bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:f9:7a:fd:c5:70, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: rcu: Tasks blocked on level-0 rcu_node (CPUs 0-1): P5044/1:b..l P11278/1:b..l rcu: (detected by 0, t=10502 jiffies, g=98313, q=117 ncpus=2) task:kworker/u4:16 state:R running task stack:26704 pid:11278 ppid:2 flags:0x00004000 Workqueue: phy3 ieee80211_iface_work Call Trace: context_switch kernel/sched/core.c:5343 [inline] __schedule+0x1d15/0x5790 kernel/sched/core.c:6669 preempt_schedule_irq+0x52/0x90 kernel/sched/core.c:6981 irqentry_exit+0x35/0x80 kernel/entry/common.c:433 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:645 RIP: 0010:__sanitizer_cov_trace_pc+0x3b/0x70 kernel/kcov.c:207 Code: 81 e1 00 01 00 00 65 48 8b 14 25 c0 bb 03 00 a9 00 01 ff 00 74 0e 85 c9 74 35 8b 82 0c 16 00 00 85 c0 74 2b 8b 82 e8 15 00 00 <83> f8 02 75 20 48 8b 8a f0 15 00 00 8b 92 ec 15 00 00 48 8b 01 48 RSP: 0018:ffffc900153079c8 EFLAGS: 00000246 RAX: 0000000000000000 RBX: 00000000000001e0 RCX: 0000000000000000 RDX: ffff88809bc25940 RSI: ffffffff8997d4f3 RDI: 0000000000000006 RBP: 000000000000005a R08: 0000000000000006 R09: 000000000000000b R10: 000000000000000c R11: 0000000000094001 R12: 000000000000000b R13: 000000000000000b R14: 000000000000000c R15: 0000000000000000 ieee80211_sta_get_rates+0x363/0x730 net/mac80211/util.c:2307 ieee80211_update_sta_info net/mac80211/ibss.c:1003 [inline] ieee80211_rx_bss_info net/mac80211/ibss.c:1118 [inline] ieee80211_rx_mgmt_probe_beacon net/mac80211/ibss.c:1609 [inline] ieee80211_ibss_rx_queued_mgmt+0x1031/0x2d50 net/mac80211/ibss.c:1638 ieee80211_iface_process_skb net/mac80211/iface.c:1594 [inline] ieee80211_iface_work+0xa4d/0xd70 net/mac80211/iface.c:1648 process_one_work+0x99a/0x15e0 kernel/workqueue.c:2407 worker_thread+0x67d/0x10c0 kernel/workqueue.c:2554 kthread+0x344/0x440 kernel/kthread.c:379 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:308 task:syz-executor.1 state:R running task stack:24032 pid:5044 ppid:5033 flags:0x00004002 Call Trace: context_switch kernel/sched/core.c:5343 [inline] __schedule+0x1d15/0x5790 kernel/sched/core.c:6669 preempt_schedule_common+0x45/0xb0 kernel/sched/core.c:6838 preempt_schedule_thunk+0x1a/0x20 arch/x86/entry/thunk_64.S:34 unwind_next_frame+0xe0c/0x1e30 arch/x86/kernel/unwind_orc.c:644 arch_stack_walk+0x81/0xf0 arch/x86/kernel/stacktrace.c:25 stack_trace_save+0x90/0xc0 kernel/stacktrace.c:122 save_stack+0x151/0x1e0 mm/page_owner.c:128 __reset_page_owner+0x56/0x170 mm/page_owner.c:149 reset_page_owner include/linux/page_owner.h:24 [inline] free_pages_prepare mm/page_alloc.c:1302 [inline] free_unref_page_prepare+0x4dd/0xb90 mm/page_alloc.c:2600 free_unref_page+0x33/0x370 mm/page_alloc.c:2695 __unfreeze_partials+0x17c/0x1a0 mm/slub.c:2636 qlink_free mm/kasan/quarantine.c:166 [inline] qlist_free_all+0x6a/0x170 mm/kasan/quarantine.c:185 kasan_quarantine_reduce+0x195/0x220 mm/kasan/quarantine.c:292 ____kasan_kmalloc mm/kasan/common.c:340 [inline] __kasan_kmalloc+0x86/0xb0 mm/kasan/common.c:383 kasan_kmalloc include/linux/kasan.h:196 [inline] __do_kmalloc_node mm/slab_common.c:966 [inline] __kmalloc+0x5e/0x190 mm/slab_common.c:979 kmalloc include/linux/slab.h:563 [inline] tomoyo_realpath_from_path+0xc3/0x600 security/tomoyo/realpath.c:251 tomoyo_get_realpath security/tomoyo/file.c:151 [inline] tomoyo_check_open_permission+0x29a/0x3a0 security/tomoyo/file.c:771 tomoyo_file_open security/tomoyo/tomoyo.c:332 [inline] tomoyo_file_open+0xa1/0xc0 security/tomoyo/tomoyo.c:327 security_file_open+0x49/0xb0 security/security.c:2797 do_dentry_open+0x575/0x13f0 fs/open.c:907 do_open fs/namei.c:3636 [inline] path_openat+0x1baa/0x2750 fs/namei.c:3791 do_filp_open+0x1ba/0x410 fs/namei.c:3818 do_sys_openat2+0x16d/0x4c0 fs/open.c:1356 do_sys_open fs/open.c:1372 [inline] __do_sys_openat fs/open.c:1388 [inline] __se_sys_openat fs/open.c:1383 [inline] __x64_sys_openat+0x143/0x1f0 fs/open.c:1383 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x39/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcd RIP: 0033:0x7f10d0c8bcd8 RSP: 002b:00007ffcd2186290 EFLAGS: 00000287 ORIG_RAX: 0000000000000101 RAX: ffffffffffffffda RBX: 0000000000000a78 RCX: 00007f10d0c8bcd8 RDX: 0000000000090800 RSI: 00007f10d0ce6d80 RDI: 00000000ffffff9c RBP: 00007ffcd218635c R08: 0000000000090800 R09: 00007f10d0ce6d80 R10: 0000000000000000 R11: 0000000000000287 R12: 0000000000000000 R13: 000000000027159b R14: 000000000000000d R15: 00007ffcd21863c0 rcu: rcu_preempt kthread starved for 10075 jiffies! g98313 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=1 rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. rcu: RCU grace-period kthread stack dump: task:rcu_preempt state:R running task stack:28352 pid:16 ppid:2 flags:0x00004000 Call Trace: context_switch kernel/sched/core.c:5343 [inline] __schedule+0x1d15/0x5790 kernel/sched/core.c:6669 schedule+0xde/0x1a0 kernel/sched/core.c:6745 schedule_timeout+0x14e/0x2b0 kernel/time/timer.c:2167 rcu_gp_fqs_loop+0x190/0x910 kernel/rcu/tree.c:1609 rcu_gp_kthread+0x23a/0x360 kernel/rcu/tree.c:1808 kthread+0x344/0x440 kernel/kthread.c:379 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:308 rcu: Stack dump where RCU GP kthread last ran: Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 skipped: idling at native_safe_halt arch/x86/include/asm/irqflags.h:48 [inline] NMI backtrace for cpu 1 skipped: idling at arch_safe_halt arch/x86/include/asm/irqflags.h:86 [inline] NMI backtrace for cpu 1 skipped: idling at acpi_safe_halt+0x40/0x50 drivers/acpi/processor_idle.c:112 net_ratelimit: 13681 callbacks suppressed bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:f9:7a:fd:c5:70, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:92:b2:4c:4a:94, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) net_ratelimit: 16549 callbacks suppressed bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:f9:7a:fd:c5:70, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:f9:7a:fd:c5:70, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:3e:f9:7a:fd:c5:70, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)