INFO: task kworker/u8:1:12 blocked for more than 143 seconds.
Not tainted 6.11.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/u8:1 state:D stack:24008 pid:12 tgid:12 ppid:2 flags:0x00004000
Workqueue: events_unbound linkwatch_event
Call Trace:
context_switch kernel/sched/core.c:5188 [inline]
__schedule+0xe37/0x5490 kernel/sched/core.c:6529
__schedule_loop kernel/sched/core.c:6606 [inline]
schedule+0xe7/0x350 kernel/sched/core.c:6621
schedule_preempt_disabled+0x13/0x30 kernel/sched/core.c:6678
__mutex_lock_common kernel/locking/mutex.c:684 [inline]
__mutex_lock+0x5b8/0x9c0 kernel/locking/mutex.c:752
linkwatch_event+0x51/0xc0 net/core/link_watch.c:276
process_one_work+0x9c5/0x1b40 kernel/workqueue.c:3231
process_scheduled_works kernel/workqueue.c:3312 [inline]
worker_thread+0x6c8/0xed0 kernel/workqueue.c:3389
kthread+0x2c1/0x3a0 kernel/kthread.c:389
ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
INFO: task syz-executor:5281 blocked for more than 143 seconds.
Not tainted 6.11.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:syz-executor state:D stack:22624 pid:5281 tgid:5281 ppid:1 flags:0x00004006
Call Trace:
context_switch kernel/sched/core.c:5188 [inline]
__schedule+0xe37/0x5490 kernel/sched/core.c:6529
__schedule_loop kernel/sched/core.c:6606 [inline]
schedule+0xe7/0x350 kernel/sched/core.c:6621
schedule_preempt_disabled+0x13/0x30 kernel/sched/core.c:6678
__mutex_lock_common kernel/locking/mutex.c:684 [inline]
__mutex_lock+0x5b8/0x9c0 kernel/locking/mutex.c:752
tun_detach drivers/net/tun.c:698 [inline]
tun_chr_close+0x3e/0x230 drivers/net/tun.c:3510
__fput+0x408/0xbb0 fs/file_table.c:422
task_work_run+0x14e/0x250 kernel/task_work.c:228
exit_task_work include/linux/task_work.h:40 [inline]
do_exit+0xaa3/0x2bb0 kernel/exit.c:882
do_group_exit+0xd3/0x2a0 kernel/exit.c:1031
get_signal+0x25fb/0x2770 kernel/signal.c:2917
arch_do_signal_or_restart+0x90/0x7e0 arch/x86/kernel/signal.c:310
exit_to_user_mode_loop kernel/entry/common.c:111 [inline]
exit_to_user_mode_prepare include/linux/entry-common.h:328 [inline]
__syscall_exit_to_user_mode_work kernel/entry/common.c:207 [inline]
syscall_exit_to_user_mode+0x150/0x2a0 kernel/entry/common.c:218
do_syscall_64+0xda/0x250 arch/x86/entry/common.c:89
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f86b977bdaa
RSP: 002b:00007ffd8ed2cb28 EFLAGS: 00000202 ORIG_RAX: 0000000000000036
RAX: 0000000000000000 RBX: 00007ffd8ed2cbb0 RCX: 00007f86b977bdaa
RDX: 0000000000000040 RSI: 0000000000000029 RDI: 0000000000000003
RBP: 0000000000000003 R08: 00000000000003b8 R09: 0079746972756365
R10: 00007f86b98e6ce0 R11: 0000000000000202 R12: 00007f86b98e6c80
R13: 00007ffd8ed2cb4c R14: 0000000000000000 R15: 00007f86b98e8e40
INFO: task syz-executor:5286 blocked for more than 143 seconds.
Not tainted 6.11.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:syz-executor state:D stack:23296 pid:5286 tgid:5286 ppid:1 flags:0x00004006
Call Trace:
context_switch kernel/sched/core.c:5188 [inline]
__schedule+0xe37/0x5490 kernel/sched/core.c:6529
__schedule_loop kernel/sched/core.c:6606 [inline]
schedule+0xe7/0x350 kernel/sched/core.c:6621
schedule_preempt_disabled+0x13/0x30 kernel/sched/core.c:6678
__mutex_lock_common kernel/locking/mutex.c:684 [inline]
__mutex_lock+0x5b8/0x9c0 kernel/locking/mutex.c:752
tun_detach drivers/net/tun.c:698 [inline]
tun_chr_close+0x3e/0x230 drivers/net/tun.c:3510
__fput+0x408/0xbb0 fs/file_table.c:422
task_work_run+0x14e/0x250 kernel/task_work.c:228
exit_task_work include/linux/task_work.h:40 [inline]
do_exit+0xaa3/0x2bb0 kernel/exit.c:882
do_group_exit+0xd3/0x2a0 kernel/exit.c:1031
get_signal+0x25fb/0x2770 kernel/signal.c:2917
arch_do_signal_or_restart+0x90/0x7e0 arch/x86/kernel/signal.c:310
exit_to_user_mode_loop kernel/entry/common.c:111 [inline]
exit_to_user_mode_prepare include/linux/entry-common.h:328 [inline]
__syscall_exit_to_user_mode_work kernel/entry/common.c:207 [inline]
syscall_exit_to_user_mode+0x150/0x2a0 kernel/entry/common.c:218
do_syscall_64+0xda/0x250 arch/x86/entry/common.c:89
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7fb4b43788fc
RSP: 002b:00007fff01de3b30 EFLAGS: 00000246 ORIG_RAX: 0000000000000000
RAX: fffffffffffffe00 RBX: 00000000ffffffff RCX: 00007fb4b43788fc
RDX: 0000000000000028 RSI: 00007fff01de3be0 RDI: 00000000000000f9
RBP: 00007fff01de3b8c R08: 0000000000000000 R09: 0079746972756365
R10: 00007fb4b44e87e0 R11: 0000000000000246 R12: 0000000000000032
R13: 0000000000057fdb R14: 0000000000057a74 R15: 00007fff01de3be0
Showing all locks held in the system:
2 locks held by kthreadd/2:
2 locks held by kworker/0:0/8:
2 locks held by kworker/0:1/9:
2 locks held by kworker/u8:0/11:
3 locks held by kworker/u8:1/12:
#0: ffff88801ac89148 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_one_work+0x1277/0x1b40 kernel/workqueue.c:3206
#1: ffffc90000117d80 ((linkwatch_work).work){+.+.}-{0:0}, at: process_one_work+0x921/0x1b40 kernel/workqueue.c:3207
#2: ffffffff8fa355e8 (rtnl_mutex){+.+.}-{3:3}, at: linkwatch_event+0x51/0xc0 net/core/link_watch.c:276
1 lock held by kworker/R-mm_pe/13:
#0: ffffffff8dc73f48 (wq_pool_attach_mutex){+.+.}-{3:3}, at: worker_detach_from_pool kernel/workqueue.c:2730 [inline]
#0: ffffffff8dc73f48 (wq_pool_attach_mutex){+.+.}-{3:3}, at: rescuer_thread+0x87c/0xe30 kernel/workqueue.c:3524
1 lock held by kworker/1:0/25:
1 lock held by khungtaskd/30:
#0: ffffffff8ddb9fe0 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire include/linux/rcupdate.h:326 [inline]
#0: ffffffff8ddb9fe0 (rcu_read_lock){....}-{1:2}, at: rcu_read_lock include/linux/rcupdate.h:838 [inline]
#0: ffffffff8ddb9fe0 (rcu_read_lock){....}-{1:2}, at: debug_show_all_locks+0x75/0x340 kernel/locking/lockdep.c:6626
5 locks held by kworker/1:1/46:
5 locks held by kworker/u8:5/987:
2 locks held by kworker/u8:6/1102:
3 locks held by kworker/u8:7/1114:
#0: ffff888030343148 ((wq_completion)ipv6_addrconf){+.+.}-{0:0}, at: process_one_work+0x1277/0x1b40 kernel/workqueue.c:3206
#1: ffffc9000439fd80 ((work_completion)(&(&net->ipv6.addr_chk_work)->work)){+.+.}-{0:0}, at: process_one_work+0x921/0x1b40 kernel/workqueue.c:3207
#2: ffffffff8fa355e8 (rtnl_mutex){+.+.}-{3:3}, at: addrconf_verify_work+0x12/0x30 net/ipv6/addrconf.c:4734
2 locks held by kworker/u8:8/1131:
4 locks held by kworker/0:2/1171:
#0: ffff88807ca48d48 ((wq_completion)wg-kex-wg2#8){+.+.}-{0:0}, at: process_one_work+0x1277/0x1b40 kernel/workqueue.c:3206
#1: ffffc900046dfd80 ((work_completion)(&({ do { const void *__vpp_verify = (typeof((worker) + 0))((void *)0); (void)__vpp_verify; } while (0); ({ unsigned long __ptr; __asm__ ("" : "=r"(__ptr) : "0"((typeof(*((worker))) *)((worker)))); (typeof((typeof(*((worker))) *)((worker)))) (__ptr + (((__per_cpu_offset[(cpu)])))); }); })->work)){+.+.}-{0:0}, at: process_one_work+0x921/0x1b40 kernel/workqueue.c:3207
#2: ffff88807c10d248 (&wg->static_identity.lock){++++}-{3:3}, at: wg_noise_handshake_consume_initiation+0x1c3/0x880 drivers/net/wireguard/noise.c:598
#3: ffff88807b3828b8 (&handshake->lock){++++}-{3:3}, at: wg_noise_handshake_consume_initiation+0x5ae/0x880 drivers/net/wireguard/noise.c:632
1 lock held by kworker/R-dm_bu/2375:
#0: ffffffff8dc73f48 (wq_pool_attach_mutex){+.+.}-{3:3}, at: worker_attach_to_pool+0x27/0x420 kernel/workqueue.c:2671
3 locks held by syslogd/4655:
2 locks held by udevd/4673:
2 locks held by dhcpcd/4886:
2 locks held by getty/4975:
#0: ffff888030d4d0a0 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x24/0x80 drivers/tty/tty_ldisc.c:243
#1: ffffc90002efe2f0 (&ldata->atomic_read_lock){+.+.}-{3:3}, at: n_tty_read+0xfc8/0x1490 drivers/tty/n_tty.c:2211
3 locks held by syz-executor/5210:
3 locks held by kworker/0:3/5260:
#0: ffff88801ac80948 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x1277/0x1b40 kernel/workqueue.c:3206
#1: ffffc90003557d80 (deferred_process_work){+.+.}-{0:0}, at: process_one_work+0x921/0x1b40 kernel/workqueue.c:3207
#2: ffffffff8fa355e8 (rtnl_mutex){+.+.}-{3:3}, at: switchdev_deferred_process_work+0xe/0x20 net/switchdev/switchdev.c:104
1 lock held by syz-executor/5277:
#0: ffffffff8fa355e8 (rtnl_mutex){+.+.}-{3:3}, at: tun_detach drivers/net/tun.c:698 [inline]
#0: ffffffff8fa355e8 (rtnl_mutex){+.+.}-{3:3}, at: tun_chr_close+0x3e/0x230 drivers/net/tun.c:3510
2 locks held by syz-executor/5280:
#0: ffffffff8fa355e8 (rtnl_mutex){+.+.}-{3:3}, at: tun_detach drivers/net/tun.c:698 [inline]
#0: ffffffff8fa355e8 (rtnl_mutex){+.+.}-{3:3}, at: tun_chr_close+0x3e/0x230 drivers/net/tun.c:3510
#1: ffffffff8ddc5778 (rcu_state.exp_mutex){+.+.}-{3:3}, at: exp_funnel_lock+0x1a4/0x3b0 kernel/rcu/tree_exp.h:328
1 lock held by syz-executor/5281:
#0: ffffffff8fa355e8 (rtnl_mutex){+.+.}-{3:3}, at: tun_detach drivers/net/tun.c:698 [inline]
#0: ffffffff8fa355e8 (rtnl_mutex){+.+.}-{3:3}, at: tun_chr_close+0x3e/0x230 drivers/net/tun.c:3510
1 lock held by syz-executor/5283:
#0: ffffffff8fa355e8 (rtnl_mutex){+.+.}-{3:3}, at: tun_detach drivers/net/tun.c:698 [inline]
#0: ffffffff8fa355e8 (rtnl_mutex){+.+.}-{3:3}, at: tun_chr_close+0x3e/0x230 drivers/net/tun.c:3510
1 lock held by syz-executor/5286:
#0: ffffffff8fa355e8 (rtnl_mutex){+.+.}-{3:3}, at: tun_detach drivers/net/tun.c:698 [inline]
#0: ffffffff8fa355e8 (rtnl_mutex){+.+.}-{3:3}, at: tun_chr_close+0x3e/0x230 drivers/net/tun.c:3510
5 locks held by kworker/1:3/5291:
1 lock held by kworker/R-wg-cr/5312:
#0: ffffffff8dc73f48 (wq_pool_attach_mutex){+.+.}-{3:3}, at: worker_attach_to_pool+0x27/0x420 kernel/workqueue.c:2671
1 lock held by kworker/R-wg-cr/5313:
#0: ffffffff8dc73f48 (wq_pool_attach_mutex){+.+.}-{3:3}, at: worker_detach_from_pool kernel/workqueue.c:2730 [inline]
#0: ffffffff8dc73f48 (wq_pool_attach_mutex){+.+.}-{3:3}, at: rescuer_thread+0x87c/0xe30 kernel/workqueue.c:3524
1 lock held by kworker/R-wg-cr/5314:
#0: ffffffff8dc73f48 (wq_pool_attach_mutex){+.+.}-{3:3}, at: worker_attach_to_pool+0x27/0x420 kernel/workqueue.c:2671
1 lock held by kworker/R-wg-cr/5315:
1 lock held by kworker/R-wg-cr/5321:
#0: ffffffff8dc73f48 (wq_pool_attach_mutex){+.+.}-{3:3}, at: worker_attach_to_pool+0x27/0x420 kernel/workqueue.c:2671
1 lock held by kworker/R-wg-cr/5322:
#0: ffffffff8dc73f48 (wq_pool_attach_mutex){+.+.}-{3:3}, at: worker_attach_to_pool+0x27/0x420 kernel/workqueue.c:2671
1 lock held by kworker/R-wg-cr/5324:
#0: ffffffff8dc73f48 (wq_pool_attach_mutex){+.+.}-{3:3}, at: worker_detach_from_pool kernel/workqueue.c:2730 [inline]
#0: ffffffff8dc73f48 (wq_pool_attach_mutex){+.+.}-{3:3}, at: rescuer_thread+0x87c/0xe30 kernel/workqueue.c:3524
1 lock held by kworker/R-wg-cr/5325:
2 locks held by kworker/1:5/5330:
2 locks held by kworker/1:6/5331:
3 locks held by kworker/0:4/5345:
4 locks held by kworker/0:6/5360:
#0: ffff88805eed8148 ((wq_completion)wg-kex-wg0#10){+.+.}-{0:0}, at: process_one_work+0x1277/0x1b40 kernel/workqueue.c:3206
#1: ffffc900040ffd80 ((work_completion)(&({ do { const void *__vpp_verify = (typeof((worker) + 0))((void *)0); (void)__vpp_verify; } while (0); ({ unsigned long __ptr; __asm__ ("" : "=r"(__ptr) : "0"((typeof(*((worker))) *)((worker)))); (typeof((typeof(*((worker))) *)((worker)))) (__ptr + (((__per_cpu_offset[(cpu)])))); }); })->work)){+.+.}-{0:0}, at: process_one_work+0x921/0x1b40 kernel/workqueue.c:3207
#2: ffff88805edb5248 (&wg->static_identity.lock){++++}-{3:3}, at: wg_noise_handshake_consume_initiation+0x1c3/0x880 drivers/net/wireguard/noise.c:598
#3: ffff88807b383b78 (&handshake->lock){++++}-{3:3}, at: wg_noise_handshake_consume_initiation+0x5ae/0x880 drivers/net/wireguard/noise.c:632
3 locks held by kworker/1:7/5393:
3 locks held by kworker/0:7/5406:
3 locks held by kworker/1:2/12043:
4 locks held by kworker/0:5/12044:
3 locks held by kworker/1:8/12046:
3 locks held by kworker/0:8/12048:
2 locks held by kworker/1:9/12049:
2 locks held by udevd/12052:
4 locks held by kworker/1:10/12055:
#0: ffff88807cfc1948 ((wq_completion)wg-kex-wg1#6){+.+.}-{0:0}, at: process_one_work+0x1277/0x1b40 kernel/workqueue.c:3206
#1: ffffc900031cfd80 ((work_completion)(&({ do { const void *__vpp_verify = (typeof((worker) + 0))((void *)0); (void)__vpp_verify; } while (0); ({ unsigned long __ptr; __asm__ ("" : "=r"(__ptr) : "0"((typeof(*((worker))) *)((worker)))); (typeof((typeof(*((worker))) *)((worker)))) (__ptr + (((__per_cpu_offset[(cpu)])))); }); })->work)){+.+.}-{0:0}, at: process_one_work+0x921/0x1b40 kernel/workqueue.c:3207
#2: ffff88805f621248 (&wg->static_identity.lock){++++}-{3:3}, at: wg_noise_handshake_consume_initiation+0x1c3/0x880 drivers/net/wireguard/noise.c:598
#3: ffff88805d961f58 (&handshake->lock){++++}-{3:3}, at: wg_noise_handshake_consume_initiation+0x668/0x880 drivers/net/wireguard/noise.c:643
2 locks held by kworker/u8:4/12057:
1 lock held by udevd/12061:
3 locks held by syz-executor/12062:
5 locks held by kworker/0:10/12063:
3 locks held by syz-executor/12064:
3 locks held by kworker/1:11/12065:
=============================================
NMI backtrace for cpu 1
CPU: 1 UID: 0 PID: 30 Comm: khungtaskd Not tainted 6.11.0-rc6-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024
Call Trace:
__dump_stack lib/dump_stack.c:93 [inline]
dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:119
nmi_cpu_backtrace+0x27b/0x390 lib/nmi_backtrace.c:113
nmi_trigger_cpumask_backtrace+0x29c/0x300 lib/nmi_backtrace.c:62
trigger_all_cpu_backtrace include/linux/nmi.h:162 [inline]
check_hung_uninterruptible_tasks kernel/hung_task.c:223 [inline]
watchdog+0xf0c/0x1240 kernel/hung_task.c:379
kthread+0x2c1/0x3a0 kernel/kthread.c:389
ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
Sending NMI from CPU 1 to CPUs 0:
NMI backtrace for cpu 0
CPU: 0 UID: 0 PID: 987 Comm: kworker/u8:5 Not tainted 6.11.0-rc6-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024
Workqueue: bat_events batadv_tt_purge
RIP: 0010:check_kcov_mode kernel/kcov.c:182 [inline]
RIP: 0010:__sanitizer_cov_trace_pc+0x37/0x70 kernel/kcov.c:216
Code: 8b 05 05 1b 78 7e a9 00 01 ff 00 48 8b 34 24 74 1d f6 c4 01 74 43 a9 00 00 0f 00 75 3c a9 00 00 f0 00 75 35 8b 82 1c 16 00 00 <85> c0 74 2b 8b 82 f8 15 00 00 83 f8 02 75 20 48 8b 8a 00 16 00 00
RSP: 0018:ffffc900000067f8 EFLAGS: 00000246
RAX: 0000000000000000 RBX: ffffffff9083471c RCX: ffffffff813cd424
RDX: ffff888027a60000 RSI: ffffffff813cd42e RDI: 0000000000000006
RBP: ffffffff9083471c R08: 0000000000000006 R09: ffffffff88f21eac
R10: ffffffff88f21eb7 R11: 0000000000000000 R12: ffffffff88f21eac
R13: ffffffff88f21eb7 R14: dffffc0000000000 R15: ffffffff9083471c
FS: 0000000000000000(0000) GS:ffff8880b8800000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f8a4d57cff8 CR3: 000000000db7c000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
__orc_find+0xce/0x130 arch/x86/kernel/unwind_orc.c:106
orc_find arch/x86/kernel/unwind_orc.c:227 [inline]
unwind_next_frame+0x335/0x23a0 arch/x86/kernel/unwind_orc.c:494
arch_stack_walk+0x100/0x170 arch/x86/kernel/stacktrace.c:25
stack_trace_save+0x95/0xd0 kernel/stacktrace.c:122
kasan_save_stack+0x33/0x60 mm/kasan/common.c:47
kasan_save_track+0x14/0x30 mm/kasan/common.c:68
kasan_save_free_info+0x3b/0x60 mm/kasan/generic.c:579
poison_slab_object+0xf7/0x160 mm/kasan/common.c:240
__kasan_slab_free+0x32/0x50 mm/kasan/common.c:256
kasan_slab_free include/linux/kasan.h:184 [inline]
slab_free_hook mm/slub.c:2252 [inline]
slab_free mm/slub.c:4473 [inline]
kmem_cache_free+0x12f/0x3a0 mm/slub.c:4548
__skb_ext_put+0x102/0x2c0 net/core/skbuff.c:7015
__skb_ext_del+0xf3/0x340 net/core/skbuff.c:6982
skb_ext_del include/linux/skbuff.h:4787 [inline]
nf_bridge_info_free net/bridge/br_netfilter_hooks.c:154 [inline]
br_nf_dev_queue_xmit+0x6f2/0x2900 net/bridge/br_netfilter_hooks.c:941
NF_HOOK include/linux/netfilter.h:314 [inline]
NF_HOOK include/linux/netfilter.h:308 [inline]
br_nf_post_routing+0x8ee/0x11b0 net/bridge/br_netfilter_hooks.c:988
nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline]
nf_hook_slow+0xbb/0x200 net/netfilter/core.c:626
nf_hook+0x474/0x7d0 include/linux/netfilter.h:269
NF_HOOK include/linux/netfilter.h:312 [inline]
br_forward_finish+0xcd/0x130 net/bridge/br_forward.c:66
br_nf_hook_thresh+0x303/0x410 net/bridge/br_netfilter_hooks.c:1189
br_nf_forward_finish+0x66a/0xba0 net/bridge/br_netfilter_hooks.c:688
NF_HOOK include/linux/netfilter.h:314 [inline]
NF_HOOK include/linux/netfilter.h:308 [inline]
br_nf_forward_ip.part.0+0x610/0x820 net/bridge/br_netfilter_hooks.c:742
br_nf_forward_ip net/bridge/br_netfilter_hooks.c:702 [inline]
br_nf_forward+0xf11/0x1bd0 net/bridge/br_netfilter_hooks.c:799
nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline]
nf_hook_slow+0xbb/0x200 net/netfilter/core.c:626
nf_hook+0x474/0x7d0 include/linux/netfilter.h:269
NF_HOOK include/linux/netfilter.h:312 [inline]
__br_forward+0x1be/0x5b0 net/bridge/br_forward.c:115
deliver_clone+0x5b/0xa0 net/bridge/br_forward.c:131
br_flood+0x493/0x5c0 net/bridge/br_forward.c:245
br_handle_frame_finish+0xda5/0x1c80 net/bridge/br_input.c:215
br_nf_hook_thresh+0x303/0x410 net/bridge/br_netfilter_hooks.c:1189
br_nf_pre_routing_finish_ipv6+0x76a/0xfb0 net/bridge/br_netfilter_ipv6.c:154
NF_HOOK include/linux/netfilter.h:314 [inline]
br_nf_pre_routing_ipv6+0x3ce/0x8c0 net/bridge/br_netfilter_ipv6.c:184
br_nf_pre_routing+0x860/0x15b0 net/bridge/br_netfilter_hooks.c:531
nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline]
nf_hook_bridge_pre net/bridge/br_input.c:277 [inline]
br_handle_frame+0x9eb/0x1490 net/bridge/br_input.c:424
__netif_receive_skb_core.constprop.0+0xa3d/0x4330 net/core/dev.c:5555
__netif_receive_skb_one_core+0xb1/0x1e0 net/core/dev.c:5659
__netif_receive_skb+0x1d/0x160 net/core/dev.c:5775
process_backlog+0x443/0x15f0 net/core/dev.c:6108
__napi_poll.constprop.0+0xb7/0x550 net/core/dev.c:6772
napi_poll net/core/dev.c:6841 [inline]
net_rx_action+0xa92/0x1010 net/core/dev.c:6963
handle_softirqs+0x216/0x8f0 kernel/softirq.c:554
do_softirq kernel/softirq.c:455 [inline]
do_softirq+0xb2/0xf0 kernel/softirq.c:442
__local_bh_enable_ip+0x100/0x120 kernel/softirq.c:382
spin_unlock_bh include/linux/spinlock.h:396 [inline]
batadv_tt_global_purge net/batman-adv/translation-table.c:2299 [inline]
batadv_tt_purge+0x251/0xb90 net/batman-adv/translation-table.c:3561
process_one_work+0x9c5/0x1b40 kernel/workqueue.c:3231
process_scheduled_works kernel/workqueue.c:3312 [inline]
worker_thread+0x6c8/0xed0 kernel/workqueue.c:3389
kthread+0x2c1/0x3a0 kernel/kthread.c:389
ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
net_ratelimit: 10787 callbacks suppressed
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:53:dc:c5:56:85, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:53:dc:c5:56:85, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:53:dc:c5:56:85, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:53:dc:c5:56:85, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:53:dc:c5:56:85, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:53:dc:c5:56:85, vlan:0)