bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
rcu: INFO: rcu_preempt detected stalls on CPUs/tasks:
rcu: Tasks blocked on level-0 rcu_node (CPUs 0-1): P5231/1:b..l P6003/1:b..l
rcu: (detected by 1, t=10502 jiffies, g=9509, q=2373 ncpus=2)
task:syz.1.14 state:R running task stack:27720 pid:6003 tgid:6002 ppid:5857 task_flags:0x40054c flags:0x00004006
Call Trace:
context_switch kernel/sched/core.c:5357 [inline]
__schedule+0x1190/0x5de0 kernel/sched/core.c:6961
preempt_schedule_common+0x44/0xc0 kernel/sched/core.c:7145
preempt_schedule_thunk+0x16/0x30 arch/x86/entry/thunk.S:12
__raw_spin_unlock include/linux/spinlock_api_smp.h:143 [inline]
_raw_spin_unlock+0x3e/0x50 kernel/locking/spinlock.c:186
spin_unlock include/linux/spinlock.h:391 [inline]
zap_pte_range mm/memory.c:1756 [inline]
zap_pmd_range mm/memory.c:1818 [inline]
zap_pud_range mm/memory.c:1847 [inline]
zap_p4d_range mm/memory.c:1868 [inline]
unmap_page_range+0xf77/0x42c0 mm/memory.c:1889
unmap_single_vma.constprop.0+0x153/0x240 mm/memory.c:1932
unmap_vmas+0x218/0x470 mm/memory.c:1976
exit_mmap+0x1b9/0xb90 mm/mmap.c:1280
__mmput+0x12a/0x410 kernel/fork.c:1130
mmput+0x62/0x70 kernel/fork.c:1152
exit_mm kernel/exit.c:582 [inline]
do_exit+0x7c7/0x2bf0 kernel/exit.c:949
do_group_exit+0xd3/0x2a0 kernel/exit.c:1102
get_signal+0x2673/0x26d0 kernel/signal.c:3034
arch_do_signal_or_restart+0x8f/0x790 arch/x86/kernel/signal.c:337
exit_to_user_mode_loop+0x84/0x110 kernel/entry/common.c:40
exit_to_user_mode_prepare include/linux/irq-entry-common.h:225 [inline]
syscall_exit_to_user_mode_work include/linux/entry-common.h:175 [inline]
syscall_exit_to_user_mode include/linux/entry-common.h:210 [inline]
do_syscall_64+0x3f6/0x490 arch/x86/entry/syscall_64.c:100
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7fb1cd390a7c
RSP: 002b:00007fb1ce155ec0 EFLAGS: 00000293 ORIG_RAX: 000000000000002c
RAX: 000000000000001c RBX: 00007fb1ce155fc0 RCX: 00007fb1cd390a7c
RDX: 000000000000001c RSI: 00007fb1ce156010 RDI: 0000000000000004
RBP: 0000000000000000 R08: 00007fb1ce155f14 R09: 000000000000000c
R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004
R13: 00007fb1ce155f68 R14: 00007fb1ce156010 R15: 0000000000000000
task:udevd state:R running task stack:26376 pid:5231 tgid:5231 ppid:1 task_flags:0x400140 flags:0x00004002
Call Trace:
context_switch kernel/sched/core.c:5357 [inline]
__schedule+0x1190/0x5de0 kernel/sched/core.c:6961
preempt_schedule_irq+0x51/0x90 kernel/sched/core.c:7288
irqentry_exit+0x36/0x90 kernel/entry/common.c:197
asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702
RIP: 0010:rcu_is_watching+0x80/0xc0 kernel/rcu/tree.c:752
Code: 89 da 48 c1 ea 03 0f b6 14 02 48 89 d8 83 e0 07 83 c0 03 38 d0 7c 04 84 d2 75 24 8b 03 c1 e8 02 83 e0 01 65 ff 0d 90 75 35 12 <74> 07 5b 5d c3 cc cc cc cc e8 b2 12 8c ff 5b 5d c3 cc cc cc cc 48
RSP: 0018:ffffc900030171c8 EFLAGS: 00000286
RAX: 0000000000000001 RBX: ffff8880b85332a8 RCX: ffffc90003018001
RDX: 0000000000000000 RSI: ffffffff8c162c80 RDI: ffffffff8df57e68
RBP: 0000000000000001 R08: 0000000000000001 R09: 0000000000000000
R10: ffffc90003017298 R11: 0000000000039735 R12: ffffffff816ab8a4
R13: ffffc90003017298 R14: ffffc90003017a78 R15: ffffc900030172cc
trace_lock_release include/trace/events/lock.h:69 [inline]
lock_release+0x201/0x2f0 kernel/locking/lockdep.c:5879
rcu_lock_release include/linux/rcupdate.h:341 [inline]
rcu_read_unlock include/linux/rcupdate.h:871 [inline]
class_rcu_destructor include/linux/rcupdate.h:1155 [inline]
unwind_next_frame+0x3f9/0x20a0 arch/x86/kernel/unwind_orc.c:479
arch_stack_walk+0x94/0x100 arch/x86/kernel/stacktrace.c:25
stack_trace_save+0x8e/0xc0 kernel/stacktrace.c:122
kasan_save_stack+0x33/0x60 mm/kasan/common.c:47
kasan_save_track+0x14/0x30 mm/kasan/common.c:68
unpoison_slab_object mm/kasan/common.c:330 [inline]
__kasan_slab_alloc+0x89/0x90 mm/kasan/common.c:356
kasan_slab_alloc include/linux/kasan.h:250 [inline]
slab_post_alloc_hook mm/slub.c:4180 [inline]
slab_alloc_node mm/slub.c:4229 [inline]
kmem_cache_alloc_noprof+0x1cb/0x3b0 mm/slub.c:4236
kmem_alloc_batch+0x49/0x170 lib/debugobjects.c:371
fill_pool lib/debugobjects.c:403 [inline]
debug_objects_fill_pool lib/debugobjects.c:725 [inline]
debug_objects_fill_pool+0x23f/0x520 lib/debugobjects.c:697
debug_object_activate+0x10b/0x4c0 lib/debugobjects.c:814
debug_rcu_head_queue kernel/rcu/rcu.h:236 [inline]
__call_rcu_common.constprop.0+0x35/0xa10 kernel/rcu/tree.c:3108
discard_slab mm/slub.c:2753 [inline]
__put_partials+0x165/0x1c0 mm/slub.c:3218
qlink_free mm/kasan/quarantine.c:163 [inline]
qlist_free_all+0x4d/0x120 mm/kasan/quarantine.c:179
kasan_quarantine_reduce+0x195/0x1e0 mm/kasan/quarantine.c:286
__kasan_kmalloc+0x8a/0xb0 mm/kasan/common.c:396
kasan_kmalloc include/linux/kasan.h:260 [inline]
__do_kmalloc_node mm/slub.c:4365 [inline]
__kmalloc_noprof+0x223/0x510 mm/slub.c:4377
kmalloc_noprof include/linux/slab.h:909 [inline]
tomoyo_realpath_from_path+0xc2/0x6e0 security/tomoyo/realpath.c:251
tomoyo_get_realpath security/tomoyo/file.c:151 [inline]
tomoyo_path_perm+0x274/0x460 security/tomoyo/file.c:822
security_inode_getattr+0x116/0x290 security/security.c:2377
vfs_getattr fs/stat.c:259 [inline]
vfs_statx_path fs/stat.c:299 [inline]
vfs_statx+0x121/0x3f0 fs/stat.c:356
vfs_fstatat+0x7b/0xf0 fs/stat.c:375
__do_sys_newfstatat+0x97/0x120 fs/stat.c:542
do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
do_syscall_64+0xcd/0x490 arch/x86/entry/syscall_64.c:94
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f3de9711b0a
RSP: 002b:00007ffe754a6858 EFLAGS: 00000246 ORIG_RAX: 0000000000000106
RAX: ffffffffffffffda RBX: 0000559277226408 RCX: 00007f3de9711b0a
RDX: 00007ffe754a6860 RSI: 0000559277214ef3 RDI: 00000000ffffff9c
RBP: 000055928867b148 R08: 00063489548db180 R09: 00007f3de9eb8000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
R13: 00007ffe754a6860 R14: 0000000000000000 R15: 00063489548db180
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)