bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
rcu: INFO: rcu_preempt detected stalls on CPUs/tasks:
rcu: Tasks blocked on level-0 rcu_node (CPUs 0-1): P18313/1:b..l
rcu: (detected by 0, t=10503 jiffies, g=61657, q=2837 ncpus=2)
task:syz.3.3558 state:R running task stack:25640 pid:18313 tgid:18308 ppid:16230 task_flags:0x400140 flags:0x00080001
Call Trace:
context_switch kernel/sched/core.c:5325 [inline]
__schedule+0x1798/0x4cc0 kernel/sched/core.c:6929
preempt_schedule_common+0x83/0xd0 kernel/sched/core.c:7113
preempt_schedule+0xae/0xc0 kernel/sched/core.c:7137
preempt_schedule_thunk+0x16/0x30 arch/x86/entry/thunk.S:12
__local_bh_enable_ip+0x13e/0x1c0 kernel/softirq.c:457
local_bh_enable include/linux/bottom_half.h:33 [inline]
xdp_test_run_batch net/bpf/test_run.c:368 [inline]
bpf_test_run_xdp_live+0x1872/0x1b20 net/bpf/test_run.c:390
bpf_prog_test_run_xdp+0x75b/0x10e0 net/bpf/test_run.c:1331
bpf_prog_test_run+0x2c7/0x340 kernel/bpf/syscall.c:4673
__sys_bpf+0x562/0x860 kernel/bpf/syscall.c:6152
__do_sys_bpf kernel/bpf/syscall.c:6244 [inline]
__se_sys_bpf kernel/bpf/syscall.c:6242 [inline]
__x64_sys_bpf+0x7c/0x90 kernel/bpf/syscall.c:6242
do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
do_syscall_64+0xfa/0xfa0 arch/x86/entry/syscall_64.c:94
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f2b92f8efc9
RSP: 002b:00007f2b93dd8038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
RAX: ffffffffffffffda RBX: 00007f2b931e6090 RCX: 00007f2b92f8efc9
RDX: 0000000000000048 RSI: 0000200000000600 RDI: 000000000000000a
RBP: 00007f2b93011f91 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007f2b931e6128 R14: 00007f2b931e6090 R15: 00007ffc866bd468
rcu: rcu_preempt kthread starved for 983 jiffies! g61657 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=1
rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior.
rcu: RCU grace-period kthread stack dump:
task:rcu_preempt state:R running task stack:26856 pid:16 tgid:16 ppid:2 task_flags:0x208040 flags:0x00080000
Call Trace:
context_switch kernel/sched/core.c:5325 [inline]
__schedule+0x1798/0x4cc0 kernel/sched/core.c:6929
__schedule_loop kernel/sched/core.c:7011 [inline]
schedule+0x165/0x360 kernel/sched/core.c:7026
schedule_timeout+0x12b/0x270 kernel/time/sleep_timeout.c:99
rcu_gp_fqs_loop+0x301/0x1540 kernel/rcu/tree.c:2083
rcu_gp_kthread+0x99/0x390 kernel/rcu/tree.c:2285
kthread+0x711/0x8a0 kernel/kthread.c:463
ret_from_fork+0x4bc/0x870 arch/x86/kernel/process.c:158
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245
rcu: Stack dump where RCU GP kthread last ran:
Sending NMI from CPU 0 to CPUs 1:
NMI backtrace for cpu 1
CPU: 1 UID: 0 PID: 2 Comm: kthreadd Not tainted syzkaller #0 PREEMPT(full)
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025
RIP: 0010:check_kcov_mode kernel/kcov.c:183 [inline]
RIP: 0010:__sanitizer_cov_trace_pc+0x2f/0x70 kernel/kcov.c:217
Code: 8b 04 24 65 48 8b 0c 25 08 b0 91 92 65 8b 15 28 6c d1 10 81 e2 00 01 ff 00 74 11 81 fa 00 01 00 00 75 35 83 b9 7c 16 00 00 00 <74> 2c 8b 91 58 16 00 00 83 fa 02 75 21 48 8b 91 60 16 00 00 48 8b
RSP: 0018:ffffc90000a08a88 EFLAGS: 00000246
RAX: ffffffff89655aa3 RBX: fffffff0a3da8801 RCX: ffff88801c2a9e40
RDX: 0000000000000100 RSI: 0000000000000000 RDI: 0000000000000000
RBP: ffff888044f6a648 R08: 0000000000000003 R09: 0000000000000004
R10: dffffc0000000000 R11: fffff52000141154 R12: dffffc0000000000
R13: 0019999999999998 R14: 0000000000000000 R15: 0000000000000000
FS: 0000000000000000(0000) GS:ffff888125e05000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007ffde4458118 CR3: 00000000772ba000 CR4: 00000000003526f0
Call Trace:
pie_calculate_probability+0x433/0x7e0 net/sched/sch_pie.c:404
fq_pie_timer+0x288/0x5b0 net/sched/sch_fq_pie.c:402
call_timer_fn+0x17e/0x5f0 kernel/time/timer.c:1747
expire_timers kernel/time/timer.c:1798 [inline]
__run_timers kernel/time/timer.c:2372 [inline]
__run_timer_base+0x61a/0x860 kernel/time/timer.c:2384
run_timer_base kernel/time/timer.c:2393 [inline]
run_timer_softirq+0xb7/0x180 kernel/time/timer.c:2403
handle_softirqs+0x286/0x870 kernel/softirq.c:622
__do_softirq kernel/softirq.c:656 [inline]
invoke_softirq kernel/softirq.c:496 [inline]
__irq_exit_rcu+0xca/0x1f0 kernel/softirq.c:723
irq_exit_rcu+0x9/0x30 kernel/softirq.c:739
instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1052 [inline]
sysvec_apic_timer_interrupt+0xa6/0xc0 arch/x86/kernel/apic/apic.c:1052
asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:697
RIP: 0010:preempt_count_sub+0x3f/0x170 kernel/sched/core.c:5821
Code: 9c 99 48 c1 e8 03 0f b6 04 18 84 c0 0f 85 d1 00 00 00 83 3d f2 c0 0c 18 00 75 25 65 8b 05 d9 7d 01 11 89 c1 81 e1 ff ff ff 7f <39> cf 7f 2a 81 ff ff 00 00 00 0f 93 c1 84 c0 0f 95 c0 08 c8 74 5e
RSP: 0018:ffffc900000775c0 EFLAGS: 00000202
RAX: 0000000080000001 RBX: dffffc0000000000 RCX: 0000000000000001
RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000001
RBP: 0000000000000000 R08: ffff8880b87401c3 R09: 1ffff110170e8038
R10: dffffc0000000000 R11: ffffed10170e8039 R12: ffffffff8da0ddd8
R13: ffff8880b87401c0 R14: ffff88813fffbb80 R15: 0000000000000000
__free_frozen_pages+0x691/0xd30 mm/page_alloc.c:2935
discard_slab mm/slub.c:3310 [inline]
__put_partials+0x146/0x170 mm/slub.c:3857
put_cpu_partial+0x1f2/0x2e0 mm/slub.c:3932
__slab_free+0x2b9/0x390 mm/slub.c:5906
qlink_free mm/kasan/quarantine.c:163 [inline]
qlist_free_all+0x97/0x140 mm/kasan/quarantine.c:179
kasan_quarantine_reduce+0x148/0x160 mm/kasan/quarantine.c:286
__kasan_kmalloc+0x22/0xb0 mm/kasan/common.c:408
kasan_kmalloc include/linux/kasan.h:262 [inline]
__kmalloc_cache_noprof+0x3d5/0x6f0 mm/slub.c:5748
kmalloc_noprof include/linux/slab.h:957 [inline]
kzalloc_noprof include/linux/slab.h:1094 [inline]
set_kthread_struct+0xbb/0x340 kernel/kthread.c:125
copy_process+0x10c4/0x3c00 kernel/fork.c:2110
kernel_clone+0x21e/0x840 kernel/fork.c:2609
kernel_thread+0x10d/0x160 kernel/fork.c:2670
create_kthread kernel/kthread.c:486 [inline]
kthreadd+0x575/0x770 kernel/kthread.c:846
ret_from_fork+0x4bc/0x870 arch/x86/kernel/process.c:158
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245
net_ratelimit: 14342 callbacks suppressed
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ea:ff:e4:61:f2:70, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ea:ff:e4:61:f2:70, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
net_ratelimit: 16499 callbacks suppressed
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ea:ff:e4:61:f2:70, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ea:ff:e4:61:f2:70, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)