bridge0: received packet on veth0_to_bridge with own address as source address (addr:0a:bd:60:cd:0f:00, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:0a:bd:60:cd:0f:00, vlan:0) rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: rcu: Tasks blocked on level-0 rcu_node (CPUs 0-1): P7663/1:b..l P5233/1:b..l P5618/1:b..l P2567/1:b..l P7670/1:b..l rcu: (detected by 1, t=10502 jiffies, g=35381, q=442 ncpus=2) task:sed state:R running task stack:26448 pid:7670 tgid:7670 ppid:7666 flags:0x00000002 Call Trace: context_switch kernel/sched/core.c:5188 [inline] __schedule+0xe37/0x5490 kernel/sched/core.c:6529 preempt_schedule_common+0x44/0xc0 kernel/sched/core.c:6708 preempt_schedule_thunk+0x1a/0x30 arch/x86/entry/thunk.S:12 __raw_spin_unlock include/linux/spinlock_api_smp.h:143 [inline] _raw_spin_unlock+0x3e/0x50 kernel/locking/spinlock.c:186 spin_unlock include/linux/spinlock.h:391 [inline] wp_page_copy mm/memory.c:3436 [inline] do_wp_page+0x15fd/0x3430 mm/memory.c:3727 handle_pte_fault mm/memory.c:5537 [inline] __handle_mm_fault+0x23d0/0x55b0 mm/memory.c:5664 handle_mm_fault+0x44e/0x7b0 mm/memory.c:5832 do_user_addr_fault+0x60d/0x13f0 arch/x86/mm/fault.c:1338 handle_page_fault arch/x86/mm/fault.c:1481 [inline] exc_page_fault+0x5c/0xc0 arch/x86/mm/fault.c:1539 asm_exc_page_fault+0x26/0x30 arch/x86/include/asm/idtentry.h:623 RIP: 0033:0x7f5376445d4e RSP: 002b:00007ffd1f57e490 EFLAGS: 00010212 RAX: 00007f53763603a0 RBX: 00007f53761e4260 RCX: 00007ffd1f57e520 RDX: 00007f537635b750 RSI: 00007f53761e4a88 RDI: 00007f53761e4f38 RBP: 00007ffd1f57e590 R08: 00007f53761e4a88 R09: 0000000000000001 R10: 0000000053053053 R11: 0000000000000246 R12: 00007f53764315c0 R13: 00007f53761dd270 R14: 0000000000000000 R15: 00007f53764692a0 task:kworker/u8:10 state:R running task stack:24008 pid:2567 tgid:2567 ppid:2 flags:0x00004000 Workqueue: events_unbound call_usermodehelper_exec_work Call Trace: context_switch kernel/sched/core.c:5188 [inline] __schedule+0xe37/0x5490 kernel/sched/core.c:6529 preempt_schedule_irq+0x51/0x90 kernel/sched/core.c:6851 irqentry_exit+0x36/0x90 kernel/entry/common.c:354 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702 RIP: 0010:__reset_page_owner+0x68/0x400 mm/page_owner.c:295 Code: 00 00 48 89 c3 e8 48 4a 9a ff 48 03 1d 31 15 08 0c 48 b8 00 00 00 00 00 fc ff df 48 8d 7b 08 48 89 fa 48 c1 ea 03 0f b6 04 02 <84> c0 74 08 3c 03 0f 8e 09 03 00 00 8b 43 08 bf 00 28 00 00 41 bd RSP: 0018:ffffc90009637640 EFLAGS: 00000a06 RAX: 0000000000000000 RBX: ffff88801710a908 RCX: ffffffff81f1bf14 RDX: 1ffff11002e21522 RSI: ffffffff81f02f28 RDI: ffff88801710a910 RBP: 0000000000000003 R08: 0000000000000007 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000003 R15: 0000000000000000 reset_page_owner include/linux/page_owner.h:25 [inline] free_pages_prepare mm/page_alloc.c:1094 [inline] free_unref_page+0x64a/0xe40 mm/page_alloc.c:2612 qlink_free mm/kasan/quarantine.c:163 [inline] qlist_free_all+0x4e/0x140 mm/kasan/quarantine.c:179 kasan_quarantine_reduce+0x192/0x1e0 mm/kasan/quarantine.c:286 __kasan_slab_alloc+0x69/0x90 mm/kasan/common.c:322 kasan_slab_alloc include/linux/kasan.h:201 [inline] slab_post_alloc_hook mm/slub.c:3988 [inline] slab_alloc_node mm/slub.c:4037 [inline] kmem_cache_alloc_noprof+0x121/0x2f0 mm/slub.c:4044 copy_fs_struct+0x49/0x340 fs/fs_struct.c:114 copy_fs kernel/fork.c:1747 [inline] copy_process+0x35cb/0x8e90 kernel/fork.c:2378 kernel_clone+0xfd/0x960 kernel/fork.c:2800 user_mode_thread+0xb4/0xf0 kernel/fork.c:2878 call_usermodehelper_exec_sync kernel/umh.c:133 [inline] call_usermodehelper_exec_work+0x6b/0x170 kernel/umh.c:164 process_one_work+0x9c5/0x1b40 kernel/workqueue.c:3231 process_scheduled_works kernel/workqueue.c:3312 [inline] worker_thread+0x6c8/0xed0 kernel/workqueue.c:3389 kthread+0x2c1/0x3a0 kernel/kthread.c:389 ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 task:kworker/1:6 state:R running task stack:24704 pid:5618 tgid:5618 ppid:2 flags:0x00004000 Workqueue: events ovs_dp_masks_rebalance Call Trace: context_switch kernel/sched/core.c:5188 [inline] __schedule+0xe37/0x5490 kernel/sched/core.c:6529 preempt_schedule_common+0x44/0xc0 kernel/sched/core.c:6708 preempt_schedule_thunk+0x1a/0x30 arch/x86/entry/thunk.S:12 unwind_next_frame+0x1c90/0x23a0 arch/x86/kernel/unwind_orc.c:672 arch_stack_walk+0x100/0x170 arch/x86/kernel/stacktrace.c:25 stack_trace_save+0x95/0xd0 kernel/stacktrace.c:122 save_stack+0x162/0x1f0 mm/page_owner.c:156 __reset_page_owner+0x8d/0x400 mm/page_owner.c:297 reset_page_owner include/linux/page_owner.h:25 [inline] free_pages_prepare mm/page_alloc.c:1094 [inline] free_unref_page+0x64a/0xe40 mm/page_alloc.c:2612 qlink_free mm/kasan/quarantine.c:163 [inline] qlist_free_all+0x4e/0x140 mm/kasan/quarantine.c:179 kasan_quarantine_reduce+0x192/0x1e0 mm/kasan/quarantine.c:286 __kasan_slab_alloc+0x69/0x90 mm/kasan/common.c:322 kasan_slab_alloc include/linux/kasan.h:201 [inline] slab_post_alloc_hook mm/slub.c:3988 [inline] slab_alloc_node mm/slub.c:4037 [inline] __do_kmalloc_node mm/slub.c:4157 [inline] __kmalloc_noprof+0x199/0x400 mm/slub.c:4170 kmalloc_noprof include/linux/slab.h:685 [inline] kmalloc_array_noprof include/linux/slab.h:726 [inline] ovs_flow_masks_rebalance+0xdc/0xa00 net/openvswitch/flow_table.c:1114 ovs_dp_masks_rebalance+0x64/0xf0 net/openvswitch/datapath.c:2530 process_one_work+0x9c5/0x1b40 kernel/workqueue.c:3231 process_scheduled_works kernel/workqueue.c:3312 [inline] worker_thread+0x6c8/0xed0 kernel/workqueue.c:3389 kthread+0x2c1/0x3a0 kernel/kthread.c:389 ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 task:syz-executor state:R running task stack:23088 pid:5233 tgid:5233 ppid:5220 flags:0x00004002 Call Trace: context_switch kernel/sched/core.c:5188 [inline] __schedule+0xe37/0x5490 kernel/sched/core.c:6529 preempt_schedule_common+0x44/0xc0 kernel/sched/core.c:6708 preempt_schedule_thunk+0x1a/0x30 arch/x86/entry/thunk.S:12 unwind_next_frame+0x1c90/0x23a0 arch/x86/kernel/unwind_orc.c:672 arch_stack_walk+0x100/0x170 arch/x86/kernel/stacktrace.c:25 stack_trace_save+0x95/0xd0 kernel/stacktrace.c:122 save_stack+0x162/0x1f0 mm/page_owner.c:156 __reset_page_owner+0x8d/0x400 mm/page_owner.c:297 reset_page_owner include/linux/page_owner.h:25 [inline] free_pages_prepare mm/page_alloc.c:1094 [inline] free_unref_page+0x64a/0xe40 mm/page_alloc.c:2612 qlink_free mm/kasan/quarantine.c:163 [inline] qlist_free_all+0x4e/0x140 mm/kasan/quarantine.c:179 kasan_quarantine_reduce+0x192/0x1e0 mm/kasan/quarantine.c:286 __kasan_kmalloc+0x8a/0xb0 mm/kasan/common.c:378 kasan_kmalloc include/linux/kasan.h:211 [inline] __do_kmalloc_node mm/slub.c:4158 [inline] __kmalloc_noprof+0x1e8/0x400 mm/slub.c:4170 kmalloc_noprof include/linux/slab.h:685 [inline] tomoyo_realpath_from_path+0xb9/0x720 security/tomoyo/realpath.c:251 tomoyo_get_realpath security/tomoyo/file.c:151 [inline] tomoyo_check_open_permission+0x2a7/0x3b0 security/tomoyo/file.c:771 tomoyo_file_open+0x71/0x90 security/tomoyo/tomoyo.c:334 security_file_open+0x78/0x8b0 security/security.c:2988 do_dentry_open+0x5c7/0x15f0 fs/open.c:946 vfs_open+0x82/0x3f0 fs/open.c:1089 do_open fs/namei.c:3727 [inline] path_openat+0x2141/0x2d20 fs/namei.c:3886 do_filp_open+0x1dc/0x430 fs/namei.c:3913 do_sys_openat2+0x17a/0x1e0 fs/open.c:1416 do_sys_open fs/open.c:1431 [inline] __do_sys_openat fs/open.c:1447 [inline] __se_sys_openat fs/open.c:1442 [inline] __x64_sys_openat+0x175/0x210 fs/open.c:1442 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f20caf79771 RSP: 002b:00007ffd314ca130 EFLAGS: 00000287 ORIG_RAX: 0000000000000101 RAX: ffffffffffffffda RBX: 00000000000001cf RCX: 00007f20caf79771 RDX: 0000000000090800 RSI: 00007f20cafe7e6d RDI: 00000000ffffff9c RBP: 00007ffd314ca1cc R08: 0000000000000000 R09: 00007f20cbe30080 R10: 0000000000000000 R11: 0000000000000287 R12: 0000000000000000 R13: 00000000000619b5 R14: 0000000000061618 R15: 00007ffd314ca220 task:syz.4.462 state:R running task stack:26288 pid:7663 tgid:7663 ppid:5233 flags:0x00004004 Call Trace: context_switch kernel/sched/core.c:5188 [inline] __schedule+0xe37/0x5490 kernel/sched/core.c:6529 preempt_schedule_common+0x44/0xc0 kernel/sched/core.c:6708 preempt_schedule_thunk+0x1a/0x30 arch/x86/entry/thunk.S:12 __raw_spin_unlock include/linux/spinlock_api_smp.h:143 [inline] _raw_spin_unlock+0x3e/0x50 kernel/locking/spinlock.c:186 spin_unlock include/linux/spinlock.h:391 [inline] zap_pte_range mm/memory.c:1688 [inline] zap_pmd_range mm/memory.c:1736 [inline] zap_pud_range mm/memory.c:1765 [inline] zap_p4d_range mm/memory.c:1786 [inline] unmap_page_range+0xbb8/0x3c10 mm/memory.c:1807 unmap_single_vma+0x194/0x2b0 mm/memory.c:1853 unmap_vmas+0x22f/0x490 mm/memory.c:1897 exit_mmap+0x1b8/0xb20 mm/mmap.c:3412 __mmput+0x12a/0x480 kernel/fork.c:1345 mmput+0x62/0x70 kernel/fork.c:1367 exit_mm kernel/exit.c:571 [inline] do_exit+0x9bf/0x2bb0 kernel/exit.c:869 do_group_exit+0xd3/0x2a0 kernel/exit.c:1031 get_signal+0x25fd/0x2770 kernel/signal.c:2917 arch_do_signal_or_restart+0x90/0x7e0 arch/x86/kernel/signal.c:310 exit_to_user_mode_loop kernel/entry/common.c:111 [inline] exit_to_user_mode_prepare include/linux/entry-common.h:328 [inline] __syscall_exit_to_user_mode_work kernel/entry/common.c:207 [inline] syscall_exit_to_user_mode+0x150/0x2a0 kernel/entry/common.c:218 do_syscall_64+0xda/0x250 arch/x86/entry/common.c:89 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f20caf79e79 RSP: 002b:00007ffd314c9f78 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca RAX: ffffffffffffff92 RBX: 00000000000619e7 RCX: 00007f20caf79e79 RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f20cb116064 RBP: 00007f20cb116064 R08: 00007f20cb115f80 R09: 00007ffd314ca25f R10: 00007ffd314ca070 R11: 0000000000000246 R12: 0000000000000032 R13: 00007ffd314ca070 R14: 00007ffd314ca090 R15: 00000000000619b5 net_ratelimit: 4247 callbacks suppressed bridge0: received packet on veth0_to_bridge with own address as source address (addr:0a:bd:60:cd:0f:00, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:0a:bd:60:cd:0f:00, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:0a:bd:60:cd:0f:00, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:0a:bd:60:cd:0f:00, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:0a:bd:60:cd:0f:00, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:0a:bd:60:cd:0f:00, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:0a:bd:60:cd:0f:00, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:0a:bd:60:cd:0f:00, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:0a:bd:60:cd:0f:00, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:0a:bd:60:cd:0f:00, vlan:0) net_ratelimit: 6174 callbacks suppressed bridge0: received packet on veth0_to_bridge with own address as source address (addr:0a:bd:60:cd:0f:00, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:0a:bd:60:cd:0f:00, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:0a:bd:60:cd:0f:00, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:0a:bd:60:cd:0f:00, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:0a:bd:60:cd:0f:00, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:0a:bd:60:cd:0f:00, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:0a:bd:60:cd:0f:00, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:0a:bd:60:cd:0f:00, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:0a:bd:60:cd:0f:00, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:0a:bd:60:cd:0f:00, vlan:0)