IPv6: ADDRCONF(NETDEV_UP): bridge17: link is not ready INFO: task syz-executor.3:5672 blocked for more than 140 seconds. Not tainted 4.19.211-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. syz-executor.3 D26304 5672 8219 0x00000004 Call Trace: context_switch kernel/sched/core.c:2828 [inline] __schedule+0x887/0x2040 kernel/sched/core.c:3517 schedule+0x8d/0x1b0 kernel/sched/core.c:3561 audit: type=1804 audit(1675816417.350:41775): pid=17290 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir2642501094/syzkaller.3Fn50W/4935/file0" dev="sda1" ino=13985 res=1 xlog_grant_head_wait+0x13b/0xcd0 fs/xfs/xfs_log.c:263 UDF-fs: error (device loop2): udf_read_tagged: tag version 0x0000 != 0x0002 || 0x0003, block 0 UDF-fs: error (device loop2): udf_read_tagged: tag version 0x0000 != 0x0002 || 0x0003, block 0 IPVS: sync thread started: state = BACKUP, mcast_ifn = veth0, syncid = 2, id = 0 audit: type=1804 audit(1675816417.390:41776): pid=17293 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir2112737029/syzkaller.j41H2c/4438/file0" dev="sda1" ino=14002 res=1 xlog_grant_head_check+0x3c8/0x420 fs/xfs/xfs_log.c:325 audit: type=1804 audit(1675816417.430:41777): pid=17297 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir2112737029/syzkaller.j41H2c/4438/file0" dev="sda1" ino=14002 res=1 UDF-fs: error (device loop2): udf_read_tagged: tag version 0x0000 != 0x0002 || 0x0003, block 0 audit: type=1804 audit(1675816417.570:41778): pid=17302 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir2642501094/syzkaller.3Fn50W/4935/file0" dev="sda1" ino=13985 res=1 UDF-fs: warning (device loop2): udf_load_vrs: No anchor found xfs_log_reserve+0x347/0xa70 fs/xfs/xfs_log.c:454 UDF-fs: Scanning with blocksize 512 failed xfs_trans_reserve+0x63a/0x9c0 fs/xfs/xfs_trans.c:197 xfs_trans_alloc+0x2f7/0x700 fs/xfs/xfs_trans.c:289 xlog_finish_defer_ops fs/xfs/xfs_log_recover.c:4841 [inline] xlog_recover_process_intents+0x274/0x430 fs/xfs/xfs_log_recover.c:4947 UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) xlog_recover_finish+0x5f/0x230 fs/xfs/xfs_log_recover.c:5839 xfs_log_mount_finish+0x135/0x450 fs/xfs/xfs_log.c:778 xfs_mountfs+0x1032/0x1bf0 fs/xfs/xfs_mount.c:974 IPVS: set_ctl: invalid protocol: 0 172.20.20.170:0 xfs_fs_fill_super+0xd0e/0x1540 fs/xfs/xfs_super.c:1720 mount_bdev+0x2fc/0x3b0 fs/super.c:1158 mount_fs+0xa3/0x310 fs/super.c:1261 vfs_kern_mount.part.0+0x68/0x470 fs/namespace.c:961 vfs_kern_mount fs/namespace.c:951 [inline] do_new_mount fs/namespace.c:2492 [inline] do_mount+0x115c/0x2f50 fs/namespace.c:2822 IPVS: set_ctl: invalid protocol: 0 172.20.20.170:0 ksys_mount+0xcf/0x130 fs/namespace.c:3038 __do_sys_mount fs/namespace.c:3052 [inline] __se_sys_mount fs/namespace.c:3049 [inline] __x64_sys_mount+0xba/0x150 fs/namespace.c:3049 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7f818c3b162a Code: Bad RIP value. RSP: 002b:00007f818a921f88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 IPVS: set_ctl: invalid protocol: 0 172.20.20.170:0 RAX: ffffffffffffffda RBX: 000000000000bb2b RCX: 00007f818c3b162a RDX: 000000002000bb00 RSI: 000000002000bb40 RDI: 00007f818a921fe0 RBP: 00007f818a922020 R08: 00007f818a922020 R09: 0000000000000004 R10: 0000000000000004 R11: 0000000000000202 R12: 000000002000bb00 R13: 000000002000bb40 R14: 00007f818a921fe0 R15: 0000000020000040 Showing all locks held in the system: 1 lock held by khungtaskd/1568: #0: 00000000c1c5ac0f (rcu_read_lock){....}, at: debug_show_all_locks+0x53/0x265 kernel/locking/lockdep.c:4441 1 lock held by in:imklog/7798: #0: 0000000051629f7a (&f->f_pos_lock){+.+.}, at: __fdget_pos+0x26f/0x310 fs/file.c:767 2 locks held by agetty/7820: #0: 00000000672bca39 (&tty->ldisc_sem){++++}, at: tty_ldisc_ref_wait+0x22/0x80 drivers/tty/tty_ldisc.c:272 #1: 00000000dabd0bd0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x217/0x1950 drivers/tty/n_tty.c:2154 1 lock held by syz-executor.2/8157: #0: 0000000000faf2e3 (rcu_preempt_state.exp_mutex){+.+.}, at: exp_funnel_lock kernel/rcu/tree_exp.h:297 [inline] #0: 0000000000faf2e3 (rcu_preempt_state.exp_mutex){+.+.}, at: _synchronize_rcu_expedited+0x4dc/0x6f0 kernel/rcu/tree_exp.h:667 2 locks held by kworker/1:0/16797: 2 locks held by syz-executor.3/5672: #0: 00000000d300e976 (&type->s_umount_key#73/1){+.+.}, at: alloc_super fs/super.c:226 [inline] #0: 00000000d300e976 (&type->s_umount_key#73/1){+.+.}, at: sget_userns+0x20b/0xcd0 fs/super.c:519 #1: 00000000cb201ab8 (sb_internal#4){.+.+}, at: sb_start_intwrite include/linux/fs.h:1626 [inline] #1: 00000000cb201ab8 (sb_internal#4){.+.+}, at: xfs_trans_alloc+0x4fc/0x700 fs/xfs/xfs_trans.c:271 1 lock held by syz-executor.0/17259: audit: type=1804 audit(1675816418.010:41779): pid=17343 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir1122251961/syzkaller.eG86Pg/1749/file0" dev="sda1" ino=14231 res=1 2 locks held by syz-executor.5/17343: ============================================= NMI backtrace for cpu 0 CPU: 0 PID: 1568 Comm: khungtaskd Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1fc/0x2ef lib/dump_stack.c:118 nmi_cpu_backtrace.cold+0x63/0xa2 lib/nmi_backtrace.c:101 nmi_trigger_cpumask_backtrace+0x1a6/0x1f0 lib/nmi_backtrace.c:62 trigger_all_cpu_backtrace include/linux/nmi.h:146 [inline] check_hung_uninterruptible_tasks kernel/hung_task.c:203 [inline] watchdog+0x991/0xe60 kernel/hung_task.c:287 kthread+0x33f/0x460 kernel/kthread.c:259 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 PID: 4693 Comm: systemd-journal Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 RIP: 0010:preempt_count arch/x86/include/asm/preempt.h:23 [inline] RIP: 0010:check_kcov_mode kernel/kcov.c:67 [inline] RIP: 0010:__sanitizer_cov_trace_pc+0xd/0x50 kernel/kcov.c:101 Code: ff 4c 89 ef e8 04 dd 35 00 e9 23 fe ff ff 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 48 8b 34 24 65 48 8b 04 25 c0 df 01 00 <65> 8b 15 cc 59 9f 7e 81 e2 00 01 1f 00 75 2b 8b 90 60 13 00 00 83 RSP: 0018:ffff8880a0e6f7f8 EFLAGS: 00000293 RAX: ffff8880a0e605c0 RBX: 0000000000000001 RCX: ffffffff83771e23 RDX: 0000000000000000 RSI: ffffffff83771e31 RDI: 0000000000000005 RBP: ffffffff88b3e120 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000005 R11: 0000000000000000 R12: 0000000000000001 R13: ffffffff88b3e0e0 R14: ffff8880b5414e30 R15: ffff8880a0e6fa40 FS: 00007f4825b448c0(0000) GS:ffff8880ba100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000001b2fe3d000 CR3: 00000000a1324000 CR4: 00000000003406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: check_preemption_disabled+0x41/0x280 lib/smp_processor_id.c:51 rcu_lockdep_current_cpu_online kernel/rcu/tree.c:1078 [inline] rcu_lockdep_current_cpu_online+0xb2/0x1b0 kernel/rcu/tree.c:1068 rcu_read_lock_held+0xc3/0x110 kernel/rcu/update.c:285 hlist_bl_first_rcu include/linux/rculist_bl.h:24 [inline] __d_lookup_rcu+0x3d7/0x6b0 fs/dcache.c:2164 lookup_fast+0x11b/0x1080 fs/namei.c:1572 walk_component+0xde/0xda0 fs/namei.c:1807 link_path_walk.part.0+0x901/0x1230 fs/namei.c:2142 link_path_walk fs/namei.c:2073 [inline] path_parentat+0x51/0x140 fs/namei.c:2367 filename_parentat+0x198/0x590 fs/namei.c:2389 filename_create+0x9e/0x490 fs/namei.c:3621 user_path_create fs/namei.c:3696 [inline] do_mkdirat+0xa0/0x2d0 fs/namei.c:3834 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7f4824dff687 Code: 00 b8 ff ff ff ff c3 0f 1f 40 00 48 8b 05 09 d8 2b 00 64 c7 00 5f 00 00 00 b8 ff ff ff ff c3 0f 1f 40 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d e1 d7 2b 00 f7 d8 64 89 01 48 RSP: 002b:00007ffd0326f638 EFLAGS: 00000293 ORIG_RAX: 0000000000000053 RAX: ffffffffffffffda RBX: 00007ffd03272550 RCX: 00007f4824dff687 RDX: 00007f4825870a00 RSI: 00000000000001ed RDI: 000055b213cf88a0 RBP: 00007ffd0326f670 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000069 R11: 0000000000000293 R12: 0000000000000000 R13: 0000000000000000 R14: 00007ffd03272550 R15: 00007ffd0326fb60 IPv6: ADDRCONF(NETDEV_UP): bridge17: link is not ready audit: type=1804 audit(1675816418.280:41780): pid=17357 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir2642501094/syzkaller.3Fn50W/4936/file0" dev="sda1" ino=14111 res=1