bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0)
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth1_to_bridge with own address as source address (addr:76:e3:97:2a:0d:28, vlan:0)
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0)
rcu: INFO: rcu_sched detected stalls on CPUs/tasks:
rcu: 1-....: (10482 ticks this GP) idle=41a/1/0x4000000000000004 softirq=176257/176592 fqs=3315
rcu: (detected by 0, t=10502 jiffies, g=73389, q=14)
Sending NMI from CPU 0 to CPUs 1:
NMI backtrace for cpu 1
CPU: 1 PID: 20224 Comm: syz-executor.1 Not tainted 4.19.197-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:kasan_check_read+0x0/0x10 mm/kasan/kasan.c:272
Code: 00 00 c3 48 89 d0 49 39 c1 75 11 49 0f be 01 41 83 e2 07 49 39 c2 0f 8c 4e ff ff ff 5b 44 89 c2 5d 41 5c e9 b2 18 00 00 66 90 <48> 8b 0c 24 89 f6 31 d2 e9 83 fe ff ff 0f 1f 00 48 8b 0c 24 89 f6
RSP: 0018:ffff8880ba107020 EFLAGS: 00000082
RAX: 0000000000000001 RBX: ffff8880ba122a80 RCX: 1ffffffff139f1e1
RDX: dffffc0000000000 RSI: 0000000000000004 RDI: ffff8880ba122a90
RBP: ffff8880ba122a90 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000005 R11: ffffffff8c66205b R12: 0000000000000086
R13: ffff888095104298 R14: ffff8880ba124d00 R15: dffffc0000000000
FS: 00007fdf035d7700(0000) GS:ffff8880ba100000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000000000056c020 CR3: 00000000a4b00000 CR4: 00000000001406e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
atomic_read include/asm-generic/atomic-instrumented.h:21 [inline]
rcu_dynticks_curr_cpu_in_eqs kernel/rcu/tree.c:350 [inline]
rcu_is_watching+0x53/0xc0 kernel/rcu/tree.c:1025
rcu_read_lock_sched_held+0xc6/0x1d0 kernel/rcu/update.c:113
trace_hrtimer_cancel include/trace/events/timer.h:285 [inline]
debug_deactivate kernel/time/hrtimer.c:472 [inline]
__run_hrtimer kernel/time/hrtimer.c:1389 [inline]
__hrtimer_run_queues+0xc21/0xe60 kernel/time/hrtimer.c:1481
hrtimer_interrupt+0x326/0x9e0 kernel/time/hrtimer.c:1539
local_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1071 [inline]
smp_apic_timer_interrupt+0x10c/0x550 arch/x86/kernel/apic/apic.c:1096
apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:894
RIP: 0010:get_current arch/x86/include/asm/current.h:15 [inline]
RIP: 0010:__sanitizer_cov_trace_pc+0x4/0x50 kernel/kcov.c:100
Code: e8 31 cf 35 00 e9 ab fe ff ff 4c 89 ef e8 24 cf 35 00 e9 23 fe ff ff 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 48 8b 34 24 <65> 48 8b 04 25 80 df 01 00 65 8b 15 0c 5f 9f 7e 81 e2 00 01 1f 00
RSP: 0018:ffff8880ba107310 EFLAGS: 00000282 ORIG_RAX: ffffffffffffff13
RAX: dffffc0000000000 RBX: 1ffff11017420e67 RCX: ffffffff872a07cb
RDX: 1ffff11013345e97 RSI: ffffffff872a081d RDI: ffff888045c3e180
RBP: ffff8880ba107498 R08: 0000000000000001 R09: ffffed1008b87c30
R10: ffff888045c3e183 R11: 00000000a8f2488c R12: ffff888099a2f440
R13: ffff888045c3e200 R14: ffff888045c3e180 R15: ffff888099a2f4b8
memcpy include/linux/string.h:377 [inline]
nf_bridge_unshare net/bridge/br_netfilter_hooks.c:157 [inline]
br_nf_forward_ip+0x3dd/0x15e0 net/bridge/br_netfilter_hooks.c:577
nf_hook_entry_hookfn include/linux/netfilter.h:119 [inline]
nf_hook_slow+0xc5/0x1e0 net/netfilter/core.c:511
nf_hook include/linux/netfilter.h:244 [inline]
NF_HOOK include/linux/netfilter.h:287 [inline]
__br_forward+0x354/0xae0 net/bridge/br_forward.c:113
deliver_clone net/bridge/br_forward.c:129 [inline]
br_flood+0x3c2/0x4d0 net/bridge/br_forward.c:238
br_handle_frame_finish+0xf41/0x1410 net/bridge/br_input.c:167
br_nf_hook_thresh+0x2a3/0x330 net/bridge/br_netfilter_hooks.c:1014
br_nf_pre_routing_finish_ipv6+0x6e3/0xd40 net/bridge/br_netfilter_ipv6.c:210
NF_HOOK include/linux/netfilter.h:289 [inline]
br_nf_pre_routing_ipv6+0x3f4/0x860 net/bridge/br_netfilter_ipv6.c:240
br_nf_pre_routing+0xf05/0x1500 net/bridge/br_netfilter_hooks.c:494
nf_hook_entry_hookfn include/linux/netfilter.h:119 [inline]
nf_hook_slow+0xc5/0x1e0 net/netfilter/core.c:511
nf_hook include/linux/netfilter.h:244 [inline]
NF_HOOK include/linux/netfilter.h:287 [inline]
br_handle_frame+0xa60/0x13b0 net/bridge/br_input.c:306
__netif_receive_skb_core+0x929/0x3270 net/core/dev.c:4876
__netif_receive_skb_one_core+0xae/0x180 net/core/dev.c:4952
__netif_receive_skb+0x27/0x1c0 net/core/dev.c:5066
process_backlog+0x241/0x700 net/core/dev.c:5848
napi_poll net/core/dev.c:6272 [inline]
net_rx_action+0x4ac/0xfb0 net/core/dev.c:6338
__do_softirq+0x265/0x980 kernel/softirq.c:292
invoke_softirq kernel/softirq.c:372 [inline]
irq_exit+0x215/0x260 kernel/softirq.c:412
exiting_irq arch/x86/include/asm/apic.h:536 [inline]
smp_apic_timer_interrupt+0x136/0x550 arch/x86/kernel/apic/apic.c:1098
apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:894
RIP: 0010:arch_local_irq_restore arch/x86/include/asm/paravirt.h:789 [inline]
RIP: 0010:console_unlock+0xe7b/0x1110 kernel/printk/printk.c:2468
Code: ff df 48 c1 e8 03 80 3c 08 00 0f 85 66 02 00 00 48 83 3d cf c5 a3 08 00 0f 84 9e 00 00 00 e8 6c c3 14 00 48 8b 7c 24 30 57 9d <0f> 1f 44 00 00 e9 9b fc ff ff e8 56 c3 14 00 0f 0b e8 4f c3 14 00
RSP: 0018:ffff88804d40f918 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13
RAX: 0000000000040000 RBX: 0000000000000200 RCX: ffffc9000804a000
RDX: 0000000000040000 RSI: ffffffff814dbc84 RDI: 0000000000000246
RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000000 R12: ffffffff8446d900
R13: 000000000000007e R14: 0000000000000000 R15: ffffffff8a6dc830
vprintk_emit+0x2d1/0x740 kernel/printk/printk.c:1965
vprintk_func+0x79/0x180 kernel/printk/printk_safe.c:405
printk+0xba/0xed kernel/printk/printk.c:2040
ovl_parse_opt fs/overlayfs/super.c:570 [inline]
ovl_fill_super.cold+0x2f2/0x828 fs/overlayfs/super.c:1571
mount_nodev+0x60/0x110 fs/super.c:1204
mount_fs+0xa3/0x310 fs/super.c:1261
vfs_kern_mount.part.0+0x68/0x470 fs/namespace.c:961
vfs_kern_mount fs/namespace.c:951 [inline]
do_new_mount fs/namespace.c:2469 [inline]
do_mount+0x113c/0x2f10 fs/namespace.c:2799
ksys_mount+0xcf/0x130 fs/namespace.c:3015
__do_sys_mount fs/namespace.c:3029 [inline]
__se_sys_mount fs/namespace.c:3026 [inline]
__x64_sys_mount+0xba/0x150 fs/namespace.c:3026
do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293
entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x4665e9
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007fdf035d7188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5
RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665e9
RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000
RBP: 00000000004bfcc4 R08: 0000000020000300 R09: 0000000000000000
R10: 0000000000008000 R11: 0000000000000246 R12: 000000000056c038
R13: 00007ffe73ad2b2f R14: 00007fdf035d7300 R15: 0000000000022000
net_ratelimit: 19243 callbacks suppressed
bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0)
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0)
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0)
net_ratelimit: 19810 callbacks suppressed
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0)
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0)
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0)
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0)
net_ratelimit: 20132 callbacks suppressed
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0)
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0)
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0)
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
net_ratelimit: 20159 callbacks suppressed
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0)
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0)
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0)
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0)
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
net_ratelimit: 19782 callbacks suppressed
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0)
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0)
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0)
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0)
ieee802154 phy0 wpan0: encryption failed: -22
ieee802154 phy1 wpan1: encryption failed: -22
net_ratelimit: 19887 callbacks suppressed
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0)
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0)
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth1_to_bridge with own address as source address (addr:76:e3:97:2a:0d:28, vlan:0)
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0)
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
net_ratelimit: 20124 callbacks suppressed
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0)
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0)
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0)
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0)
net_ratelimit: 19968 callbacks suppressed
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0)
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0)
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0)
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
net_ratelimit: 20021 callbacks suppressed
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0)
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0)
bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0)
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
net_ratelimit: 20051 callbacks suppressed
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0)
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth1_to_bridge with own address as source address (addr:76:e3:97:2a:0d:28, vlan:0)
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0)
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0)
INFO: task systemd-udevd:4702 blocked for more than 140 seconds.
Not tainted 4.19.197-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
systemd-udevd D25024 4702 1 0x00000100
Call Trace:
context_switch kernel/sched/core.c:2828 [inline]
__schedule+0x887/0x2040 kernel/sched/core.c:3517
schedule+0x8d/0x1b0 kernel/sched/core.c:3561
schedule_preempt_disabled+0xf/0x20 kernel/sched/core.c:3619
__mutex_lock_common kernel/locking/mutex.c:1015 [inline]
__mutex_lock+0x604/0x1200 kernel/locking/mutex.c:1083
__blkdev_get+0x1d0/0x1480 fs/block_dev.c:1478
blkdev_get+0xb0/0x940 fs/block_dev.c:1627
blkdev_open+0x202/0x290 fs/block_dev.c:1788
do_dentry_open+0x4aa/0x1160 fs/open.c:796
do_last fs/namei.c:3421 [inline]
path_openat+0x793/0x2df0 fs/namei.c:3537
do_filp_open+0x18c/0x3f0 fs/namei.c:3567
do_sys_open+0x3b3/0x520 fs/open.c:1085
do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293
entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x7f1e92feb840
Code: Bad RIP value.
RSP: 002b:00007ffcd8cda3a8 EFLAGS: 00000246 ORIG_RAX: 0000000000000002
RAX: ffffffffffffffda RBX: 00007ffcd8cda440 RCX: 00007f1e92feb840
RDX: 00005557368c8fe3 RSI: 00000000000a0800 RDI: 00005557377619a0
RBP: 00007ffcd8cda900 R08: 00005557368c8670 R09: 0000000000000010
R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffcd8cda550
R13: 000055573774f010 R14: 00005557377632e0 R15: 00007ffcd8cda420
INFO: task syz-executor.4:20197 blocked for more than 140 seconds.
Not tainted 4.19.197-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
syz-executor.4 D28648 20197 8159 0x00000004
Call Trace:
context_switch kernel/sched/core.c:2828 [inline]
__schedule+0x887/0x2040 kernel/sched/core.c:3517
schedule+0x8d/0x1b0 kernel/sched/core.c:3561
schedule_preempt_disabled+0xf/0x20 kernel/sched/core.c:3619
__mutex_lock_common kernel/locking/mutex.c:1015 [inline]
__mutex_lock+0x604/0x1200 kernel/locking/mutex.c:1083
blkdev_put+0x30/0x520 fs/block_dev.c:1839
blkdev_close+0x86/0xb0 fs/block_dev.c:1888
__fput+0x2ce/0x890 fs/file_table.c:278
task_work_run+0x148/0x1c0 kernel/task_work.c:113
tracehook_notify_resume include/linux/tracehook.h:193 [inline]
exit_to_usermode_loop+0x251/0x2a0 arch/x86/entry/common.c:167
prepare_exit_to_usermode arch/x86/entry/common.c:198 [inline]
syscall_return_slowpath arch/x86/entry/common.c:271 [inline]
do_syscall_64+0x538/0x620 arch/x86/entry/common.c:296
entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x4193fb
Code: 8b 5c 24 2c 89 de 87 59 10 4c 8b 44 24 60 4c 8b 4c 24 40 48 89 ca 89 f3 4c 89 c9 4c 89 c0 85 db 0f 86 5a 02 00 00 ff cb 0f 1f <80> 00 00 00 00 48 83 fb 65 0f 83 fb 02 00 00 89 5c 24 2c 48 8d 34
RSP: 002b:00007ffc49e78200 EFLAGS: 00000293 ORIG_RAX: 0000000000000003
RAX: 0000000000000000 RBX: 0000000000000005 RCX: 00000000004193fb
RDX: 00000000005703a8 RSI: 00000000000f4240 RDI: 0000000000000004
RBP: 0000000000000000 R08: 0000000000000000 R09: 0000012ad9a5ef8f
R10: 001414c92dfc4fac R11: 0000000000000293 R12: 000000000010f9e0
R13: 00000000000003e8 R14: 000000000056bf80 R15: 000000000010f893
INFO: task syz-executor.4:20203 blocked for more than 140 seconds.
Not tainted 4.19.197-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
syz-executor.4 D27984 20203 8159 0x80000004
Call Trace:
context_switch kernel/sched/core.c:2828 [inline]
__schedule+0x887/0x2040 kernel/sched/core.c:3517
schedule+0x8d/0x1b0 kernel/sched/core.c:3561
schedule_preempt_disabled+0xf/0x20 kernel/sched/core.c:3619
__mutex_lock_common kernel/locking/mutex.c:1015 [inline]
__mutex_lock+0x604/0x1200 kernel/locking/mutex.c:1083
lo_release+0x1a/0x1f0 drivers/block/loop.c:1790
__blkdev_put+0x636/0x870 fs/block_dev.c:1819
deactivate_locked_super+0x94/0x160 fs/super.c:329
mount_bdev+0x373/0x3b0 fs/super.c:1160
mount_fs+0xa3/0x310 fs/super.c:1261
vfs_kern_mount.part.0+0x68/0x470 fs/namespace.c:961
vfs_kern_mount fs/namespace.c:951 [inline]
do_new_mount fs/namespace.c:2469 [inline]
do_mount+0x113c/0x2f10 fs/namespace.c:2799
ksys_mount+0xcf/0x130 fs/namespace.c:3015
__do_sys_mount fs/namespace.c:3029 [inline]
__se_sys_mount fs/namespace.c:3026 [inline]
__x64_sys_mount+0xba/0x150 fs/namespace.c:3026
do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293
entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x467b0a
Code: 68 48 8b 44 24 48 48 89 44 24 70 48 8b 44 24 40 48 89 44 24 78 48 8b 6c 24 58 48 83 c4 60 c3 48 8d 0d fa d3 2a 00 48 89 0c 24 <48> 8d 15 df 38 42 01 48 89 54 24 08 0f 57 c0 0f 11 44 24 10 48 89
RSP: 002b:00007f85df544fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5
RAX: ffffffffffffffda RBX: 0000000020001500 RCX: 0000000000467b0a
RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f85df545000
RBP: 00007f85df545040 R08: 00007f85df545040 R09: 0000000020000000
R10: 0000000000000001 R11: 0000000000000202 R12: 0000000020000000
R13: 0000000020000100 R14: 00007f85df545000 R15: 00000000200001c0
INFO: task syz-executor.5:20209 blocked for more than 140 seconds.
Not tainted 4.19.197-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
syz-executor.5 D27984 20209 8161 0x00000004
Call Trace:
context_switch kernel/sched/core.c:2828 [inline]
__schedule+0x887/0x2040 kernel/sched/core.c:3517
schedule+0x8d/0x1b0 kernel/sched/core.c:3561
blk_mq_freeze_queue_wait+0x119/0x270 block/blk-mq.c:152
__loop_clr_fd+0x143/0xe50 drivers/block/loop.c:1093
loop_clr_fd drivers/block/loop.c:1211 [inline]
lo_ioctl+0x363/0x20e0 drivers/block/loop.c:1580
__blkdev_driver_ioctl block/ioctl.c:303 [inline]
blkdev_ioctl+0x5cb/0x1a80 block/ioctl.c:601
block_ioctl+0xe9/0x130 fs/block_dev.c:1906
vfs_ioctl fs/ioctl.c:46 [inline]
file_ioctl fs/ioctl.c:501 [inline]
do_vfs_ioctl+0xcdb/0x12e0 fs/ioctl.c:688
ksys_ioctl+0x9b/0xc0 fs/ioctl.c:705
__do_sys_ioctl fs/ioctl.c:712 [inline]
__se_sys_ioctl fs/ioctl.c:710 [inline]
__x64_sys_ioctl+0x6f/0xb0 fs/ioctl.c:710
do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293
entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x4663a7
Code: cc cc cc 64 48 8b 0c 25 f8 ff ff ff 48 3b 61 10 76 68 48 83 ec 20 48 89 6c 24 18 48 8d 6c 24 18 80 3d c0 51 42 01 00 74 0c 48 <8b> 44 24 28 48 83 78 08 00 75 22 48 8b 44 24 30 48 89 04 24 48 8b
RSP: 002b:00007f7f92a68fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: ffffffffffffffda RBX: 0000000020001500 RCX: 00000000004663a7
RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005
RBP: 00007f7f92a696bc R08: 00007f7f92a69040 R09: 0000000020000000
R10: 0000000000000001 R11: 0000000000000246 R12: ffffffffffffffff
R13: 0000000000000016 R14: 00007f7f92a69000 R15: 00000000200001c0
INFO: task syz-executor.1:20219 blocked for more than 140 seconds.
Not tainted 4.19.197-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
syz-executor.1 D28648 20219 8153 0x00000004
Call Trace:
context_switch kernel/sched/core.c:2828 [inline]
__schedule+0x887/0x2040 kernel/sched/core.c:3517
schedule+0x8d/0x1b0 kernel/sched/core.c:3561
schedule_preempt_disabled+0xf/0x20 kernel/sched/core.c:3619
__mutex_lock_common kernel/locking/mutex.c:1015 [inline]
__mutex_lock+0x604/0x1200 kernel/locking/mutex.c:1083
lo_release+0x1a/0x1f0 drivers/block/loop.c:1790
__blkdev_put+0x636/0x870 fs/block_dev.c:1819
blkdev_close+0x86/0xb0 fs/block_dev.c:1888
__fput+0x2ce/0x890 fs/file_table.c:278
task_work_run+0x148/0x1c0 kernel/task_work.c:113
tracehook_notify_resume include/linux/tracehook.h:193 [inline]
exit_to_usermode_loop+0x251/0x2a0 arch/x86/entry/common.c:167
prepare_exit_to_usermode arch/x86/entry/common.c:198 [inline]
syscall_return_slowpath arch/x86/entry/common.c:271 [inline]
do_syscall_64+0x538/0x620 arch/x86/entry/common.c:296
entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x4193fb
Code: 8b 5c 24 2c 89 de 87 59 10 4c 8b 44 24 60 4c 8b 4c 24 40 48 89 ca 89 f3 4c 89 c9 4c 89 c0 85 db 0f 86 5a 02 00 00 ff cb 0f 1f <80> 00 00 00 00 48 83 fb 65 0f 83 fb 02 00 00 89 5c 24 2c 48 8d 34
RSP: 002b:00007ffe73ad2b90 EFLAGS: 00000293 ORIG_RAX: 0000000000000003
RAX: 0000000000000000 RBX: 0000000000000005 RCX: 00000000004193fb
RDX: 0000001b314279f4 RSI: ffffffff83771681 RDI: 0000000000000004
RBP: 0000000000000001 R08: 0000000000000000 R09: 0000001b31427034
R10: 0000000000000207 R11: 0000000000000293 R12: 000000000056cb00
R13: 000000000056cb00 R14: 000000000056bf80 R15: 000000000010f974
INFO: task syz-executor.2:20240 blocked for more than 140 seconds.
Not tainted 4.19.197-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
syz-executor.2 D28104 20240 8155 0x00000004
Call Trace:
context_switch kernel/sched/core.c:2828 [inline]
__schedule+0x887/0x2040 kernel/sched/core.c:3517
schedule+0x8d/0x1b0 kernel/sched/core.c:3561
schedule_preempt_disabled+0xf/0x20 kernel/sched/core.c:3619
__mutex_lock_common kernel/locking/mutex.c:1015 [inline]
__mutex_lock+0x604/0x1200 kernel/locking/mutex.c:1083
__blkdev_get+0x1d0/0x1480 fs/block_dev.c:1478
blkdev_get+0xb0/0x940 fs/block_dev.c:1627
blkdev_open+0x202/0x290 fs/block_dev.c:1788
do_dentry_open+0x4aa/0x1160 fs/open.c:796
do_last fs/namei.c:3421 [inline]
path_openat+0x793/0x2df0 fs/namei.c:3537
do_filp_open+0x18c/0x3f0 fs/namei.c:3567
do_sys_open+0x3b3/0x520 fs/open.c:1085
do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293
entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x4196d4
Code: 8b 54 24 30 48 85 d2 74 12 48 89 54 24 48 8b 5a 10 0f 1f 44 00 00 e9 2a fd ff ff 48 89 c2 48 89 c8 48 89 d1 e9 32 fc ff ff 48 <8d> 05 df 36 3a 00 48 89 04 24 48 c7 44 24 08 13 00 00 00 e8 74 cd
RSP: 002b:00007f57b4158ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101
RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004196d4
RDX: 0000000000000002 RSI: 00007f57b4159000 RDI: 00000000ffffff9c
RBP: 00007f57b4159000 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002
R13: 0000000000000004 R14: 0000000020001530 R15: 0000000000000002
INFO: task systemd-udevd:20237 blocked for more than 140 seconds.
Not tainted 4.19.197-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
systemd-udevd D28648 20237 4702 0x00000100
Call Trace:
context_switch kernel/sched/core.c:2828 [inline]
__schedule+0x887/0x2040 kernel/sched/core.c:3517
schedule+0x8d/0x1b0 kernel/sched/core.c:3561
schedule_preempt_disabled+0xf/0x20 kernel/sched/core.c:3619
__mutex_lock_common kernel/locking/mutex.c:1015 [inline]
__mutex_lock+0x604/0x1200 kernel/locking/mutex.c:1083
__blkdev_get+0x1d0/0x1480 fs/block_dev.c:1478
blkdev_get+0xb0/0x940 fs/block_dev.c:1627
blkdev_open+0x202/0x290 fs/block_dev.c:1788
do_dentry_open+0x4aa/0x1160 fs/open.c:796
do_last fs/namei.c:3421 [inline]
path_openat+0x793/0x2df0 fs/namei.c:3537
do_filp_open+0x18c/0x3f0 fs/namei.c:3567
do_sys_open+0x3b3/0x520 fs/open.c:1085
do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293
entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x7f1e92feb840
Code: Bad RIP value.
RSP: 002b:00007ffcd8cd9ce8 EFLAGS: 00000246 ORIG_RAX: 0000000000000002
RAX: ffffffffffffffda RBX: 0000555737760810 RCX: 00007f1e92feb840
RDX: 00005557368c8fe3 RSI: 00000000000a0800 RDI: 00005557377605c0
RBP: 00007ffcd8cd9e60 R08: 00005557368c8670 R09: 0000000000000010
R10: 00005557368c8d0c R11: 0000000000000246 R12: 00007ffcd8cd9db0
R13: 000055573775ff00 R14: 0000000000000003 R15: 000000000000000e
Showing all locks held in the system:
1 lock held by khungtaskd/1569:
#0: 00000000330c992f (rcu_read_lock){....}, at: debug_show_all_locks+0x53/0x265 kernel/locking/lockdep.c:4441
1 lock held by systemd-journal/4688:
1 lock held by systemd-udevd/4702:
#0: 00000000708494a1 (&bdev->bd_mutex){+.+.}, at: __blkdev_get+0x1d0/0x1480 fs/block_dev.c:1478
1 lock held by in:imklog/7825:
#0: 000000000dc64df7 (&f->f_pos_lock){+.+.}, at: __fdget_pos+0x26f/0x310 fs/file.c:767
2 locks held by agetty/7832:
#0: 000000007089a2f4 (&tty->ldisc_sem){++++}, at: tty_ldisc_ref_wait+0x22/0x80 drivers/tty/tty_ldisc.c:272
#1: 000000008025a771 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x217/0x1950 drivers/tty/n_tty.c:2154
2 locks held by kworker/0:3/8697:
#0: 000000001dbecbf1 ((wq_completion)"md_misc"){+.+.}, at: process_one_work+0x767/0x1570 kernel/workqueue.c:2124
#1: 00000000dea01edb ((work_completion)(&mddev->del_work)){+.+.}, at: process_one_work+0x79c/0x1570 kernel/workqueue.c:2128
1 lock held by syz-executor.3/9727:
#0: 0000000078582d22 (tty_mutex){+.+.}, at: tty_release_struct+0xa9/0xe0 drivers/tty/tty_io.c:1623
1 lock held by syz-executor.4/9799:
#0: 0000000078582d22 (tty_mutex){+.+.}, at: tty_release_struct+0xa9/0xe0 drivers/tty/tty_io.c:1623
2 locks held by kworker/0:2/27447:
#0: 000000004f837ae0 ((wq_completion)"rcu_gp"){+.+.}, at: process_one_work+0x767/0x1570 kernel/workqueue.c:2124
#1: 00000000f76624ec ((work_completion)(&rew.rew_work)){+.+.}, at: process_one_work+0x79c/0x1570 kernel/workqueue.c:2128
2 locks held by syz-executor.1/12206:
#0: 0000000012b8a099 (event_mutex){+.+.}, at: perf_trace_destroy+0x23/0xf0 kernel/trace/trace_event_perf.c:236
#1: 00000000ed2e3658 (rcu_sched_state.exp_mutex){+.+.}, at: exp_funnel_lock kernel/rcu/tree_exp.h:297 [inline]
#1: 00000000ed2e3658 (rcu_sched_state.exp_mutex){+.+.}, at: _synchronize_rcu_expedited+0x4dc/0x6f0 kernel/rcu/tree_exp.h:667
2 locks held by syz-executor.3/16967:
#0: 000000005dd7daf6 (rtnl_mutex){+.+.}, at: tun_detach drivers/net/tun.c:759 [inline]
#0: 000000005dd7daf6 (rtnl_mutex){+.+.}, at: tun_chr_close+0x3a/0x180 drivers/net/tun.c:3323
#1: 00000000d57bea7d (cpu_hotplug_lock.rw_sem){++++}, at: get_online_cpus include/linux/cpu.h:137 [inline]
#1: 00000000d57bea7d (cpu_hotplug_lock.rw_sem){++++}, at: flush_all_backlogs net/core/dev.c:5276 [inline]
#1: 00000000d57bea7d (cpu_hotplug_lock.rw_sem){++++}, at: rollback_registered_many+0x3a8/0xe70 net/core/dev.c:8173
1 lock held by syz-executor.4/20197:
#0: 00000000708494a1 (&bdev->bd_mutex){+.+.}, at: blkdev_put+0x30/0x520 fs/block_dev.c:1839
2 locks held by syz-executor.4/20203:
#0: 00000000708494a1 (&bdev->bd_mutex){+.+.}, at: __blkdev_put+0xfc/0x870 fs/block_dev.c:1806
#1: 00000000d9a3746f (loop_ctl_mutex){+.+.}, at: lo_release+0x1a/0x1f0 drivers/block/loop.c:1790
1 lock held by syz-executor.5/20209:
#0: 00000000d9a3746f (loop_ctl_mutex){+.+.}, at: __loop_clr_fd+0x88/0xe50 drivers/block/loop.c:1080
1 lock held by systemd-udevd/20208:
#0: 00000000cee75ad9 (&bdev->bd_mutex){+.+.}, at: blkdev_put+0x30/0x520 fs/block_dev.c:1839
2 locks held by systemd-udevd/20217:
#0: 000000000f2e1642 (&bdev->bd_mutex){+.+.}, at: __blkdev_get+0x1d0/0x1480 fs/block_dev.c:1478
#1: 00000000d9a3746f (loop_ctl_mutex){+.+.}, at: lo_open+0x19/0xd0 drivers/block/loop.c:1771
2 locks held by syz-executor.1/20219:
#0: 00000000cee75ad9 (&bdev->bd_mutex){+.+.}, at: __blkdev_put+0xfc/0x870 fs/block_dev.c:1806
#1: 00000000d9a3746f (loop_ctl_mutex){+.+.}, at: lo_release+0x1a/0x1f0 drivers/block/loop.c:1790
1 lock held by syz-executor.1/20222:
#0: 00000000cee75ad9 (&bdev->bd_mutex){+.+.}, at: blkdev_put+0x30/0x520 fs/block_dev.c:1839
5 locks held by syz-executor.1/20224:
1 lock held by syz-executor.2/20240:
#0: 000000000f2e1642 (&bdev->bd_mutex){+.+.}, at: __blkdev_get+0x1d0/0x1480 fs/block_dev.c:1478
1 lock held by systemd-udevd/20237:
#0: 00000000708494a1 (&bdev->bd_mutex){+.+.}, at: __blkdev_get+0x1d0/0x1480 fs/block_dev.c:1478
3 locks held by kworker/0:1/20252:
#0: 000000005579a3f9 ((wq_completion)"events"){+.+.}, at: process_one_work+0x767/0x1570 kernel/workqueue.c:2124
#1: 00000000050d6ebb ((linkwatch_work).work){+.+.}, at: process_one_work+0x79c/0x1570 kernel/workqueue.c:2128
#2: 000000005dd7daf6 (rtnl_mutex){+.+.}, at: linkwatch_event+0xb/0x60 net/core/link_watch.c:236
3 locks held by kworker/0:4/20253:
#0: 0000000042b8d64a ((wq_completion)"%s"("ipv6_addrconf")){+.+.}, at: process_one_work+0x767/0x1570 kernel/workqueue.c:2124
#1: 000000003ccae78e ((addr_chk_work).work){+.+.}, at: process_one_work+0x79c/0x1570 kernel/workqueue.c:2128
#2: 000000005dd7daf6 (rtnl_mutex){+.+.}, at: addrconf_verify_work+0xa/0x20 net/ipv6/addrconf.c:4476
=============================================
NMI backtrace for cpu 0
CPU: 0 PID: 1569 Comm: khungtaskd Not tainted 4.19.197-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:77 [inline]
dump_stack+0x1fc/0x2ef lib/dump_stack.c:118
nmi_cpu_backtrace.cold+0x63/0xa2 lib/nmi_backtrace.c:101
nmi_trigger_cpumask_backtrace+0x1a6/0x1f0 lib/nmi_backtrace.c:62
trigger_all_cpu_backtrace include/linux/nmi.h:146 [inline]
check_hung_uninterruptible_tasks kernel/hung_task.c:203 [inline]
watchdog+0x991/0xe60 kernel/hung_task.c:287
kthread+0x33f/0x460 kernel/kthread.c:259
ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415
Sending NMI from CPU 0 to CPUs 1:
NMI backtrace for cpu 1
CPU: 1 PID: 20224 Comm: syz-executor.1 Not tainted 4.19.197-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:lock_is_held_type+0x131/0x210 kernel/locking/lockdep.c:3947
Code: ef e8 93 fd ff ff 65 48 8b 2c 25 80 df 01 00 48 8d bd 84 08 00 00 41 89 c4 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <0f> b6 14 02 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 04 84 d2 75 6f 48
RSP: 0018:ffff8880ba107418 EFLAGS: 00000803
RAX: dffffc0000000000 RBX: 0000000000000286 RCX: 0000000000000000
RDX: 1ffff11013390910 RSI: 00000000ffffffff RDI: ffff888099c84884
RBP: ffff888099c84000 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000005 R11: 0000000000000000 R12: 0000000000000001
R13: ffff88808f46ca80 R14: 0000000000000000 R15: dffffc0000000000
FS: 00007fdf035d7700(0000) GS:ffff8880ba100000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000000000056c020 CR3: 00000000a4b00000 CR4: 00000000001406e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
__rhashtable_lookup include/linux/rhashtable.h:481 [inline]
rhashtable_lookup include/linux/rhashtable.h:516 [inline]
fdb_find_rcu+0x51a/0x680 net/bridge/br_fdb.c:105
br_fdb_update.part.0+0x40/0x8c0 net/bridge/br_fdb.c:576
br_fdb_update+0x148/0x170 net/bridge/br_fdb.c:618
br_handle_frame_finish+0x7a2/0x1410 net/bridge/br_input.c:96
br_nf_hook_thresh+0x2a3/0x330 net/bridge/br_netfilter_hooks.c:1014
br_nf_pre_routing_finish_ipv6+0x6e3/0xd40 net/bridge/br_netfilter_ipv6.c:210
NF_HOOK include/linux/netfilter.h:289 [inline]
br_nf_pre_routing_ipv6+0x3f4/0x860 net/bridge/br_netfilter_ipv6.c:240
br_nf_pre_routing+0xf05/0x1500 net/bridge/br_netfilter_hooks.c:494
nf_hook_entry_hookfn include/linux/netfilter.h:119 [inline]
nf_hook_slow+0xc5/0x1e0 net/netfilter/core.c:511
nf_hook include/linux/netfilter.h:244 [inline]
NF_HOOK include/linux/netfilter.h:287 [inline]
br_handle_frame+0xa60/0x13b0 net/bridge/br_input.c:306
__netif_receive_skb_core+0x929/0x3270 net/core/dev.c:4876
__netif_receive_skb_one_core+0xae/0x180 net/core/dev.c:4952
__netif_receive_skb+0x27/0x1c0 net/core/dev.c:5066
process_backlog+0x241/0x700 net/core/dev.c:5848
napi_poll net/core/dev.c:6272 [inline]
net_rx_action+0x4ac/0xfb0 net/core/dev.c:6338
__do_softirq+0x265/0x980 kernel/softirq.c:292
invoke_softirq kernel/softirq.c:372 [inline]
irq_exit+0x215/0x260 kernel/softirq.c:412
exiting_irq arch/x86/include/asm/apic.h:536 [inline]
smp_apic_timer_interrupt+0x136/0x550 arch/x86/kernel/apic/apic.c:1098
apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:894
RIP: 0010:arch_local_save_flags arch/x86/include/asm/paravirt.h:784 [inline]
RIP: 0010:arch_local_irq_save arch/x86/include/asm/paravirt.h:806 [inline]
RIP: 0010:console_unlock+0xd9/0x1110 kernel/printk/printk.c:2399
Code: 00 00 00 fc ff df 48 c1 e8 03 48 01 c8 48 89 44 24 38 65 48 8b 04 25 80 df 01 00 48 89 44 24 50 e8 0c d1 14 00 48 8b 44 24 38 <80> 38 00 0f 85 ee 0e 00 00 48 83 3d 46 d3 a3 08 00 0f 84 9c 0d 00
RSP: 0018:ffff88804d40f918 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13
RAX: fffffbfff13e3048 RBX: 0000000000000000 RCX: ffffc9000804a000
RDX: 0000000000040000 RSI: ffffffff814daee4 RDI: 0000000000000005
RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000005 R11: 0000000000000000 R12: ffffffff8446d900
R13: 000000000000007e R14: 0000000000000000 R15: ffffffff8a6dc830
vprintk_emit+0x2d1/0x740 kernel/printk/printk.c:1965
vprintk_func+0x79/0x180 kernel/printk/printk_safe.c:405
printk+0xba/0xed kernel/printk/printk.c:2040
ovl_parse_opt fs/overlayfs/super.c:570 [inline]
ovl_fill_super.cold+0x2f2/0x828 fs/overlayfs/super.c:1571
mount_nodev+0x60/0x110 fs/super.c:1204
mount_fs+0xa3/0x310 fs/super.c:1261
vfs_kern_mount.part.0+0x68/0x470 fs/namespace.c:961
vfs_kern_mount fs/namespace.c:951 [inline]
do_new_mount fs/namespace.c:2469 [inline]
do_mount+0x113c/0x2f10 fs/namespace.c:2799
ksys_mount+0xcf/0x130 fs/namespace.c:3015
__do_sys_mount fs/namespace.c:3029 [inline]
__se_sys_mount fs/namespace.c:3026 [inline]
__x64_sys_mount+0xba/0x150 fs/namespace.c:3026
do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293
entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x4665e9
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007fdf035d7188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5
RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665e9
RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000
RBP: 00000000004bfcc4 R08: 0000000020000300 R09: 0000000000000000
R10: 0000000000008000 R11: 0000000000000246 R12: 000000000056c038
R13: 00007ffe73ad2b2f R14: 00007fdf035d7300 R15: 0000000000022000