bridge0: received packet on team0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on team0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on team0 with own address as source address (addr:aa:aa:aa:aa:aa:1f, vlan:0) rcu: INFO: rcu_sched detected stalls on CPUs/tasks: rcu: 1-....: (10469 ticks this GP) idle=0fa/1/0x4000000000000002 softirq=67844/68015 fqs=2862 rcu: (detected by 0, t=10502 jiffies, g=6913, q=11) Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 PID: 27050 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:get_current arch/x86/include/asm/current.h:15 [inline] RIP: 0010:__sanitizer_cov_trace_pc+0x4/0x50 kernel/kcov.c:100 Code: e8 11 dd 35 00 e9 ab fe ff ff 4c 89 ef e8 04 dd 35 00 e9 23 fe ff ff 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 48 8b 34 24 <65> 48 8b 04 25 c0 df 01 00 65 8b 15 cc 59 9f 7e 81 e2 00 01 1f 00 RSP: 0018:ffff8880ba106c00 EFLAGS: 00000002 RAX: 0000000000000007 RBX: 0000000000000000 RCX: 0000000000000000 RDX: 0000000000000000 RSI: ffffffff83772099 RDI: ffffffff88671460 RBP: ffffffff88671460 R08: ffffffff8c665058 R09: 0000000000000000 R10: 0000000000000005 R11: ffffffff8c66505b R12: ffff88801c147698 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 FS: 00007ff02ce1a700(0000) GS:ffff8880ba100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00005567a4ee7e28 CR3: 0000000009e6d000 CR4: 00000000003406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: __this_cpu_preempt_check+0x9/0x20 lib/smp_processor_id.c:62 kvm_set_cpu_l1tf_flush_l1d arch/x86/include/asm/hardirq.h:67 [inline] entering_irq arch/x86/include/asm/apic.h:518 [inline] entering_ack_irq arch/x86/include/asm/apic.h:523 [inline] smp_apic_timer_interrupt+0x2b/0x550 arch/x86/kernel/apic/apic.c:1094 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:894 RIP: 0010:find_rr_leaf net/ipv6/route.c:714 [inline] RIP: 0010:rt6_select net/ipv6/route.c:769 [inline] RIP: 0010:fib6_table_lookup+0x451/0xf40 net/ipv6/route.c:1876 Code: e8 84 1d 5a fa 48 8d bb 98 00 00 00 48 89 f8 48 c1 e8 03 42 0f b6 04 38 84 c0 74 08 3c 03 0f 8e 78 09 00 00 8b ab 98 00 00 00 <44> 89 ef 89 ee e8 45 1e 5a fa 41 39 ed 0f 85 02 01 00 00 e8 47 1d RSP: 0018:ffff8880ba106d00 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13 RAX: 0000000000000000 RBX: ffff8880a8a4d640 RCX: ffffffff870867de RDX: 0000000000000100 RSI: ffffffff870867ec RDI: ffff8880a8a4d6d8 RBP: 0000000000000100 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000007 R11: 0000000000000000 R12: ffff8880b14d7580 R13: 0000000000000100 R14: 000000000000000d R15: dffffc0000000000 ip6_pol_route+0x180/0x1270 net/ipv6/route.c:1909 fib6_rule_lookup+0x10b/0x4e0 net/ipv6/fib6_rules.c:118 ip6_route_input_lookup net/ipv6/route.c:1990 [inline] ip6_route_input+0x6c0/0xaa0 net/ipv6/route.c:2125 ip6_rcv_finish_core.constprop.0.isra.0+0xd7/0x550 net/ipv6/ip6_input.c:63 ip6_rcv_finish+0x176/0x2f0 net/ipv6/ip6_input.c:74 ip_sabotage_in net/bridge/br_netfilter_hooks.c:847 [inline] ip_sabotage_in+0x17d/0x1d0 net/bridge/br_netfilter_hooks.c:841 nf_hook_entry_hookfn include/linux/netfilter.h:119 [inline] nf_hook_slow+0xc5/0x1e0 net/netfilter/core.c:511 nf_hook include/linux/netfilter.h:244 [inline] NF_HOOK include/linux/netfilter.h:287 [inline] ipv6_rcv+0x26a/0x3f0 net/ipv6/ip6_input.c:273 __netif_receive_skb_one_core+0x114/0x180 net/core/dev.c:4954 __netif_receive_skb+0x27/0x1c0 net/core/dev.c:5066 netif_receive_skb_internal+0xf0/0x3f0 net/core/dev.c:5156 NF_HOOK include/linux/netfilter.h:289 [inline] br_pass_frame_up+0x309/0x6c0 net/bridge/br_input.c:69 br_handle_frame_finish+0x6f2/0x1410 net/bridge/br_input.c:173 br_nf_hook_thresh+0x2a3/0x330 net/bridge/br_netfilter_hooks.c:1014 br_nf_pre_routing_finish_ipv6+0x6e3/0xd40 net/bridge/br_netfilter_ipv6.c:210 NF_HOOK include/linux/netfilter.h:289 [inline] br_nf_pre_routing_ipv6+0x3f4/0x860 net/bridge/br_netfilter_ipv6.c:240 br_nf_pre_routing+0xf05/0x1500 net/bridge/br_netfilter_hooks.c:494 nf_hook_entry_hookfn include/linux/netfilter.h:119 [inline] nf_hook_slow+0xc5/0x1e0 net/netfilter/core.c:511 nf_hook include/linux/netfilter.h:244 [inline] NF_HOOK include/linux/netfilter.h:287 [inline] br_handle_frame+0xa60/0x13b0 net/bridge/br_input.c:306 __netif_receive_skb_core+0x929/0x3270 net/core/dev.c:4876 __netif_receive_skb_one_core+0xae/0x180 net/core/dev.c:4952 __netif_receive_skb+0x27/0x1c0 net/core/dev.c:5066 process_backlog+0x241/0x700 net/core/dev.c:5849 napi_poll net/core/dev.c:6280 [inline] net_rx_action+0x4ac/0xfb0 net/core/dev.c:6346 __do_softirq+0x265/0x980 kernel/softirq.c:292 invoke_softirq kernel/softirq.c:372 [inline] irq_exit+0x215/0x260 kernel/softirq.c:412 exiting_irq arch/x86/include/asm/apic.h:536 [inline] smp_apic_timer_interrupt+0x136/0x550 arch/x86/kernel/apic/apic.c:1098 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:894 RIP: 0010:__tlb_remove_page_size+0x30/0x470 mm/memory.c:308 Code: f6 41 55 41 54 55 89 d5 53 48 89 fb e8 b9 52 d7 ff 48 8d 7b 18 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 80 3c 02 00 <0f> 85 a8 03 00 00 4c 8b 63 18 31 ff 4c 89 e6 e8 1c 54 d7 ff 4d 85 RSP: 0018:ffff88801c147740 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13 RAX: dffffc0000000000 RBX: ffff88801c1479b8 RCX: ffffffff818ba0c8 RDX: 1ffff11003828f3a RSI: ffffffff818b32b7 RDI: ffff88801c1479d0 RBP: 0000000000001000 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000005 R11: 0000000000000000 R12: dead000000000100 R13: ffffea00014ed4c0 R14: ffffea00014ed4c0 R15: 00007ff02eacb000 __tlb_remove_page include/asm-generic/tlb.h:161 [inline] zap_pte_range mm/memory.c:1353 [inline] zap_pmd_range mm/memory.c:1463 [inline] zap_pud_range mm/memory.c:1492 [inline] zap_p4d_range mm/memory.c:1513 [inline] unmap_page_range+0x14e7/0x2c50 mm/memory.c:1534 unmap_single_vma+0x198/0x300 mm/memory.c:1579 unmap_vmas+0xa9/0x180 mm/memory.c:1609 exit_mmap+0x2b9/0x530 mm/mmap.c:3093 __mmput kernel/fork.c:1016 [inline] mmput+0x14e/0x4a0 kernel/fork.c:1037 exit_mm kernel/exit.c:549 [inline] do_exit+0xaec/0x2be0 kernel/exit.c:857 do_group_exit+0x125/0x310 kernel/exit.c:967 get_signal+0x3f2/0x1f70 kernel/signal.c:2589 do_signal+0x8f/0x1670 arch/x86/kernel/signal.c:799 exit_to_usermode_loop+0x204/0x2a0 arch/x86/entry/common.c:163 prepare_exit_to_usermode+0x277/0x2d0 arch/x86/entry/common.c:198 retint_user+0x8/0x18 RIP: 0033:0x7ff02f8a4ae9 Code: Bad RIP value. RSP: 002b:00007ff02ce1a218 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13 RAX: 0000000000000000 RBX: 00007ff02f9b7f68 RCX: 00007ff02f8a4ae9 RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007ff02f9b7f68 RBP: 00007ff02f9b7f60 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff02f9b7f6c R13: 00007fff65cd9f7f R14: 00007ff02ce1a300 R15: 0000000000022000 rcu: INFO: rcu_sched detected expedited stalls on CPUs/tasks: { 1-... } 10699 jiffies s: 1169 root: 0x2/. rcu: blocking rcu_node structures: Task dump for CPU 1: syz-executor.2 R running task 27920 27050 22710 0x8000000c Call Trace: net_ratelimit: 4736 callbacks suppressed bridge0: received packet on team0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on team0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on team0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on team0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on team0 with own address as source address (addr:aa:aa:aa:aa:aa:1f, vlan:0) bridge0: received packet on team0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on team0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on team0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on team0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on team0 with own address as source address (addr:aa:aa:aa:aa:aa:1f, vlan:0) net_ratelimit: 4912 callbacks suppressed bridge0: received packet on team0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on team0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on team0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on team0 with own address as source address (addr:aa:aa:aa:aa:aa:1f, vlan:0) bridge0: received packet on team0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on team0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on team0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on team0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on team0 with own address as source address (addr:aa:aa:aa:aa:aa:1f, vlan:0) bridge0: received packet on team0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) ---------------- Code disassembly (best guess): 0: e8 11 dd 35 00 callq 0x35dd16 5: e9 ab fe ff ff jmpq 0xfffffeb5 a: 4c 89 ef mov %r13,%rdi d: e8 04 dd 35 00 callq 0x35dd16 12: e9 23 fe ff ff jmpq 0xfffffe3a 17: 90 nop 18: 90 nop 19: 90 nop 1a: 90 nop 1b: 90 nop 1c: 90 nop 1d: 90 nop 1e: 90 nop 1f: 90 nop 20: 90 nop 21: 90 nop 22: 90 nop 23: 90 nop 24: 90 nop 25: 90 nop 26: 48 8b 34 24 mov (%rsp),%rsi * 2a: 65 48 8b 04 25 c0 df mov %gs:0x1dfc0,%rax <-- trapping instruction 31: 01 00 33: 65 8b 15 cc 59 9f 7e mov %gs:0x7e9f59cc(%rip),%edx # 0x7e9f5a06 3a: 81 e2 00 01 1f 00 and $0x1f0100,%edx