INFO: task kworker/u8:1:12 blocked for more than 143 seconds. Not tainted 6.11.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/u8:1 state:D stack:24008 pid:12 tgid:12 ppid:2 flags:0x00004000 Workqueue: events_unbound linkwatch_event Call Trace: context_switch kernel/sched/core.c:5188 [inline] __schedule+0xe37/0x5490 kernel/sched/core.c:6529 __schedule_loop kernel/sched/core.c:6606 [inline] schedule+0xe7/0x350 kernel/sched/core.c:6621 schedule_preempt_disabled+0x13/0x30 kernel/sched/core.c:6678 __mutex_lock_common kernel/locking/mutex.c:684 [inline] __mutex_lock+0x5b8/0x9c0 kernel/locking/mutex.c:752 linkwatch_event+0x51/0xc0 net/core/link_watch.c:276 process_one_work+0x9c5/0x1b40 kernel/workqueue.c:3231 process_scheduled_works kernel/workqueue.c:3312 [inline] worker_thread+0x6c8/0xed0 kernel/workqueue.c:3389 kthread+0x2c1/0x3a0 kernel/kthread.c:389 ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 INFO: task syz-executor:5281 blocked for more than 143 seconds. Not tainted 6.11.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:syz-executor state:D stack:22624 pid:5281 tgid:5281 ppid:1 flags:0x00004006 Call Trace: context_switch kernel/sched/core.c:5188 [inline] __schedule+0xe37/0x5490 kernel/sched/core.c:6529 __schedule_loop kernel/sched/core.c:6606 [inline] schedule+0xe7/0x350 kernel/sched/core.c:6621 schedule_preempt_disabled+0x13/0x30 kernel/sched/core.c:6678 __mutex_lock_common kernel/locking/mutex.c:684 [inline] __mutex_lock+0x5b8/0x9c0 kernel/locking/mutex.c:752 tun_detach drivers/net/tun.c:698 [inline] tun_chr_close+0x3e/0x230 drivers/net/tun.c:3510 __fput+0x408/0xbb0 fs/file_table.c:422 task_work_run+0x14e/0x250 kernel/task_work.c:228 exit_task_work include/linux/task_work.h:40 [inline] do_exit+0xaa3/0x2bb0 kernel/exit.c:882 do_group_exit+0xd3/0x2a0 kernel/exit.c:1031 get_signal+0x25fb/0x2770 kernel/signal.c:2917 arch_do_signal_or_restart+0x90/0x7e0 arch/x86/kernel/signal.c:310 exit_to_user_mode_loop kernel/entry/common.c:111 [inline] exit_to_user_mode_prepare include/linux/entry-common.h:328 [inline] __syscall_exit_to_user_mode_work kernel/entry/common.c:207 [inline] syscall_exit_to_user_mode+0x150/0x2a0 kernel/entry/common.c:218 do_syscall_64+0xda/0x250 arch/x86/entry/common.c:89 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f86b977bdaa RSP: 002b:00007ffd8ed2cb28 EFLAGS: 00000202 ORIG_RAX: 0000000000000036 RAX: 0000000000000000 RBX: 00007ffd8ed2cbb0 RCX: 00007f86b977bdaa RDX: 0000000000000040 RSI: 0000000000000029 RDI: 0000000000000003 RBP: 0000000000000003 R08: 00000000000003b8 R09: 0079746972756365 R10: 00007f86b98e6ce0 R11: 0000000000000202 R12: 00007f86b98e6c80 R13: 00007ffd8ed2cb4c R14: 0000000000000000 R15: 00007f86b98e8e40 INFO: task syz-executor:5286 blocked for more than 143 seconds. Not tainted 6.11.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:syz-executor state:D stack:23296 pid:5286 tgid:5286 ppid:1 flags:0x00004006 Call Trace: context_switch kernel/sched/core.c:5188 [inline] __schedule+0xe37/0x5490 kernel/sched/core.c:6529 __schedule_loop kernel/sched/core.c:6606 [inline] schedule+0xe7/0x350 kernel/sched/core.c:6621 schedule_preempt_disabled+0x13/0x30 kernel/sched/core.c:6678 __mutex_lock_common kernel/locking/mutex.c:684 [inline] __mutex_lock+0x5b8/0x9c0 kernel/locking/mutex.c:752 tun_detach drivers/net/tun.c:698 [inline] tun_chr_close+0x3e/0x230 drivers/net/tun.c:3510 __fput+0x408/0xbb0 fs/file_table.c:422 task_work_run+0x14e/0x250 kernel/task_work.c:228 exit_task_work include/linux/task_work.h:40 [inline] do_exit+0xaa3/0x2bb0 kernel/exit.c:882 do_group_exit+0xd3/0x2a0 kernel/exit.c:1031 get_signal+0x25fb/0x2770 kernel/signal.c:2917 arch_do_signal_or_restart+0x90/0x7e0 arch/x86/kernel/signal.c:310 exit_to_user_mode_loop kernel/entry/common.c:111 [inline] exit_to_user_mode_prepare include/linux/entry-common.h:328 [inline] __syscall_exit_to_user_mode_work kernel/entry/common.c:207 [inline] syscall_exit_to_user_mode+0x150/0x2a0 kernel/entry/common.c:218 do_syscall_64+0xda/0x250 arch/x86/entry/common.c:89 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7fb4b43788fc RSP: 002b:00007fff01de3b30 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 RAX: fffffffffffffe00 RBX: 00000000ffffffff RCX: 00007fb4b43788fc RDX: 0000000000000028 RSI: 00007fff01de3be0 RDI: 00000000000000f9 RBP: 00007fff01de3b8c R08: 0000000000000000 R09: 0079746972756365 R10: 00007fb4b44e87e0 R11: 0000000000000246 R12: 0000000000000032 R13: 0000000000057fdb R14: 0000000000057a74 R15: 00007fff01de3be0 Showing all locks held in the system: 2 locks held by kthreadd/2: 2 locks held by kworker/0:0/8: 2 locks held by kworker/0:1/9: 2 locks held by kworker/u8:0/11: 3 locks held by kworker/u8:1/12: #0: ffff88801ac89148 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_one_work+0x1277/0x1b40 kernel/workqueue.c:3206 #1: ffffc90000117d80 ((linkwatch_work).work){+.+.}-{0:0}, at: process_one_work+0x921/0x1b40 kernel/workqueue.c:3207 #2: ffffffff8fa355e8 (rtnl_mutex){+.+.}-{3:3}, at: linkwatch_event+0x51/0xc0 net/core/link_watch.c:276 1 lock held by kworker/R-mm_pe/13: #0: ffffffff8dc73f48 (wq_pool_attach_mutex){+.+.}-{3:3}, at: worker_detach_from_pool kernel/workqueue.c:2730 [inline] #0: ffffffff8dc73f48 (wq_pool_attach_mutex){+.+.}-{3:3}, at: rescuer_thread+0x87c/0xe30 kernel/workqueue.c:3524 1 lock held by kworker/1:0/25: 1 lock held by khungtaskd/30: #0: ffffffff8ddb9fe0 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire include/linux/rcupdate.h:326 [inline] #0: ffffffff8ddb9fe0 (rcu_read_lock){....}-{1:2}, at: rcu_read_lock include/linux/rcupdate.h:838 [inline] #0: ffffffff8ddb9fe0 (rcu_read_lock){....}-{1:2}, at: debug_show_all_locks+0x75/0x340 kernel/locking/lockdep.c:6626 5 locks held by kworker/1:1/46: 5 locks held by kworker/u8:5/987: 2 locks held by kworker/u8:6/1102: 3 locks held by kworker/u8:7/1114: #0: ffff888030343148 ((wq_completion)ipv6_addrconf){+.+.}-{0:0}, at: process_one_work+0x1277/0x1b40 kernel/workqueue.c:3206 #1: ffffc9000439fd80 ((work_completion)(&(&net->ipv6.addr_chk_work)->work)){+.+.}-{0:0}, at: process_one_work+0x921/0x1b40 kernel/workqueue.c:3207 #2: ffffffff8fa355e8 (rtnl_mutex){+.+.}-{3:3}, at: addrconf_verify_work+0x12/0x30 net/ipv6/addrconf.c:4734 2 locks held by kworker/u8:8/1131: 4 locks held by kworker/0:2/1171: #0: ffff88807ca48d48 ((wq_completion)wg-kex-wg2#8){+.+.}-{0:0}, at: process_one_work+0x1277/0x1b40 kernel/workqueue.c:3206 #1: ffffc900046dfd80 ((work_completion)(&({ do { const void *__vpp_verify = (typeof((worker) + 0))((void *)0); (void)__vpp_verify; } while (0); ({ unsigned long __ptr; __asm__ ("" : "=r"(__ptr) : "0"((typeof(*((worker))) *)((worker)))); (typeof((typeof(*((worker))) *)((worker)))) (__ptr + (((__per_cpu_offset[(cpu)])))); }); })->work)){+.+.}-{0:0}, at: process_one_work+0x921/0x1b40 kernel/workqueue.c:3207 #2: ffff88807c10d248 (&wg->static_identity.lock){++++}-{3:3}, at: wg_noise_handshake_consume_initiation+0x1c3/0x880 drivers/net/wireguard/noise.c:598 #3: ffff88807b3828b8 (&handshake->lock){++++}-{3:3}, at: wg_noise_handshake_consume_initiation+0x5ae/0x880 drivers/net/wireguard/noise.c:632 1 lock held by kworker/R-dm_bu/2375: #0: ffffffff8dc73f48 (wq_pool_attach_mutex){+.+.}-{3:3}, at: worker_attach_to_pool+0x27/0x420 kernel/workqueue.c:2671 3 locks held by syslogd/4655: 2 locks held by udevd/4673: 2 locks held by dhcpcd/4886: 2 locks held by getty/4975: #0: ffff888030d4d0a0 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x24/0x80 drivers/tty/tty_ldisc.c:243 #1: ffffc90002efe2f0 (&ldata->atomic_read_lock){+.+.}-{3:3}, at: n_tty_read+0xfc8/0x1490 drivers/tty/n_tty.c:2211 3 locks held by syz-executor/5210: 3 locks held by kworker/0:3/5260: #0: ffff88801ac80948 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x1277/0x1b40 kernel/workqueue.c:3206 #1: ffffc90003557d80 (deferred_process_work){+.+.}-{0:0}, at: process_one_work+0x921/0x1b40 kernel/workqueue.c:3207 #2: ffffffff8fa355e8 (rtnl_mutex){+.+.}-{3:3}, at: switchdev_deferred_process_work+0xe/0x20 net/switchdev/switchdev.c:104 1 lock held by syz-executor/5277: #0: ffffffff8fa355e8 (rtnl_mutex){+.+.}-{3:3}, at: tun_detach drivers/net/tun.c:698 [inline] #0: ffffffff8fa355e8 (rtnl_mutex){+.+.}-{3:3}, at: tun_chr_close+0x3e/0x230 drivers/net/tun.c:3510 2 locks held by syz-executor/5280: #0: ffffffff8fa355e8 (rtnl_mutex){+.+.}-{3:3}, at: tun_detach drivers/net/tun.c:698 [inline] #0: ffffffff8fa355e8 (rtnl_mutex){+.+.}-{3:3}, at: tun_chr_close+0x3e/0x230 drivers/net/tun.c:3510 #1: ffffffff8ddc5778 (rcu_state.exp_mutex){+.+.}-{3:3}, at: exp_funnel_lock+0x1a4/0x3b0 kernel/rcu/tree_exp.h:328 1 lock held by syz-executor/5281: #0: ffffffff8fa355e8 (rtnl_mutex){+.+.}-{3:3}, at: tun_detach drivers/net/tun.c:698 [inline] #0: ffffffff8fa355e8 (rtnl_mutex){+.+.}-{3:3}, at: tun_chr_close+0x3e/0x230 drivers/net/tun.c:3510 1 lock held by syz-executor/5283: #0: ffffffff8fa355e8 (rtnl_mutex){+.+.}-{3:3}, at: tun_detach drivers/net/tun.c:698 [inline] #0: ffffffff8fa355e8 (rtnl_mutex){+.+.}-{3:3}, at: tun_chr_close+0x3e/0x230 drivers/net/tun.c:3510 1 lock held by syz-executor/5286: #0: ffffffff8fa355e8 (rtnl_mutex){+.+.}-{3:3}, at: tun_detach drivers/net/tun.c:698 [inline] #0: ffffffff8fa355e8 (rtnl_mutex){+.+.}-{3:3}, at: tun_chr_close+0x3e/0x230 drivers/net/tun.c:3510 5 locks held by kworker/1:3/5291: 1 lock held by kworker/R-wg-cr/5312: #0: ffffffff8dc73f48 (wq_pool_attach_mutex){+.+.}-{3:3}, at: worker_attach_to_pool+0x27/0x420 kernel/workqueue.c:2671 1 lock held by kworker/R-wg-cr/5313: #0: ffffffff8dc73f48 (wq_pool_attach_mutex){+.+.}-{3:3}, at: worker_detach_from_pool kernel/workqueue.c:2730 [inline] #0: ffffffff8dc73f48 (wq_pool_attach_mutex){+.+.}-{3:3}, at: rescuer_thread+0x87c/0xe30 kernel/workqueue.c:3524 1 lock held by kworker/R-wg-cr/5314: #0: ffffffff8dc73f48 (wq_pool_attach_mutex){+.+.}-{3:3}, at: worker_attach_to_pool+0x27/0x420 kernel/workqueue.c:2671 1 lock held by kworker/R-wg-cr/5315: 1 lock held by kworker/R-wg-cr/5321: #0: ffffffff8dc73f48 (wq_pool_attach_mutex){+.+.}-{3:3}, at: worker_attach_to_pool+0x27/0x420 kernel/workqueue.c:2671 1 lock held by kworker/R-wg-cr/5322: #0: ffffffff8dc73f48 (wq_pool_attach_mutex){+.+.}-{3:3}, at: worker_attach_to_pool+0x27/0x420 kernel/workqueue.c:2671 1 lock held by kworker/R-wg-cr/5324: #0: ffffffff8dc73f48 (wq_pool_attach_mutex){+.+.}-{3:3}, at: worker_detach_from_pool kernel/workqueue.c:2730 [inline] #0: ffffffff8dc73f48 (wq_pool_attach_mutex){+.+.}-{3:3}, at: rescuer_thread+0x87c/0xe30 kernel/workqueue.c:3524 1 lock held by kworker/R-wg-cr/5325: 2 locks held by kworker/1:5/5330: 2 locks held by kworker/1:6/5331: 3 locks held by kworker/0:4/5345: 4 locks held by kworker/0:6/5360: #0: ffff88805eed8148 ((wq_completion)wg-kex-wg0#10){+.+.}-{0:0}, at: process_one_work+0x1277/0x1b40 kernel/workqueue.c:3206 #1: ffffc900040ffd80 ((work_completion)(&({ do { const void *__vpp_verify = (typeof((worker) + 0))((void *)0); (void)__vpp_verify; } while (0); ({ unsigned long __ptr; __asm__ ("" : "=r"(__ptr) : "0"((typeof(*((worker))) *)((worker)))); (typeof((typeof(*((worker))) *)((worker)))) (__ptr + (((__per_cpu_offset[(cpu)])))); }); })->work)){+.+.}-{0:0}, at: process_one_work+0x921/0x1b40 kernel/workqueue.c:3207 #2: ffff88805edb5248 (&wg->static_identity.lock){++++}-{3:3}, at: wg_noise_handshake_consume_initiation+0x1c3/0x880 drivers/net/wireguard/noise.c:598 #3: ffff88807b383b78 (&handshake->lock){++++}-{3:3}, at: wg_noise_handshake_consume_initiation+0x5ae/0x880 drivers/net/wireguard/noise.c:632 3 locks held by kworker/1:7/5393: 3 locks held by kworker/0:7/5406: 3 locks held by kworker/1:2/12043: 4 locks held by kworker/0:5/12044: 3 locks held by kworker/1:8/12046: 3 locks held by kworker/0:8/12048: 2 locks held by kworker/1:9/12049: 2 locks held by udevd/12052: 4 locks held by kworker/1:10/12055: #0: ffff88807cfc1948 ((wq_completion)wg-kex-wg1#6){+.+.}-{0:0}, at: process_one_work+0x1277/0x1b40 kernel/workqueue.c:3206 #1: ffffc900031cfd80 ((work_completion)(&({ do { const void *__vpp_verify = (typeof((worker) + 0))((void *)0); (void)__vpp_verify; } while (0); ({ unsigned long __ptr; __asm__ ("" : "=r"(__ptr) : "0"((typeof(*((worker))) *)((worker)))); (typeof((typeof(*((worker))) *)((worker)))) (__ptr + (((__per_cpu_offset[(cpu)])))); }); })->work)){+.+.}-{0:0}, at: process_one_work+0x921/0x1b40 kernel/workqueue.c:3207 #2: ffff88805f621248 (&wg->static_identity.lock){++++}-{3:3}, at: wg_noise_handshake_consume_initiation+0x1c3/0x880 drivers/net/wireguard/noise.c:598 #3: ffff88805d961f58 (&handshake->lock){++++}-{3:3}, at: wg_noise_handshake_consume_initiation+0x668/0x880 drivers/net/wireguard/noise.c:643 2 locks held by kworker/u8:4/12057: 1 lock held by udevd/12061: 3 locks held by syz-executor/12062: 5 locks held by kworker/0:10/12063: 3 locks held by syz-executor/12064: 3 locks held by kworker/1:11/12065: ============================================= NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 30 Comm: khungtaskd Not tainted 6.11.0-rc6-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 Call Trace: __dump_stack lib/dump_stack.c:93 [inline] dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:119 nmi_cpu_backtrace+0x27b/0x390 lib/nmi_backtrace.c:113 nmi_trigger_cpumask_backtrace+0x29c/0x300 lib/nmi_backtrace.c:62 trigger_all_cpu_backtrace include/linux/nmi.h:162 [inline] check_hung_uninterruptible_tasks kernel/hung_task.c:223 [inline] watchdog+0xf0c/0x1240 kernel/hung_task.c:379 kthread+0x2c1/0x3a0 kernel/kthread.c:389 ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 987 Comm: kworker/u8:5 Not tainted 6.11.0-rc6-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 Workqueue: bat_events batadv_tt_purge RIP: 0010:check_kcov_mode kernel/kcov.c:182 [inline] RIP: 0010:__sanitizer_cov_trace_pc+0x37/0x70 kernel/kcov.c:216 Code: 8b 05 05 1b 78 7e a9 00 01 ff 00 48 8b 34 24 74 1d f6 c4 01 74 43 a9 00 00 0f 00 75 3c a9 00 00 f0 00 75 35 8b 82 1c 16 00 00 <85> c0 74 2b 8b 82 f8 15 00 00 83 f8 02 75 20 48 8b 8a 00 16 00 00 RSP: 0018:ffffc900000067f8 EFLAGS: 00000246 RAX: 0000000000000000 RBX: ffffffff9083471c RCX: ffffffff813cd424 RDX: ffff888027a60000 RSI: ffffffff813cd42e RDI: 0000000000000006 RBP: ffffffff9083471c R08: 0000000000000006 R09: ffffffff88f21eac R10: ffffffff88f21eb7 R11: 0000000000000000 R12: ffffffff88f21eac R13: ffffffff88f21eb7 R14: dffffc0000000000 R15: ffffffff9083471c FS: 0000000000000000(0000) GS:ffff8880b8800000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f8a4d57cff8 CR3: 000000000db7c000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: __orc_find+0xce/0x130 arch/x86/kernel/unwind_orc.c:106 orc_find arch/x86/kernel/unwind_orc.c:227 [inline] unwind_next_frame+0x335/0x23a0 arch/x86/kernel/unwind_orc.c:494 arch_stack_walk+0x100/0x170 arch/x86/kernel/stacktrace.c:25 stack_trace_save+0x95/0xd0 kernel/stacktrace.c:122 kasan_save_stack+0x33/0x60 mm/kasan/common.c:47 kasan_save_track+0x14/0x30 mm/kasan/common.c:68 kasan_save_free_info+0x3b/0x60 mm/kasan/generic.c:579 poison_slab_object+0xf7/0x160 mm/kasan/common.c:240 __kasan_slab_free+0x32/0x50 mm/kasan/common.c:256 kasan_slab_free include/linux/kasan.h:184 [inline] slab_free_hook mm/slub.c:2252 [inline] slab_free mm/slub.c:4473 [inline] kmem_cache_free+0x12f/0x3a0 mm/slub.c:4548 __skb_ext_put+0x102/0x2c0 net/core/skbuff.c:7015 __skb_ext_del+0xf3/0x340 net/core/skbuff.c:6982 skb_ext_del include/linux/skbuff.h:4787 [inline] nf_bridge_info_free net/bridge/br_netfilter_hooks.c:154 [inline] br_nf_dev_queue_xmit+0x6f2/0x2900 net/bridge/br_netfilter_hooks.c:941 NF_HOOK include/linux/netfilter.h:314 [inline] NF_HOOK include/linux/netfilter.h:308 [inline] br_nf_post_routing+0x8ee/0x11b0 net/bridge/br_netfilter_hooks.c:988 nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline] nf_hook_slow+0xbb/0x200 net/netfilter/core.c:626 nf_hook+0x474/0x7d0 include/linux/netfilter.h:269 NF_HOOK include/linux/netfilter.h:312 [inline] br_forward_finish+0xcd/0x130 net/bridge/br_forward.c:66 br_nf_hook_thresh+0x303/0x410 net/bridge/br_netfilter_hooks.c:1189 br_nf_forward_finish+0x66a/0xba0 net/bridge/br_netfilter_hooks.c:688 NF_HOOK include/linux/netfilter.h:314 [inline] NF_HOOK include/linux/netfilter.h:308 [inline] br_nf_forward_ip.part.0+0x610/0x820 net/bridge/br_netfilter_hooks.c:742 br_nf_forward_ip net/bridge/br_netfilter_hooks.c:702 [inline] br_nf_forward+0xf11/0x1bd0 net/bridge/br_netfilter_hooks.c:799 nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline] nf_hook_slow+0xbb/0x200 net/netfilter/core.c:626 nf_hook+0x474/0x7d0 include/linux/netfilter.h:269 NF_HOOK include/linux/netfilter.h:312 [inline] __br_forward+0x1be/0x5b0 net/bridge/br_forward.c:115 deliver_clone+0x5b/0xa0 net/bridge/br_forward.c:131 br_flood+0x493/0x5c0 net/bridge/br_forward.c:245 br_handle_frame_finish+0xda5/0x1c80 net/bridge/br_input.c:215 br_nf_hook_thresh+0x303/0x410 net/bridge/br_netfilter_hooks.c:1189 br_nf_pre_routing_finish_ipv6+0x76a/0xfb0 net/bridge/br_netfilter_ipv6.c:154 NF_HOOK include/linux/netfilter.h:314 [inline] br_nf_pre_routing_ipv6+0x3ce/0x8c0 net/bridge/br_netfilter_ipv6.c:184 br_nf_pre_routing+0x860/0x15b0 net/bridge/br_netfilter_hooks.c:531 nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline] nf_hook_bridge_pre net/bridge/br_input.c:277 [inline] br_handle_frame+0x9eb/0x1490 net/bridge/br_input.c:424 __netif_receive_skb_core.constprop.0+0xa3d/0x4330 net/core/dev.c:5555 __netif_receive_skb_one_core+0xb1/0x1e0 net/core/dev.c:5659 __netif_receive_skb+0x1d/0x160 net/core/dev.c:5775 process_backlog+0x443/0x15f0 net/core/dev.c:6108 __napi_poll.constprop.0+0xb7/0x550 net/core/dev.c:6772 napi_poll net/core/dev.c:6841 [inline] net_rx_action+0xa92/0x1010 net/core/dev.c:6963 handle_softirqs+0x216/0x8f0 kernel/softirq.c:554 do_softirq kernel/softirq.c:455 [inline] do_softirq+0xb2/0xf0 kernel/softirq.c:442 __local_bh_enable_ip+0x100/0x120 kernel/softirq.c:382 spin_unlock_bh include/linux/spinlock.h:396 [inline] batadv_tt_global_purge net/batman-adv/translation-table.c:2299 [inline] batadv_tt_purge+0x251/0xb90 net/batman-adv/translation-table.c:3561 process_one_work+0x9c5/0x1b40 kernel/workqueue.c:3231 process_scheduled_works kernel/workqueue.c:3312 [inline] worker_thread+0x6c8/0xed0 kernel/workqueue.c:3389 kthread+0x2c1/0x3a0 kernel/kthread.c:389 ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 net_ratelimit: 10787 callbacks suppressed bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:53:dc:c5:56:85, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:53:dc:c5:56:85, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:53:dc:c5:56:85, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:53:dc:c5:56:85, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:53:dc:c5:56:85, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:fe:53:dc:c5:56:85, vlan:0)