bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
rcu: INFO: rcu_preempt detected stalls on CPUs/tasks:
rcu: Tasks blocked on level-0 rcu_node (CPUs 0-1):
P6787/1:b..l
rcu: (detected by 0, t=10505 jiffies, g=8921, q=1344 ncpus=2)
task:syz.1.255 state:R
running task stack:25552 pid:6787 tgid:6781 ppid:5830 flags:0x00004006
Call Trace:
context_switch kernel/sched/core.c:5369 [inline]
__schedule+0x1850/0x4c30 kernel/sched/core.c:6756
preempt_schedule_irq+0xfb/0x1c0 kernel/sched/core.c:7078
irqentry_exit+0x5e/0x90 kernel/entry/common.c:354
asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702
RIP: 0010:page_ext_data include/linux/page_ext.h:86 [inline]
RIP: 0010:get_page_table_check mm/page_table_check.c:56 [inline]
RIP: 0010:__page_table_check_zero+0x12e/0x350 mm/page_table_check.c:154
Code: fd 44 89 f1 48 d3 ed 31 ff 48 89 ee e8 6b 18 8e ff 48 85 ed 0f 85 e3 00 00 00 4d 85 e4 0f 84 37 01 00 00 48 8b 2d 02 be 95 0c <4c> 01 e5 48 89 ef be 04 00 00 00 e8 02 76 f4 ff 48 89 e8 48 c1 e8
RSP: 0018:ffffc9000405efd0 EFLAGS: 00000286
RAX: 0000000000000002 RBX: dffffc0000000000 RCX: ffff888033053c00
RDX: ffffc9000e72d000 RSI: 0000000000000000 RDI: 0000000000000000
RBP: 0000000000000048 R08: ffffffff82116065 R09: 1ffffffff20346be
R10: dffffc0000000000 R11: fffffbfff20346bf R12: ffff88801ed7bd30
R13: 1ffffffff34867dc R14: 0000000000000000 R15: 0000000000000000
page_table_check_free include/linux/page_table_check.h:41 [inline]
free_pages_prepare mm/page_alloc.c:1128 [inline]
free_unref_folios+0xe4d/0x18b0 mm/page_alloc.c:2704
folios_put_refs+0x76c/0x860 mm/swap.c:962
free_pages_and_swap_cache+0x2ea/0x690 mm/swap_state.c:332
__tlb_batch_free_encoded_pages mm/mmu_gather.c:136 [inline]
tlb_batch_pages_flush mm/mmu_gather.c:149 [inline]
tlb_flush_mmu_free mm/mmu_gather.c:366 [inline]
tlb_flush_mmu+0x3a3/0x680 mm/mmu_gather.c:373
tlb_finish_mmu+0xd4/0x200 mm/mmu_gather.c:465
vms_clear_ptes+0x437/0x530 mm/vma.c:1143
vms_clean_up_area mm/vma.c:1155 [inline]
__mmap_prepare mm/vma.c:2278 [inline]
__mmap_region+0xf99/0x2cd0 mm/vma.c:2443
mmap_region+0x226/0x2c0 mm/mmap.c:1348
do_mmap+0x8f0/0x1000 mm/mmap.c:496
vm_mmap_pgoff+0x1dd/0x3d0 mm/util.c:580
ksys_mmap_pgoff+0x53e/0x720 mm/mmap.c:542
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7ff4ea585d29
RSP: 002b:00007ff4eb3e8038 EFLAGS: 00000246 ORIG_RAX: 0000000000000009
RAX: ffffffffffffffda RBX: 00007ff4ea776160 RCX: 00007ff4ea585d29
RDX: 0000000000000003 RSI: 0000000000ff5000 RDI: 0000000020000000
RBP: 00007ff4ea601b08 R08: ffffffffffffffff R09: 0000000000000000
R10: 00020000000ec071 R11: 0000000000000246 R12: 0000000000000000
R13: 0000000000000001 R14: 00007ff4ea776160 R15: 00007fff822a2918
rcu: rcu_preempt kthread starved for 2158 jiffies! g8921 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=1
rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior.
rcu: RCU grace-period kthread stack dump:
task:rcu_preempt state:R running task stack:26264 pid:17 tgid:17 ppid:2 flags:0x00004000
Call Trace:
context_switch kernel/sched/core.c:5369 [inline]
__schedule+0x1850/0x4c30 kernel/sched/core.c:6756
__schedule_loop kernel/sched/core.c:6833 [inline]
schedule+0x14b/0x320 kernel/sched/core.c:6848
schedule_timeout+0x15a/0x290 kernel/time/sleep_timeout.c:99
rcu_gp_fqs_loop+0x2df/0x1330 kernel/rcu/tree.c:2045
rcu_gp_kthread+0xa7/0x3b0 kernel/rcu/tree.c:2247
kthread+0x2f0/0x390 kernel/kthread.c:389
ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
rcu: Stack dump where RCU GP kthread last ran:
Sending NMI from CPU 0 to CPUs 1:
NMI backtrace for cpu 1
CPU: 1 UID: 0 PID: 24 Comm: ksoftirqd/1 Not tainted 6.13.0-rc3-syzkaller-00762-g9268abe611b0 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
RIP: 0010:check_kcov_mode kernel/kcov.c:183 [inline]
RIP: 0010:write_comp_data kernel/kcov.c:246 [inline]
RIP: 0010:__sanitizer_cov_trace_cmp8+0x1f/0x90 kernel/kcov.c:294
Code: 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 4c 8b 04 24 65 48 8b 0c 25 00 d6 03 00 65 8b 05 a0 5f 64 7e 25 00 01 ff 00 74 10 <3d> 00 01 00 00 75 57 83 b9 1c 16 00 00 00 74 4e 8b 81 f8 15 00 00
RSP: 0018:ffffc900001e74b0 EFLAGS: 00000206
RAX: 0000000000000100 RBX: ffff888032a02130 RCX: ffff88801d2e0000
RDX: 0000000000000100 RSI: 0200000000000000 RDI: 1c0000ff01000000
RBP: 00000000000002ff R08: ffffffff8a7634c9 R09: 1ffffffff20346be
R10: dffffc0000000000 R11: fffffbfff20346bf R12: 0200000000000000
R13: ffff888032a02128 R14: 00000000000002ff R15: 1c0000ff01000000
FS: 0000000000000000(0000) GS:ffff8880b8700000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007ffd6e8d8b28 CR3: 000000003324c000 CR4: 00000000003526f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
ipv6_addr_equal include/net/ipv6.h:673 [inline]
ipv6_chk_mcast_addr+0x259/0x860 net/ipv6/mcast.c:1068
ip6_mc_input+0x500/0xc30 net/ipv6/ip6_input.c:521
NF_HOOK+0x3a4/0x450 include/linux/netfilter.h:314
__netif_receive_skb_one_core net/core/dev.c:5672 [inline]
__netif_receive_skb+0x1ea/0x650 net/core/dev.c:5785
process_backlog+0x662/0x15b0 net/core/dev.c:6117
__napi_poll+0xcb/0x490 net/core/dev.c:6883
napi_poll net/core/dev.c:6952 [inline]
net_rx_action+0x89b/0x1240 net/core/dev.c:7074
handle_softirqs+0x2d4/0x9b0 kernel/softirq.c:561
run_ksoftirqd+0xca/0x130 kernel/softirq.c:950
smpboot_thread_fn+0x544/0xa30 kernel/smpboot.c:164
kthread+0x2f0/0x390 kernel/kthread.c:389
ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
net_ratelimit: 39012 callbacks suppressed
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:2a:5c:37:59:bc:2c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:2a:5c:37:59:bc:2c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:2a:5c:37:59:bc:2c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
net_ratelimit: 43778 callbacks suppressed
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:2a:5c:37:59:bc:2c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)