bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) INFO: task kworker/1:0:17 blocked for more than 140 seconds. Not tainted 5.0.0-rc7+ #87 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. kworker/1:0 D25104 17 2 0x80000000 Workqueue: events linkwatch_event Call Trace: context_switch kernel/sched/core.c:2844 [inline] __schedule+0x817/0x1cc0 kernel/sched/core.c:3485 schedule+0x92/0x180 kernel/sched/core.c:3529 exp_funnel_lock kernel/rcu/tree_exp.h:319 [inline] _synchronize_rcu_expedited.constprop.0+0x4d4/0x530 kernel/rcu/tree_exp.h:622 synchronize_rcu_expedited+0x27/0xa0 kernel/rcu/tree_exp.h:762 synchronize_net+0x3b/0x60 net/core/dev.c:9247 dev_deactivate_many+0x46f/0xb60 net/sched/sch_generic.c:1222 dev_deactivate+0x115/0x1e0 net/sched/sch_generic.c:1242 linkwatch_do_dev+0xea/0x170 net/core/link_watch.c:162 __linkwatch_run_queue+0x2cd/0x570 net/core/link_watch.c:202 linkwatch_event+0x4e/0x70 net/core/link_watch.c:237 process_one_work+0x98e/0x1790 kernel/workqueue.c:2173 worker_thread+0x98/0xe40 kernel/workqueue.c:2319 kthread+0x357/0x430 kernel/kthread.c:246 ret_from_fork+0x3a/0x50 arch/x86/entry/entry_64.S:352 INFO: task syz-executor.2:15953 blocked for more than 140 seconds. Not tainted 5.0.0-rc7+ #87 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. net_ratelimit: 45524 callbacks suppressed bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) syz-executor.2 D28048 15953 7469 0x80000006 Call Trace: context_switch kernel/sched/core.c:2844 [inline] __schedule+0x817/0x1cc0 kernel/sched/core.c:3485 schedule+0x92/0x180 kernel/sched/core.c:3529 schedule_preempt_disabled+0x13/0x20 kernel/sched/core.c:3587 __mutex_lock_common kernel/locking/mutex.c:1002 [inline] __mutex_lock+0x726/0x1310 kernel/locking/mutex.c:1072 mutex_lock_nested+0x16/0x20 kernel/locking/mutex.c:1087 rtnl_lock+0x17/0x20 net/core/rtnetlink.c:76 cangw_pernet_exit+0x13/0x30 net/can/gw.c:1029 ops_exit_list.isra.0+0xb0/0x160 net/core/net_namespace.c:153 setup_net+0x3f2/0x730 net/core/net_namespace.c:331 copy_net_ns+0x1d9/0x340 net/core/net_namespace.c:437 create_new_namespaces+0x400/0x7b0 kernel/nsproxy.c:107 unshare_nsproxy_namespaces+0xc2/0x200 kernel/nsproxy.c:206 ksys_unshare+0x440/0x980 kernel/fork.c:2550 __do_sys_unshare kernel/fork.c:2618 [inline] __se_sys_unshare kernel/fork.c:2616 [inline] __x64_sys_unshare+0x31/0x40 kernel/fork.c:2616 do_syscall_64+0x103/0x610 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x457e29 Code: Bad RIP value. RSP: 002b:00007fea70c13c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 0000000000457e29 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007fea70c146d4 R13: 00000000004c6c3b R14: 00000000004dc3f8 R15: 00000000ffffffff INFO: task syz-executor.0:15965 blocked for more than 140 seconds. Not tainted 5.0.0-rc7+ #87 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. syz-executor.0 D29872 15965 14819 0x00000004 Call Trace: context_switch kernel/sched/core.c:2844 [inline] __schedule+0x817/0x1cc0 kernel/sched/core.c:3485 schedule+0x92/0x180 kernel/sched/core.c:3529 __rwsem_down_write_failed_common kernel/locking/rwsem-xadd.c:584 [inline] rwsem_down_write_failed+0x774/0xc30 kernel/locking/rwsem-xadd.c:613 call_rwsem_down_write_failed+0x17/0x30 arch/x86/lib/rwsem.S:117 __down_write arch/x86/include/asm/rwsem.h:142 [inline] down_write+0x53/0x90 kernel/locking/rwsem.c:72 register_netdevice_notifier+0x7e/0x630 net/core/dev.c:1634 raw_init+0x299/0x340 net/can/raw.c:343 can_create+0x28a/0x4b0 net/can/af_can.c:183 __sock_create+0x3e6/0x750 net/socket.c:1297 sock_create net/socket.c:1337 [inline] __sys_socket+0x103/0x220 net/socket.c:1367 __do_sys_socket net/socket.c:1376 [inline] __se_sys_socket net/socket.c:1374 [inline] __x64_sys_socket+0x73/0xb0 net/socket.c:1374 do_syscall_64+0x103/0x610 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x457e29 Code: Bad RIP value. RSP: 002b:00007f02d2280c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457e29 RDX: 0000000000000001 RSI: 0000000000000003 RDI: 000000000000001d RBP: 000000000073c040 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f02d22816d4 R13: 00000000004c61d8 R14: 00000000004db438 R15: 00000000ffffffff INFO: task syz-executor.0:15987 blocked for more than 140 seconds. Not tainted 5.0.0-rc7+ #87 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. syz-executor.0 D29120 15987 14819 0x00000006 Call Trace: context_switch kernel/sched/core.c:2844 [inline] __schedule+0x817/0x1cc0 kernel/sched/core.c:3485 schedule+0x92/0x180 kernel/sched/core.c:3529 __rwsem_down_write_failed_common kernel/locking/rwsem-xadd.c:584 [inline] rwsem_down_write_failed+0x774/0xc30 kernel/locking/rwsem-xadd.c:613 call_rwsem_down_write_failed+0x17/0x30 arch/x86/lib/rwsem.S:117 __down_write arch/x86/include/asm/rwsem.h:142 [inline] down_write+0x53/0x90 kernel/locking/rwsem.c:72 unregister_netdevice_notifier+0x7e/0x3a0 net/core/dev.c:1703 raw_release+0x57/0x6f0 net/can/raw.c:358 __sock_release+0xd3/0x250 net/socket.c:579 sock_close+0x1b/0x30 net/socket.c:1161 __fput+0x2df/0x8d0 fs/file_table.c:278 ____fput+0x16/0x20 fs/file_table.c:309 task_work_run+0x14a/0x1c0 kernel/task_work.c:113 get_signal+0x1961/0x1d50 kernel/signal.c:2388 do_signal+0x87/0x1940 arch/x86/kernel/signal.c:816 exit_to_usermode_loop+0x244/0x2c0 arch/x86/entry/common.c:162 prepare_exit_to_usermode arch/x86/entry/common.c:197 [inline] syscall_return_slowpath arch/x86/entry/common.c:268 [inline] do_syscall_64+0x52d/0x610 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x457e29 Code: Bad RIP value. RSP: 002b:00007f02d225fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: 0000000000000000 RBX: 0000000000000003 RCX: 0000000000457e29 RDX: 00000000200000c0 RSI: 0000000000008914 RDI: 0000000000000003 RBP: 000000000073c0e0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f02d22606d4 R13: 00000000004c34d0 R14: 00000000004d6308 R15: 00000000ffffffff Showing all locks held in the system: 3 locks held by kworker/1:0/17: #0: 000000007eddeda4 ((wq_completion)"events"){+.+.}, at: __write_once_size include/linux/compiler.h:220 [inline] #0: 000000007eddeda4 ((wq_completion)"events"){+.+.}, at: arch_atomic64_set arch/x86/include/asm/atomic64_64.h:34 [inline] #0: 000000007eddeda4 ((wq_completion)"events"){+.+.}, at: atomic64_set include/asm-generic/atomic-instrumented.h:40 [inline] #0: 000000007eddeda4 ((wq_completion)"events"){+.+.}, at: atomic_long_set include/asm-generic/atomic-long.h:59 [inline] #0: 000000007eddeda4 ((wq_completion)"events"){+.+.}, at: set_work_data kernel/workqueue.c:617 [inline] #0: 000000007eddeda4 ((wq_completion)"events"){+.+.}, at: set_work_pool_and_clear_pending kernel/workqueue.c:644 [inline] #0: 000000007eddeda4 ((wq_completion)"events"){+.+.}, at: process_one_work+0x87e/0x1790 kernel/workqueue.c:2144 #1: 00000000464a94f6 ((linkwatch_work).work){+.+.}, at: process_one_work+0x8b4/0x1790 kernel/workqueue.c:2148 #2: 000000002beafeb8 (rtnl_mutex){+.+.}, at: rtnl_lock+0x17/0x20 net/core/rtnetlink.c:76 1 lock held by khungtaskd/1041: #0: 00000000569e4a68 (rcu_read_lock){....}, at: debug_show_all_locks+0x5f/0x27e kernel/locking/lockdep.c:4389 1 lock held by rsyslogd/7335: #0: 00000000b96f1fbf (&f->f_pos_lock){+.+.}, at: __fdget_pos+0xee/0x110 fs/file.c:795 2 locks held by getty/7425: #0: 000000000e2d9a8b (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:341 #1: 0000000020ae10fd (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 drivers/tty/n_tty.c:2154 2 locks held by getty/7426: #0: 00000000c62af1b4 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:341 #1: 00000000007a45cb (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 drivers/tty/n_tty.c:2154 2 locks held by getty/7427: #0: 000000005d76133b (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:341 #1: 00000000bbd81f24 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 drivers/tty/n_tty.c:2154 2 locks held by getty/7428: #0: 000000004b72a9ba (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:341 #1: 0000000059d498c5 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 drivers/tty/n_tty.c:2154 2 locks held by getty/7429: #0: 00000000f816bccd (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:341 #1: 000000003509145e (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 drivers/tty/n_tty.c:2154 2 locks held by getty/7430: #0: 00000000c793cfc4 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:341 #1: 000000000fb408fe (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 drivers/tty/n_tty.c:2154 2 locks held by getty/7431: #0: 0000000079134044 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:341 #1: 0000000012d4d13f (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 drivers/tty/n_tty.c:2154 3 locks held by kworker/1:1/15576: #0: 00000000fe95da56 ((wq_completion)"%s"("ipv6_addrconf")){+.+.}, at: __write_once_size include/linux/compiler.h:220 [inline] #0: 00000000fe95da56 ((wq_completion)"%s"("ipv6_addrconf")){+.+.}, at: arch_atomic64_set arch/x86/include/asm/atomic64_64.h:34 [inline] #0: 00000000fe95da56 ((wq_completion)"%s"("ipv6_addrconf")){+.+.}, at: atomic64_set include/asm-generic/atomic-instrumented.h:40 [inline] #0: 00000000fe95da56 ((wq_completion)"%s"("ipv6_addrconf")){+.+.}, at: atomic_long_set include/asm-generic/atomic-long.h:59 [inline] #0: 00000000fe95da56 ((wq_completion)"%s"("ipv6_addrconf")){+.+.}, at: set_work_data kernel/workqueue.c:617 [inline] #0: 00000000fe95da56 ((wq_completion)"%s"("ipv6_addrconf")){+.+.}, at: set_work_pool_and_clear_pending kernel/workqueue.c:644 [inline] #0: 00000000fe95da56 ((wq_completion)"%s"("ipv6_addrconf")){+.+.}, at: process_one_work+0x87e/0x1790 kernel/workqueue.c:2144 #1: 00000000957ec30e ((addr_chk_work).work){+.+.}, at: process_one_work+0x8b4/0x1790 kernel/workqueue.c:2148 #2: 000000002beafeb8 (rtnl_mutex){+.+.}, at: rtnl_lock+0x17/0x20 net/core/rtnetlink.c:76 2 locks held by syz-executor.2/15953: #0: 000000007beb05aa (pernet_ops_rwsem){++++}, at: copy_net_ns+0x1ba/0x340 net/core/net_namespace.c:433 #1: 000000002beafeb8 (rtnl_mutex){+.+.}, at: rtnl_lock+0x17/0x20 net/core/rtnetlink.c:76 1 lock held by syz-executor.0/15965: #0: 000000007beb05aa (pernet_ops_rwsem){++++}, at: register_netdevice_notifier+0x7e/0x630 net/core/dev.c:1634 2 locks held by syz-executor.0/15987: #0: 00000000dccf160e (&sb->s_type->i_mutex_key#11){+.+.}, at: inode_lock include/linux/fs.h:757 [inline] #0: 00000000dccf160e (&sb->s_type->i_mutex_key#11){+.+.}, at: __sock_release+0x89/0x250 net/socket.c:578 #1: 000000007beb05aa (pernet_ops_rwsem){++++}, at: unregister_netdevice_notifier+0x7e/0x3a0 net/core/dev.c:1703 ============================================= NMI backtrace for cpu 1 CPU: 1 PID: 1041 Comm: khungtaskd Not tainted 5.0.0-rc7+ #87 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x172/0x1f0 lib/dump_stack.c:113 nmi_cpu_backtrace.cold+0x63/0xa4 lib/nmi_backtrace.c:101 nmi_trigger_cpumask_backtrace+0x1be/0x236 lib/nmi_backtrace.c:62 arch_trigger_cpumask_backtrace+0x14/0x20 arch/x86/kernel/apic/hw_nmi.c:38 trigger_all_cpu_backtrace include/linux/nmi.h:146 [inline] check_hung_uninterruptible_tasks kernel/hung_task.c:203 [inline] watchdog+0x9df/0xee0 kernel/hung_task.c:287 kthread+0x357/0x430 kernel/kthread.c:246 ret_from_fork+0x3a/0x50 arch/x86/entry/entry_64.S:352 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 PID: 7335 Comm: rsyslogd Not tainted 5.0.0-rc7+ #87 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:__trace_hardirqs_on_caller kernel/locking/lockdep.c:2755 [inline] RIP: 0010:lockdep_hardirqs_on+0x17b/0x5d0 kernel/locking/lockdep.c:2814 Code: 00 01 00 00 00 48 b8 00 00 00 00 00 fc ff df 65 48 8b 1c 25 40 ee 01 00 48 8d bb 48 08 00 00 48 89 fa 48 c1 ea 03 0f b6 04 02 <84> c0 74 08 3c 03 0f 8e 28 03 00 00 c7 83 48 08 00 00 01 00 00 00 RSP: 0018:ffff8880971178c0 EFLAGS: 00000806 RAX: 0000000000000000 RBX: ffff888097024040 RCX: 0000000000000000 RDX: 1ffff11012e04911 RSI: ffffffff81754d8e RDI: ffff888097024888 RBP: ffff8880971178d0 R08: ffff888097024040 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: ffffffff81a75c9d R13: ffffffff81a760bb R14: ffffffff81a75c9d R15: ffff88821b708540 FS: 00007f1841453700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000457dff CR3: 00000000a0feb000 CR4: 00000000001406f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: trace_hardirqs_on+0x67/0x230 kernel/trace/trace_preemptirq.c:30 qlink_free mm/kasan/quarantine.c:151 [inline] qlist_free_all+0xfd/0x150 mm/kasan/quarantine.c:167 quarantine_reduce+0x17b/0x1b0 mm/kasan/quarantine.c:260 __kasan_kmalloc.constprop.0+0xa3/0xe0 mm/kasan/common.c:476 kasan_slab_alloc+0xf/0x20 mm/kasan/common.c:503 slab_post_alloc_hook mm/slab.h:440 [inline] slab_alloc mm/slab.c:3388 [inline] kmem_cache_alloc_trace+0x13a/0x760 mm/slab.c:3613 kmalloc include/linux/slab.h:545 [inline] syslog_print kernel/printk/printk.c:1302 [inline] do_syslog kernel/printk/printk.c:1475 [inline] do_syslog+0x5aa/0x1790 kernel/printk/printk.c:1449 kmsg_read+0x8f/0xc0 fs/proc/kmsg.c:40 proc_reg_read+0x1fa/0x2c0 fs/proc/inode.c:229 __vfs_read+0x116/0x8c0 fs/read_write.c:416 vfs_read+0x194/0x3e0 fs/read_write.c:452 ksys_read+0xea/0x1f0 fs/read_write.c:578 __do_sys_read fs/read_write.c:588 [inline] __se_sys_read fs/read_write.c:586 [inline] __x64_sys_read+0x73/0xb0 fs/read_write.c:586 do_syscall_64+0x103/0x610 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7f1843eb31fd Code: d1 20 00 00 75 10 b8 00 00 00 00 0f 05 48 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 5e fa ff ff 48 89 04 24 b8 00 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 a7 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 RSP: 002b:00007f1841452e30 EFLAGS: 00000293 ORIG_RAX: 0000000000000000 RAX: ffffffffffffffda RBX: 0000000001c4fce0 RCX: 00007f1843eb31fd RDX: 0000000000000fff RSI: 00007f1842c875a0 RDI: 0000000000000004 RBP: 0000000000000000 R08: 0000000001c3b260 R09: 0000000004000001 R10: 0000000000000001 R11: 0000000000000293 R12: 000000000065e420 R13: 00007f18414539c0 R14: 00007f18444f8040 R15: 0000000000000003