bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on bond0 with own address as source address (addr:00:00:ff:00:00:00, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:26:fe:4d:a2:ff:55, vlan:0) INFO: task syz-executor.5:18342 blocked for more than 140 seconds. Not tainted 5.0.0+ #97 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. syz-executor.5 D28864 18342 31545 0x00000004 Call Trace: context_switch kernel/sched/core.c:2844 [inline] __schedule+0x817/0x1cc0 kernel/sched/core.c:3485 schedule+0x92/0x180 kernel/sched/core.c:3529 __rwsem_down_write_failed_common kernel/locking/rwsem-xadd.c:584 [inline] rwsem_down_write_failed+0x774/0xc30 kernel/locking/rwsem-xadd.c:613 call_rwsem_down_write_failed+0x17/0x30 arch/x86/lib/rwsem.S:117 __down_write arch/x86/include/asm/rwsem.h:142 [inline] down_write+0x53/0x90 kernel/locking/rwsem.c:72 inode_lock include/linux/fs.h:763 [inline] process_measurement+0x1540/0x1570 security/integrity/ima/ima_main.c:207 ima_file_check+0xc5/0x110 security/integrity/ima/ima_main.c:393 do_last fs/namei.c:3422 [inline] path_openat+0x1130/0x4690 fs/namei.c:3534 do_filp_open+0x1a1/0x280 fs/namei.c:3564 do_sys_open+0x3fe/0x5d0 fs/open.c:1063 __do_sys_openat fs/open.c:1090 [inline] __se_sys_openat fs/open.c:1084 [inline] __x64_sys_openat+0x9d/0x100 fs/open.c:1084 do_syscall_64+0x103/0x610 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x457f29 Code: Bad RIP value. RSP: 002b:00007f0d88a0ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000457f29 RDX: 000000000000275a RSI: 0000000020000740 RDI: ffffffffffffff9c RBP: 000000000073c040 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0d88a0f6d4 R13: 00000000004c3f95 R14: 00000000004d73f8 R15: 00000000ffffffff Showing all locks held in the system: 2 locks held by ksoftirqd/0/9: 1 lock held by khungtaskd/1041: #0: 00000000aa6cad43 (rcu_read_lock){....}, at: debug_show_all_locks+0x5f/0x27e kernel/locking/lockdep.c:4389 1 lock held by rsyslogd/7685: #0: 0000000012db66fd (&f->f_pos_lock){+.+.}, at: __fdget_pos+0xee/0x110 fs/file.c:795 2 locks held by getty/7775: #0: 000000009406e51f (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:341 #1: 000000008a66313a (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 drivers/tty/n_tty.c:2154 2 locks held by getty/7776: #0: 00000000792b536e (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:341 #1: 000000001e1c47b3 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 drivers/tty/n_tty.c:2154 2 locks held by getty/7777: #0: 000000003a944b34 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:341 #1: 00000000bdc54805 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 drivers/tty/n_tty.c:2154 2 locks held by getty/7778: #0: 000000001b7cf7bc (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:341 #1: 00000000f6816312 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 drivers/tty/n_tty.c:2154 2 locks held by getty/7779: #0: 000000003a5f36c7 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:341 #1: 00000000bb2486a7 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 drivers/tty/n_tty.c:2154 2 locks held by getty/7780: #0: 0000000088deafe6 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:341 #1: 000000006b39413f (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 drivers/tty/n_tty.c:2154 2 locks held by getty/7781: #0: 0000000040ddbefa (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:341 #1: 0000000034bbb0d5 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 drivers/tty/n_tty.c:2154 3 locks held by kworker/0:3/7828: #0: 000000006be410e9 (&rq->lock){-.-.}, at: rq_lock kernel/sched/sched.h:1149 [inline] #0: 000000006be410e9 (&rq->lock){-.-.}, at: __schedule+0x1fc/0x1cc0 kernel/sched/core.c:3423 #1: 00000000aa6cad43 (rcu_read_lock){....}, at: trace_sched_stat_runtime include/trace/events/sched.h:428 [inline] #1: 00000000aa6cad43 (rcu_read_lock){....}, at: update_curr+0x2ce/0x8a0 kernel/sched/fair.c:829 #2: 0000000000f6eaae (&base->lock){-.-.}, at: lock_timer_base+0x56/0x1b0 kernel/time/timer.c:937 2 locks held by syz-executor.5/18342: #0: 000000000df3c3c1 (sb_writers#3){.+.+}, at: sb_start_write include/linux/fs.h:1609 [inline] #0: 000000000df3c3c1 (sb_writers#3){.+.+}, at: mnt_want_write+0x3f/0xc0 fs/namespace.c:357 #1: 0000000021710556 (&sb->s_type->i_mutex_key#10){++++}, at: inode_lock include/linux/fs.h:763 [inline] #1: 0000000021710556 (&sb->s_type->i_mutex_key#10){++++}, at: process_measurement+0x1540/0x1570 security/integrity/ima/ima_main.c:207 3 locks held by syz-executor.5/18346: ============================================= NMI backtrace for cpu 0 CPU: 0 PID: 1041 Comm: khungtaskd Not tainted 5.0.0+ #97 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x172/0x1f0 lib/dump_stack.c:113 nmi_cpu_backtrace.cold+0x63/0xa4 lib/nmi_backtrace.c:101 nmi_trigger_cpumask_backtrace+0x1be/0x236 lib/nmi_backtrace.c:62 arch_trigger_cpumask_backtrace+0x14/0x20 arch/x86/kernel/apic/hw_nmi.c:38 trigger_all_cpu_backtrace include/linux/nmi.h:146 [inline] check_hung_uninterruptible_tasks kernel/hung_task.c:203 [inline] watchdog+0x9df/0xee0 kernel/hung_task.c:287 kthread+0x357/0x430 kernel/kthread.c:246 ret_from_fork+0x3a/0x50 arch/x86/entry/entry_64.S:352 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 PID: 16 Comm: ksoftirqd/1 Not tainted 5.0.0+ #97 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:find_rr_leaf net/ipv6/route.c:708 [inline] RIP: 0010:rt6_select net/ipv6/route.c:763 [inline] RIP: 0010:fib6_table_lookup+0x450/0xce0 net/ipv6/route.c:1821 Code: 96 b7 62 fb 48 8d bb 98 00 00 00 48 89 f8 48 c1 e8 03 42 0f b6 04 38 84 c0 74 08 3c 03 0f 8e 58 07 00 00 44 8b b3 98 00 00 00 <44> 89 e7 44 89 f6 e8 65 b8 62 fb 45 39 f4 0f 85 d1 00 00 00 e8 57 RSP: 0018:ffff8880aa2c74a8 EFLAGS: 00000246 RAX: 0000000000000000 RBX: ffff88805784cc80 RCX: ffffffff860cfecc RDX: 0000000000000100 RSI: ffffffff860cfeda RDI: ffff88805784cd18 RBP: ffff8880aa2c75e8 R08: ffff8880aa2b2440 R09: ffffed1015d25bd0 R10: ffffed1015d25bcf R11: ffff8880ae92de7b R12: 0000000000000100 R13: ffff88804e6728c0 R14: 0000000000000100 R15: dffffc0000000000 FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffffffff600400 CR3: 000000009a083000 CR4: 00000000001406e0 Call Trace: ip6_pol_route+0x1a4/0xf00 net/ipv6/route.c:1854 ip6_pol_route_input+0x65/0x80 net/ipv6/route.c:1923 fib6_rule_lookup+0x128/0x560 net/ipv6/fib6_rules.c:118 ip6_route_input_lookup+0xb7/0xd0 net/ipv6/route.c:1935 ip6_route_input+0x5e2/0x9e0 net/ipv6/route.c:2070 ip6_rcv_finish_core.isra.0+0x174/0x590 net/ipv6/ip6_input.c:63 ip6_rcv_finish+0x17d/0x320 net/ipv6/ip6_input.c:74 NF_HOOK include/linux/netfilter.h:289 [inline] NF_HOOK include/linux/netfilter.h:283 [inline] ipv6_rcv+0x10e/0x420 net/ipv6/ip6_input.c:272 __netif_receive_skb_one_core+0x115/0x1a0 net/core/dev.c:4973 __netif_receive_skb+0x2c/0x1c0 net/core/dev.c:5083 process_backlog+0x206/0x750 net/core/dev.c:5923 napi_poll net/core/dev.c:6346 [inline] net_rx_action+0x4fa/0x1070 net/core/dev.c:6412 __do_softirq+0x266/0x95a kernel/softirq.c:292 run_ksoftirqd kernel/softirq.c:654 [inline] run_ksoftirqd+0x8e/0x110 kernel/softirq.c:646 smpboot_thread_fn+0x6ab/0xa10 kernel/smpboot.c:164 kthread+0x357/0x430 kernel/kthread.c:246 ret_from_fork+0x3a/0x50 arch/x86/entry/entry_64.S:352