bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
rcu: INFO: rcu_preempt detected stalls on CPUs/tasks:
rcu: (detected by 1, t=10002 jiffies, g=2217, q=1579 ncpus=2)
rcu: All QSes seen, last rcu_preempt kthread activity 9904 (4294959508-4294949604), jiffies_till_next_fqs=1, root ->qsmask 0x0
rcu: rcu_preempt kthread starved for 9905 jiffies! g2217 f0x2 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=0
rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior.
rcu: RCU grace-period kthread stack dump:
task:rcu_preempt state:R running task stack:0 pid:18 tgid:18 ppid:2 flags:0x00004000
Call Trace:
context_switch kernel/sched/core.c:5945 [inline]
__schedule+0x1322/0x1df0 kernel/sched/core.c:7791
__schedule_loop kernel/sched/core.c:7872 [inline]
schedule+0xc6/0x240 kernel/sched/core.c:7887
schedule_timeout+0x139/0x3a0 kernel/time/timer.c:2619
rcu_gp_fqs_loop+0x2f2/0x12f0 kernel/rcu/tree.c:2053
rcu_gp_kthread+0x99/0x380 kernel/rcu/tree.c:2255
kthread+0x2c7/0x370 kernel/kthread.c:389
ret_from_fork+0x67/0xa0 arch/x86/kernel/process.c:153
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
rcu: Stack dump where RCU GP kthread last ran:
Sending NMI from CPU 1 to CPUs 0:
NMI backtrace for cpu 0
CPU: 0 UID: 0 PID: 66 Comm: kworker/R-mld Not tainted syzkaller #0 a8cf528afde17777b8d0df17d514b1350887467d
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025
Workqueue: mld mld_query_work
RIP: 0010:filter_irq_stacks+0x6c/0xa0 kernel/stacktrace.c:398
Code: 04 de 48 3d 30 02 a0 85 0f 93 c1 48 3d 90 17 a0 85 0f 92 c2 84 d1 75 27 48 3d e0 2e 8e 85 0f 92 c1 48 3d 06 2f 8e 85 0f 93 c0 <08> c8 74 11 48 ff c3 49 83 c7 08 49 39 dc 75 ae 44 89 e3 eb 06 ff
RSP: 0018:ffffc90000007038 EFLAGS: 00000283
RAX: ffffffff84ffe000 RBX: 000000000000000c RCX: 0000000000000001
RDX: 0000000000000001 RSI: 000000000000001c RDI: ffffc900000070e0
RBP: ffffc90000007060 R08: ffffc90000007070 R09: ffffc90000007068
R10: 000000000000001b R11: ffffffff81744340 R12: 000000000000001c
R13: dffffc0000000000 R14: ffffc900000070e0 R15: ffffc90000007140
FS: 0000000000000000(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00005631c6f8db18 CR3: 0000000120330000 CR4: 00000000003526b0
Call Trace:
stack_depot_save_flags+0x38/0x800 lib/stackdepot.c:609
kasan_save_stack mm/kasan/common.c:48 [inline]
kasan_save_track+0x4f/0x80 mm/kasan/common.c:68
kasan_save_free_info+0x4a/0x60 mm/kasan/generic.c:579
poison_slab_object mm/kasan/common.c:247 [inline]
__kasan_slab_free+0x5f/0x80 mm/kasan/common.c:264
kasan_slab_free include/linux/kasan.h:233 [inline]
slab_free_hook mm/slub.c:2418 [inline]
slab_free mm/slub.c:4667 [inline]
kmem_cache_free+0x1c1/0x510 mm/slub.c:4774
kfree_skbmem net/core/skbuff.c:-1 [inline]
__kfree_skb+0x18f/0x210 net/core/skbuff.c:1203
sk_skb_reason_drop+0xd8/0x310 net/core/skbuff.c:1240
kfree_skb_reason include/linux/skbuff.h:1271 [inline]
kfree_skb include/linux/skbuff.h:1280 [inline]
ip6_mc_input+0x4f3/0x670 net/ipv6/ip6_input.c:587
dst_input include/net/dst.h:469 [inline]
ip6_rcv_finish+0x341/0x3c0 net/ipv6/ip6_input.c:79
NF_HOOK include/linux/netfilter.h:317 [inline]
ipv6_rcv+0xed/0x220 net/ipv6/ip6_input.c:309
__netif_receive_skb_one_core net/core/dev.c:5757 [inline]
__netif_receive_skb net/core/dev.c:5870 [inline]
netif_receive_skb_internal net/core/dev.c:5956 [inline]
netif_receive_skb+0x147/0x7b0 net/core/dev.c:6015
br_netif_receive_skb net/bridge/br_input.c:30 [inline]
NF_HOOK include/linux/netfilter.h:317 [inline]
br_pass_frame_up+0x126/0x1c0 net/bridge/br_input.c:70
br_handle_frame_finish+0x12d9/0x1720 net/bridge/br_input.c:221
nf_hook_bridge_pre net/bridge/br_input.c:301 [inline]
br_handle_frame+0x5a6/0xba0 net/bridge/br_input.c:424
__netif_receive_skb_core+0xf4b/0x3940 net/core/dev.c:5651
__netif_receive_skb_one_core net/core/dev.c:5755 [inline]
__netif_receive_skb net/core/dev.c:5870 [inline]
process_backlog+0x3e5/0xae0 net/core/dev.c:6206
__napi_poll+0xd3/0x610 net/core/dev.c:6857
napi_poll net/core/dev.c:6926 [inline]
net_rx_action+0x584/0xce0 net/core/dev.c:7048
handle_softirqs+0x1ab/0x630 kernel/softirq.c:621
__do_softirq+0xf/0x16 kernel/softirq.c:659
do_softirq+0xa6/0x100 kernel/softirq.c:503
__local_bh_enable_ip+0x74/0x80 kernel/softirq.c:430
__raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline]
_raw_spin_unlock_bh+0x54/0x60 kernel/locking/spinlock.c:210
spin_unlock_bh include/linux/spinlock.h:396 [inline]
mld_query_work+0x951/0x2c10 net/ipv6/mcast.c:1529
process_one_work kernel/workqueue.c:3238 [inline]
process_scheduled_works+0x7d5/0x1020 kernel/workqueue.c:3319
rescuer_thread+0x912/0xfd0 kernel/workqueue.c:3496
kthread+0x2c7/0x370 kernel/kthread.c:389
ret_from_fork+0x67/0xa0 arch/x86/kernel/process.c:153
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
net_ratelimit: 136037 callbacks suppressed
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:de:4e:da:5e:c4, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:de:4e:da:5e:c4, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
net_ratelimit: 134883 callbacks suppressed
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:de:4e:da:5e:c4, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:de:4e:da:5e:c4, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:de:4e:da:5e:c4, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)