bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:e4:da:b9:c1:6e, vlan:0)
rcu: INFO: rcu_preempt detected stalls on CPUs/tasks:
rcu: 	Tasks blocked on level-0 rcu_node (CPUs 0-1): P7080/3:b..l P7084/1:b..l
rcu: 	(detected by 1, t=10503 jiffies, g=14057, q=1028 ncpus=2)
task:syz.4.300       state:R  running task     stack:23728 pid:7084  tgid:7079  ppid:5831   flags:0x00004002
Call Trace:
 <TASK>
 context_switch kernel/sched/core.c:5369 [inline]
 __schedule+0x1850/0x4c30 kernel/sched/core.c:6756
 preempt_schedule_irq+0xfb/0x1c0 kernel/sched/core.c:7078
 irqentry_exit+0x5e/0x90 kernel/entry/common.c:354
 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702
RIP: 0010:__sanitizer_cov_trace_const_cmp8+0x4/0x90 kernel/kcov.c:322
Code: 0a 18 4c 89 44 0a 20 c3 cc cc cc cc 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa <4c> 8b 04 24 65 48 8b 0c 25 00 d6 03 00 65 8b 05 d0 72 64 7e 25 00
RSP: 0018:ffffc9000ba07698 EFLAGS: 00000246
RAX: ffffffff81f216c0 RBX: 0000000000000000 RCX: ffff88807e5c1e00
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
RBP: ffffc9000ba07750 R08: ffffffff81f216ae R09: 1ffffffff2853f10
R10: dffffc0000000000 R11: fffffbfff2853f11 R12: 0200000000000000
R13: 000000005d589067 R14: dffffc0000000000 R15: ffffc9000ba077e0
 __pte_offset_map+0x26e/0x380 mm/pgtable-generic.c:296
 __pte_offset_map_lock+0xc7/0x300 mm/pgtable-generic.c:398
 pte_offset_map_lock include/linux/mm.h:3026 [inline]
 follow_page_pte+0x119/0x1ca0 mm/gup.c:855
 follow_pmd_mask mm/gup.c:978 [inline]
 follow_pud_mask mm/gup.c:1030 [inline]
 follow_p4d_mask mm/gup.c:1047 [inline]
 follow_page_mask mm/gup.c:1090 [inline]
 __get_user_pages+0xb90/0x49e0 mm/gup.c:1492
 populate_vma_page_range+0x264/0x330 mm/gup.c:1932
 __mm_populate+0x27a/0x460 mm/gup.c:2035
 mm_populate include/linux/mm.h:3386 [inline]
 vm_mmap_pgoff+0x2c3/0x3d0 mm/util.c:585
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f47a8f85d19
RSP: 002b:00007f47a9dd1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000009
RAX: ffffffffffffffda RBX: 00007f47a9176080 RCX: 00007f47a8f85d19
RDX: 0000000002000004 RSI: 0000000000c00000 RDI: 0000000020001000
RBP: 00007f47a9001a20 R08: ffffffffffffffff R09: 0000000000000000
R10: 000000000003b071 R11: 0000000000000246 R12: 0000000000000000
R13: 0000000000000000 R14: 00007f47a9176080 R15: 00007ffd718d0128
 </TASK>
task:syz.4.300       state:R  running task     stack:23696 pid:7080  tgid:7079  ppid:5831   flags:0x00004002
Call Trace:
 <TASK>
 context_switch kernel/sched/core.c:5369 [inline]
 __schedule+0x1850/0x4c30 kernel/sched/core.c:6756
 preempt_schedule_common+0x84/0xd0 kernel/sched/core.c:6935
 preempt_schedule+0xe1/0xf0 kernel/sched/core.c:6959
 preempt_schedule_thunk+0x1a/0x30 arch/x86/entry/thunk.S:12
 __raw_spin_unlock include/linux/spinlock_api_smp.h:143 [inline]
 _raw_spin_unlock+0x3e/0x50 kernel/locking/spinlock.c:186
 spin_unlock include/linux/spinlock.h:391 [inline]
 filemap_map_pages+0x13ce/0x1900 mm/filemap.c:3689
 do_fault_around mm/memory.c:5280 [inline]
 do_read_fault mm/memory.c:5313 [inline]
 do_fault mm/memory.c:5456 [inline]
 do_pte_missing mm/memory.c:3979 [inline]
 handle_pte_fault+0x3888/0x5ed0 mm/memory.c:5801
 __handle_mm_fault mm/memory.c:5944 [inline]
 handle_mm_fault+0x1106/0x1bb0 mm/memory.c:6112
 faultin_page mm/gup.c:1196 [inline]
 __get_user_pages+0x1c82/0x49e0 mm/gup.c:1494
 populate_vma_page_range+0x264/0x330 mm/gup.c:1932
 __mm_populate+0x27a/0x460 mm/gup.c:2035
 mm_populate include/linux/mm.h:3386 [inline]
 vm_mmap_pgoff+0x2c3/0x3d0 mm/util.c:585
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f47a8f85d19
RSP: 002b:00007f47a9df2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000009
RAX: ffffffffffffffda RBX: 00007f47a9175fa0 RCX: 00007f47a8f85d19
RDX: 0000000002000004 RSI: 0000000000c00000 RDI: 0000000020001000
RBP: 00007f47a9001a20 R08: ffffffffffffffff R09: 0000000000000000
R10: 000000000003b071 R11: 0000000000000246 R12: 0000000000000000
R13: 0000000000000000 R14: 00007f47a9175fa0 R15: 00007ffd718d0128
 </TASK>
rcu: rcu_preempt kthread starved for 9145 jiffies! g14057 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=1
rcu: 	Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior.
rcu: RCU grace-period kthread stack dump:
task:rcu_preempt     state:R  running task     stack:26072 pid:17    tgid:17    ppid:2      flags:0x00004000
Call Trace:
 <TASK>
 context_switch kernel/sched/core.c:5369 [inline]
 __schedule+0x1850/0x4c30 kernel/sched/core.c:6756
 __schedule_loop kernel/sched/core.c:6833 [inline]
 schedule+0x14b/0x320 kernel/sched/core.c:6848
 schedule_timeout+0x15a/0x290 kernel/time/sleep_timeout.c:99
 rcu_gp_fqs_loop+0x2df/0x1330 kernel/rcu/tree.c:2045
 rcu_gp_kthread+0xa7/0x3b0 kernel/rcu/tree.c:2247
 kthread+0x2f0/0x390 kernel/kthread.c:389
 ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
 </TASK>
rcu: Stack dump where RCU GP kthread last ran:
CPU: 1 UID: 0 PID: 24 Comm: ksoftirqd/1 Not tainted 6.13.0-rc2-syzkaller-00146-g922b4b955a03 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/25/2024
RIP: 0010:ipv6_addr_equal include/net/ipv6.h:673 [inline]
RIP: 0010:ipv6_chk_mcast_addr+0x202/0x840 net/ipv6/mcast.c:1026
Code: 74 08 48 89 ef e8 ce b8 90 f7 48 89 6c 24 08 48 8b 6d 00 48 8b 44 24 18 42 80 3c 20 00 74 08 4c 89 ff e8 b1 b8 90 f7 4d 89 fd <4d> 8b 37 48 8b 44 24 08 48 8d 58 08 48 89 d8 48 c1 e8 03 42 80 3c
RSP: 0018:ffffc900001e6838 EFLAGS: 00000246
RAX: 1ffff11008e999e5 RBX: 0000000000000001 RCX: ffff88801d2f8000
RDX: 0000000000000100 RSI: 0000000000000001 RDI: 0000000000000000
RBP: 00000000000001ff R08: ffffffff8a75073b R09: 1ffffffff2853f10
R10: dffffc0000000000 R11: fffffbfff2853f11 R12: dffffc0000000000
R13: ffff8880474ccf28 R14: 00000000000002ff R15: ffff8880474ccf28
FS:  0000000000000000(0000) GS:ffff8880b8700000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000560e3613fd88 CR3: 00000000336d2000 CR4: 00000000003526f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 <IRQ>
 </IRQ>
 <TASK>
 ip6_mc_input+0x500/0xc30 net/ipv6/ip6_input.c:521
 ip_sabotage_in+0x203/0x290 net/bridge/br_netfilter_hooks.c:1021
 nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline]
 nf_hook_slow+0xc3/0x220 net/netfilter/core.c:626
 nf_hook include/linux/netfilter.h:269 [inline]
 NF_HOOK+0x29e/0x450 include/linux/netfilter.h:312
 __netif_receive_skb_one_core net/core/dev.c:5672 [inline]
 __netif_receive_skb+0x1ea/0x650 net/core/dev.c:5785
 netif_receive_skb_internal net/core/dev.c:5871 [inline]
 netif_receive_skb+0x1e8/0x890 net/core/dev.c:5930
 NF_HOOK+0x9e/0x400 include/linux/netfilter.h:314
 br_handle_frame_finish+0x18ed/0x1fe0
 br_nf_hook_thresh+0x472/0x590
 br_nf_pre_routing_finish_ipv6+0xaa0/0xdd0
 NF_HOOK include/linux/netfilter.h:314 [inline]
 br_nf_pre_routing_ipv6+0x379/0x770 net/bridge/br_netfilter_ipv6.c:184
 nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline]
 nf_hook_bridge_pre net/bridge/br_input.c:277 [inline]
 br_handle_frame+0x9fd/0x1530 net/bridge/br_input.c:424
 __netif_receive_skb_core+0x14eb/0x4690 net/core/dev.c:5566
 __netif_receive_skb_one_core net/core/dev.c:5670 [inline]
 __netif_receive_skb+0x12f/0x650 net/core/dev.c:5785
 process_backlog+0x662/0x15b0 net/core/dev.c:6117
 __napi_poll+0xcb/0x490 net/core/dev.c:6883
 napi_poll net/core/dev.c:6952 [inline]
 net_rx_action+0x89b/0x1240 net/core/dev.c:7074
 handle_softirqs+0x2d4/0x9b0 kernel/softirq.c:561
 run_ksoftirqd+0xca/0x130 kernel/softirq.c:950
 smpboot_thread_fn+0x544/0xa30 kernel/smpboot.c:164
 kthread+0x2f0/0x390 kernel/kthread.c:389
 ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
 </TASK>
net_ratelimit: 23248 callbacks suppressed
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:e4:da:b9:c1:6e, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:e4:da:b9:c1:6e, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:06:e4:da:b9:c1:6e, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)