bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:0a:44:ce:9c:07:2c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) INFO: task syz-executor.2:383 blocked for more than 140 seconds. Not tainted 5.0.0-rc6+ #84 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. syz-executor.2 D29664 383 7466 0x00000004 Call Trace: context_switch kernel/sched/core.c:2844 [inline] __schedule+0x817/0x1cc0 kernel/sched/core.c:3485 schedule+0x92/0x180 kernel/sched/core.c:3529 exp_funnel_lock kernel/rcu/tree_exp.h:319 [inline] _synchronize_rcu_expedited.constprop.0+0x4d4/0x530 kernel/rcu/tree_exp.h:622 synchronize_rcu_expedited+0x27/0xa0 kernel/rcu/tree_exp.h:762 synchronize_net+0x3b/0x60 net/core/dev.c:9165 packet_set_ring+0x24a/0x1b60 net/packet/af_packet.c:4344 packet_setsockopt+0x536/0x2dd0 net/packet/af_packet.c:3654 __sys_setsockopt+0x180/0x280 net/socket.c:1900 net_ratelimit: 26433 callbacks suppressed bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:0a:44:ce:9c:07:2c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) __do_sys_setsockopt net/socket.c:1911 [inline] __se_sys_setsockopt net/socket.c:1908 [inline] __x64_sys_setsockopt+0xbe/0x150 net/socket.c:1908 do_syscall_64+0x103/0x610 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x457e29 Code: Bad RIP value. RSP: 002b:00007f8fabb92c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000457e29 RDX: 0000000000000005 RSI: 0000000000000107 RDI: 0000000000000005 RBP: 000000000073c0e0 R08: 000000000000001c R09: 0000000000000000 R10: 0000000020000080 R11: 0000000000000246 R12: 00007f8fabb936d4 R13: 00000000004c5f44 R14: 00000000004daed0 R15: 00000000ffffffff Showing all locks held in the system: 3 locks held by kworker/u4:3/220: 1 lock held by khungtaskd/1040: #0: 000000005d973c47 (rcu_read_lock){....}, at: debug_show_all_locks+0x5f/0x27e kernel/locking/lockdep.c:4389 1 lock held by rsyslogd/7334: 2 locks held by getty/7423: #0: 0000000065a08576 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:341 #1: 0000000097b6b919 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 drivers/tty/n_tty.c:2154 2 locks held by getty/7424: #0: 00000000687b8d1b (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:341 #1: 00000000e0e81f31 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 drivers/tty/n_tty.c:2154 2 locks held by getty/7425: #0: 000000005a394d4b (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:341 #1: 0000000085b8f2d6 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 drivers/tty/n_tty.c:2154 2 locks held by getty/7426: #0: 00000000abb692b2 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:341 #1: 000000007635b5e3 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 drivers/tty/n_tty.c:2154 2 locks held by getty/7427: #0: 00000000bce53990 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:341 #1: 000000006ddfbce0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 drivers/tty/n_tty.c:2154 2 locks held by getty/7428: #0: 000000008fbe21d8 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:341 #1: 000000004db59525 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 drivers/tty/n_tty.c:2154 2 locks held by getty/7429: #0: 00000000bd549295 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:341 #1: 000000009741c5d3 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 drivers/tty/n_tty.c:2154 1 lock held by syz-executor.2/383: #0: 00000000f5b23bd7 (sk_lock-AF_PACKET){+.+.}, at: lock_sock include/net/sock.h:1506 [inline] #0: 00000000f5b23bd7 (sk_lock-AF_PACKET){+.+.}, at: packet_setsockopt+0x44d/0x2dd0 net/packet/af_packet.c:3637 ============================================= NMI backtrace for cpu 0 CPU: 0 PID: 1040 Comm: khungtaskd Not tainted 5.0.0-rc6+ #84 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x172/0x1f0 lib/dump_stack.c:113 nmi_cpu_backtrace.cold+0x63/0xa4 lib/nmi_backtrace.c:101 nmi_trigger_cpumask_backtrace+0x1be/0x236 lib/nmi_backtrace.c:62 arch_trigger_cpumask_backtrace+0x14/0x20 arch/x86/kernel/apic/hw_nmi.c:38 trigger_all_cpu_backtrace include/linux/nmi.h:146 [inline] check_hung_uninterruptible_tasks kernel/hung_task.c:203 [inline] watchdog+0x9df/0xee0 kernel/hung_task.c:287 kthread+0x357/0x430 kernel/kthread.c:246 ret_from_fork+0x3a/0x50 arch/x86/entry/entry_64.S:352 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 PID: 7334 Comm: rsyslogd Not tainted 5.0.0-rc6+ #84 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:check_preemption_disabled+0x48/0x290 lib/smp_processor_id.c:52 Code: 8b 2d 5c 77 d6 7c 65 8b 1d f5 e3 d6 7c 81 e3 ff ff ff 7f 31 ff 89 de e8 a6 d8 44 fe 85 db 74 1c e8 1d d7 44 fe e8 18 d7 44 fe <44> 89 e8 48 83 c4 08 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 01 d7 44 RSP: 0018:ffff888097d87860 EFLAGS: 00000093 RAX: ffff88808883c300 RBX: 0000000000000000 RCX: ffffffff832b0a5a RDX: 0000000000000000 RSI: ffffffff832b09f8 RDI: 0000000000000007 RBP: ffff888097d87890 R08: ffff88808883c300 R09: ffff88808883cba0 R10: 0000000000000000 R11: 0000000000000000 R12: ffffffff87a24240 R13: 0000000000000001 R14: ffffffff87a24200 R15: 0000607f514080f0 FS: 00007fe2d2ee1700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffffffff600400 CR3: 00000000999d1000 CR4: 00000000001406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: debug_smp_processor_id+0x1c/0x20 lib/smp_processor_id.c:56 cpu_cache_get mm/slab.c:423 [inline] ___cache_free+0x2e/0x380 mm/slab.c:3496 qlink_free mm/kasan/quarantine.c:148 [inline] qlist_free_all+0x85/0x150 mm/kasan/quarantine.c:167 quarantine_reduce+0x17b/0x1b0 mm/kasan/quarantine.c:260 __kasan_kmalloc.constprop.0+0xa3/0xe0 mm/kasan/common.c:477 kasan_kmalloc+0x9/0x10 mm/kasan/common.c:504 kmem_cache_alloc_trace+0x151/0x760 mm/slab.c:3609 kmalloc include/linux/slab.h:545 [inline] syslog_print kernel/printk/printk.c:1302 [inline] do_syslog kernel/printk/printk.c:1475 [inline] do_syslog+0x5aa/0x1790 kernel/printk/printk.c:1449 kmsg_read+0x8f/0xc0 fs/proc/kmsg.c:40 proc_reg_read+0x1fa/0x2c0 fs/proc/inode.c:229 __vfs_read+0x116/0x8c0 fs/read_write.c:416 vfs_read+0x194/0x3e0 fs/read_write.c:452 ksys_read+0xea/0x1f0 fs/read_write.c:578 __do_sys_read fs/read_write.c:588 [inline] __se_sys_read fs/read_write.c:586 [inline] __x64_sys_read+0x73/0xb0 fs/read_write.c:586 do_syscall_64+0x103/0x610 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7fe2d59411fd Code: d1 20 00 00 75 10 b8 00 00 00 00 0f 05 48 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 5e fa ff ff 48 89 04 24 b8 00 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 a7 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 RSP: 002b:00007fe2d2ee0e30 EFLAGS: 00000293 ORIG_RAX: 0000000000000000 RAX: ffffffffffffffda RBX: 0000000001ef9ce0 RCX: 00007fe2d59411fd RDX: 0000000000000fff RSI: 00007fe2d47155a0 RDI: 0000000000000004 RBP: 0000000000000000 R08: 0000000001ee5260 R09: 0000000004000001 R10: 0000000000000001 R11: 0000000000000293 R12: 000000000065e420 R13: 00007fe2d2ee19c0 R14: 00007fe2d5f86040 R15: 0000000000000003