bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:e4:da:b9:c1:6e, vlan:0)
rcu: INFO: rcu_preempt detected stalls on CPUs/tasks:
rcu: Tasks blocked on level-0 rcu_node (CPUs 0-1): P7080/3:b..l P7084/1:b..l
rcu: (detected by 1, t=10503 jiffies, g=14057, q=1028 ncpus=2)
task:syz.4.300 state:R running task stack:23728 pid:7084 tgid:7079 ppid:5831 flags:0x00004002
Call Trace:
context_switch kernel/sched/core.c:5369 [inline]
__schedule+0x1850/0x4c30 kernel/sched/core.c:6756
preempt_schedule_irq+0xfb/0x1c0 kernel/sched/core.c:7078
irqentry_exit+0x5e/0x90 kernel/entry/common.c:354
asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702
RIP: 0010:__sanitizer_cov_trace_const_cmp8+0x4/0x90 kernel/kcov.c:322
Code: 0a 18 4c 89 44 0a 20 c3 cc cc cc cc 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa <4c> 8b 04 24 65 48 8b 0c 25 00 d6 03 00 65 8b 05 d0 72 64 7e 25 00
RSP: 0018:ffffc9000ba07698 EFLAGS: 00000246
RAX: ffffffff81f216c0 RBX: 0000000000000000 RCX: ffff88807e5c1e00
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
RBP: ffffc9000ba07750 R08: ffffffff81f216ae R09: 1ffffffff2853f10
R10: dffffc0000000000 R11: fffffbfff2853f11 R12: 0200000000000000
R13: 000000005d589067 R14: dffffc0000000000 R15: ffffc9000ba077e0
__pte_offset_map+0x26e/0x380 mm/pgtable-generic.c:296
__pte_offset_map_lock+0xc7/0x300 mm/pgtable-generic.c:398
pte_offset_map_lock include/linux/mm.h:3026 [inline]
follow_page_pte+0x119/0x1ca0 mm/gup.c:855
follow_pmd_mask mm/gup.c:978 [inline]
follow_pud_mask mm/gup.c:1030 [inline]
follow_p4d_mask mm/gup.c:1047 [inline]
follow_page_mask mm/gup.c:1090 [inline]
__get_user_pages+0xb90/0x49e0 mm/gup.c:1492
populate_vma_page_range+0x264/0x330 mm/gup.c:1932
__mm_populate+0x27a/0x460 mm/gup.c:2035
mm_populate include/linux/mm.h:3386 [inline]
vm_mmap_pgoff+0x2c3/0x3d0 mm/util.c:585
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f47a8f85d19
RSP: 002b:00007f47a9dd1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000009
RAX: ffffffffffffffda RBX: 00007f47a9176080 RCX: 00007f47a8f85d19
RDX: 0000000002000004 RSI: 0000000000c00000 RDI: 0000000020001000
RBP: 00007f47a9001a20 R08: ffffffffffffffff R09: 0000000000000000
R10: 000000000003b071 R11: 0000000000000246 R12: 0000000000000000
R13: 0000000000000000 R14: 00007f47a9176080 R15: 00007ffd718d0128
task:syz.4.300 state:R running task stack:23696 pid:7080 tgid:7079 ppid:5831 flags:0x00004002
Call Trace:
context_switch kernel/sched/core.c:5369 [inline]
__schedule+0x1850/0x4c30 kernel/sched/core.c:6756
preempt_schedule_common+0x84/0xd0 kernel/sched/core.c:6935
preempt_schedule+0xe1/0xf0 kernel/sched/core.c:6959
preempt_schedule_thunk+0x1a/0x30 arch/x86/entry/thunk.S:12
__raw_spin_unlock include/linux/spinlock_api_smp.h:143 [inline]
_raw_spin_unlock+0x3e/0x50 kernel/locking/spinlock.c:186
spin_unlock include/linux/spinlock.h:391 [inline]
filemap_map_pages+0x13ce/0x1900 mm/filemap.c:3689
do_fault_around mm/memory.c:5280 [inline]
do_read_fault mm/memory.c:5313 [inline]
do_fault mm/memory.c:5456 [inline]
do_pte_missing mm/memory.c:3979 [inline]
handle_pte_fault+0x3888/0x5ed0 mm/memory.c:5801
__handle_mm_fault mm/memory.c:5944 [inline]
handle_mm_fault+0x1106/0x1bb0 mm/memory.c:6112
faultin_page mm/gup.c:1196 [inline]
__get_user_pages+0x1c82/0x49e0 mm/gup.c:1494
populate_vma_page_range+0x264/0x330 mm/gup.c:1932
__mm_populate+0x27a/0x460 mm/gup.c:2035
mm_populate include/linux/mm.h:3386 [inline]
vm_mmap_pgoff+0x2c3/0x3d0 mm/util.c:585
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f47a8f85d19
RSP: 002b:00007f47a9df2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000009
RAX: ffffffffffffffda RBX: 00007f47a9175fa0 RCX: 00007f47a8f85d19
RDX: 0000000002000004 RSI: 0000000000c00000 RDI: 0000000020001000
RBP: 00007f47a9001a20 R08: ffffffffffffffff R09: 0000000000000000
R10: 000000000003b071 R11: 0000000000000246 R12: 0000000000000000
R13: 0000000000000000 R14: 00007f47a9175fa0 R15: 00007ffd718d0128
rcu: rcu_preempt kthread starved for 9145 jiffies! g14057 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=1
rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior.
rcu: RCU grace-period kthread stack dump:
task:rcu_preempt state:R running task stack:26072 pid:17 tgid:17 ppid:2 flags:0x00004000
Call Trace:
context_switch kernel/sched/core.c:5369 [inline]
__schedule+0x1850/0x4c30 kernel/sched/core.c:6756
__schedule_loop kernel/sched/core.c:6833 [inline]
schedule+0x14b/0x320 kernel/sched/core.c:6848
schedule_timeout+0x15a/0x290 kernel/time/sleep_timeout.c:99
rcu_gp_fqs_loop+0x2df/0x1330 kernel/rcu/tree.c:2045
rcu_gp_kthread+0xa7/0x3b0 kernel/rcu/tree.c:2247
kthread+0x2f0/0x390 kernel/kthread.c:389
ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
rcu: Stack dump where RCU GP kthread last ran:
CPU: 1 UID: 0 PID: 24 Comm: ksoftirqd/1 Not tainted 6.13.0-rc2-syzkaller-00146-g922b4b955a03 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/25/2024
RIP: 0010:ipv6_addr_equal include/net/ipv6.h:673 [inline]
RIP: 0010:ipv6_chk_mcast_addr+0x202/0x840 net/ipv6/mcast.c:1026
Code: 74 08 48 89 ef e8 ce b8 90 f7 48 89 6c 24 08 48 8b 6d 00 48 8b 44 24 18 42 80 3c 20 00 74 08 4c 89 ff e8 b1 b8 90 f7 4d 89 fd <4d> 8b 37 48 8b 44 24 08 48 8d 58 08 48 89 d8 48 c1 e8 03 42 80 3c
RSP: 0018:ffffc900001e6838 EFLAGS: 00000246
RAX: 1ffff11008e999e5 RBX: 0000000000000001 RCX: ffff88801d2f8000
RDX: 0000000000000100 RSI: 0000000000000001 RDI: 0000000000000000
RBP: 00000000000001ff R08: ffffffff8a75073b R09: 1ffffffff2853f10
R10: dffffc0000000000 R11: fffffbfff2853f11 R12: dffffc0000000000
R13: ffff8880474ccf28 R14: 00000000000002ff R15: ffff8880474ccf28
FS: 0000000000000000(0000) GS:ffff8880b8700000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000560e3613fd88 CR3: 00000000336d2000 CR4: 00000000003526f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
ip6_mc_input+0x500/0xc30 net/ipv6/ip6_input.c:521
ip_sabotage_in+0x203/0x290 net/bridge/br_netfilter_hooks.c:1021
nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline]
nf_hook_slow+0xc3/0x220 net/netfilter/core.c:626
nf_hook include/linux/netfilter.h:269 [inline]
NF_HOOK+0x29e/0x450 include/linux/netfilter.h:312
__netif_receive_skb_one_core net/core/dev.c:5672 [inline]
__netif_receive_skb+0x1ea/0x650 net/core/dev.c:5785
netif_receive_skb_internal net/core/dev.c:5871 [inline]
netif_receive_skb+0x1e8/0x890 net/core/dev.c:5930
NF_HOOK+0x9e/0x400 include/linux/netfilter.h:314
br_handle_frame_finish+0x18ed/0x1fe0
br_nf_hook_thresh+0x472/0x590
br_nf_pre_routing_finish_ipv6+0xaa0/0xdd0
NF_HOOK include/linux/netfilter.h:314 [inline]
br_nf_pre_routing_ipv6+0x379/0x770 net/bridge/br_netfilter_ipv6.c:184
nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline]
nf_hook_bridge_pre net/bridge/br_input.c:277 [inline]
br_handle_frame+0x9fd/0x1530 net/bridge/br_input.c:424
__netif_receive_skb_core+0x14eb/0x4690 net/core/dev.c:5566
__netif_receive_skb_one_core net/core/dev.c:5670 [inline]
__netif_receive_skb+0x12f/0x650 net/core/dev.c:5785
process_backlog+0x662/0x15b0 net/core/dev.c:6117
__napi_poll+0xcb/0x490 net/core/dev.c:6883
napi_poll net/core/dev.c:6952 [inline]
net_rx_action+0x89b/0x1240 net/core/dev.c:7074
handle_softirqs+0x2d4/0x9b0 kernel/softirq.c:561
run_ksoftirqd+0xca/0x130 kernel/softirq.c:950
smpboot_thread_fn+0x544/0xa30 kernel/smpboot.c:164
kthread+0x2f0/0x390 kernel/kthread.c:389
ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
net_ratelimit: 23248 callbacks suppressed
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:e4:da:b9:c1:6e, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:e4:da:b9:c1:6e, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:e4:da:b9:c1:6e, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)