bridge0: received packet on veth0_to_bridge with own address as source address (addr:0a:80:9a:31:31:da, vlan:0)
rcu: INFO: rcu_preempt detected stalls on CPUs/tasks:
rcu: (detected by 1, t=10002 jiffies, g=3733, q=7909 ncpus=2)
rcu: All QSes seen, last rcu_preempt kthread activity 9907 (4294967779-4294957872), jiffies_till_next_fqs=1, root ->qsmask 0x0
rcu: rcu_preempt kthread starved for 9908 jiffies! g3733 f0x2 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=0
rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior.
rcu: RCU grace-period kthread stack dump:
task:rcu_preempt state:R running task stack:0 pid:18 tgid:18 ppid:2 flags:0x00004000
Call Trace:
context_switch kernel/sched/core.c:5945 [inline]
__schedule+0x1322/0x1df0 kernel/sched/core.c:7791
__schedule_loop kernel/sched/core.c:7872 [inline]
schedule+0xc6/0x240 kernel/sched/core.c:7887
schedule_timeout+0x139/0x3a0 kernel/time/timer.c:2619
rcu_gp_fqs_loop+0x2f2/0x12f0 kernel/rcu/tree.c:2053
rcu_gp_kthread+0x99/0x380 kernel/rcu/tree.c:2255
kthread+0x2ca/0x370 kernel/kthread.c:389
ret_from_fork+0x67/0xa0 arch/x86/kernel/process.c:153
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
rcu: Stack dump where RCU GP kthread last ran:
Sending NMI from CPU 1 to CPUs 0:
NMI backtrace for cpu 0
CPU: 0 UID: 0 PID: 440 Comm: kworker/0:3 Not tainted 6.12.38-syzkaller-g0d89690c20b1 #0 70853a5d0159a4d1ba77fadacda2dadb70163b96
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025
Workqueue: mld mld_query_work
RIP: 0010:stack_trace_consume_entry+0xea/0x2a0 kernel/stacktrace.c:93
Code: 67 00 4c 8b 55 d0 4d 89 f1 4c 8b 45 c8 4c 89 e2 4c 89 ff 48 8b 75 c0 4c 8b 37 45 8d 7a 01 0f b6 04 13 84 c0 0f 85 4a 01 00 00 <45> 89 38 4f 8d 3c d6 4c 89 f8 48 c1 e8 03 80 3c 10 00 74 1e 4c 89
RSP: 0018:ffffc90000006c50 EFLAGS: 00000246
RAX: 0000000000000000 RBX: 1ffff92000000dae RCX: 0000000000006c00
RDX: dffffc0000000000 RSI: ffffffff84ecac91 RDI: ffffc90000006d60
RBP: ffffc90000006c98 R08: ffffc90000006d70 R09: ffffc90000006d68
R10: 000000000000001a R11: ffffffff81743dc0 R12: ffffc90000006d6c
R13: 1ffff92000000dad R14: ffffc90000006de0 R15: 000000000000001b
FS: 0000000000000000(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f15b8011f06 CR3: 0000000107a8c000 CR4: 00000000003526b0
Call Trace:
arch_stack_walk+0x12d/0x170 arch/x86/kernel/stacktrace.c:27
stack_trace_save+0x9d/0xe0 kernel/stacktrace.c:122
kasan_save_stack mm/kasan/common.c:47 [inline]
kasan_save_track+0x3e/0x80 mm/kasan/common.c:68
kasan_save_free_info+0x4a/0x60 mm/kasan/generic.c:579
poison_slab_object mm/kasan/common.c:247 [inline]
__kasan_slab_free+0x5f/0x80 mm/kasan/common.c:264
kasan_slab_free include/linux/kasan.h:233 [inline]
slab_free_hook mm/slub.c:2418 [inline]
slab_free mm/slub.c:4667 [inline]
kmem_cache_free+0x1c1/0x510 mm/slub.c:4774
kfree_skbmem net/core/skbuff.c:-1 [inline]
__kfree_skb+0x18f/0x210 net/core/skbuff.c:1203
sk_skb_reason_drop+0xd8/0x310 net/core/skbuff.c:1240
kfree_skb_reason include/linux/skbuff.h:1271 [inline]
kfree_skb include/linux/skbuff.h:1280 [inline]
igmp6_event_query+0x243/0x2e0 net/ipv6/mcast.c:1391
icmpv6_rcv+0xec9/0x1790 net/ipv6/icmp.c:995
ip6_protocol_deliver_rcu+0xbbc/0x12d0 net/ipv6/ip6_input.c:436
ip6_input_finish net/ipv6/ip6_input.c:481 [inline]
NF_HOOK include/linux/netfilter.h:317 [inline]
ip6_input+0x1c2/0x380 net/ipv6/ip6_input.c:490
ip6_mc_input+0x35a/0x670 net/ipv6/ip6_input.c:584
dst_input include/net/dst.h:469 [inline]
ip6_rcv_finish+0x344/0x3c0 net/ipv6/ip6_input.c:79
NF_HOOK include/linux/netfilter.h:317 [inline]
ipv6_rcv+0xed/0x220 net/ipv6/ip6_input.c:309
__netif_receive_skb_one_core net/core/dev.c:5757 [inline]
__netif_receive_skb net/core/dev.c:5870 [inline]
netif_receive_skb_internal net/core/dev.c:5956 [inline]
netif_receive_skb+0x147/0x7b0 net/core/dev.c:6015
br_netif_receive_skb net/bridge/br_input.c:30 [inline]
NF_HOOK include/linux/netfilter.h:317 [inline]
br_pass_frame_up+0x126/0x1c0 net/bridge/br_input.c:70
br_handle_frame_finish+0x12d9/0x1720 net/bridge/br_input.c:221
nf_hook_bridge_pre net/bridge/br_input.c:301 [inline]
br_handle_frame+0x5a6/0xba0 net/bridge/br_input.c:424
__netif_receive_skb_core+0xf48/0x3940 net/core/dev.c:5651
__netif_receive_skb_one_core net/core/dev.c:5755 [inline]
__netif_receive_skb net/core/dev.c:5870 [inline]
process_backlog+0x3e5/0xae0 net/core/dev.c:6206
__napi_poll+0xd0/0x610 net/core/dev.c:6857
napi_poll net/core/dev.c:6926 [inline]
net_rx_action+0x584/0xce0 net/core/dev.c:7048
handle_softirqs+0x1ab/0x630 kernel/softirq.c:621
__do_softirq+0xf/0x16 kernel/softirq.c:659
do_softirq+0xa6/0x100 kernel/softirq.c:503
__local_bh_enable_ip+0x74/0x80 kernel/softirq.c:430
__raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline]
_raw_spin_unlock_bh+0x54/0x60 kernel/locking/spinlock.c:210
spin_unlock_bh include/linux/spinlock.h:396 [inline]
mld_query_work+0x951/0x2c10 net/ipv6/mcast.c:1529
process_one_work kernel/workqueue.c:3238 [inline]
process_scheduled_works+0x7d2/0x1020 kernel/workqueue.c:3319
worker_thread+0xc58/0x1250 kernel/workqueue.c:3400
kthread+0x2ca/0x370 kernel/kthread.c:389
ret_from_fork+0x67/0xa0 arch/x86/kernel/process.c:153
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
net_ratelimit: 184111 callbacks suppressed
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:0a:80:9a:31:31:da, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:0a:80:9a:31:31:da, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:0a:80:9a:31:31:da, vlan:0)
net_ratelimit: 206168 callbacks suppressed
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:0a:80:9a:31:31:da, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:0a:80:9a:31:31:da, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)