bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:fd:4b:fe:30:63, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: rcu: 0-...!: (1 GPs behind) idle=5894/1/0x4000000000000000 softirq=18423/18424 fqs=1 rcu: (detected by 1, t=10502 jiffies, g=15421, q=285623 ncpus=2) Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 16 Comm: ksoftirqd/0 Not tainted 6.13.0-rc3-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/25/2024 RIP: 0010:__lock_acquire+0x33c/0x2100 kernel/locking/lockdep.c:5160 Code: 00 00 b8 00 e0 ff ff 23 03 41 81 e6 ff 1f 00 00 44 09 f0 48 89 5c 24 10 89 03 4a 8d 5c ef 08 48 89 d8 48 c1 e8 03 80 3c 30 00 <74> 17 48 89 df e8 5a 25 8b 00 48 8b 7c 24 08 48 be 00 00 00 00 00 RSP: 0018:ffffc90000007a10 EFLAGS: 00000046 RAX: 1ffff110039d8ca2 RBX: ffff88801cec6510 RCX: ffffffff9a3a8903 RDX: 0000000000000001 RSI: dffffc0000000000 RDI: ffff88801cec64e0 RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000001 R10: dffffc0000000000 R11: fffffbfff2032f2f R12: ffffffff89cd8622 R13: 0000000000000005 R14: 0000000000000021 R15: ffffffff8e937ae0 FS: 0000000000000000(0000) GS:ffff8880b8600000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000002057eff8 CR3: 0000000051e26000 CR4: 0000000000350ef0 Call Trace: lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5849 rcu_lock_acquire include/linux/rcupdate.h:337 [inline] rcu_read_lock include/linux/rcupdate.h:849 [inline] advance_sched+0xa1e/0xca0 net/sched/sch_taprio.c:985 __run_hrtimer kernel/time/hrtimer.c:1739 [inline] __hrtimer_run_queues+0x59d/0xd30 kernel/time/hrtimer.c:1803 hrtimer_interrupt+0x403/0xa40 kernel/time/hrtimer.c:1865 local_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1038 [inline] __sysvec_apic_timer_interrupt+0x112/0x420 arch/x86/kernel/apic/apic.c:1055 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1049 [inline] sysvec_apic_timer_interrupt+0xa1/0xc0 arch/x86/kernel/apic/apic.c:1049 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702 RIP: 0010:rcu_preempt_read_exit kernel/rcu/tree_plugin.h:395 [inline] RIP: 0010:__rcu_read_unlock+0x21/0x110 kernel/rcu/tree_plugin.h:434 Code: 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 55 41 57 41 56 41 55 41 54 53 49 bc 00 00 00 00 00 fc ff df 65 4c 8b 34 25 00 d6 03 00 <4d> 8d ae 44 04 00 00 4c 89 eb 48 c1 eb 03 42 0f b6 04 23 84 c0 75 RSP: 0018:ffffc90000157210 EFLAGS: 00000246 RAX: e9ce0b7d2793f900 RBX: 0000000000000001 RCX: ffffc90000157103 RDX: 0000000000000001 RSI: ffffffff8c0aa8c0 RDI: ffffffff8c5faaa0 RBP: ffff888034742e80 R08: ffffffff90197977 R09: 1ffffffff2032f2e R10: dffffc0000000000 R11: fffffbfff2032f2f R12: dffffc0000000000 R13: 1ffff1100e0df32b R14: ffff88801cec5a00 R15: ffffffff8a9c19ff rcu_read_unlock include/linux/rcupdate.h:882 [inline] net_generic+0x1f0/0x240 include/net/netns/generic.h:48 is_pppoe_ip net/bridge/br_netfilter_hooks.c:122 [inline] br_nf_pre_routing+0xa1a/0x1470 net/bridge/br_netfilter_hooks.c:543 nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline] nf_hook_bridge_pre net/bridge/br_input.c:277 [inline] br_handle_frame+0x9ff/0x1530 net/bridge/br_input.c:424 __netif_receive_skb_core+0x14ed/0x4690 net/core/dev.c:5566 __netif_receive_skb_one_core net/core/dev.c:5670 [inline] __netif_receive_skb+0x12f/0x650 net/core/dev.c:5785 process_backlog+0x662/0x15b0 net/core/dev.c:6117 __napi_poll+0xcd/0x490 net/core/dev.c:6883 napi_poll net/core/dev.c:6952 [inline] net_rx_action+0x89b/0x1240 net/core/dev.c:7074 handle_softirqs+0x2d6/0x9b0 kernel/softirq.c:561 run_ksoftirqd+0xca/0x130 kernel/softirq.c:950 smpboot_thread_fn+0x546/0xa30 kernel/smpboot.c:164 kthread+0x2f2/0x390 kernel/kthread.c:389 ret_from_fork+0x4d/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 rcu: rcu_preempt kthread starved for 10496 jiffies! g15421 f0x2 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=1 rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. rcu: RCU grace-period kthread stack dump: task:rcu_preempt state:R running task stack:26264 pid:17 tgid:17 ppid:2 flags:0x00004000 Call Trace: context_switch kernel/sched/core.c:5369 [inline] __schedule+0x1850/0x4c30 kernel/sched/core.c:6756 __schedule_loop kernel/sched/core.c:6833 [inline] schedule+0x14b/0x320 kernel/sched/core.c:6848 schedule_timeout+0x15a/0x290 kernel/time/sleep_timeout.c:99 rcu_gp_fqs_loop+0x2df/0x1330 kernel/rcu/tree.c:2045 rcu_gp_kthread+0xa7/0x3b0 kernel/rcu/tree.c:2247 kthread+0x2f2/0x390 kernel/kthread.c:389 ret_from_fork+0x4d/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 rcu: Stack dump where RCU GP kthread last ran: CPU: 1 UID: 0 PID: 1091 Comm: kworker/u8:6 Not tainted 6.13.0-rc3-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/25/2024 Workqueue: events_unbound toggle_allocation_gate RIP: 0010:should_resched arch/x86/include/asm/preempt.h:103 [inline] RIP: 0010:unwind_next_frame+0x18e6/0x22d0 arch/x86/kernel/unwind_orc.c:672 Code: 00 00 80 3d f5 8e e2 0c 01 75 40 80 3d 72 d0 ce 11 00 75 37 c6 05 69 d0 ce 11 01 e9 21 fa ff ff bf 01 00 00 00 e8 fa c0 21 00 <65> 8b 0d 9b 14 b8 7e b0 01 85 c9 75 73 e8 18 86 be ff eb 6c 80 3d RSP: 0018:ffffc90000a17c70 EFLAGS: 00000213 RAX: 0000000000000102 RBX: ffffc90000a17d50 RCX: 0000000000000102 RDX: dffffc0000000000 RSI: ffffc90000a11000 RDI: 0000000000000001 RBP: ffffc90000a17d40 R08: ffffc90000a18a10 R09: ffffc90000a17d90 R10: dffffc0000000000 R11: fffff52000142fb4 R12: dffffc0000000000 R13: ffffc90000a17d40 R14: ffffc90000a11000 R15: ffffc90000a18a20 FS: 0000000000000000(0000) GS:ffff8880b8700000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000020000000 CR3: 000000000e736000 CR4: 0000000000350ef0 Call Trace: arch_stack_walk+0x11c/0x150 arch/x86/kernel/stacktrace.c:25 stack_trace_save+0x118/0x1d0 kernel/stacktrace.c:122 kasan_save_stack+0x3f/0x60 mm/kasan/common.c:47 __kasan_record_aux_stack+0xac/0xc0 mm/kasan/generic.c:544 __call_rcu_common kernel/rcu/tree.c:3086 [inline] call_rcu+0x167/0xa70 kernel/rcu/tree.c:3190 ip6_rt_put include/net/ip6_fib.h:323 [inline] nft_fib6_eval+0x849/0xbd0 net/ipv6/netfilter/nft_fib_ipv6.c:211 expr_call_ops_eval net/netfilter/nf_tables_core.c:240 [inline] nft_do_chain+0x4af/0x1da0 net/netfilter/nf_tables_core.c:288 nft_do_chain_inet+0x418/0x6b0 net/netfilter/nft_chain_filter.c:161 nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline] nf_hook_slow+0xc5/0x220 net/netfilter/core.c:626 nf_hook include/linux/netfilter.h:269 [inline] NF_HOOK+0x29e/0x450 include/linux/netfilter.h:312 __netif_receive_skb_one_core net/core/dev.c:5672 [inline] __netif_receive_skb+0x1ea/0x650 net/core/dev.c:5785 process_backlog+0x662/0x15b0 net/core/dev.c:6117 __napi_poll+0xcd/0x490 net/core/dev.c:6883 napi_poll net/core/dev.c:6952 [inline] net_rx_action+0x89b/0x1240 net/core/dev.c:7074 handle_softirqs+0x2d6/0x9b0 kernel/softirq.c:561 __do_softirq kernel/softirq.c:595 [inline] invoke_softirq kernel/softirq.c:435 [inline] __irq_exit_rcu+0xf7/0x220 kernel/softirq.c:662 irq_exit_rcu+0x9/0x30 kernel/softirq.c:678 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1049 [inline] sysvec_apic_timer_interrupt+0xa6/0xc0 arch/x86/kernel/apic/apic.c:1049 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702 RIP: 0010:csd_lock_wait kernel/smp.c:340 [inline] RIP: 0010:smp_call_function_many_cond+0x19f8/0x2c60 kernel/smp.c:884 Code: 89 e6 83 e6 01 31 ff e8 56 e9 0b 00 41 83 e4 01 49 bc 00 00 00 00 00 fc ff df 75 07 e8 01 e5 0b 00 eb 38 f3 90 42 0f b6 04 23 <84> c0 75 11 41 f7 45 00 01 00 00 00 74 1e e8 e5 e4 0b 00 eb e4 44 RSP: 0018:ffffc9000412f6e0 EFLAGS: 00000293 RAX: 0000000000000000 RBX: 1ffff110170c8c89 RCX: ffff88802748bc00 RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000 RBP: ffffc9000412f8e0 R08: ffffffff81938eda R09: 1ffffffff2854310 R10: dffffc0000000000 R11: fffffbfff2854311 R12: dffffc0000000000 R13: ffff8880b8646448 R14: ffff8880b873fac0 R15: 0000000000000000 on_each_cpu_cond_mask+0x3f/0x80 kernel/smp.c:1051 on_each_cpu include/linux/smp.h:71 [inline] text_poke_sync arch/x86/kernel/alternative.c:2114 [inline] text_poke_bp_batch+0x352/0xb30 arch/x86/kernel/alternative.c:2324 text_poke_flush arch/x86/kernel/alternative.c:2515 [inline] text_poke_finish+0x30/0x50 arch/x86/kernel/alternative.c:2522 arch_jump_label_transform_apply+0x1c/0x30 arch/x86/kernel/jump_label.c:146 static_key_enable_cpuslocked+0x136/0x260 kernel/jump_label.c:210 static_key_enable+0x1a/0x20 kernel/jump_label.c:223 toggle_allocation_gate+0xbc/0x260 mm/kfence/core.c:849 process_one_work kernel/workqueue.c:3229 [inline] process_scheduled_works+0xa68/0x1840 kernel/workqueue.c:3310 worker_thread+0x870/0xd30 kernel/workqueue.c:3391 kthread+0x2f2/0x390 kernel/kthread.c:389 ret_from_fork+0x4d/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 net_ratelimit: 5174 callbacks suppressed bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:fd:4b:fe:30:63, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:fd:4b:fe:30:63, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:fd:4b:fe:30:63, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) net_ratelimit: 8681 callbacks suppressed bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:fd:4b:fe:30:63, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:fd:4b:fe:30:63, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:fd:4b:fe:30:63, vlan:0)