bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: rcu: Tasks blocked on level-0 rcu_node (CPUs 0-1): P5832/1:b..l rcu: (detected by 0, t=10503 jiffies, g=10937, q=1761 ncpus=2) task:syz-executor state:R running task stack:22016 pid:5832 tgid:5832 ppid:5813 task_flags:0x400140 flags:0x00080000 Call Trace: context_switch kernel/sched/core.c:5298 [inline] __schedule+0x15dd/0x52d0 kernel/sched/core.c:6911 preempt_schedule_irq+0x4d/0xa0 kernel/sched/core.c:7238 irqentry_exit+0x599/0x620 kernel/entry/common.c:239 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:697 RIP: 0010:kasan_mem_to_shadow include/linux/kasan.h:65 [inline] RIP: 0010:memory_is_poisoned_n mm/kasan/generic.c:141 [inline] RIP: 0010:memory_is_poisoned mm/kasan/generic.c:172 [inline] RIP: 0010:check_region_inline mm/kasan/generic.c:191 [inline] RIP: 0010:kasan_check_range+0x67/0x2c0 mm/kasan/generic.c:200 Code: 00 ff 4c 39 cf 0f 82 14 02 00 00 49 89 ff 49 c1 ef 03 49 ba 00 00 00 00 00 fc ff df 4f 8d 1c 17 49 ff c8 4d 89 c1 49 c1 e9 03 <48> bb 01 00 00 00 00 fc ff df 4d 8d 34 19 4d 89 f4 4d 29 dc 49 83 RSP: 0018:ffffc90003cf72e0 EFLAGS: 00000a03 RAX: ffffc90003cf7901 RBX: 0000000000000010 RCX: ffffffff81768c9e RDX: 0000000000000001 RSI: 0000000000000010 RDI: ffffc90003cf7458 RBP: 0000000000000000 R08: ffffc90003cf7467 R09: 1ffff9200079ee8c R10: dffffc0000000000 R11: fffff5200079ee8b R12: ffffc90003cf7458 R13: 1ffff9200079ee83 R14: ffffc90003cf7458 R15: 1ffff9200079ee8b __asan_memset+0x22/0x50 mm/kasan/shadow.c:84 unwind_next_frame+0xeae/0x23c0 arch/x86/kernel/unwind_orc.c:607 arch_stack_walk+0x11b/0x150 arch/x86/kernel/stacktrace.c:25 stack_trace_save+0xa9/0x100 kernel/stacktrace.c:122 save_stack+0x122/0x230 mm/page_owner.c:165 __reset_page_owner+0x71/0x1f0 mm/page_owner.c:320 reset_page_owner include/linux/page_owner.h:25 [inline] __free_pages_prepare mm/page_alloc.c:1433 [inline] __free_frozen_pages+0xc2b/0xdb0 mm/page_alloc.c:2978 __slab_free+0x263/0x2b0 mm/slub.c:5573 qlink_free mm/kasan/quarantine.c:163 [inline] qlist_free_all+0x97/0x100 mm/kasan/quarantine.c:179 kasan_quarantine_reduce+0x148/0x160 mm/kasan/quarantine.c:286 __kasan_slab_alloc+0x22/0x80 mm/kasan/common.c:350 kasan_slab_alloc include/linux/kasan.h:253 [inline] slab_post_alloc_hook mm/slub.c:4538 [inline] slab_alloc_node mm/slub.c:4866 [inline] kmem_cache_alloc_noprof+0x2bc/0x650 mm/slub.c:4873 lsm_file_alloc security/security.c:169 [inline] security_file_alloc+0x34/0x310 security/security.c:2380 init_file+0x90/0x2b0 fs/file_table.c:159 alloc_empty_file+0x6e/0x1d0 fs/file_table.c:241 path_openat+0x10f/0x3860 fs/namei.c:4816 do_file_open+0x23e/0x4a0 fs/namei.c:4859 do_sys_openat2+0x113/0x200 fs/open.c:1366 do_sys_open fs/open.c:1372 [inline] __do_sys_openat fs/open.c:1388 [inline] __se_sys_openat fs/open.c:1383 [inline] __x64_sys_openat+0x138/0x170 fs/open.c:1383 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0x14d/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f59a579babc RSP: 002b:00007f59a5b3fd40 EFLAGS: 00000206 ORIG_RAX: 0000000000000101 RAX: ffffffffffffffda RBX: 000000000000001a RCX: 00007f59a579babc RDX: 0000000000090800 RSI: 00007f59a58325db RDI: 00000000ffffff9c RBP: 00007f59a5b3fdec R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 R13: 0000000000000000 R14: 00000000000152d2 R15: 00007f59a5b3fe40 net_ratelimit: 16555 callbacks suppressed bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:0e:e2:b5:f7:cf:3f, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)