INFO: task kworker/0:6:5895 blocked for more than 143 seconds.
Not tainted 6.14.0-rc7-syzkaller-00137-g5fc319360819 #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:6 state:D stack:26592 pid:5895 tgid:5895 ppid:2 task_flags:0x4208060 flags:0x00004000
Workqueue: events_power_efficient crda_timeout_work
Call Trace:
context_switch kernel/sched/core.c:5378 [inline]
__schedule+0xf43/0x5890 kernel/sched/core.c:6765
__schedule_loop kernel/sched/core.c:6842 [inline]
schedule+0xe7/0x350 kernel/sched/core.c:6857
schedule_preempt_disabled+0x13/0x30 kernel/sched/core.c:6914
__mutex_lock_common kernel/locking/mutex.c:662 [inline]
__mutex_lock+0x6bd/0xb10 kernel/locking/mutex.c:730
crda_timeout_work+0x15/0x50 net/wireless/reg.c:541
process_one_work+0x9c5/0x1ba0 kernel/workqueue.c:3238
process_scheduled_works kernel/workqueue.c:3319 [inline]
worker_thread+0x6c8/0xf00 kernel/workqueue.c:3400
kthread+0x3af/0x750 kernel/kthread.c:464
ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:148
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
INFO: task syz.3.64:6179 blocked for more than 143 seconds.
Not tainted 6.14.0-rc7-syzkaller-00137-g5fc319360819 #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:syz.3.64 state:D stack:24800 pid:6179 tgid:6178 ppid:5842 task_flags:0x400140 flags:0x00004006
Call Trace:
context_switch kernel/sched/core.c:5378 [inline]
__schedule+0xf43/0x5890 kernel/sched/core.c:6765
__schedule_loop kernel/sched/core.c:6842 [inline]
schedule+0xe7/0x350 kernel/sched/core.c:6857
schedule_preempt_disabled+0x13/0x30 kernel/sched/core.c:6914
__mutex_lock_common kernel/locking/mutex.c:662 [inline]
__mutex_lock+0x6bd/0xb10 kernel/locking/mutex.c:730
setup_net+0x40b/0x860 net/core/net_namespace.c:384
copy_net_ns+0x2a6/0x5f0 net/core/net_namespace.c:516
create_new_namespaces+0x3ea/0xad0 kernel/nsproxy.c:110
unshare_nsproxy_namespaces+0xc0/0x1f0 kernel/nsproxy.c:228
ksys_unshare+0x45d/0xa40 kernel/fork.c:3342
__do_sys_unshare kernel/fork.c:3413 [inline]
__se_sys_unshare kernel/fork.c:3411 [inline]
__x64_sys_unshare+0x31/0x40 kernel/fork.c:3411
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f6b7c98d169
RSP: 002b:00007f6b7d7de038 EFLAGS: 00000246 ORIG_RAX: 0000000000000110
RAX: ffffffffffffffda RBX: 00007f6b7cba5fa0 RCX: 00007f6b7c98d169
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000080
RBP: 00007f6b7ca0e2a0 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 0000000000000000 R14: 00007f6b7cba5fa0 R15: 00007ffcc3732888
INFO: task syz.3.64:6186 blocked for more than 143 seconds.
Not tainted 6.14.0-rc7-syzkaller-00137-g5fc319360819 #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:syz.3.64 state:D stack:27168 pid:6186 tgid:6178 ppid:5842 task_flags:0x400140 flags:0x00024006
Call Trace:
context_switch kernel/sched/core.c:5378 [inline]
__schedule+0xf43/0x5890 kernel/sched/core.c:6765
__schedule_loop kernel/sched/core.c:6842 [inline]
schedule+0xe7/0x350 kernel/sched/core.c:6857
schedule_preempt_disabled+0x13/0x30 kernel/sched/core.c:6914
__mutex_lock_common kernel/locking/mutex.c:662 [inline]
__mutex_lock+0x6bd/0xb10 kernel/locking/mutex.c:730
ip_tunnel_init_net+0x218/0x790 net/ipv4/ip_tunnel.c:1159
ops_init+0x1df/0x5f0 net/core/net_namespace.c:138
setup_net+0x21f/0x860 net/core/net_namespace.c:362
copy_net_ns+0x2a6/0x5f0 net/core/net_namespace.c:516
create_new_namespaces+0x3ea/0xad0 kernel/nsproxy.c:110
unshare_nsproxy_namespaces+0xc0/0x1f0 kernel/nsproxy.c:228
ksys_unshare+0x45d/0xa40 kernel/fork.c:3342
__do_sys_unshare kernel/fork.c:3413 [inline]
__se_sys_unshare kernel/fork.c:3411 [inline]
__x64_sys_unshare+0x31/0x40 kernel/fork.c:3411
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f6b7c98d169
RSP: 002b:00007f6b7d7bd038 EFLAGS: 00000246 ORIG_RAX: 0000000000000110
RAX: ffffffffffffffda RBX: 00007f6b7cba6080 RCX: 00007f6b7c98d169
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000080
RBP: 00007f6b7ca0e2a0 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 0000000000000000 R14: 00007f6b7cba6080 R15: 00007ffcc3732888
INFO: task syz.3.64:6189 blocked for more than 150 seconds.
Not tainted 6.14.0-rc7-syzkaller-00137-g5fc319360819 #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:syz.3.64 state:D stack:26952 pid:6189 tgid:6178 ppid:5842 task_flags:0x400140 flags:0x00004006
Call Trace:
context_switch kernel/sched/core.c:5378 [inline]
__schedule+0xf43/0x5890 kernel/sched/core.c:6765
__schedule_loop kernel/sched/core.c:6842 [inline]
schedule+0xe7/0x350 kernel/sched/core.c:6857
schedule_preempt_disabled+0x13/0x30 kernel/sched/core.c:6914
__mutex_lock_common kernel/locking/mutex.c:662 [inline]
__mutex_lock+0x6bd/0xb10 kernel/locking/mutex.c:730
ip_tunnel_init_net+0x218/0x790 net/ipv4/ip_tunnel.c:1159
vti_init_net+0x2e/0x140 net/ipv4/ip_vti.c:517
ops_init+0x1df/0x5f0 net/core/net_namespace.c:138
setup_net+0x21f/0x860 net/core/net_namespace.c:362
copy_net_ns+0x2a6/0x5f0 net/core/net_namespace.c:516
create_new_namespaces+0x3ea/0xad0 kernel/nsproxy.c:110
unshare_nsproxy_namespaces+0xc0/0x1f0 kernel/nsproxy.c:228
ksys_unshare+0x45d/0xa40 kernel/fork.c:3342
__do_sys_unshare kernel/fork.c:3413 [inline]
__se_sys_unshare kernel/fork.c:3411 [inline]
__x64_sys_unshare+0x31/0x40 kernel/fork.c:3411
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f6b7c98d169
RSP: 002b:00007f6b7d79c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000110
RAX: ffffffffffffffda RBX: 00007f6b7cba6160 RCX: 00007f6b7c98d169
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000080
RBP: 00007f6b7ca0e2a0 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 0000000000000000 R14: 00007f6b7cba6160 R15: 00007ffcc3732888
INFO: task syz.0.66:6195 blocked for more than 150 seconds.
Not tainted 6.14.0-rc7-syzkaller-00137-g5fc319360819 #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:syz.0.66 state:D stack:27904 pid:6195 tgid:6194 ppid:5834 task_flags:0x400140 flags:0x00400004
Call Trace:
context_switch kernel/sched/core.c:5378 [inline]
__schedule+0xf43/0x5890 kernel/sched/core.c:6765
__schedule_loop kernel/sched/core.c:6842 [inline]
schedule+0xe7/0x350 kernel/sched/core.c:6857
schedule_preempt_disabled+0x13/0x30 kernel/sched/core.c:6914
__mutex_lock_common kernel/locking/mutex.c:662 [inline]
__mutex_lock+0x6bd/0xb10 kernel/locking/mutex.c:730
rtnl_net_lock include/linux/rtnetlink.h:129 [inline]
dev_ioctl+0x1a1/0x10c0 net/core/dev_ioctl.c:852
sock_ioctl+0x5b9/0x6c0 net/socket.c:1245
vfs_ioctl fs/ioctl.c:51 [inline]
__do_sys_ioctl fs/ioctl.c:906 [inline]
__se_sys_ioctl fs/ioctl.c:892 [inline]
__x64_sys_ioctl+0x190/0x200 fs/ioctl.c:892
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7faf2eb8d169
RSP: 002b:00007faf2f9c7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: ffffffffffffffda RBX: 00007faf2eda5fa0 RCX: 00007faf2eb8d169
RDX: 0000200000000040 RSI: 00000000000089fc RDI: 0000000000000006
RBP: 00007faf2ec0e2a0 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 0000000000000000 R14: 00007faf2eda5fa0 R15: 00007fffec38e418
Showing all locks held in the system:
1 lock held by kthreadd/2:
2 locks held by kworker/0:0/9:
4 locks held by kworker/0:1/10:
2 locks held by kworker/u8:0/12:
#0: ffff88801e79b948 ((wq_completion)iou_exit){+.+.}-{0:0}, at: process_one_work+0x1293/0x1ba0 kernel/workqueue.c:3213
#1: ffffc90000117d18 ((work_completion)(&ctx->exit_work)){+.+.}-{0:0}, at: process_one_work+0x921/0x1ba0 kernel/workqueue.c:3214
3 locks held by kworker/u8:1/13:
2 locks held by kworker/1:0/26:
1 lock held by khungtaskd/31:
#0: ffffffff8e1bd140 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire include/linux/rcupdate.h:337 [inline]
#0: ffffffff8e1bd140 (rcu_read_lock){....}-{1:3}, at: rcu_read_lock include/linux/rcupdate.h:849 [inline]
#0: ffffffff8e1bd140 (rcu_read_lock){....}-{1:3}, at: debug_show_all_locks+0x7f/0x390 kernel/locking/lockdep.c:6746
4 locks held by kworker/u8:2/36:
#0: ffff88801bef6148 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x1293/0x1ba0 kernel/workqueue.c:3213
#1: ffffc90000ac7d18 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x921/0x1ba0 kernel/workqueue.c:3214
#2: ffffffff8fee46d0 (pernet_ops_rwsem){++++}-{4:4}, at: cleanup_net+0xca/0xb30 net/core/net_namespace.c:606
#3: ffffffff8fefa3e8 (rtnl_mutex){+.+.}-{4:4}, at: caif_exit_net+0x64/0x3c0 net/caif/caif_dev.c:528
3 locks held by kworker/u8:3/37:
3 locks held by kworker/1:1/48:
3 locks held by kworker/u8:4/62:
4 locks held by kworker/0:2/117:
#0: ffff888034d19948 ((wq_completion)wg-kex-wg0#2){+.+.}-{0:0}, at: process_one_work+0x1293/0x1ba0 kernel/workqueue.c:3213
#1: ffffc90002787d18 ((work_completion)(&({ do { const void *__vpp_verify = (typeof((worker) + 0))((void *)0); (void)__vpp_verify; } while (0); ({ unsigned long __ptr; __asm__ ("" : "=r"(__ptr) : "0"((typeof(*((worker))) *)(( unsigned long)((worker))))); (typeof((typeof(*((worker))) *)(( unsigned long)((worker))))) (__ptr + (((__per_cpu_offset[(cpu)])))); }); })->work)){+.+.}-{0:0}, at: process_one_work+0x921/0x1ba0 kernel/workqueue.c:3214
#2: ffff888060865308 (&wg->static_identity.lock){++++}-{4:4}, at: wg_noise_handshake_consume_initiation+0x1c3/0x880 drivers/net/wireguard/noise.c:598
#3: ffff8880789f8338 (&handshake->lock){++++}-{4:4}, at: wg_noise_handshake_consume_initiation+0x5ae/0x880 drivers/net/wireguard/noise.c:632
3 locks held by kworker/u8:5/573:
3 locks held by kworker/1:2/976:
3 locks held by kworker/u8:6/1147:
3 locks held by kworker/R-ipv6_/3169:
#0: ffff88814ddf4148 ((wq_completion)ipv6_addrconf){+.+.}-{0:0}, at: process_one_work+0x1293/0x1ba0 kernel/workqueue.c:3213
#1: ffffc9000c387cb0 ((work_completion)(&(&net->ipv6.addr_chk_work)->work)){+.+.}-{0:0}, at: process_one_work+0x921/0x1ba0 kernel/workqueue.c:3214
#2: ffffffff8fefa3e8 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_net_lock include/linux/rtnetlink.h:129 [inline]
#2: ffffffff8fefa3e8 (rtnl_mutex){+.+.}-{4:4}, at: addrconf_verify_work+0x12/0x30 net/ipv6/addrconf.c:4730
2 locks held by kworker/R-bat_e/3399:
3 locks held by kworker/u8:7/3555:
3 locks held by syslogd/5190:
1 lock held by dhcpcd/5501:
4 locks held by dhcpcd/5502:
2 locks held by getty/5596:
#0: ffff888030d220a0 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x24/0x80 drivers/tty/tty_ldisc.c:243
#1: ffffc90002fde2f0 (&ldata->atomic_read_lock){+.+.}-{4:4}, at: n_tty_read+0xfba/0x1480 drivers/tty/n_tty.c:2211
3 locks held by kworker/0:3/5836:
1 lock held by kworker/R-wg-cr/5860:
#0: ffffffff8e076608 (wq_pool_attach_mutex){+.+.}-{4:4}, at: worker_detach_from_pool kernel/workqueue.c:2736 [inline]
#0: ffffffff8e076608 (wq_pool_attach_mutex){+.+.}-{4:4}, at: rescuer_thread+0x836/0xe80 kernel/workqueue.c:3529
1 lock held by kworker/R-wg-cr/5867:
1 lock held by kworker/R-wg-cr/5869:
#0: ffffffff8e076608 (wq_pool_attach_mutex){+.+.}-{4:4}, at: worker_attach_to_pool+0x27/0x420 kernel/workqueue.c:2678
3 locks held by kworker/0:4/5876:
#0: ffff88801b081d48 ((wq_completion)events_power_efficient){+.+.}-{0:0}, at: process_one_work+0x1293/0x1ba0 kernel/workqueue.c:3213
#1: ffffc900040bfd18 ((reg_check_chans).work){+.+.}-{0:0}, at: process_one_work+0x921/0x1ba0 kernel/workqueue.c:3214
#2: ffffffff8fefa3e8 (rtnl_mutex){+.+.}-{4:4}, at: reg_check_chans_work+0x84/0x1130 net/wireless/reg.c:2481
3 locks held by kworker/1:4/5877:
4 locks held by kworker/0:5/5878:
#0: ffff88807c102148 ((wq_completion)wg-kex-wg0#8){+.+.}-{0:0}, at: process_one_work+0x1293/0x1ba0 kernel/workqueue.c:3213
#1: ffffc900040dfd18 ((work_completion)(&({ do { const void *__vpp_verify = (typeof((worker) + 0))((void *)0); (void)__vpp_verify; } while (0); ({ unsigned long __ptr; __asm__ ("" : "=r"(__ptr) : "0"((typeof(*((worker))) *)(( unsigned long)((worker))))); (typeof((typeof(*((worker))) *)(( unsigned long)((worker))))) (__ptr + (((__per_cpu_offset[(cpu)])))); }); })->work)){+.+.}-{0:0}, at: process_one_work+0x921/0x1ba0 kernel/workqueue.c:3214
#2: ffff888060725308 (&wg->static_identity.lock){++++}-{4:4}, at: wg_noise_handshake_consume_initiation+0x1c3/0x880 drivers/net/wireguard/noise.c:598
#3: ffff8880789fbc38 (&handshake->lock){++++}-{4:4}, at: wg_noise_handshake_consume_initiation+0x5ae/0x880 drivers/net/wireguard/noise.c:632
3 locks held by kworker/0:6/5895:
#0: ffff88801b081d48 ((wq_completion)events_power_efficient){+.+.}-{0:0}, at: process_one_work+0x1293/0x1ba0 kernel/workqueue.c:3213
#1: ffffc9000411fd18 ((crda_timeout).work){+.+.}-{0:0}, at: process_one_work+0x921/0x1ba0 kernel/workqueue.c:3214
#2: ffffffff8fefa3e8 (rtnl_mutex){+.+.}-{4:4}, at: crda_timeout_work+0x15/0x50 net/wireless/reg.c:541
2 locks held by kworker/1:5/5896:
3 locks held by kworker/1:6/5903:
5 locks held by syz.1.53/6145:
2 locks held by syz.3.64/6179:
#0: ffffffff8fee46d0 (pernet_ops_rwsem){++++}-{4:4}, at: copy_net_ns+0x286/0x5f0 net/core/net_namespace.c:512
#1: ffffffff8fefa3e8 (rtnl_mutex){+.+.}-{4:4}, at: setup_net+0x40b/0x860 net/core/net_namespace.c:384
2 locks held by syz.3.64/6186:
#0: ffffffff8fee46d0 (pernet_ops_rwsem){++++}-{4:4}, at: copy_net_ns+0x286/0x5f0 net/core/net_namespace.c:512
#1: ffffffff8fefa3e8 (rtnl_mutex){+.+.}-{4:4}, at: ip_tunnel_init_net+0x218/0x790 net/ipv4/ip_tunnel.c:1159
2 locks held by syz.3.64/6189:
#0: ffffffff8fee46d0 (pernet_ops_rwsem){++++}-{4:4}, at: copy_net_ns+0x286/0x5f0 net/core/net_namespace.c:512
#1: ffffffff8fefa3e8 (rtnl_mutex){+.+.}-{4:4}, at: ip_tunnel_init_net+0x218/0x790 net/ipv4/ip_tunnel.c:1159
6 locks held by syz.2.62/6182:
4 locks held by syz.1.63/6185:
1 lock held by syz.0.66/6195:
#0: ffffffff8fefa3e8 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_net_lock include/linux/rtnetlink.h:129 [inline]
#0: ffffffff8fefa3e8 (rtnl_mutex){+.+.}-{4:4}, at: dev_ioctl+0x1a1/0x10c0 net/core/dev_ioctl.c:852
3 locks held by kworker/u8:8/6196:
3 locks held by kworker/u8:9/6200:
6 locks held by kworker/u8:10/6201:
2 locks held by kworker/u8:11/6202:
3 locks held by kworker/u8:12/6204:
3 locks held by kworker/u8:13/6206:
3 locks held by kworker/0:8/6207:
2 locks held by kworker/1:7/6208:
4 locks held by kworker/0:9/6210:
2 locks held by syz-executor/6211:
5 locks held by kworker/1:8/6212:
=============================================
NMI backtrace for cpu 1
CPU: 1 UID: 0 PID: 31 Comm: khungtaskd Not tainted 6.14.0-rc7-syzkaller-00137-g5fc319360819 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025
Call Trace:
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:120
nmi_cpu_backtrace+0x27b/0x390 lib/nmi_backtrace.c:113
nmi_trigger_cpumask_backtrace+0x29c/0x300 lib/nmi_backtrace.c:62
trigger_all_cpu_backtrace include/linux/nmi.h:162 [inline]
check_hung_uninterruptible_tasks kernel/hung_task.c:236 [inline]
watchdog+0xf62/0x12b0 kernel/hung_task.c:399
kthread+0x3af/0x750 kernel/kthread.c:464
ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:148
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
Sending NMI from CPU 1 to CPUs 0:
NMI backtrace for cpu 0
CPU: 0 UID: 0 PID: 6201 Comm: kworker/u8:10 Not tainted 6.14.0-rc7-syzkaller-00137-g5fc319360819 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025
Workqueue: events_unbound nsim_dev_trap_report_work
RIP: 0010:orc_find arch/x86/kernel/unwind_orc.c:218 [inline]
RIP: 0010:unwind_next_frame+0x22d/0x20c0 arch/x86/kernel/unwind_orc.c:494
Code: 24 18 8d 50 01 8b 0c 8d a0 03 b0 91 48 b8 00 00 00 00 00 fc ff df 48 8d 3c 95 a0 03 b0 91 49 89 f8 49 c1 e8 03 45 0f b6 04 00 <48> 89 f8 83 e0 07 83 c0 03 44 38 c0 7c 2e 45 84 c0 74 29 48 89 54
RSP: 0018:ffffc90000006b08 EFLAGS: 00000a03
RAX: dffffc0000000000 RBX: 0000000000000002 RCX: 00000000001906b5
RDX: 0000000000083345 RSI: 00000000000a590e RDI: ffffffff91d0d0b4
RBP: ffffc90000006bc0 R08: 0000000000000000 R09: ffffffff91859e26
R10: ffffc90000006b78 R11: 0000000000083344 R12: ffffc90000006bc8
R13: ffffc90000006b78 R14: ffffc90000006bad R15: ffffffff89334460
FS: 0000000000000000(0000) GS:ffff8880b8600000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f648085dff8 CR3: 0000000034850000 CR4: 00000000003526f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
arch_stack_walk+0x95/0x100 arch/x86/kernel/stacktrace.c:25
stack_trace_save+0x95/0xd0 kernel/stacktrace.c:122
kasan_save_stack+0x33/0x60 mm/kasan/common.c:47
kasan_save_track+0x14/0x30 mm/kasan/common.c:68
kasan_save_free_info+0x3b/0x60 mm/kasan/generic.c:576
poison_slab_object mm/kasan/common.c:247 [inline]
__kasan_slab_free+0x51/0x70 mm/kasan/common.c:264
kasan_slab_free include/linux/kasan.h:233 [inline]
slab_free_hook mm/slub.c:2353 [inline]
slab_free mm/slub.c:4609 [inline]
kmem_cache_free+0x2e2/0x4d0 mm/slub.c:4711
kfree_skbmem+0x1a4/0x1f0 net/core/skbuff.c:1058
__kfree_skb net/core/skbuff.c:1115 [inline]
sk_skb_reason_drop+0x136/0x1a0 net/core/skbuff.c:1152
kfree_skb_reason include/linux/skbuff.h:1271 [inline]
kfree_skb include/linux/skbuff.h:1280 [inline]
ip6_mc_input+0x7af/0xfd0 net/ipv6/ip6_input.c:591
dst_input include/net/dst.h:469 [inline]
dst_input include/net/dst.h:467 [inline]
ip6_rcv_finish+0x3a2/0x5b0 net/ipv6/ip6_input.c:79
ip_sabotage_in+0x21b/0x290 net/bridge/br_netfilter_hooks.c:993
nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline]
nf_hook_slow+0xbb/0x200 net/netfilter/core.c:626
nf_hook.constprop.0+0x42e/0x750 include/linux/netfilter.h:269
NF_HOOK include/linux/netfilter.h:312 [inline]
ipv6_rcv+0xa4/0x680 net/ipv6/ip6_input.c:309
__netif_receive_skb_one_core+0x12e/0x1e0 net/core/dev.c:5896
__netif_receive_skb+0x1d/0x160 net/core/dev.c:6009
netif_receive_skb_internal net/core/dev.c:6095 [inline]
netif_receive_skb+0x13f/0x7b0 net/core/dev.c:6154
NF_HOOK include/linux/netfilter.h:314 [inline]
NF_HOOK include/linux/netfilter.h:308 [inline]
br_pass_frame_up+0x346/0x490 net/bridge/br_input.c:70
br_handle_frame_finish+0xecc/0x1c90 net/bridge/br_input.c:226
br_nf_hook_thresh+0x303/0x410 net/bridge/br_netfilter_hooks.c:1170
br_nf_pre_routing_finish_ipv6+0x76a/0xfb0 net/bridge/br_netfilter_ipv6.c:154
NF_HOOK include/linux/netfilter.h:314 [inline]
br_nf_pre_routing_ipv6+0x3ce/0x8c0 net/bridge/br_netfilter_ipv6.c:184
br_nf_pre_routing+0x860/0x15b0 net/bridge/br_netfilter_hooks.c:508
nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline]
nf_hook_bridge_pre net/bridge/br_input.c:282 [inline]
br_handle_frame+0xad7/0x14a0 net/bridge/br_input.c:433
__netif_receive_skb_core.constprop.0+0xa20/0x4330 net/core/dev.c:5790
__netif_receive_skb_one_core+0xb1/0x1e0 net/core/dev.c:5894
__netif_receive_skb+0x1d/0x160 net/core/dev.c:6009
process_backlog+0x443/0x15f0 net/core/dev.c:6357
__napi_poll.constprop.0+0xb7/0x550 net/core/dev.c:7191
napi_poll net/core/dev.c:7260 [inline]
net_rx_action+0xa94/0x1010 net/core/dev.c:7382
handle_softirqs+0x213/0x8f0 kernel/softirq.c:561
do_softirq kernel/softirq.c:462 [inline]
do_softirq+0xb2/0xf0 kernel/softirq.c:449
__local_bh_enable_ip+0x100/0x120 kernel/softirq.c:389
spin_unlock_bh include/linux/spinlock.h:396 [inline]
nsim_dev_trap_report drivers/net/netdevsim/dev.c:820 [inline]
nsim_dev_trap_report_work+0x8c7/0xd00 drivers/net/netdevsim/dev.c:851
process_one_work+0x9c5/0x1ba0 kernel/workqueue.c:3238
process_scheduled_works kernel/workqueue.c:3319 [inline]
worker_thread+0x6c8/0xf00 kernel/workqueue.c:3400
kthread+0x3af/0x750 kernel/kthread.c:464
ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:148
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
net_ratelimit: 18773 callbacks suppressed
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:8a:33:84:60:6b:3a, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:8a:33:84:60:6b:3a, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:8a:33:84:60:6b:3a, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
net_ratelimit: 18966 callbacks suppressed
bridge0: received packet on veth0_to_bridge with own address as source address (addr:8a:33:84:60:6b:3a, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:8a:33:84:60:6b:3a, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:8a:33:84:60:6b:3a, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)