bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:4f:79:92:45:56, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) rcu: INFO: rcu_sched self-detected stall on CPU rcu: 0-....: (10438 ticks this GP) idle=eee/1/0x4000000000000004 softirq=42260/42453 fqs=2693 rcu: (t=10500 jiffies g=2501 q=2) NMI backtrace for cpu 0 CPU: 0 PID: 16331 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1fc/0x2ef lib/dump_stack.c:118 nmi_cpu_backtrace.cold+0x63/0xa2 lib/nmi_backtrace.c:101 nmi_trigger_cpumask_backtrace+0x1a6/0x1f0 lib/nmi_backtrace.c:62 trigger_single_cpu_backtrace include/linux/nmi.h:164 [inline] rcu_dump_cpu_stacks+0x15f/0x19c kernel/rcu/tree.c:1340 print_cpu_stall kernel/rcu/tree.c:1478 [inline] check_cpu_stall kernel/rcu/tree.c:1550 [inline] __rcu_pending kernel/rcu/tree.c:3293 [inline] rcu_pending kernel/rcu/tree.c:3336 [inline] rcu_check_callbacks.cold+0x62d/0xe19 kernel/rcu/tree.c:2682 update_process_times+0x2a/0x70 kernel/time/timer.c:1650 tick_sched_handle+0x9b/0x180 kernel/time/tick-sched.c:168 tick_sched_timer+0xfc/0x290 kernel/time/tick-sched.c:1278 __run_hrtimer kernel/time/hrtimer.c:1465 [inline] __hrtimer_run_queues+0x3f6/0xe60 kernel/time/hrtimer.c:1527 hrtimer_interrupt+0x326/0x9e0 kernel/time/hrtimer.c:1585 local_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1071 [inline] smp_apic_timer_interrupt+0x10c/0x550 arch/x86/kernel/apic/apic.c:1096 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:894 RIP: 0010:preempt_count_add+0x85/0x190 kernel/sched/core.c:3238 Code: c3 03 65 01 2d cc 70 c0 7e 0f b6 04 02 38 c3 7c 08 84 c0 0f 85 da 00 00 00 8b 15 c6 c8 e2 0b 85 d2 75 11 65 8b 05 ab 70 c0 7e <0f> b6 c0 3d f4 00 00 00 7f 64 65 8b 05 9a 70 c0 7e 25 ff ff ff 7f RSP: 0018:ffff8880ba006e60 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13 RAX: 0000000000000102 RBX: 0000000000000003 RCX: 0000000000000000 RDX: 0000000000000000 RSI: ffff8880ba006e08 RDI: 0000000000000001 RBP: 0000000000000001 R08: 0000000000000001 R09: 0000000000000001 R10: ffff8880ba007007 R11: 0000000000074071 R12: ffff8880ba006ff0 R13: 0000000000000000 R14: ffff8880ba006fa8 R15: 0000000000000028 unwind_next_frame+0x135/0x1400 arch/x86/kernel/unwind_orc.c:407 __save_stack_trace+0x9f/0x190 arch/x86/kernel/stacktrace.c:44 save_stack mm/kasan/kasan.c:448 [inline] set_track mm/kasan/kasan.c:460 [inline] kasan_kmalloc+0xeb/0x160 mm/kasan/kasan.c:553 kmem_cache_alloc_trace+0x12f/0x380 mm/slab.c:3625 kmalloc include/linux/slab.h:515 [inline] kzalloc include/linux/slab.h:709 [inline] nf_bridge_alloc include/net/netfilter/br_netfilter.h:9 [inline] nf_bridge_unshare net/bridge/br_netfilter_hooks.c:154 [inline] br_nf_forward_ip+0x34d/0x15e0 net/bridge/br_netfilter_hooks.c:577 nf_hook_entry_hookfn include/linux/netfilter.h:119 [inline] nf_hook_slow+0xc5/0x1e0 net/netfilter/core.c:511 nf_hook include/linux/netfilter.h:244 [inline] NF_HOOK include/linux/netfilter.h:287 [inline] __br_forward+0x354/0xae0 net/bridge/br_forward.c:113 deliver_clone net/bridge/br_forward.c:129 [inline] maybe_deliver+0x292/0x380 net/bridge/br_forward.c:184 br_flood+0x158/0x4d0 net/bridge/br_forward.c:226 br_handle_frame_finish+0xf41/0x1410 net/bridge/br_input.c:167 br_nf_hook_thresh+0x2a3/0x330 net/bridge/br_netfilter_hooks.c:1014 br_nf_pre_routing_finish_ipv6+0x6e3/0xd40 net/bridge/br_netfilter_ipv6.c:210 NF_HOOK include/linux/netfilter.h:289 [inline] br_nf_pre_routing_ipv6+0x3f4/0x860 net/bridge/br_netfilter_ipv6.c:240 br_nf_pre_routing+0xf05/0x1500 net/bridge/br_netfilter_hooks.c:494 nf_hook_entry_hookfn include/linux/netfilter.h:119 [inline] nf_hook_slow+0xc5/0x1e0 net/netfilter/core.c:511 nf_hook include/linux/netfilter.h:244 [inline] NF_HOOK include/linux/netfilter.h:287 [inline] br_handle_frame+0xa60/0x13b0 net/bridge/br_input.c:306 __netif_receive_skb_core+0x929/0x3270 net/core/dev.c:4876 __netif_receive_skb_one_core+0xae/0x180 net/core/dev.c:4952 __netif_receive_skb+0x27/0x1c0 net/core/dev.c:5066 process_backlog+0x241/0x700 net/core/dev.c:5849 napi_poll net/core/dev.c:6280 [inline] net_rx_action+0x4ac/0xfb0 net/core/dev.c:6346 __do_softirq+0x265/0x980 kernel/softirq.c:292 invoke_softirq kernel/softirq.c:372 [inline] irq_exit+0x215/0x260 kernel/softirq.c:412 exiting_irq arch/x86/include/asm/apic.h:536 [inline] smp_apic_timer_interrupt+0x136/0x550 arch/x86/kernel/apic/apic.c:1098 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:894 RIP: 0010:unlock_page_memcg+0x0/0x30 mm/memcontrol.c:1964 Code: 00 00 00 e8 82 8a 7a 06 e9 5a ff ff ff e8 68 9c f9 ff e9 3e ff ff ff e8 5e 9c f9 ff eb c1 66 66 2e 0f 1f 84 00 00 00 00 00 90 <48> b8 00 00 00 00 00 fc ff df 53 48 89 fb 48 83 c7 38 48 89 fa 48 RSP: 0018:ffff888045767738 EFLAGS: 00000282 ORIG_RAX: ffffffffffffff13 RAX: ffff88804bafc640 RBX: 0000000000000000 RCX: ffffffff818fb155 RDX: 0000000000000000 RSI: ffffffff818fb11a RDI: ffffea0002626440 RBP: ffffea0002626440 R08: 0000000000000001 R09: 0000000000000000 R10: 0000000000000001 R11: 0000000000000000 R12: 0000000000000000 R13: 0000000000000000 R14: dead000000000100 R15: 00007fa4264b8000 page_remove_rmap+0xe5/0x120 mm/rmap.c:1297 zap_pte_range mm/memory.c:1350 [inline] zap_pmd_range mm/memory.c:1463 [inline] zap_pud_range mm/memory.c:1492 [inline] zap_p4d_range mm/memory.c:1513 [inline] unmap_page_range+0x147d/0x2c50 mm/memory.c:1534 unmap_single_vma+0x198/0x300 mm/memory.c:1579 unmap_vmas+0xa9/0x180 mm/memory.c:1609 exit_mmap+0x2b9/0x530 mm/mmap.c:3093 __mmput kernel/fork.c:1016 [inline] mmput+0x14e/0x4a0 kernel/fork.c:1037 exit_mm kernel/exit.c:549 [inline] do_exit+0xaec/0x2be0 kernel/exit.c:857 do_group_exit+0x125/0x310 kernel/exit.c:967 get_signal+0x3f2/0x1f70 kernel/signal.c:2589 do_signal+0x8f/0x1670 arch/x86/kernel/signal.c:799 exit_to_usermode_loop+0x204/0x2a0 arch/x86/entry/common.c:163 prepare_exit_to_usermode arch/x86/entry/common.c:198 [inline] syscall_return_slowpath arch/x86/entry/common.c:271 [inline] do_syscall_64+0x538/0x620 arch/x86/entry/common.c:296 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7fa4275f4ae9 Code: Bad RIP value. RSP: 002b:00007fa424b6a218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca RAX: fffffffffffffe00 RBX: 00007fa427707f68 RCX: 00007fa4275f4ae9 RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007fa427707f68 RBP: 00007fa427707f60 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa427707f6c R13: 00007ffeba33a42f R14: 00007fa424b6a300 R15: 0000000000022000 bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:4f:79:92:45:56, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) net_ratelimit: 7737 callbacks suppressed bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:4f:79:92:45:56, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:4f:79:92:45:56, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:4f:79:92:45:56, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) net_ratelimit: 13081 callbacks suppressed bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:4f:79:92:45:56, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:4f:79:92:45:56, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) ---------------- Code disassembly (best guess): 0: c3 retq 1: 03 65 01 add 0x1(%rbp),%esp 4: 2d cc 70 c0 7e sub $0x7ec070cc,%eax 9: 0f b6 04 02 movzbl (%rdx,%rax,1),%eax d: 38 c3 cmp %al,%bl f: 7c 08 jl 0x19 11: 84 c0 test %al,%al 13: 0f 85 da 00 00 00 jne 0xf3 19: 8b 15 c6 c8 e2 0b mov 0xbe2c8c6(%rip),%edx # 0xbe2c8e5 1f: 85 d2 test %edx,%edx 21: 75 11 jne 0x34 23: 65 8b 05 ab 70 c0 7e mov %gs:0x7ec070ab(%rip),%eax # 0x7ec070d5 * 2a: 0f b6 c0 movzbl %al,%eax <-- trapping instruction 2d: 3d f4 00 00 00 cmp $0xf4,%eax 32: 7f 64 jg 0x98 34: 65 8b 05 9a 70 c0 7e mov %gs:0x7ec0709a(%rip),%eax # 0x7ec070d5 3b: 25 ff ff ff 7f and $0x7fffffff,%eax