bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: rcu: Tasks blocked on level-0 rcu_node (CPUs 0-1): P16975/1:b..l rcu: (detected by 0, t=10502 jiffies, g=332853, q=611 ncpus=1) task:syz-executor state:R running task stack:23832 pid:16975 tgid:16975 ppid:16957 task_flags:0x400140 flags:0x00080000 Call Trace: context_switch kernel/sched/core.c:5387 [inline] __schedule+0x10e9/0x6820 kernel/sched/core.c:7188 preempt_schedule_irq+0x50/0x90 kernel/sched/core.c:7512 irqentry_exit_to_kernel_mode_preempt include/linux/irq-entry-common.h:476 [inline] irqentry_exit_to_kernel_mode include/linux/irq-entry-common.h:547 [inline] irqentry_exit+0x1fe/0x790 kernel/entry/common.c:164 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:697 RIP: 0010:lock_acquire+0x5e/0x370 kernel/locking/lockdep.c:5872 Code: 05 3b 59 2e 12 83 f8 07 0f 87 d9 02 00 00 48 0f a3 05 46 4b f7 0e 0f 82 a4 02 00 00 8b 35 ae 7e f7 0e 85 f6 0f 85 bf 00 00 00 <48> 8b 44 24 30 65 48 2b 05 dd 58 2e 12 0f 85 ed 02 00 00 48 83 c4 RSP: 0018:ffffc90003d5f250 EFLAGS: 00000206 RAX: 0000000000000046 RBX: 0000000000000000 RCX: 0000000000000003 RDX: 0000000000000000 RSI: ffffffff8df2c0ea RDI: ffffffff8c1c0200 RBP: ffffffff8e7e5260 R08: 00000000106a1359 R09: 0000000000000007 R10: 0000000000000200 R11: 0000000000000000 R12: 0000000000000002 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 rcu_lock_acquire include/linux/rcupdate.h:300 [inline] rcu_read_lock include/linux/rcupdate.h:838 [inline] class_rcu_constructor include/linux/rcupdate.h:1181 [inline] unwind_next_frame+0xd1/0x2090 arch/x86/kernel/unwind_orc.c:495 arch_stack_walk+0x94/0xf0 arch/x86/kernel/stacktrace.c:25 stack_trace_save+0x8e/0xc0 kernel/stacktrace.c:122 kasan_save_stack+0x30/0x50 mm/kasan/common.c:57 kasan_save_track+0x14/0x30 mm/kasan/common.c:78 kasan_save_free_info+0x3b/0x70 mm/kasan/generic.c:584 poison_slab_object mm/kasan/common.c:253 [inline] __kasan_slab_free+0x5f/0x80 mm/kasan/common.c:285 kasan_slab_free include/linux/kasan.h:235 [inline] slab_free_hook mm/slub.c:2689 [inline] slab_free mm/slub.c:6246 [inline] kfree+0x223/0x6c0 mm/slub.c:6561 tomoyo_init_log+0x13b4/0x20c0 security/tomoyo/audit.c:294 tomoyo_write_log2 security/tomoyo/audit.c:376 [inline] tomoyo_write_log2+0x2ed/0xbc0 security/tomoyo/audit.c:366 tomoyo_supervisor+0x15e/0x1340 security/tomoyo/common.c:2208 tomoyo_audit_path_log security/tomoyo/file.c:169 [inline] tomoyo_path_permission security/tomoyo/file.c:592 [inline] tomoyo_path_permission+0x270/0x3b0 security/tomoyo/file.c:577 tomoyo_path_perm+0x364/0x460 security/tomoyo/file.c:843 tomoyo_path_unlink+0x91/0xe0 security/tomoyo/tomoyo.c:162 security_path_unlink+0x145/0x2b0 security/security.c:1483 filename_unlinkat+0x316/0x730 fs/namei.c:5565 __do_sys_unlink fs/namei.c:5603 [inline] __se_sys_unlink fs/namei.c:5600 [inline] __x64_sys_unlink+0x46/0x70 fs/namei.c:5600 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0x10b/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f15afd9b907 RSP: 002b:00007ffcf7f25c38 EFLAGS: 00000206 ORIG_RAX: 0000000000000057 RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f15afd9b907 RDX: 00007ffcf7f25c60 RSI: 00007ffcf7f25cf0 RDI: 00007ffcf7f25cf0 RBP: 00007ffcf7f25cf0 R08: 00007ffcf7f26cf0 R09: 00000000ffffffff R10: 0000000000000100 R11: 0000000000000206 R12: 00007ffcf7f26d80 R13: 00007f15afe32048 R14: 000000000011bdbd R15: 00007ffcf7f26dc0 net_ratelimit: 12152 callbacks suppressed bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) net_ratelimit: 15154 callbacks suppressed bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)