audit: audit_backlog=65 > audit_backlog_limit=64 audit: audit_lost=207151 audit_rate_limit=0 audit_backlog_limit=64 rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: rcu: Tasks blocked on level-0 rcu_node (CPUs 0-1): P5819/1:b..l rcu: (detected by 1, t=10502 jiffies, g=49453, q=327404 ncpus=2) task:syz-executor state:R running task stack:23992 pid:5819 tgid:5819 ppid:5805 task_flags:0x400140 flags:0x00080000 Call Trace: context_switch kernel/sched/core.c:5256 [inline] __schedule+0x1139/0x6150 kernel/sched/core.c:6863 preempt_schedule_irq+0x51/0x90 kernel/sched/core.c:7190 irqentry_exit+0x1d8/0x8c0 kernel/entry/common.c:216 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:697 RIP: 0010:lock_acquire+0x62/0x330 kernel/locking/lockdep.c:5872 Code: 56 18 12 83 f8 07 0f 87 a2 02 00 00 89 c0 48 0f a3 05 82 87 ee 0e 0f 82 74 02 00 00 8b 35 1a b8 ee 0e 85 f6 0f 85 8d 00 00 00 <48> 8b 44 24 30 65 48 2b 05 99 56 18 12 0f 85 ad 02 00 00 48 83 c4 RSP: 0018:ffffc90003207458 EFLAGS: 00000206 RAX: 0000000000000046 RBX: ffffffff8e3c9620 RCX: 000000001794a162 RDX: 0000000000000000 RSI: ffffffff8daa5c73 RDI: ffffffff8bf2a800 RBP: 0000000000000002 R08: 000000004104ce22 R09: 0000000024104ce2 R10: 0000000000000002 R11: ffff888077dbaff0 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 rcu_lock_acquire include/linux/rcupdate.h:331 [inline] rcu_read_lock include/linux/rcupdate.h:867 [inline] __update_page_owner_free_handle.constprop.0+0x4d/0x4a0 mm/page_owner.c:283 __reset_page_owner+0x93/0x1a0 mm/page_owner.c:321 reset_page_owner include/linux/page_owner.h:25 [inline] free_pages_prepare mm/page_alloc.c:1395 [inline] __free_frozen_pages+0x7df/0x1170 mm/page_alloc.c:2943 discard_slab mm/slub.c:3346 [inline] __put_partials+0x130/0x170 mm/slub.c:3886 qlink_free mm/kasan/quarantine.c:163 [inline] qlist_free_all+0x4c/0xf0 mm/kasan/quarantine.c:179 kasan_quarantine_reduce+0x195/0x1e0 mm/kasan/quarantine.c:286 __kasan_kmalloc+0x8a/0xb0 mm/kasan/common.c:405 kasan_kmalloc include/linux/kasan.h:262 [inline] __do_kmalloc_node mm/slub.c:5657 [inline] __kmalloc_noprof+0x33d/0x910 mm/slub.c:5669 kmalloc_noprof include/linux/slab.h:961 [inline] tomoyo_realpath_from_path+0xc2/0x6e0 security/tomoyo/realpath.c:251 tomoyo_get_realpath security/tomoyo/file.c:151 [inline] tomoyo_check_open_permission+0x2ab/0x3c0 security/tomoyo/file.c:771 tomoyo_file_open+0x6b/0x90 security/tomoyo/tomoyo.c:334 security_file_open+0x84/0x1e0 security/security.c:2636 do_dentry_open+0x597/0x1590 fs/open.c:939 vfs_open+0x82/0x3f0 fs/open.c:1094 do_open fs/namei.c:4628 [inline] path_openat+0x2078/0x3140 fs/namei.c:4787 do_filp_open+0x20b/0x470 fs/namei.c:4814 do_sys_openat2+0x11f/0x280 fs/open.c:1430 do_sys_open fs/open.c:1436 [inline] __do_sys_openat fs/open.c:1452 [inline] __se_sys_openat fs/open.c:1447 [inline] __x64_sys_openat+0x174/0x210 fs/open.c:1447 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xcd/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f39a038df90 RSP: 002b:00007ffd4cfa4bf0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007f39a038df90 RDX: 0000000000000002 RSI: 00007ffd4cfa4d00 RDI: 00000000ffffff9c RBP: 00007ffd4cfa4d00 R08: 0000000000000000 R09: 00007ffd4cfa49b7 R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000113 R13: 000055555c6cd590 R14: 000000000008baaa R15: 00007ffd4cfa4d00 net_ratelimit: 2951 callbacks suppressed bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) audit: audit_backlog=65 > audit_backlog_limit=64 audit: audit_lost=213098 audit_rate_limit=0 audit_backlog_limit=64 audit: backlog limit exceeded audit: audit_backlog=65 > audit_backlog_limit=64 audit: audit_lost=213100 audit_rate_limit=0 audit_backlog_limit=64 bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) audit: audit_backlog=65 > audit_backlog_limit=64 audit: audit_lost=219642 audit_rate_limit=0 audit_backlog_limit=64 audit: backlog limit exceeded audit: audit_backlog=65 > audit_backlog_limit=64