bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:d3:47:33:56:02, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
rcu: INFO: rcu_preempt detected stalls on CPUs/tasks:
rcu: Tasks blocked on level-0 rcu_node (CPUs 0-1): P13431/2:b..l
rcu: (detected by 0, t=10502 jiffies, g=46317, q=228 ncpus=2)
task:syz-executor state:R running task stack:25144 pid:13431 tgid:13431 ppid:13412 task_flags:0x400140 flags:0x00004002
Call Trace:
context_switch kernel/sched/core.c:5367 [inline]
__schedule+0x1129/0x5c00 kernel/sched/core.c:6748
preempt_schedule_irq+0x51/0x90 kernel/sched/core.c:7070
irqentry_exit+0x36/0x90 kernel/entry/common.c:354
asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702
RIP: 0010:bpf_tree_comp kernel/bpf/core.c:642 [inline]
RIP: 0010:__lt_find include/linux/rbtree_latch.h:115 [inline]
RIP: 0010:latch_tree_find include/linux/rbtree_latch.h:210 [inline]
RIP: 0010:bpf_ksym_find+0xa0/0x1c0 kernel/bpf/core.c:740
Code: de e8 b4 da f0 ff 4a 8d 2c 33 48 8d bd e0 fd ff ff 48 89 f8 48 c1 e8 03 42 80 3c 28 00 0f 85 f1 00 00 00 4c 8b bd e0 fd ff ff <4c> 89 e7 4c 89 fe e8 25 d5 f0 ff 4d 39 fc 0f 82 b9 00 00 00 e8 77
RSP: 0018:ffffc9000ee27808 EFLAGS: 00000246
RAX: 1ffffffff201fb1b RBX: ffffffff900fdaf8 RCX: ffffffff81cbb902
RDX: ffff88801ebf4880 RSI: ffffffff81ca1b8c RDI: ffffffff900fd8d8
RBP: ffffffff900fdaf8 R08: 0000000000000001 R09: 0000000000000000
R10: 0000000000000001 R11: 0000000000000000 R12: 00007f116838f087
R13: dffffc0000000000 R14: 0000000000000000 R15: ffffffffa0003c00
is_bpf_text_address+0x58/0x1a0 kernel/bpf/core.c:773
kernel_text_address kernel/extable.c:125 [inline]
kernel_text_address+0x8d/0x100 kernel/extable.c:94
__kernel_text_address+0xd/0x40 kernel/extable.c:79
unwind_get_return_address+0x59/0xa0 arch/x86/kernel/unwind_orc.c:369
arch_stack_walk+0xa6/0x100 arch/x86/kernel/stacktrace.c:26
stack_trace_save+0x8e/0xc0 kernel/stacktrace.c:122
save_stack+0x160/0x1f0 mm/page_owner.c:156
__reset_page_owner+0x8d/0x400 mm/page_owner.c:297
reset_page_owner include/linux/page_owner.h:25 [inline]
free_pages_prepare mm/page_alloc.c:1127 [inline]
free_frozen_pages+0x6d8/0xf40 mm/page_alloc.c:2660
qlink_free mm/kasan/quarantine.c:163 [inline]
qlist_free_all+0x4e/0x120 mm/kasan/quarantine.c:179
kasan_quarantine_reduce+0x195/0x1e0 mm/kasan/quarantine.c:286
__kasan_kmalloc+0x8a/0xb0 mm/kasan/common.c:385
kmalloc_noprof include/linux/slab.h:902 [inline]
kzalloc_noprof include/linux/slab.h:1036 [inline]
ref_tracker_alloc+0x18e/0x5b0 lib/ref_tracker.c:203
__netns_tracker_alloc include/net/net_namespace.h:354 [inline]
netns_tracker_alloc include/net/net_namespace.h:363 [inline]
get_net_track include/net/net_namespace.h:380 [inline]
sk_alloc+0x206/0xc20 net/core/sock.c:2246
unix_create1+0xa6/0x6c0 net/unix/af_unix.c:1021
unix_create+0x10e/0x1d0 net/unix/af_unix.c:1091
__sock_create+0x335/0x8d0 net/socket.c:1548
sock_create net/socket.c:1606 [inline]
__sys_socket_create net/socket.c:1643 [inline]
__sys_socket+0x14d/0x260 net/socket.c:1690
__do_sys_socket net/socket.c:1704 [inline]
__se_sys_socket net/socket.c:1702 [inline]
__x64_sys_socket+0x72/0xb0 net/socket.c:1702
do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
do_syscall_64+0xcd/0x260 arch/x86/entry/syscall_64.c:94
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f116838f087
RSP: 002b:00007ffd1e6a7048 EFLAGS: 00000246 ORIG_RAX: 0000000000000029
RAX: ffffffffffffffda RBX: 00007ffd1e6a7320 RCX: 00007f116838f087
RDX: 0000000000000000 RSI: 0000000000080002 RDI: 0000000000000001
RBP: 00007ffd1e6a7060 R08: 0000000000000001 R09: 00305f6576616c73
R10: 00000000ffffffff R11: 0000000000000246 R12: 0000000000000003
R13: 00007f11690d4620 R14: 0000000000000000 R15: 0000000000000000
rcu: rcu_preempt kthread starved for 8732 jiffies! g46317 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=1
rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior.
rcu: RCU grace-period kthread stack dump:
task:rcu_preempt state:R running task stack:26696 pid:16 tgid:16 ppid:2 task_flags:0x208040 flags:0x00004000
Call Trace:
context_switch kernel/sched/core.c:5367 [inline]
__schedule+0x1129/0x5c00 kernel/sched/core.c:6748
__schedule_loop kernel/sched/core.c:6825 [inline]
schedule+0xe7/0x3a0 kernel/sched/core.c:6840
schedule_timeout+0x123/0x280 kernel/time/sleep_timeout.c:99
rcu_gp_fqs_loop+0x1ea/0xb00 kernel/rcu/tree.c:2046
rcu_gp_kthread+0x270/0x380 kernel/rcu/tree.c:2248
kthread+0x3a4/0x760 kernel/kthread.c:464
ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:153
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245
rcu: Stack dump where RCU GP kthread last ran:
Sending NMI from CPU 0 to CPUs 1:
NMI backtrace for cpu 1 skipped: idling at native_safe_halt arch/x86/include/asm/irqflags.h:48 [inline]
NMI backtrace for cpu 1 skipped: idling at arch_safe_halt arch/x86/include/asm/irqflags.h:106 [inline]
NMI backtrace for cpu 1 skipped: idling at acpi_safe_halt+0x1a/0x20 drivers/acpi/processor_idle.c:111
net_ratelimit: 3926 callbacks suppressed
bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:d3:47:33:56:02, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:d3:47:33:56:02, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:d3:47:33:56:02, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:d3:47:33:56:02, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:d3:47:33:56:02, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
net_ratelimit: 4408 callbacks suppressed
bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:d3:47:33:56:02, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:d3:47:33:56:02, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:d3:47:33:56:02, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:d3:47:33:56:02, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:d3:47:33:56:02, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)