bridge0: received packet on team0 with own address as source address (addr:aa:aa:aa:aa:aa:20, vlan:0) bridge0: received packet on team0 with own address as source address (addr:aa:aa:aa:aa:aa:20, vlan:0) bridge0: received packet on team0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) watchdog: BUG: soft lockup - CPU#1 stuck for 21s! [syz-executor.0:23819] Modules linked in: irq event stamp: 3170005 hardirqs last enabled at (3170004): [] trace_hardirqs_on_thunk+0x1a/0x1c hardirqs last disabled at (3170005): [] trace_hardirqs_off_thunk+0x1a/0x1c softirqs last enabled at (3162040): [] __do_softirq+0x678/0x980 kernel/softirq.c:318 softirqs last disabled at (3162043): [] invoke_softirq kernel/softirq.c:372 [inline] softirqs last disabled at (3162043): [] irq_exit+0x215/0x260 kernel/softirq.c:412 CPU: 1 PID: 23819 Comm: syz-executor.0 Not tainted 4.19.207-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:preempt_count_sub+0xc4/0x150 kernel/sched/core.c:3267 Code: 00 00 8b 15 9e 7a f5 0b 85 d2 75 bd 48 c7 c6 80 ba 69 88 48 c7 c7 c0 ba 69 88 e8 97 33 b1 06 0f 0b 5b c3 65 8b 05 8c 62 c0 7e <84> c0 75 8b e8 03 e0 31 02 85 c0 74 92 48 c7 c0 40 f7 36 8d 48 ba RSP: 0018:ffff8880ba106710 EFLAGS: 00000297 ORIG_RAX: ffffffffffffff13 RAX: 0000000000000302 RBX: 0000000000000001 RCX: 0000000000000000 RDX: 0000000000000004 RSI: ffff8880ba1066b8 RDI: 0000000000000001 RBP: 0000000000000002 R08: ffff8880ba1066b8 R09: ffffffff8c11cad8 R10: ffff8880ba1068af R11: 0000000000074071 R12: 0000000000000001 R13: ffff8880ba106885 R14: ffff8880ba106850 R15: ffffffff8c11caf6 FS: 00007f96df76d700(0000) GS:ffff8880ba100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000055555627b708 CR3: 0000000009e6d000 CR4: 00000000001406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: unwind_next_frame+0xeee/0x1400 arch/x86/kernel/unwind_orc.c:579 __save_stack_trace+0x9f/0x190 arch/x86/kernel/stacktrace.c:44 save_stack mm/kasan/kasan.c:448 [inline] set_track mm/kasan/kasan.c:460 [inline] kasan_kmalloc+0xeb/0x160 mm/kasan/kasan.c:553 kmem_cache_alloc+0x122/0x370 mm/slab.c:3559 skb_clone+0x151/0x3d0 net/core/skbuff.c:1293 dev_queue_xmit_nit+0x326/0xa20 net/core/dev.c:2018 xmit_one net/core/dev.c:3252 [inline] dev_hard_start_xmit+0xaa/0x920 net/core/dev.c:3272 __dev_queue_xmit+0x269d/0x2e00 net/core/dev.c:3838 br_dev_queue_push_xmit+0x25a/0x6c0 net/bridge/br_forward.c:56 br_nf_dev_queue_xmit+0x387/0x1970 net/bridge/br_netfilter_hooks.c:732 NF_HOOK include/linux/netfilter.h:289 [inline] br_nf_post_routing+0xa19/0x1110 net/bridge/br_netfilter_hooks.c:831 nf_hook_entry_hookfn include/linux/netfilter.h:119 [inline] nf_hook_slow+0xc5/0x1e0 net/netfilter/core.c:511 nf_hook include/linux/netfilter.h:244 [inline] NF_HOOK include/linux/netfilter.h:287 [inline] br_forward_finish+0x25a/0x3d0 net/bridge/br_forward.c:69 br_nf_hook_thresh+0x2a3/0x330 net/bridge/br_netfilter_hooks.c:1014 br_nf_forward_finish+0x335/0x6d0 net/bridge/br_netfilter_hooks.c:553 NF_HOOK include/linux/netfilter.h:289 [inline] br_nf_forward_ip+0xaae/0x15e0 net/bridge/br_netfilter_hooks.c:620 net_ratelimit: 6093 callbacks suppressed bridge0: received packet on team0 with own address as source address (addr:aa:aa:aa:aa:aa:20, vlan:0) bridge0: received packet on team0 with own address as source address (addr:aa:aa:aa:aa:aa:20, vlan:0) nf_hook_entry_hookfn include/linux/netfilter.h:119 [inline] nf_hook_slow+0xc5/0x1e0 net/netfilter/core.c:511 nf_hook include/linux/netfilter.h:244 [inline] NF_HOOK include/linux/netfilter.h:287 [inline] __br_forward+0x354/0xae0 net/bridge/br_forward.c:113 bridge0: received packet on team0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) deliver_clone net/bridge/br_forward.c:129 [inline] maybe_deliver+0x292/0x380 net/bridge/br_forward.c:184 bridge0: received packet on team0 with own address as source address (addr:aa:aa:aa:aa:aa:20, vlan:0) br_flood+0x158/0x4d0 net/bridge/br_forward.c:226 br_handle_frame_finish+0xf41/0x1410 net/bridge/br_input.c:167 bridge0: received packet on team0 with own address as source address (addr:aa:aa:aa:aa:aa:20, vlan:0) br_nf_hook_thresh+0x2a3/0x330 net/bridge/br_netfilter_hooks.c:1014 bridge0: received packet on team0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on team0 with own address as source address (addr:aa:aa:aa:aa:aa:20, vlan:0) br_nf_pre_routing_finish_ipv6+0x6e3/0xd40 net/bridge/br_netfilter_ipv6.c:210 bridge0: received packet on team0 with own address as source address (addr:aa:aa:aa:aa:aa:20, vlan:0) bridge0: received packet on team0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on team0 with own address as source address (addr:aa:aa:aa:aa:aa:20, vlan:0) NF_HOOK include/linux/netfilter.h:289 [inline] br_nf_pre_routing_ipv6+0x3f4/0x860 net/bridge/br_netfilter_ipv6.c:240 br_nf_pre_routing+0xf05/0x1500 net/bridge/br_netfilter_hooks.c:494 nf_hook_entry_hookfn include/linux/netfilter.h:119 [inline] nf_hook_slow+0xc5/0x1e0 net/netfilter/core.c:511 nf_hook include/linux/netfilter.h:244 [inline] NF_HOOK include/linux/netfilter.h:287 [inline] br_handle_frame+0xa60/0x13b0 net/bridge/br_input.c:306 __netif_receive_skb_core+0x929/0x3270 net/core/dev.c:4876 __netif_receive_skb_one_core+0xae/0x180 net/core/dev.c:4952 __netif_receive_skb+0x27/0x1c0 net/core/dev.c:5066 process_backlog+0x241/0x700 net/core/dev.c:5849 napi_poll net/core/dev.c:6280 [inline] net_rx_action+0x4ac/0xfb0 net/core/dev.c:6346 __do_softirq+0x265/0x980 kernel/softirq.c:292 invoke_softirq kernel/softirq.c:372 [inline] irq_exit+0x215/0x260 kernel/softirq.c:412 exiting_irq arch/x86/include/asm/apic.h:536 [inline] smp_apic_timer_interrupt+0x136/0x550 arch/x86/kernel/apic/apic.c:1098 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:894 RIP: 0010:zap_pte_range mm/memory.c:1323 [inline] RIP: 0010:zap_pmd_range mm/memory.c:1463 [inline] RIP: 0010:zap_pud_range mm/memory.c:1492 [inline] RIP: 0010:zap_p4d_range mm/memory.c:1513 [inline] RIP: 0010:unmap_page_range+0x1123/0x2c50 mm/memory.c:1534 Code: 85 db 0f 84 eb f3 ff ff e8 6a ea d6 ff 31 d2 be d6 05 00 00 48 c7 c7 e0 a8 72 88 e8 87 d7 b5 ff 48 8b 44 24 10 49 89 c5 eb 83 48 ea d6 ff 48 8b 7c 24 20 4c 89 e2 b9 01 00 00 00 49 8d b7 00 RSP: 0018:ffff88822dfcf770 EFLAGS: 00000202 ORIG_RAX: ffffffffffffff13 RAX: 0000000000000000 RBX: 8000000000000007 RCX: ffffffff818ba3fd RDX: 0000000000000001 RSI: ffff888045e4c300 RDI: 0000000000000005 RBP: 0000000000000001 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000005 R11: 0000000000000000 R12: 80000000aad54007 R13: ffffea0002944cc0 R14: dffffc0000000000 R15: 00007f96e1bd0000 unmap_single_vma+0x198/0x300 mm/memory.c:1579 unmap_vmas+0xa9/0x180 mm/memory.c:1609 exit_mmap+0x2b9/0x530 mm/mmap.c:3093 __mmput kernel/fork.c:1016 [inline] mmput+0x14e/0x4a0 kernel/fork.c:1037 exit_mm kernel/exit.c:549 [inline] do_exit+0xaec/0x2be0 kernel/exit.c:857 do_group_exit+0x125/0x310 kernel/exit.c:967 get_signal+0x3f2/0x1f70 kernel/signal.c:2589 do_signal+0x8f/0x1670 arch/x86/kernel/signal.c:799 exit_to_usermode_loop+0x204/0x2a0 arch/x86/entry/common.c:163 prepare_exit_to_usermode arch/x86/entry/common.c:198 [inline] syscall_return_slowpath arch/x86/entry/common.c:271 [inline] do_syscall_64+0x538/0x620 arch/x86/entry/common.c:296 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7f96e21f6709 Code: Bad RIP value. RSP: 002b:00007f96df76d218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca RAX: 0000000000000001 RBX: 00007f96e22faf68 RCX: 00007f96e21f6709 RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f96e22faf6c RBP: 00007f96e22faf60 R08: 000000000000000e R09: 0000000000000000 R10: 0000000000000003 R11: 0000000000000246 R12: 00007f96e22faf6c R13: 00007fff2a30981f R14: 00007f96df76d300 R15: 0000000000022000 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 PID: 81 Comm: kworker/u4:2 Not tainted 4.19.207-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Workqueue: bat_events batadv_nc_worker RIP: 0010:get_current arch/x86/include/asm/current.h:15 [inline] RIP: 0010:__sanitizer_cov_trace_pc+0x4/0x50 kernel/kcov.c:100 Code: e8 11 db 35 00 e9 ab fe ff ff 4c 89 ef e8 04 db 35 00 e9 23 fe ff ff 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 48 8b 34 24 <65> 48 8b 04 25 c0 df 01 00 65 8b 15 bc 4a 9f 7e 81 e2 00 01 1f 00 RSP: 0018:ffff8880b527fbe0 EFLAGS: 00000293 RAX: ffff8880b5274040 RBX: ffff88809d605b38 RCX: ffffffff87d8b666 RDX: 0000000000000000 RSI: ffffffff837728e5 RDI: ffffffff88b3e120 RBP: ffffffff88b3e120 R08: 00000000ab6a5069 R09: 0000000000000000 R10: 0000000000000001 R11: 0000000000000000 R12: dffffc0000000000 R13: ffffffff88b3e0e0 R14: ffff888041aba940 R15: 0000000000000007 FS: 0000000000000000(0000) GS:ffff8880ba000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f7479a1b000 CR3: 00000000b4738000 CR4: 00000000001406f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: check_preemption_disabled+0x15/0x280 lib/smp_processor_id.c:13 rcu_dynticks_curr_cpu_in_eqs kernel/rcu/tree.c:348 [inline] rcu_is_watching+0x12/0xc0 kernel/rcu/tree.c:1025 rcu_read_lock include/linux/rcupdate.h:628 [inline] batadv_nc_process_nc_paths.part.0+0x2db/0x3d0 net/batman-adv/network-coding.c:698 batadv_nc_process_nc_paths net/batman-adv/network-coding.c:690 [inline] batadv_nc_worker+0xa59/0xd50 net/batman-adv/network-coding.c:746 process_one_work+0x864/0x1570 kernel/workqueue.c:2153 worker_thread+0x64c/0x1130 kernel/workqueue.c:2296 kthread+0x33f/0x460 kernel/kthread.c:259 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415 ---------------- Code disassembly (best guess): 0: 00 00 add %al,(%rax) 2: 8b 15 9e 7a f5 0b mov 0xbf57a9e(%rip),%edx # 0xbf57aa6 8: 85 d2 test %edx,%edx a: 75 bd jne 0xffffffc9 c: 48 c7 c6 80 ba 69 88 mov $0xffffffff8869ba80,%rsi 13: 48 c7 c7 c0 ba 69 88 mov $0xffffffff8869bac0,%rdi 1a: e8 97 33 b1 06 callq 0x6b133b6 1f: 0f 0b ud2 21: 5b pop %rbx 22: c3 retq 23: 65 8b 05 8c 62 c0 7e mov %gs:0x7ec0628c(%rip),%eax # 0x7ec062b6 * 2a: 84 c0 test %al,%al <-- trapping instruction 2c: 75 8b jne 0xffffffb9 2e: e8 03 e0 31 02 callq 0x231e036 33: 85 c0 test %eax,%eax 35: 74 92 je 0xffffffc9 37: 48 c7 c0 40 f7 36 8d mov $0xffffffff8d36f740,%rax 3e: 48 rex.W 3f: ba .byte 0xba