bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth1_to_bridge with own address as source address (addr:76:e3:97:2a:0d:28, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) rcu: INFO: rcu_sched detected stalls on CPUs/tasks: rcu: 1-....: (10482 ticks this GP) idle=41a/1/0x4000000000000004 softirq=176257/176592 fqs=3315 rcu: (detected by 0, t=10502 jiffies, g=73389, q=14) Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 PID: 20224 Comm: syz-executor.1 Not tainted 4.19.197-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:kasan_check_read+0x0/0x10 mm/kasan/kasan.c:272 Code: 00 00 c3 48 89 d0 49 39 c1 75 11 49 0f be 01 41 83 e2 07 49 39 c2 0f 8c 4e ff ff ff 5b 44 89 c2 5d 41 5c e9 b2 18 00 00 66 90 <48> 8b 0c 24 89 f6 31 d2 e9 83 fe ff ff 0f 1f 00 48 8b 0c 24 89 f6 RSP: 0018:ffff8880ba107020 EFLAGS: 00000082 RAX: 0000000000000001 RBX: ffff8880ba122a80 RCX: 1ffffffff139f1e1 RDX: dffffc0000000000 RSI: 0000000000000004 RDI: ffff8880ba122a90 RBP: ffff8880ba122a90 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000005 R11: ffffffff8c66205b R12: 0000000000000086 R13: ffff888095104298 R14: ffff8880ba124d00 R15: dffffc0000000000 FS: 00007fdf035d7700(0000) GS:ffff8880ba100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000000056c020 CR3: 00000000a4b00000 CR4: 00000000001406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: atomic_read include/asm-generic/atomic-instrumented.h:21 [inline] rcu_dynticks_curr_cpu_in_eqs kernel/rcu/tree.c:350 [inline] rcu_is_watching+0x53/0xc0 kernel/rcu/tree.c:1025 rcu_read_lock_sched_held+0xc6/0x1d0 kernel/rcu/update.c:113 trace_hrtimer_cancel include/trace/events/timer.h:285 [inline] debug_deactivate kernel/time/hrtimer.c:472 [inline] __run_hrtimer kernel/time/hrtimer.c:1389 [inline] __hrtimer_run_queues+0xc21/0xe60 kernel/time/hrtimer.c:1481 hrtimer_interrupt+0x326/0x9e0 kernel/time/hrtimer.c:1539 local_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1071 [inline] smp_apic_timer_interrupt+0x10c/0x550 arch/x86/kernel/apic/apic.c:1096 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:894 RIP: 0010:get_current arch/x86/include/asm/current.h:15 [inline] RIP: 0010:__sanitizer_cov_trace_pc+0x4/0x50 kernel/kcov.c:100 Code: e8 31 cf 35 00 e9 ab fe ff ff 4c 89 ef e8 24 cf 35 00 e9 23 fe ff ff 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 48 8b 34 24 <65> 48 8b 04 25 80 df 01 00 65 8b 15 0c 5f 9f 7e 81 e2 00 01 1f 00 RSP: 0018:ffff8880ba107310 EFLAGS: 00000282 ORIG_RAX: ffffffffffffff13 RAX: dffffc0000000000 RBX: 1ffff11017420e67 RCX: ffffffff872a07cb RDX: 1ffff11013345e97 RSI: ffffffff872a081d RDI: ffff888045c3e180 RBP: ffff8880ba107498 R08: 0000000000000001 R09: ffffed1008b87c30 R10: ffff888045c3e183 R11: 00000000a8f2488c R12: ffff888099a2f440 R13: ffff888045c3e200 R14: ffff888045c3e180 R15: ffff888099a2f4b8 memcpy include/linux/string.h:377 [inline] nf_bridge_unshare net/bridge/br_netfilter_hooks.c:157 [inline] br_nf_forward_ip+0x3dd/0x15e0 net/bridge/br_netfilter_hooks.c:577 nf_hook_entry_hookfn include/linux/netfilter.h:119 [inline] nf_hook_slow+0xc5/0x1e0 net/netfilter/core.c:511 nf_hook include/linux/netfilter.h:244 [inline] NF_HOOK include/linux/netfilter.h:287 [inline] __br_forward+0x354/0xae0 net/bridge/br_forward.c:113 deliver_clone net/bridge/br_forward.c:129 [inline] br_flood+0x3c2/0x4d0 net/bridge/br_forward.c:238 br_handle_frame_finish+0xf41/0x1410 net/bridge/br_input.c:167 br_nf_hook_thresh+0x2a3/0x330 net/bridge/br_netfilter_hooks.c:1014 br_nf_pre_routing_finish_ipv6+0x6e3/0xd40 net/bridge/br_netfilter_ipv6.c:210 NF_HOOK include/linux/netfilter.h:289 [inline] br_nf_pre_routing_ipv6+0x3f4/0x860 net/bridge/br_netfilter_ipv6.c:240 br_nf_pre_routing+0xf05/0x1500 net/bridge/br_netfilter_hooks.c:494 nf_hook_entry_hookfn include/linux/netfilter.h:119 [inline] nf_hook_slow+0xc5/0x1e0 net/netfilter/core.c:511 nf_hook include/linux/netfilter.h:244 [inline] NF_HOOK include/linux/netfilter.h:287 [inline] br_handle_frame+0xa60/0x13b0 net/bridge/br_input.c:306 __netif_receive_skb_core+0x929/0x3270 net/core/dev.c:4876 __netif_receive_skb_one_core+0xae/0x180 net/core/dev.c:4952 __netif_receive_skb+0x27/0x1c0 net/core/dev.c:5066 process_backlog+0x241/0x700 net/core/dev.c:5848 napi_poll net/core/dev.c:6272 [inline] net_rx_action+0x4ac/0xfb0 net/core/dev.c:6338 __do_softirq+0x265/0x980 kernel/softirq.c:292 invoke_softirq kernel/softirq.c:372 [inline] irq_exit+0x215/0x260 kernel/softirq.c:412 exiting_irq arch/x86/include/asm/apic.h:536 [inline] smp_apic_timer_interrupt+0x136/0x550 arch/x86/kernel/apic/apic.c:1098 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:894 RIP: 0010:arch_local_irq_restore arch/x86/include/asm/paravirt.h:789 [inline] RIP: 0010:console_unlock+0xe7b/0x1110 kernel/printk/printk.c:2468 Code: ff df 48 c1 e8 03 80 3c 08 00 0f 85 66 02 00 00 48 83 3d cf c5 a3 08 00 0f 84 9e 00 00 00 e8 6c c3 14 00 48 8b 7c 24 30 57 9d <0f> 1f 44 00 00 e9 9b fc ff ff e8 56 c3 14 00 0f 0b e8 4f c3 14 00 RSP: 0018:ffff88804d40f918 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13 RAX: 0000000000040000 RBX: 0000000000000200 RCX: ffffc9000804a000 RDX: 0000000000040000 RSI: ffffffff814dbc84 RDI: 0000000000000246 RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: ffffffff8446d900 R13: 000000000000007e R14: 0000000000000000 R15: ffffffff8a6dc830 vprintk_emit+0x2d1/0x740 kernel/printk/printk.c:1965 vprintk_func+0x79/0x180 kernel/printk/printk_safe.c:405 printk+0xba/0xed kernel/printk/printk.c:2040 ovl_parse_opt fs/overlayfs/super.c:570 [inline] ovl_fill_super.cold+0x2f2/0x828 fs/overlayfs/super.c:1571 mount_nodev+0x60/0x110 fs/super.c:1204 mount_fs+0xa3/0x310 fs/super.c:1261 vfs_kern_mount.part.0+0x68/0x470 fs/namespace.c:961 vfs_kern_mount fs/namespace.c:951 [inline] do_new_mount fs/namespace.c:2469 [inline] do_mount+0x113c/0x2f10 fs/namespace.c:2799 ksys_mount+0xcf/0x130 fs/namespace.c:3015 __do_sys_mount fs/namespace.c:3029 [inline] __se_sys_mount fs/namespace.c:3026 [inline] __x64_sys_mount+0xba/0x150 fs/namespace.c:3026 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x4665e9 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fdf035d7188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665e9 RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 RBP: 00000000004bfcc4 R08: 0000000020000300 R09: 0000000000000000 R10: 0000000000008000 R11: 0000000000000246 R12: 000000000056c038 R13: 00007ffe73ad2b2f R14: 00007fdf035d7300 R15: 0000000000022000 net_ratelimit: 19243 callbacks suppressed bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) net_ratelimit: 19810 callbacks suppressed bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) net_ratelimit: 20132 callbacks suppressed bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) net_ratelimit: 20159 callbacks suppressed bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) net_ratelimit: 19782 callbacks suppressed bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) ieee802154 phy0 wpan0: encryption failed: -22 ieee802154 phy1 wpan1: encryption failed: -22 net_ratelimit: 19887 callbacks suppressed bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth1_to_bridge with own address as source address (addr:76:e3:97:2a:0d:28, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) net_ratelimit: 20124 callbacks suppressed bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) net_ratelimit: 19968 callbacks suppressed bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) net_ratelimit: 20021 callbacks suppressed bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) net_ratelimit: 20051 callbacks suppressed bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth1_to_bridge with own address as source address (addr:76:e3:97:2a:0d:28, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) INFO: task systemd-udevd:4702 blocked for more than 140 seconds. Not tainted 4.19.197-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. systemd-udevd D25024 4702 1 0x00000100 Call Trace: context_switch kernel/sched/core.c:2828 [inline] __schedule+0x887/0x2040 kernel/sched/core.c:3517 schedule+0x8d/0x1b0 kernel/sched/core.c:3561 schedule_preempt_disabled+0xf/0x20 kernel/sched/core.c:3619 __mutex_lock_common kernel/locking/mutex.c:1015 [inline] __mutex_lock+0x604/0x1200 kernel/locking/mutex.c:1083 __blkdev_get+0x1d0/0x1480 fs/block_dev.c:1478 blkdev_get+0xb0/0x940 fs/block_dev.c:1627 blkdev_open+0x202/0x290 fs/block_dev.c:1788 do_dentry_open+0x4aa/0x1160 fs/open.c:796 do_last fs/namei.c:3421 [inline] path_openat+0x793/0x2df0 fs/namei.c:3537 do_filp_open+0x18c/0x3f0 fs/namei.c:3567 do_sys_open+0x3b3/0x520 fs/open.c:1085 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7f1e92feb840 Code: Bad RIP value. RSP: 002b:00007ffcd8cda3a8 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 RAX: ffffffffffffffda RBX: 00007ffcd8cda440 RCX: 00007f1e92feb840 RDX: 00005557368c8fe3 RSI: 00000000000a0800 RDI: 00005557377619a0 RBP: 00007ffcd8cda900 R08: 00005557368c8670 R09: 0000000000000010 R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffcd8cda550 R13: 000055573774f010 R14: 00005557377632e0 R15: 00007ffcd8cda420 INFO: task syz-executor.4:20197 blocked for more than 140 seconds. Not tainted 4.19.197-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. syz-executor.4 D28648 20197 8159 0x00000004 Call Trace: context_switch kernel/sched/core.c:2828 [inline] __schedule+0x887/0x2040 kernel/sched/core.c:3517 schedule+0x8d/0x1b0 kernel/sched/core.c:3561 schedule_preempt_disabled+0xf/0x20 kernel/sched/core.c:3619 __mutex_lock_common kernel/locking/mutex.c:1015 [inline] __mutex_lock+0x604/0x1200 kernel/locking/mutex.c:1083 blkdev_put+0x30/0x520 fs/block_dev.c:1839 blkdev_close+0x86/0xb0 fs/block_dev.c:1888 __fput+0x2ce/0x890 fs/file_table.c:278 task_work_run+0x148/0x1c0 kernel/task_work.c:113 tracehook_notify_resume include/linux/tracehook.h:193 [inline] exit_to_usermode_loop+0x251/0x2a0 arch/x86/entry/common.c:167 prepare_exit_to_usermode arch/x86/entry/common.c:198 [inline] syscall_return_slowpath arch/x86/entry/common.c:271 [inline] do_syscall_64+0x538/0x620 arch/x86/entry/common.c:296 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x4193fb Code: 8b 5c 24 2c 89 de 87 59 10 4c 8b 44 24 60 4c 8b 4c 24 40 48 89 ca 89 f3 4c 89 c9 4c 89 c0 85 db 0f 86 5a 02 00 00 ff cb 0f 1f <80> 00 00 00 00 48 83 fb 65 0f 83 fb 02 00 00 89 5c 24 2c 48 8d 34 RSP: 002b:00007ffc49e78200 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 RAX: 0000000000000000 RBX: 0000000000000005 RCX: 00000000004193fb RDX: 00000000005703a8 RSI: 00000000000f4240 RDI: 0000000000000004 RBP: 0000000000000000 R08: 0000000000000000 R09: 0000012ad9a5ef8f R10: 001414c92dfc4fac R11: 0000000000000293 R12: 000000000010f9e0 R13: 00000000000003e8 R14: 000000000056bf80 R15: 000000000010f893 INFO: task syz-executor.4:20203 blocked for more than 140 seconds. Not tainted 4.19.197-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. syz-executor.4 D27984 20203 8159 0x80000004 Call Trace: context_switch kernel/sched/core.c:2828 [inline] __schedule+0x887/0x2040 kernel/sched/core.c:3517 schedule+0x8d/0x1b0 kernel/sched/core.c:3561 schedule_preempt_disabled+0xf/0x20 kernel/sched/core.c:3619 __mutex_lock_common kernel/locking/mutex.c:1015 [inline] __mutex_lock+0x604/0x1200 kernel/locking/mutex.c:1083 lo_release+0x1a/0x1f0 drivers/block/loop.c:1790 __blkdev_put+0x636/0x870 fs/block_dev.c:1819 deactivate_locked_super+0x94/0x160 fs/super.c:329 mount_bdev+0x373/0x3b0 fs/super.c:1160 mount_fs+0xa3/0x310 fs/super.c:1261 vfs_kern_mount.part.0+0x68/0x470 fs/namespace.c:961 vfs_kern_mount fs/namespace.c:951 [inline] do_new_mount fs/namespace.c:2469 [inline] do_mount+0x113c/0x2f10 fs/namespace.c:2799 ksys_mount+0xcf/0x130 fs/namespace.c:3015 __do_sys_mount fs/namespace.c:3029 [inline] __se_sys_mount fs/namespace.c:3026 [inline] __x64_sys_mount+0xba/0x150 fs/namespace.c:3026 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x467b0a Code: 68 48 8b 44 24 48 48 89 44 24 70 48 8b 44 24 40 48 89 44 24 78 48 8b 6c 24 58 48 83 c4 60 c3 48 8d 0d fa d3 2a 00 48 89 0c 24 <48> 8d 15 df 38 42 01 48 89 54 24 08 0f 57 c0 0f 11 44 24 10 48 89 RSP: 002b:00007f85df544fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 0000000020001500 RCX: 0000000000467b0a RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f85df545000 RBP: 00007f85df545040 R08: 00007f85df545040 R09: 0000000020000000 R10: 0000000000000001 R11: 0000000000000202 R12: 0000000020000000 R13: 0000000020000100 R14: 00007f85df545000 R15: 00000000200001c0 INFO: task syz-executor.5:20209 blocked for more than 140 seconds. Not tainted 4.19.197-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. syz-executor.5 D27984 20209 8161 0x00000004 Call Trace: context_switch kernel/sched/core.c:2828 [inline] __schedule+0x887/0x2040 kernel/sched/core.c:3517 schedule+0x8d/0x1b0 kernel/sched/core.c:3561 blk_mq_freeze_queue_wait+0x119/0x270 block/blk-mq.c:152 __loop_clr_fd+0x143/0xe50 drivers/block/loop.c:1093 loop_clr_fd drivers/block/loop.c:1211 [inline] lo_ioctl+0x363/0x20e0 drivers/block/loop.c:1580 __blkdev_driver_ioctl block/ioctl.c:303 [inline] blkdev_ioctl+0x5cb/0x1a80 block/ioctl.c:601 block_ioctl+0xe9/0x130 fs/block_dev.c:1906 vfs_ioctl fs/ioctl.c:46 [inline] file_ioctl fs/ioctl.c:501 [inline] do_vfs_ioctl+0xcdb/0x12e0 fs/ioctl.c:688 ksys_ioctl+0x9b/0xc0 fs/ioctl.c:705 __do_sys_ioctl fs/ioctl.c:712 [inline] __se_sys_ioctl fs/ioctl.c:710 [inline] __x64_sys_ioctl+0x6f/0xb0 fs/ioctl.c:710 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x4663a7 Code: cc cc cc 64 48 8b 0c 25 f8 ff ff ff 48 3b 61 10 76 68 48 83 ec 20 48 89 6c 24 18 48 8d 6c 24 18 80 3d c0 51 42 01 00 74 0c 48 <8b> 44 24 28 48 83 78 08 00 75 22 48 8b 44 24 30 48 89 04 24 48 8b RSP: 002b:00007f7f92a68fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 0000000020001500 RCX: 00000000004663a7 RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 RBP: 00007f7f92a696bc R08: 00007f7f92a69040 R09: 0000000020000000 R10: 0000000000000001 R11: 0000000000000246 R12: ffffffffffffffff R13: 0000000000000016 R14: 00007f7f92a69000 R15: 00000000200001c0 INFO: task syz-executor.1:20219 blocked for more than 140 seconds. Not tainted 4.19.197-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. syz-executor.1 D28648 20219 8153 0x00000004 Call Trace: context_switch kernel/sched/core.c:2828 [inline] __schedule+0x887/0x2040 kernel/sched/core.c:3517 schedule+0x8d/0x1b0 kernel/sched/core.c:3561 schedule_preempt_disabled+0xf/0x20 kernel/sched/core.c:3619 __mutex_lock_common kernel/locking/mutex.c:1015 [inline] __mutex_lock+0x604/0x1200 kernel/locking/mutex.c:1083 lo_release+0x1a/0x1f0 drivers/block/loop.c:1790 __blkdev_put+0x636/0x870 fs/block_dev.c:1819 blkdev_close+0x86/0xb0 fs/block_dev.c:1888 __fput+0x2ce/0x890 fs/file_table.c:278 task_work_run+0x148/0x1c0 kernel/task_work.c:113 tracehook_notify_resume include/linux/tracehook.h:193 [inline] exit_to_usermode_loop+0x251/0x2a0 arch/x86/entry/common.c:167 prepare_exit_to_usermode arch/x86/entry/common.c:198 [inline] syscall_return_slowpath arch/x86/entry/common.c:271 [inline] do_syscall_64+0x538/0x620 arch/x86/entry/common.c:296 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x4193fb Code: 8b 5c 24 2c 89 de 87 59 10 4c 8b 44 24 60 4c 8b 4c 24 40 48 89 ca 89 f3 4c 89 c9 4c 89 c0 85 db 0f 86 5a 02 00 00 ff cb 0f 1f <80> 00 00 00 00 48 83 fb 65 0f 83 fb 02 00 00 89 5c 24 2c 48 8d 34 RSP: 002b:00007ffe73ad2b90 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 RAX: 0000000000000000 RBX: 0000000000000005 RCX: 00000000004193fb RDX: 0000001b314279f4 RSI: ffffffff83771681 RDI: 0000000000000004 RBP: 0000000000000001 R08: 0000000000000000 R09: 0000001b31427034 R10: 0000000000000207 R11: 0000000000000293 R12: 000000000056cb00 R13: 000000000056cb00 R14: 000000000056bf80 R15: 000000000010f974 INFO: task syz-executor.2:20240 blocked for more than 140 seconds. Not tainted 4.19.197-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. syz-executor.2 D28104 20240 8155 0x00000004 Call Trace: context_switch kernel/sched/core.c:2828 [inline] __schedule+0x887/0x2040 kernel/sched/core.c:3517 schedule+0x8d/0x1b0 kernel/sched/core.c:3561 schedule_preempt_disabled+0xf/0x20 kernel/sched/core.c:3619 __mutex_lock_common kernel/locking/mutex.c:1015 [inline] __mutex_lock+0x604/0x1200 kernel/locking/mutex.c:1083 __blkdev_get+0x1d0/0x1480 fs/block_dev.c:1478 blkdev_get+0xb0/0x940 fs/block_dev.c:1627 blkdev_open+0x202/0x290 fs/block_dev.c:1788 do_dentry_open+0x4aa/0x1160 fs/open.c:796 do_last fs/namei.c:3421 [inline] path_openat+0x793/0x2df0 fs/namei.c:3537 do_filp_open+0x18c/0x3f0 fs/namei.c:3567 do_sys_open+0x3b3/0x520 fs/open.c:1085 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x4196d4 Code: 8b 54 24 30 48 85 d2 74 12 48 89 54 24 48 8b 5a 10 0f 1f 44 00 00 e9 2a fd ff ff 48 89 c2 48 89 c8 48 89 d1 e9 32 fc ff ff 48 <8d> 05 df 36 3a 00 48 89 04 24 48 c7 44 24 08 13 00 00 00 e8 74 cd RSP: 002b:00007f57b4158ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004196d4 RDX: 0000000000000002 RSI: 00007f57b4159000 RDI: 00000000ffffff9c RBP: 00007f57b4159000 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 R13: 0000000000000004 R14: 0000000020001530 R15: 0000000000000002 INFO: task systemd-udevd:20237 blocked for more than 140 seconds. Not tainted 4.19.197-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. systemd-udevd D28648 20237 4702 0x00000100 Call Trace: context_switch kernel/sched/core.c:2828 [inline] __schedule+0x887/0x2040 kernel/sched/core.c:3517 schedule+0x8d/0x1b0 kernel/sched/core.c:3561 schedule_preempt_disabled+0xf/0x20 kernel/sched/core.c:3619 __mutex_lock_common kernel/locking/mutex.c:1015 [inline] __mutex_lock+0x604/0x1200 kernel/locking/mutex.c:1083 __blkdev_get+0x1d0/0x1480 fs/block_dev.c:1478 blkdev_get+0xb0/0x940 fs/block_dev.c:1627 blkdev_open+0x202/0x290 fs/block_dev.c:1788 do_dentry_open+0x4aa/0x1160 fs/open.c:796 do_last fs/namei.c:3421 [inline] path_openat+0x793/0x2df0 fs/namei.c:3537 do_filp_open+0x18c/0x3f0 fs/namei.c:3567 do_sys_open+0x3b3/0x520 fs/open.c:1085 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7f1e92feb840 Code: Bad RIP value. RSP: 002b:00007ffcd8cd9ce8 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 RAX: ffffffffffffffda RBX: 0000555737760810 RCX: 00007f1e92feb840 RDX: 00005557368c8fe3 RSI: 00000000000a0800 RDI: 00005557377605c0 RBP: 00007ffcd8cd9e60 R08: 00005557368c8670 R09: 0000000000000010 R10: 00005557368c8d0c R11: 0000000000000246 R12: 00007ffcd8cd9db0 R13: 000055573775ff00 R14: 0000000000000003 R15: 000000000000000e Showing all locks held in the system: 1 lock held by khungtaskd/1569: #0: 00000000330c992f (rcu_read_lock){....}, at: debug_show_all_locks+0x53/0x265 kernel/locking/lockdep.c:4441 1 lock held by systemd-journal/4688: 1 lock held by systemd-udevd/4702: #0: 00000000708494a1 (&bdev->bd_mutex){+.+.}, at: __blkdev_get+0x1d0/0x1480 fs/block_dev.c:1478 1 lock held by in:imklog/7825: #0: 000000000dc64df7 (&f->f_pos_lock){+.+.}, at: __fdget_pos+0x26f/0x310 fs/file.c:767 2 locks held by agetty/7832: #0: 000000007089a2f4 (&tty->ldisc_sem){++++}, at: tty_ldisc_ref_wait+0x22/0x80 drivers/tty/tty_ldisc.c:272 #1: 000000008025a771 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x217/0x1950 drivers/tty/n_tty.c:2154 2 locks held by kworker/0:3/8697: #0: 000000001dbecbf1 ((wq_completion)"md_misc"){+.+.}, at: process_one_work+0x767/0x1570 kernel/workqueue.c:2124 #1: 00000000dea01edb ((work_completion)(&mddev->del_work)){+.+.}, at: process_one_work+0x79c/0x1570 kernel/workqueue.c:2128 1 lock held by syz-executor.3/9727: #0: 0000000078582d22 (tty_mutex){+.+.}, at: tty_release_struct+0xa9/0xe0 drivers/tty/tty_io.c:1623 1 lock held by syz-executor.4/9799: #0: 0000000078582d22 (tty_mutex){+.+.}, at: tty_release_struct+0xa9/0xe0 drivers/tty/tty_io.c:1623 2 locks held by kworker/0:2/27447: #0: 000000004f837ae0 ((wq_completion)"rcu_gp"){+.+.}, at: process_one_work+0x767/0x1570 kernel/workqueue.c:2124 #1: 00000000f76624ec ((work_completion)(&rew.rew_work)){+.+.}, at: process_one_work+0x79c/0x1570 kernel/workqueue.c:2128 2 locks held by syz-executor.1/12206: #0: 0000000012b8a099 (event_mutex){+.+.}, at: perf_trace_destroy+0x23/0xf0 kernel/trace/trace_event_perf.c:236 #1: 00000000ed2e3658 (rcu_sched_state.exp_mutex){+.+.}, at: exp_funnel_lock kernel/rcu/tree_exp.h:297 [inline] #1: 00000000ed2e3658 (rcu_sched_state.exp_mutex){+.+.}, at: _synchronize_rcu_expedited+0x4dc/0x6f0 kernel/rcu/tree_exp.h:667 2 locks held by syz-executor.3/16967: #0: 000000005dd7daf6 (rtnl_mutex){+.+.}, at: tun_detach drivers/net/tun.c:759 [inline] #0: 000000005dd7daf6 (rtnl_mutex){+.+.}, at: tun_chr_close+0x3a/0x180 drivers/net/tun.c:3323 #1: 00000000d57bea7d (cpu_hotplug_lock.rw_sem){++++}, at: get_online_cpus include/linux/cpu.h:137 [inline] #1: 00000000d57bea7d (cpu_hotplug_lock.rw_sem){++++}, at: flush_all_backlogs net/core/dev.c:5276 [inline] #1: 00000000d57bea7d (cpu_hotplug_lock.rw_sem){++++}, at: rollback_registered_many+0x3a8/0xe70 net/core/dev.c:8173 1 lock held by syz-executor.4/20197: #0: 00000000708494a1 (&bdev->bd_mutex){+.+.}, at: blkdev_put+0x30/0x520 fs/block_dev.c:1839 2 locks held by syz-executor.4/20203: #0: 00000000708494a1 (&bdev->bd_mutex){+.+.}, at: __blkdev_put+0xfc/0x870 fs/block_dev.c:1806 #1: 00000000d9a3746f (loop_ctl_mutex){+.+.}, at: lo_release+0x1a/0x1f0 drivers/block/loop.c:1790 1 lock held by syz-executor.5/20209: #0: 00000000d9a3746f (loop_ctl_mutex){+.+.}, at: __loop_clr_fd+0x88/0xe50 drivers/block/loop.c:1080 1 lock held by systemd-udevd/20208: #0: 00000000cee75ad9 (&bdev->bd_mutex){+.+.}, at: blkdev_put+0x30/0x520 fs/block_dev.c:1839 2 locks held by systemd-udevd/20217: #0: 000000000f2e1642 (&bdev->bd_mutex){+.+.}, at: __blkdev_get+0x1d0/0x1480 fs/block_dev.c:1478 #1: 00000000d9a3746f (loop_ctl_mutex){+.+.}, at: lo_open+0x19/0xd0 drivers/block/loop.c:1771 2 locks held by syz-executor.1/20219: #0: 00000000cee75ad9 (&bdev->bd_mutex){+.+.}, at: __blkdev_put+0xfc/0x870 fs/block_dev.c:1806 #1: 00000000d9a3746f (loop_ctl_mutex){+.+.}, at: lo_release+0x1a/0x1f0 drivers/block/loop.c:1790 1 lock held by syz-executor.1/20222: #0: 00000000cee75ad9 (&bdev->bd_mutex){+.+.}, at: blkdev_put+0x30/0x520 fs/block_dev.c:1839 5 locks held by syz-executor.1/20224: 1 lock held by syz-executor.2/20240: #0: 000000000f2e1642 (&bdev->bd_mutex){+.+.}, at: __blkdev_get+0x1d0/0x1480 fs/block_dev.c:1478 1 lock held by systemd-udevd/20237: #0: 00000000708494a1 (&bdev->bd_mutex){+.+.}, at: __blkdev_get+0x1d0/0x1480 fs/block_dev.c:1478 3 locks held by kworker/0:1/20252: #0: 000000005579a3f9 ((wq_completion)"events"){+.+.}, at: process_one_work+0x767/0x1570 kernel/workqueue.c:2124 #1: 00000000050d6ebb ((linkwatch_work).work){+.+.}, at: process_one_work+0x79c/0x1570 kernel/workqueue.c:2128 #2: 000000005dd7daf6 (rtnl_mutex){+.+.}, at: linkwatch_event+0xb/0x60 net/core/link_watch.c:236 3 locks held by kworker/0:4/20253: #0: 0000000042b8d64a ((wq_completion)"%s"("ipv6_addrconf")){+.+.}, at: process_one_work+0x767/0x1570 kernel/workqueue.c:2124 #1: 000000003ccae78e ((addr_chk_work).work){+.+.}, at: process_one_work+0x79c/0x1570 kernel/workqueue.c:2128 #2: 000000005dd7daf6 (rtnl_mutex){+.+.}, at: addrconf_verify_work+0xa/0x20 net/ipv6/addrconf.c:4476 ============================================= NMI backtrace for cpu 0 CPU: 0 PID: 1569 Comm: khungtaskd Not tainted 4.19.197-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1fc/0x2ef lib/dump_stack.c:118 nmi_cpu_backtrace.cold+0x63/0xa2 lib/nmi_backtrace.c:101 nmi_trigger_cpumask_backtrace+0x1a6/0x1f0 lib/nmi_backtrace.c:62 trigger_all_cpu_backtrace include/linux/nmi.h:146 [inline] check_hung_uninterruptible_tasks kernel/hung_task.c:203 [inline] watchdog+0x991/0xe60 kernel/hung_task.c:287 kthread+0x33f/0x460 kernel/kthread.c:259 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 PID: 20224 Comm: syz-executor.1 Not tainted 4.19.197-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:lock_is_held_type+0x131/0x210 kernel/locking/lockdep.c:3947 Code: ef e8 93 fd ff ff 65 48 8b 2c 25 80 df 01 00 48 8d bd 84 08 00 00 41 89 c4 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <0f> b6 14 02 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 04 84 d2 75 6f 48 RSP: 0018:ffff8880ba107418 EFLAGS: 00000803 RAX: dffffc0000000000 RBX: 0000000000000286 RCX: 0000000000000000 RDX: 1ffff11013390910 RSI: 00000000ffffffff RDI: ffff888099c84884 RBP: ffff888099c84000 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000005 R11: 0000000000000000 R12: 0000000000000001 R13: ffff88808f46ca80 R14: 0000000000000000 R15: dffffc0000000000 FS: 00007fdf035d7700(0000) GS:ffff8880ba100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000000056c020 CR3: 00000000a4b00000 CR4: 00000000001406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: __rhashtable_lookup include/linux/rhashtable.h:481 [inline] rhashtable_lookup include/linux/rhashtable.h:516 [inline] fdb_find_rcu+0x51a/0x680 net/bridge/br_fdb.c:105 br_fdb_update.part.0+0x40/0x8c0 net/bridge/br_fdb.c:576 br_fdb_update+0x148/0x170 net/bridge/br_fdb.c:618 br_handle_frame_finish+0x7a2/0x1410 net/bridge/br_input.c:96 br_nf_hook_thresh+0x2a3/0x330 net/bridge/br_netfilter_hooks.c:1014 br_nf_pre_routing_finish_ipv6+0x6e3/0xd40 net/bridge/br_netfilter_ipv6.c:210 NF_HOOK include/linux/netfilter.h:289 [inline] br_nf_pre_routing_ipv6+0x3f4/0x860 net/bridge/br_netfilter_ipv6.c:240 br_nf_pre_routing+0xf05/0x1500 net/bridge/br_netfilter_hooks.c:494 nf_hook_entry_hookfn include/linux/netfilter.h:119 [inline] nf_hook_slow+0xc5/0x1e0 net/netfilter/core.c:511 nf_hook include/linux/netfilter.h:244 [inline] NF_HOOK include/linux/netfilter.h:287 [inline] br_handle_frame+0xa60/0x13b0 net/bridge/br_input.c:306 __netif_receive_skb_core+0x929/0x3270 net/core/dev.c:4876 __netif_receive_skb_one_core+0xae/0x180 net/core/dev.c:4952 __netif_receive_skb+0x27/0x1c0 net/core/dev.c:5066 process_backlog+0x241/0x700 net/core/dev.c:5848 napi_poll net/core/dev.c:6272 [inline] net_rx_action+0x4ac/0xfb0 net/core/dev.c:6338 __do_softirq+0x265/0x980 kernel/softirq.c:292 invoke_softirq kernel/softirq.c:372 [inline] irq_exit+0x215/0x260 kernel/softirq.c:412 exiting_irq arch/x86/include/asm/apic.h:536 [inline] smp_apic_timer_interrupt+0x136/0x550 arch/x86/kernel/apic/apic.c:1098 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:894 RIP: 0010:arch_local_save_flags arch/x86/include/asm/paravirt.h:784 [inline] RIP: 0010:arch_local_irq_save arch/x86/include/asm/paravirt.h:806 [inline] RIP: 0010:console_unlock+0xd9/0x1110 kernel/printk/printk.c:2399 Code: 00 00 00 fc ff df 48 c1 e8 03 48 01 c8 48 89 44 24 38 65 48 8b 04 25 80 df 01 00 48 89 44 24 50 e8 0c d1 14 00 48 8b 44 24 38 <80> 38 00 0f 85 ee 0e 00 00 48 83 3d 46 d3 a3 08 00 0f 84 9c 0d 00 RSP: 0018:ffff88804d40f918 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13 RAX: fffffbfff13e3048 RBX: 0000000000000000 RCX: ffffc9000804a000 RDX: 0000000000040000 RSI: ffffffff814daee4 RDI: 0000000000000005 RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000005 R11: 0000000000000000 R12: ffffffff8446d900 R13: 000000000000007e R14: 0000000000000000 R15: ffffffff8a6dc830 vprintk_emit+0x2d1/0x740 kernel/printk/printk.c:1965 vprintk_func+0x79/0x180 kernel/printk/printk_safe.c:405 printk+0xba/0xed kernel/printk/printk.c:2040 ovl_parse_opt fs/overlayfs/super.c:570 [inline] ovl_fill_super.cold+0x2f2/0x828 fs/overlayfs/super.c:1571 mount_nodev+0x60/0x110 fs/super.c:1204 mount_fs+0xa3/0x310 fs/super.c:1261 vfs_kern_mount.part.0+0x68/0x470 fs/namespace.c:961 vfs_kern_mount fs/namespace.c:951 [inline] do_new_mount fs/namespace.c:2469 [inline] do_mount+0x113c/0x2f10 fs/namespace.c:2799 ksys_mount+0xcf/0x130 fs/namespace.c:3015 __do_sys_mount fs/namespace.c:3029 [inline] __se_sys_mount fs/namespace.c:3026 [inline] __x64_sys_mount+0xba/0x150 fs/namespace.c:3026 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x4665e9 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fdf035d7188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665e9 RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 RBP: 00000000004bfcc4 R08: 0000000020000300 R09: 0000000000000000 R10: 0000000000008000 R11: 0000000000000246 R12: 000000000056c038 R13: 00007ffe73ad2b2f R14: 00007fdf035d7300 R15: 0000000000022000