c:1545 [inline] get_page_from_freelist+0x3123/0x3270 mm/page_alloc.c:3493 __alloc_pages_noprof+0x292/0x710 mm/page_alloc.c:4769 alloc_pages_mpol_noprof+0x3e8/0x680 mm/mempolicy.c:2265 folio_alloc_mpol_noprof+0x36/0x50 mm/mempolicy.c:2283 shmem_alloc_folio mm/shmem.c:1788 [inline] shmem_alloc_and_add_folio+0x49b/0x13d0 mm/shmem.c:1827 shmem_get_folio_gfp+0x5a9/0x20a0 mm/shmem.c:2349 shmem_get_folio mm/shmem.c:2455 [inline] shmem_write_begin+0x17e/0x460 mm/shmem.c:3060 generic_perform_write+0x344/0x6d0 mm/filemap.c:4056 shmem_file_write_iter+0xf9/0x120 mm/shmem.c:3235 new_sync_write fs/read_write.c:590 [inline] vfs_write+0xa6d/0xc90 fs/read_write.c:683 ksys_write+0x183/0x2b0 fs/read_write.c:736 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f40fdd7cadf RSP: 002b:00007f40febb3df0 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 RAX: ffffffffffffffda RBX: 0000000000080000 RCX: 00007f40fdd7cadf RDX: 0000000000080000 RSI: 00007f40f3400000 RDI: 0000000000000003 RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000546 R10: 00000000000003d2 R11: 0000000000000293 R12: 0000000000000003 R13: 00007f40febb3ef0 R14: 00007f40febb3eb0 R15: 00007f40f3400000 rcu: rcu_preempt kthread starved for 7946 jiffies! g27565 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=1 rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. rcu: RCU grace-period kthread stack dump: task:rcu_preempt state:R running task stack:25296 pid:17 tgid:17 ppid:2 flags:0x00004000 Call Trace: context_switch kernel/sched/core.c:5328 [inline] __schedule+0x18af/0x4bd0 kernel/sched/core.c:6690 __schedule_loop kernel/sched/core.c:6767 [inline] schedule+0x14b/0x320 kernel/sched/core.c:6782 schedule_timeout+0x15a/0x290 kernel/time/sleep_timeout.c:99 rcu_gp_fqs_loop+0x2df/0x1330 kernel/rcu/tree.c:2045 rcu_gp_kthread+0xa7/0x3b0 kernel/rcu/tree.c:2247 kthread+0x2f0/0x390 kernel/kthread.c:389 ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 rcu: Stack dump where RCU GP kthread last ran: CPU: 1 UID: 0 PID: 52 Comm: kworker/1:1 Not tainted 6.12.0-rc3-next-20241015-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Workqueue: events_power_efficient neigh_periodic_work RIP: 0010:unwind_next_frame+0xadf/0x22d0 arch/x86/kernel/unwind_orc.c:581 Code: 03 42 0f b6 04 20 84 c0 0f 85 6a 16 00 00 48 89 d8 48 c1 e8 03 42 0f b6 04 20 84 c0 0f 85 7c 16 00 00 48 0f bf 02 48 01 04 24 <49> 8d 6f 01 48 8b 44 24 70 42 0f b6 04 20 84 c0 0f 85 39 11 00 00 RSP: 0018:ffffc90000a18230 EFLAGS: 00000286 RAX: 0000000000000060 RBX: ffffffff90a3c7eb RCX: ffffffff902e460c RDX: ffffffff90a3c7ea RSI: ffffffff90a3c7ea RDI: 0000000000000001 RBP: ffffc90000a183b0 R08: 0000000000000001 R09: 0000000000000000 R10: ffffc90000a18360 R11: fffff52000143078 R12: dffffc0000000000 R13: ffffc90000a18360 R14: ffffc90000a18398 R15: ffffffff90a3c7ee FS: 0000000000000000(0000) GS:ffff8880b8700000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007ffd21ecbc08 CR3: 000000005eee8000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: __unwind_start+0x59a/0x740 arch/x86/kernel/unwind_orc.c:760 unwind_start arch/x86/include/asm/unwind.h:64 [inline] arch_stack_walk+0xe5/0x150 arch/x86/kernel/stacktrace.c:24 stack_trace_save+0x118/0x1d0 kernel/stacktrace.c:122 kasan_save_stack mm/kasan/common.c:47 [inline] kasan_save_track+0x3f/0x80 mm/kasan/common.c:68 kasan_save_free_info+0x40/0x50 mm/kasan/generic.c:582 poison_slab_object mm/kasan/common.c:247 [inline] __kasan_slab_free+0x59/0x70 mm/kasan/common.c:264 kasan_slab_free include/linux/kasan.h:233 [inline] slab_free_hook mm/slub.c:2329 [inline] slab_free mm/slub.c:4588 [inline] kmem_cache_free+0x1a2/0x440 mm/slub.c:4690 kfree_skb_reason include/linux/skbuff.h:1262 [inline] kfree_skb include/linux/skbuff.h:1271 [inline] ip6_mc_input+0xa1f/0xc30 net/ipv6/ip6_input.c:587 NF_HOOK+0x3a4/0x450 include/linux/netfilter.h:314 __netif_receive_skb_one_core net/core/dev.c:5668 [inline] __netif_receive_skb+0x1ea/0x650 net/core/dev.c:5781 process_backlog+0x662/0x15b0 net/core/dev.c:6113 __napi_poll+0xcb/0x490 net/core/dev.c:6777 napi_poll net/core/dev.c:6846 [inline] net_rx_action+0x89b/0x1240 net/core/dev.c:6968 handle_softirqs+0x2c5/0x980 kernel/softirq.c:554 do_softirq+0x11b/0x1e0 kernel/softirq.c:455 __local_bh_enable_ip+0x1bb/0x200 kernel/softirq.c:382 neigh_periodic_work+0xb35/0xd50 net/core/neighbour.c:1019 process_one_work kernel/workqueue.c:3229 [inline] process_scheduled_works+0xa63/0x1850 kernel/workqueue.c:3310 worker_thread+0x870/0xd30 kernel/workqueue.c:3391 kthread+0x2f0/0x390 kernel/kthread.c:389 ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 net_ratelimit: 24760 callbacks suppressed bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)