bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: rcu: Tasks blocked on level-0 rcu_node (CPUs 0-1): P5176/1:b..l P18152/1:b..l P5817/1:b..l P5806/2:b..l rcu: (detected by 1, t=10503 jiffies, g=48341, q=572 ncpus=2) task:syz-executor state:R running task stack:22400 pid:5806 tgid:5806 ppid:5804 flags:0x00004002 Call Trace: context_switch kernel/sched/core.c:5369 [inline] __schedule+0xe58/0x5ad0 kernel/sched/core.c:6756 preempt_schedule_common+0x44/0xc0 kernel/sched/core.c:6935 preempt_schedule_thunk+0x1a/0x30 arch/x86/entry/thunk.S:12 __local_bh_enable_ip+0x107/0x120 kernel/softirq.c:396 local_bh_enable include/linux/bottom_half.h:33 [inline] rcu_read_unlock_bh include/linux/rcupdate.h:919 [inline] __dev_queue_xmit+0x8b0/0x43e0 net/core/dev.c:4493 dev_queue_xmit include/linux/netdevice.h:3168 [inline] neigh_hh_output include/net/neighbour.h:523 [inline] neigh_output include/net/neighbour.h:537 [inline] ip_finish_output2+0xc6c/0x2150 net/ipv4/ip_output.c:236 __ip_finish_output net/ipv4/ip_output.c:314 [inline] __ip_finish_output+0x49e/0x950 net/ipv4/ip_output.c:296 ip_finish_output+0x35/0x380 net/ipv4/ip_output.c:324 NF_HOOK_COND include/linux/netfilter.h:303 [inline] ip_output+0x13b/0x2a0 net/ipv4/ip_output.c:434 dst_output include/net/dst.h:450 [inline] ip_local_out+0x33e/0x4a0 net/ipv4/ip_output.c:130 __ip_queue_xmit+0x777/0x1970 net/ipv4/ip_output.c:536 __tcp_transmit_skb+0x2b39/0x3e10 net/ipv4/tcp_output.c:1468 tcp_transmit_skb net/ipv4/tcp_output.c:1486 [inline] tcp_write_xmit+0x12b1/0x8560 net/ipv4/tcp_output.c:2829 __tcp_push_pending_frames+0xaf/0x390 net/ipv4/tcp_output.c:3012 tcp_push+0x221/0x6f0 net/ipv4/tcp.c:751 tcp_sendmsg_locked+0x28d1/0x3770 net/ipv4/tcp.c:1326 tcp_sendmsg+0x2e/0x50 net/ipv4/tcp.c:1358 inet_sendmsg+0xb9/0x140 net/ipv4/af_inet.c:851 sock_sendmsg_nosec net/socket.c:711 [inline] __sock_sendmsg net/socket.c:726 [inline] sock_write_iter+0x4ac/0x5b0 net/socket.c:1147 new_sync_write fs/read_write.c:586 [inline] vfs_write+0x5ae/0x1150 fs/read_write.c:679 ksys_write+0x207/0x250 fs/read_write.c:731 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f05ed7847a0 RSP: 002b:00007ffffe213938 EFLAGS: 00000202 ORIG_RAX: 0000000000000001 RAX: ffffffffffffffda RBX: 00000003a8080600 RCX: 00007f05ed7847a0 RDX: 0000000000000098 RSI: 00007f05e7bfff68 RDI: 0000000000000003 RBP: 0000000000000000 R08: 0000000000000007 R09: 0000000000dffde8 R10: e2b70aedc252b2ea R11: 0000000000000202 R12: 0000000000000098 R13: 000055557d3318d0 R14: 00007ffffe213e40 R15: 00007f05e7bfff68 task:syz-executor state:R running task stack:22048 pid:5817 tgid:5817 ppid:5815 flags:0x00000002 Call Trace: context_switch kernel/sched/core.c:5369 [inline] __schedule+0xe58/0x5ad0 kernel/sched/core.c:6756 preempt_schedule_common+0x44/0xc0 kernel/sched/core.c:6935 preempt_schedule_thunk+0x1a/0x30 arch/x86/entry/thunk.S:12 __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:152 [inline] _raw_spin_unlock_irqrestore+0x61/0x80 kernel/locking/spinlock.c:194 spin_unlock_irqrestore include/linux/spinlock.h:406 [inline] avc_reclaim_node security/selinux/avc.c:488 [inline] avc_alloc_node+0x365/0x5a0 security/selinux/avc.c:507 avc_insert security/selinux/avc.c:618 [inline] avc_compute_av+0xfd/0x5c0 security/selinux/avc.c:993 avc_perm_nonode+0xaa/0x180 security/selinux/avc.c:1117 avc_has_perm_noaudit+0x2d2/0x3a0 security/selinux/avc.c:1160 selinux_inode_permission+0x361/0x590 security/selinux/hooks.c:3118 security_inode_permission+0xda/0x260 security/security.c:2319 inode_permission fs/namei.c:600 [inline] inode_permission+0x17a/0x5f0 fs/namei.c:567 may_lookup fs/namei.c:1819 [inline] link_path_walk.part.0.constprop.0+0x1d7/0xd40 fs/namei.c:2425 link_path_walk fs/namei.c:2409 [inline] path_openat+0x228/0x2d60 fs/namei.c:3983 do_filp_open+0x20c/0x470 fs/namei.c:4014 do_sys_openat2+0x17a/0x1e0 fs/open.c:1402 do_sys_open fs/open.c:1417 [inline] __do_sys_openat fs/open.c:1433 [inline] __se_sys_openat fs/open.c:1428 [inline] __x64_sys_openat+0x175/0x210 fs/open.c:1428 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f175f584690 RSP: 002b:00007ffc988bf1a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007f175f584690 RDX: 0000000000000002 RSI: 00007ffc988bf2a0 RDI: 00000000ffffff9c RBP: 00007ffc988bf2a0 R08: 0000000000000000 R09: 00007ffc988bef67 R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000061 R13: 000000000004c937 R14: 00007ffc988bf2a0 R15: 000000000000048b task:syz.3.5892 state:R running task stack:27888 pid:18152 tgid:18152 ppid:5820 flags:0x00004004 Call Trace: context_switch kernel/sched/core.c:5369 [inline] __schedule+0xe58/0x5ad0 kernel/sched/core.c:6756 preempt_schedule_common+0x44/0xc0 kernel/sched/core.c:6935 preempt_schedule_thunk+0x1a/0x30 arch/x86/entry/thunk.S:12 __raw_spin_unlock include/linux/spinlock_api_smp.h:143 [inline] _raw_spin_unlock+0x3e/0x50 kernel/locking/spinlock.c:186 spin_unlock include/linux/spinlock.h:391 [inline] zap_pte_range mm/memory.c:1705 [inline] zap_pmd_range mm/memory.c:1753 [inline] zap_pud_range mm/memory.c:1782 [inline] zap_p4d_range mm/memory.c:1803 [inline] unmap_page_range+0xb87/0x3d10 mm/memory.c:1824 unmap_single_vma+0x194/0x2b0 mm/memory.c:1870 unmap_vmas+0x22f/0x490 mm/memory.c:1914 exit_mmap+0x1c6/0xb20 mm/mmap.c:1672 __mmput+0x12a/0x4c0 kernel/fork.c:1348 mmput+0x62/0x70 kernel/fork.c:1370 exit_mm kernel/exit.c:570 [inline] do_exit+0x9ba/0x2d70 kernel/exit.c:925 do_group_exit+0xd3/0x2a0 kernel/exit.c:1087 get_signal+0x24ed/0x26c0 kernel/signal.c:3017 arch_do_signal_or_restart+0x90/0x7e0 arch/x86/kernel/signal.c:337 exit_to_user_mode_loop kernel/entry/common.c:111 [inline] exit_to_user_mode_prepare include/linux/entry-common.h:329 [inline] __syscall_exit_to_user_mode_work kernel/entry/common.c:207 [inline] syscall_exit_to_user_mode+0x150/0x2a0 kernel/entry/common.c:218 do_syscall_64+0xda/0x250 arch/x86/entry/common.c:89 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7fcb1c585d63 RSP: 002b:00007ffe658fc398 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 RAX: 0000001b2f260000 RBX: 0000000000600000 RCX: 00007fcb1c585d63 RDX: 0000000000000003 RSI: 00000000005c0000 RDI: 0000001b2f260000 RBP: 0000001b2f260000 R08: 0000000000000004 R09: 0000000000040000 R10: 0000000000000011 R11: 0000000000000246 R12: 0000000000000032 R13: 000000000004c10b R14: 00007ffe658fc680 R15: 00007ffe658fc680 task:syslogd state:R running task stack:24208 pid:5176 tgid:5176 ppid:1 flags:0x00000002 Call Trace: context_switch kernel/sched/core.c:5369 [inline] __schedule+0xe58/0x5ad0 kernel/sched/core.c:6756 preempt_schedule_common+0x44/0xc0 kernel/sched/core.c:6935 preempt_schedule_thunk+0x1a/0x30 arch/x86/entry/thunk.S:12 __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:152 [inline] _raw_spin_unlock_irqrestore+0x61/0x80 kernel/locking/spinlock.c:194 spin_unlock_irqrestore include/linux/spinlock.h:406 [inline] avc_reclaim_node security/selinux/avc.c:488 [inline] avc_alloc_node+0x365/0x5a0 security/selinux/avc.c:507 avc_insert security/selinux/avc.c:618 [inline] avc_compute_av+0xfd/0x5c0 security/selinux/avc.c:993 avc_perm_nonode+0xaa/0x180 security/selinux/avc.c:1117 avc_has_perm_noaudit+0x2d2/0x3a0 security/selinux/avc.c:1160 selinux_inode_permission+0x361/0x590 security/selinux/hooks.c:3118 security_inode_permission+0xda/0x260 security/security.c:2319 inode_permission fs/namei.c:600 [inline] inode_permission+0x17a/0x5f0 fs/namei.c:567 may_lookup fs/namei.c:1819 [inline] link_path_walk.part.0.constprop.0+0x1d7/0xd40 fs/namei.c:2425 link_path_walk fs/namei.c:2409 [inline] path_openat+0x228/0x2d60 fs/namei.c:3983 do_filp_open+0x20c/0x470 fs/namei.c:4014 do_sys_openat2+0x17a/0x1e0 fs/open.c:1402 do_sys_open fs/open.c:1417 [inline] __do_sys_openat fs/open.c:1433 [inline] __se_sys_openat fs/open.c:1428 [inline] __x64_sys_openat+0x175/0x210 fs/open.c:1428 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f66d8b4c9a4 RSP: 002b:00007ffc6d7e7d40 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007f66d8b4c9a4 RDX: 0000000000000901 RSI: 00007f66d8ceb3b3 RDI: 00000000ffffff9c RBP: 00007f66d8ceb3b3 R08: 0000000000000001 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000901 R13: 0000000000000901 R14: 0000000000000901 R15: 000055d0db3f8410 rcu: rcu_preempt kthread starved for 10624 jiffies! g48341 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=0 rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. rcu: RCU grace-period kthread stack dump: task:rcu_preempt state:R running task stack:28472 pid:17 tgid:17 ppid:2 flags:0x00004000 Call Trace: context_switch kernel/sched/core.c:5369 [inline] __schedule+0xe58/0x5ad0 kernel/sched/core.c:6756 __schedule_loop kernel/sched/core.c:6833 [inline] schedule+0xe7/0x350 kernel/sched/core.c:6848 schedule_timeout+0x124/0x280 kernel/time/sleep_timeout.c:99 rcu_gp_fqs_loop+0x1eb/0xb00 kernel/rcu/tree.c:2045 rcu_gp_kthread+0x271/0x380 kernel/rcu/tree.c:2247 kthread+0x2c1/0x3a0 kernel/kthread.c:389 ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 rcu: Stack dump where RCU GP kthread last ran: Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 5831 Comm: kworker/0:3 Not tainted 6.13.0-rc6-syzkaller-00231-g77a903cd8e5a #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Workqueue: events dvb_usb_read_remote_control RIP: 0010:rcu_is_watching_curr_cpu include/linux/context_tracking.h:128 [inline] RIP: 0010:rcu_is_watching+0x41/0xc0 kernel/rcu/tree.c:737 Code: 03 00 83 f8 07 89 c5 0f 87 82 00 00 00 48 8d 3c ed e0 7c a7 8d 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 80 3c 02 00 <75> 5c 48 03 1c ed e0 7c a7 8d 48 b8 00 00 00 00 00 fc ff df 48 89 RSP: 0018:ffffc900000069b0 EFLAGS: 00000246 RAX: dffffc0000000000 RBX: 0000000000037f68 RCX: ffffffff89db996c RDX: 1ffffffff1b4ef9c RSI: ffffffff8bd1ed20 RDI: ffffffff8da77ce0 RBP: 0000000000000000 R08: 0000000000000005 R09: 0000000000000000 R10: 0000000000000001 R11: 0000000000000005 R12: 0000000000000001 R13: ffffc90000006cd8 R14: 0000000000000000 R15: ffff888034d2d8b8 FS: 0000000000000000(0000) GS:ffff8880b8600000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fcb1d2a5690 CR3: 000000000df7e000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: rcu_read_lock_held_common kernel/rcu/update.c:109 [inline] rcu_read_lock_held+0x1e/0x50 kernel/rcu/update.c:349 __find_rr_leaf+0x36d/0xe00 net/ipv6/route.c:800 find_rr_leaf net/ipv6/route.c:856 [inline] rt6_select net/ipv6/route.c:900 [inline] fib6_table_lookup+0x57e/0xa30 net/ipv6/route.c:2195 ip6_pol_route+0x1cd/0x1120 net/ipv6/route.c:2231 pol_lookup_func include/net/ip6_fib.h:616 [inline] fib6_rule_lookup+0x536/0x720 net/ipv6/fib6_rules.c:117 ip6_route_input_lookup net/ipv6/route.c:2300 [inline] ip6_route_input+0x663/0xc10 net/ipv6/route.c:2596 ip6_rcv_finish_core.constprop.0+0x1a0/0x5d0 net/ipv6/ip6_input.c:66 ip6_rcv_finish+0x12c/0x5b0 net/ipv6/ip6_input.c:77 ip_sabotage_in+0x21b/0x290 net/bridge/br_netfilter_hooks.c:1021 nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline] nf_hook_slow+0xbb/0x200 net/netfilter/core.c:626 nf_hook.constprop.0+0x42e/0x750 include/linux/netfilter.h:269 NF_HOOK include/linux/netfilter.h:312 [inline] ipv6_rcv+0xa4/0x680 net/ipv6/ip6_input.c:309 __netif_receive_skb_one_core+0x12e/0x1e0 net/core/dev.c:5704 __netif_receive_skb+0x1d/0x160 net/core/dev.c:5817 netif_receive_skb_internal net/core/dev.c:5903 [inline] netif_receive_skb+0x13f/0x7b0 net/core/dev.c:5962 NF_HOOK include/linux/netfilter.h:314 [inline] NF_HOOK include/linux/netfilter.h:308 [inline] br_pass_frame_up+0x346/0x490 net/bridge/br_input.c:70 br_handle_frame_finish+0xdcf/0x1c80 net/bridge/br_input.c:221 br_nf_hook_thresh+0x303/0x410 net/bridge/br_netfilter_hooks.c:1198 br_nf_pre_routing_finish_ipv6+0x76a/0xfb0 net/bridge/br_netfilter_ipv6.c:154 NF_HOOK include/linux/netfilter.h:314 [inline] br_nf_pre_routing_ipv6+0x3ce/0x8c0 net/bridge/br_netfilter_ipv6.c:184 br_nf_pre_routing+0x860/0x15b0 net/bridge/br_netfilter_hooks.c:536 nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline] nf_hook_bridge_pre net/bridge/br_input.c:277 [inline] br_handle_frame+0x9eb/0x1490 net/bridge/br_input.c:424 __netif_receive_skb_core.constprop.0+0xa76/0x4470 net/core/dev.c:5598 __netif_receive_skb_one_core+0xb1/0x1e0 net/core/dev.c:5702 __netif_receive_skb+0x1d/0x160 net/core/dev.c:5817 process_backlog+0x443/0x15f0 net/core/dev.c:6149 __napi_poll.constprop.0+0xb7/0x550 net/core/dev.c:6902 napi_poll net/core/dev.c:6971 [inline] net_rx_action+0xa94/0x1010 net/core/dev.c:7093 handle_softirqs+0x213/0x8f0 kernel/softirq.c:561 __do_softirq kernel/softirq.c:595 [inline] invoke_softirq kernel/softirq.c:435 [inline] __irq_exit_rcu+0x109/0x170 kernel/softirq.c:662 irq_exit_rcu+0x9/0x30 kernel/softirq.c:678 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1049 [inline] sysvec_apic_timer_interrupt+0xa4/0xc0 arch/x86/kernel/apic/apic.c:1049 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702 RIP: 0010:console_trylock_spinning kernel/printk/printk.c:2061 [inline] RIP: 0010:vprintk_emit+0x621/0x6f0 kernel/printk/printk.c:2431 Code: 85 ed 0f 85 81 00 00 00 e8 5c 4f 20 00 9c 41 5c 41 81 e4 00 02 00 00 31 ff 4c 89 e6 e8 78 4a 20 00 4d 85 e4 0f 85 8d 00 00 00 3a 4f 20 00 45 31 c9 41 b8 01 00 00 00 31 c9 48 8d 05 00 00 00 RSP: 0018:ffffc90003497ad8 EFLAGS: 00000293 RAX: 0000000000000000 RBX: 0000000000000017 RCX: ffffffff8179c59e RDX: ffff888075a9a440 RSI: ffffffff8179c5a8 RDI: 0000000000000007 RBP: 1ffff92000692f5d R08: 0000000000000007 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000002 R12: 0000000000000000 R13: 0000000000000200 R14: ffff88801d6ea440 R15: ffffc90003497bc0 vprintk+0x7f/0xa0 kernel/printk/printk_safe.c:86 _printk+0xc8/0x100 kernel/printk/printk.c:2457 m920x_read drivers/media/usb/dvb-usb/m920x.c:40 [inline] m920x_rc_core_query+0x2d7/0x500 drivers/media/usb/dvb-usb/m920x.c:229 dvb_usb_read_remote_control+0xda/0x1c0 drivers/media/usb/dvb-usb/dvb-usb-remote.c:261 process_one_work+0x9c5/0x1ba0 kernel/workqueue.c:3236 process_scheduled_works kernel/workqueue.c:3317 [inline] worker_thread+0x6c8/0xf00 kernel/workqueue.c:3398 kthread+0x2c1/0x3a0 kernel/kthread.c:389 ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 net_ratelimit: 31099 callbacks suppressed bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:89:02:63:0a:90, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:89:02:63:0a:90, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) net_ratelimit: 38822 callbacks suppressed bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:89:02:63:0a:90, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:89:02:63:0a:90, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:89:02:63:0a:90, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:89:02:63:0a:90, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:89:02:63:0a:90, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)