bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
rcu: INFO: rcu_preempt detected stalls on CPUs/tasks:
rcu: (detected by 1, t=10502 jiffies, g=30817, q=823000 ncpus=2)
rcu: All QSes seen, last rcu_preempt kthread activity 1416 (4294971597-4294970181), jiffies_till_next_fqs=1, root ->qsmask 0x0
rcu: rcu_preempt kthread starved for 1417 jiffies! g30817 f0x2 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=0
rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior.
rcu: RCU grace-period kthread stack dump:
task:rcu_preempt state:R running task stack:25880 pid:17 tgid:17 ppid:2 flags:0x00004000
Call Trace:
context_switch kernel/sched/core.c:5369 [inline]
__schedule+0x1850/0x4c30 kernel/sched/core.c:6756
__schedule_loop kernel/sched/core.c:6833 [inline]
schedule+0x14b/0x320 kernel/sched/core.c:6848
schedule_timeout+0x15a/0x290 kernel/time/sleep_timeout.c:99
rcu_gp_fqs_loop+0x2df/0x1330 kernel/rcu/tree.c:2045
rcu_gp_kthread+0xa7/0x3b0 kernel/rcu/tree.c:2247
kthread+0x2f0/0x390 kernel/kthread.c:389
ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
rcu: Stack dump where RCU GP kthread last ran:
Sending NMI from CPU 1 to CPUs 0:
NMI backtrace for cpu 0
CPU: 0 UID: 0 PID: 9544 Comm: kworker/u8:14 Not tainted 6.13.0-rc7-syzkaller-00108-g70d81f25cc92 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024
Workqueue: events_unbound toggle_allocation_gate
RIP: 0010:preempt_count_add+0x12/0x190 kernel/sched/core.c:5843
Code: ee fe ff ff 0f 1f 40 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 41 57 41 56 53 89 fb 48 c7 c0 c0 c9 3a 9a <48> c1 e8 03 49 bf 00 00 00 00 00 fc ff df 42 0f b6 04 38 84 c0 0f
RSP: 0018:ffffc90000006170 EFLAGS: 00000202
RAX: ffffffff9a3ac9c0 RBX: 0000000000000001 RCX: ffffc90000007e20
RDX: dffffc0000000000 RSI: ffffffff8161daf4 RDI: 0000000000000001
RBP: ffffc90000006298 R08: 0000000000000017 R09: ffffc90000006350
R10: ffffc900000062b0 R11: ffffffff818b4af0 R12: dffffc0000000000
R13: ffffc90000006260 R14: ffffffff8161daf4 R15: 0000000000000000
FS: 0000000000000000(0000) GS:ffff8880b8600000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f4d9ec2050f CR3: 000000000e736000 CR4: 00000000003526f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
unwind_next_frame+0xb0/0x22d0 arch/x86/kernel/unwind_orc.c:479
arch_stack_walk+0x11c/0x150 arch/x86/kernel/stacktrace.c:25
stack_trace_save+0x118/0x1d0 kernel/stacktrace.c:122
kasan_save_stack mm/kasan/common.c:47 [inline]
kasan_save_track+0x3f/0x80 mm/kasan/common.c:68
unpoison_slab_object mm/kasan/common.c:319 [inline]
__kasan_slab_alloc+0x66/0x80 mm/kasan/common.c:345
kasan_slab_alloc include/linux/kasan.h:250 [inline]
slab_post_alloc_hook mm/slub.c:4119 [inline]
slab_alloc_node mm/slub.c:4168 [inline]
kmem_cache_alloc_noprof+0x1d9/0x380 mm/slub.c:4175
skb_clone+0x20c/0x390 net/core/skbuff.c:2084
dev_queue_xmit_nit+0x249/0xca0 net/core/dev.c:2345
xmit_one net/core/dev.c:3616 [inline]
dev_hard_start_xmit+0x15f/0x7d0 net/core/dev.c:3636
__dev_queue_xmit+0x1b73/0x3f50 net/core/dev.c:4466
dev_queue_xmit include/linux/netdevice.h:3168 [inline]
br_dev_queue_push_xmit+0x726/0x900 net/bridge/br_forward.c:53
NF_HOOK+0x3a7/0x460 include/linux/netfilter.h:314
br_forward_finish+0xd8/0x130 net/bridge/br_forward.c:66
br_nf_forward_finish+0xb49/0xfb0 net/bridge/br_netfilter_hooks.c:693
NF_HOOK+0x700/0x7c0 include/linux/netfilter.h:314
br_nf_forward_arp net/bridge/br_netfilter_hooks.c:783 [inline]
br_nf_forward+0xf2c/0x18b0 net/bridge/br_netfilter_hooks.c:806
nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline]
nf_hook_slow+0xc3/0x220 net/netfilter/core.c:626
nf_hook include/linux/netfilter.h:269 [inline]
NF_HOOK+0x2a7/0x460 include/linux/netfilter.h:312
__br_forward+0x489/0x660 net/bridge/br_forward.c:115
br_handle_frame_finish+0x18ba/0x1fe0 net/bridge/br_input.c:215
nf_hook_bridge_pre net/bridge/br_input.c:299 [inline]
br_handle_frame+0xbf8/0x1530 net/bridge/br_input.c:424
__netif_receive_skb_core+0x14eb/0x4690 net/core/dev.c:5598
__netif_receive_skb_one_core net/core/dev.c:5702 [inline]
__netif_receive_skb+0x12f/0x650 net/core/dev.c:5817
process_backlog+0x662/0x15b0 net/core/dev.c:6149
__napi_poll+0xcb/0x490 net/core/dev.c:6902
napi_poll net/core/dev.c:6971 [inline]
net_rx_action+0x89b/0x1240 net/core/dev.c:7093
handle_softirqs+0x2d4/0x9b0 kernel/softirq.c:561
__do_softirq kernel/softirq.c:595 [inline]
invoke_softirq kernel/softirq.c:435 [inline]
__irq_exit_rcu+0xf7/0x220 kernel/softirq.c:662
irq_exit_rcu+0x9/0x30 kernel/softirq.c:678
instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1049 [inline]
sysvec_apic_timer_interrupt+0xa6/0xc0 arch/x86/kernel/apic/apic.c:1049
asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702
RIP: 0010:csd_lock_wait kernel/smp.c:340 [inline]
RIP: 0010:smp_call_function_many_cond+0x19f8/0x2c60 kernel/smp.c:884
Code: 89 e6 83 e6 01 31 ff e8 c6 e6 0b 00 41 83 e4 01 49 bc 00 00 00 00 00 fc ff df 75 07 e8 71 e2 0b 00 eb 38 f3 90 42 0f b6 04 23 <84> c0 75 11 41 f7 45 00 01 00 00 00 74 1e e8 55 e2 0b 00 eb e4 44
RSP: 0018:ffffc90003f9f6e0 EFLAGS: 00000293
RAX: 0000000000000000 RBX: 1ffff110170e88e9 RCX: ffff88807c928000
RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000
RBP: ffffc90003f9f8e0 R08: ffffffff81939fea R09: 1ffffffff2854b10
R10: dffffc0000000000 R11: fffffbfff2854b11 R12: dffffc0000000000
R13: ffff8880b8744748 R14: ffff8880b863fac0 R15: 0000000000000001
on_each_cpu_cond_mask+0x3f/0x80 kernel/smp.c:1051
on_each_cpu include/linux/smp.h:71 [inline]
text_poke_sync arch/x86/kernel/alternative.c:2114 [inline]
text_poke_bp_batch+0x352/0xb30 arch/x86/kernel/alternative.c:2324
text_poke_flush arch/x86/kernel/alternative.c:2515 [inline]
text_poke_finish+0x30/0x50 arch/x86/kernel/alternative.c:2522
arch_jump_label_transform_apply+0x1c/0x30 arch/x86/kernel/jump_label.c:146
static_key_enable_cpuslocked+0x136/0x260 kernel/jump_label.c:210
static_key_enable+0x1a/0x20 kernel/jump_label.c:223
toggle_allocation_gate+0xbc/0x260 mm/kfence/core.c:849
process_one_work kernel/workqueue.c:3236 [inline]
process_scheduled_works+0xa66/0x1840 kernel/workqueue.c:3317
worker_thread+0x870/0xd30 kernel/workqueue.c:3398
kthread+0x2f0/0x390 kernel/kthread.c:389
ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
net_ratelimit: 26549 callbacks suppressed
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:07:59:20:35, vlan:0)
net_ratelimit: 30209 callbacks suppressed
bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:07:59:20:35, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:07:59:20:35, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)