INFO: task syz.0.1449:11793 blocked for more than 143 seconds. Tainted: G L syzkaller #0 Blocked by coredump. "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:syz.0.1449 state:D stack:25080 pid:11793 tgid:11792 ppid:10155 task_flags:0x40054c flags:0x00080003 Call Trace: context_switch kernel/sched/core.c:5258 [inline] __schedule+0x150e/0x5070 kernel/sched/core.c:6866 __schedule_loop kernel/sched/core.c:6948 [inline] schedule+0x165/0x360 kernel/sched/core.c:6963 exp_funnel_lock kernel/rcu/tree_exp.h:334 [inline] synchronize_rcu_expedited+0x5f5/0x730 kernel/rcu/tree_exp.h:956 namespace_unlock+0x536/0x760 fs/namespace.c:1715 nsproxy_free kernel/nsproxy.c:65 [inline] deactivate_nsproxy+0x41/0x140 kernel/nsproxy.c:79 do_exit+0x8b8/0x25b0 kernel/exit.c:970 do_group_exit+0x21c/0x2d0 kernel/exit.c:1112 get_signal+0x1285/0x1340 kernel/signal.c:3034 arch_do_signal_or_restart+0x9a/0x7a0 arch/x86/kernel/signal.c:337 __exit_to_user_mode_loop kernel/entry/common.c:41 [inline] exit_to_user_mode_loop+0x87/0x4f0 kernel/entry/common.c:75 __exit_to_user_mode_prepare include/linux/irq-entry-common.h:226 [inline] syscall_exit_to_user_mode_prepare include/linux/irq-entry-common.h:256 [inline] syscall_exit_to_user_mode_work include/linux/entry-common.h:159 [inline] syscall_exit_to_user_mode include/linux/entry-common.h:194 [inline] do_syscall_64+0x2d0/0xf80 arch/x86/entry/syscall_64.c:100 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f86c9b8df90 RSP: 002b:00007f86ca97fb70 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 RAX: 0000000000000006 RBX: 0000000000109301 RCX: 00007f86c9b8df90 RDX: 0000000000109301 RSI: 00007f86ca97fc10 RDI: 00000000ffffff9c RBP: 00007f86ca97fc10 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000293 R12: cccccccccccccccd R13: 00007f86c9de6038 R14: 00007f86c9de5fa0 R15: 00007ffe2e384128 Showing all locks held in the system: 3 locks held by kworker/1:0/24: 1 lock held by khungtaskd/31: #0: ffffffff8e33f2e0 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire include/linux/rcupdate.h:331 [inline] #0: ffffffff8e33f2e0 (rcu_read_lock){....}-{1:3}, at: rcu_read_lock include/linux/rcupdate.h:867 [inline] #0: ffffffff8e33f2e0 (rcu_read_lock){....}-{1:3}, at: debug_show_all_locks+0x2e/0x180 kernel/locking/lockdep.c:6775 4 locks held by udevd/5842: #0: ffff88802853d8b8 (&p->lock){+.+.}-{4:4}, at: seq_read_iter+0xb7/0xe20 fs/seq_file.c:183 #1: ffff8880b8624588 (psi_seq){-.-.}-{0:0}, at: psi_task_switch+0x53/0x880 kernel/sched/psi.c:933 #2: ffff8880b863ab18 (&rq->__lock){-.-.}-{2:2}, at: raw_spin_rq_lock_nested+0x2a/0x140 kernel/sched/core.c:639 #3: ffff88807cc858a8 (&ep->wq){....}-{3:3}, at: __wake_up_common_lock+0x2f/0x1f0 kernel/sched/wait.c:124 3 locks held by kworker/0:4/5881: #0: ffff88813fe55948 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x841/0x15a0 kernel/workqueue.c:3254 #1: ffffc900045afb80 (free_ipc_work){+.+.}-{0:0}, at: process_one_work+0x868/0x15a0 kernel/workqueue.c:3255 #2: ffffffff8e344e38 (rcu_state.exp_mutex){+.+.}-{4:4}, at: exp_funnel_lock kernel/rcu/tree_exp.h:343 [inline] #2: ffffffff8e344e38 (rcu_state.exp_mutex){+.+.}-{4:4}, at: synchronize_rcu_expedited+0x3b9/0x730 kernel/rcu/tree_exp.h:956 6 locks held by kworker/1:6/5926: 2 locks held by getty/9223: #0: ffff88814dcd10a0 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x25/0x70 drivers/tty/tty_ldisc.c:243 #1: ffffc900034452f0 (&ldata->atomic_read_lock){+.+.}-{4:4}, at: n_tty_read+0x449/0x1460 drivers/tty/n_tty.c:2211 1 lock held by syz.0.1449/11793: 1 lock held by syz.8.1475/12011: 1 lock held by syz.3.1680/13022: 1 lock held by syz.5.1689/13048: #0: ffffffff8e344d00 (rcu_state.barrier_mutex){+.+.}-{4:4}, at: rcu_barrier+0x4c/0x570 kernel/rcu/tree.c:3816 1 lock held by syz.4.1703/13139: #0: ffff8880117935c8 (&sb->s_type->i_mutex_key#13){+.+.}-{4:4}, at: inode_lock include/linux/fs.h:1028 [inline] #0: ffff8880117935c8 (&sb->s_type->i_mutex_key#13){+.+.}-{4:4}, at: __sock_release+0x89/0x250 net/socket.c:665 1 lock held by syz.1.1735/13429: 1 lock held by syz.6.1764/13675: #0: ffffffff8e344e38 (rcu_state.exp_mutex){+.+.}-{4:4}, at: exp_funnel_lock kernel/rcu/tree_exp.h:311 [inline] #0: ffffffff8e344e38 (rcu_state.exp_mutex){+.+.}-{4:4}, at: synchronize_rcu_expedited+0x2f6/0x730 kernel/rcu/tree_exp.h:956 1 lock held by syz-executor/13722: 1 lock held by syz.7.1896/14287: 2 locks held by kworker/1:15/14321: 2 locks held by kworker/1:16/14331: 3 locks held by kworker/1:19/14336: 1 lock held by dhcpcd/14341: #0: ffff888033cde260 (sk_lock-AF_PACKET){+.+.}-{0:0}, at: lock_sock include/net/sock.h:1700 [inline] #0: ffff888033cde260 (sk_lock-AF_PACKET){+.+.}-{0:0}, at: packet_do_bind+0x33/0xd30 net/packet/af_packet.c:3197 1 lock held by dhcpcd/14342: #0: ffff8880585d4260 (sk_lock-AF_PACKET){+.+.}-{0:0}, at: lock_sock include/net/sock.h:1700 [inline] #0: ffff8880585d4260 (sk_lock-AF_PACKET){+.+.}-{0:0}, at: packet_do_bind+0x33/0xd30 net/packet/af_packet.c:3197 ============================================= NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 31 Comm: khungtaskd Tainted: G L syzkaller #0 PREEMPT(full) Tainted: [L]=SOFTLOCKUP Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 Call Trace: dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120 nmi_cpu_backtrace+0x39e/0x3d0 lib/nmi_backtrace.c:113 nmi_trigger_cpumask_backtrace+0x17a/0x300 lib/nmi_backtrace.c:62 trigger_all_cpu_backtrace include/linux/nmi.h:160 [inline] __sys_info lib/sys_info.c:157 [inline] sys_info+0x135/0x170 lib/sys_info.c:165 check_hung_uninterruptible_tasks kernel/hung_task.c:363 [inline] watchdog+0xe40/0xe90 kernel/hung_task.c:557 kthread+0x711/0x8a0 kernel/kthread.c:463 ret_from_fork+0x599/0xb30 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:246 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 14336 Comm: kworker/1:19 Tainted: G L syzkaller #0 PREEMPT(full) Tainted: [L]=SOFTLOCKUP Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 Workqueue: wg-kex-wg0 wg_packet_handshake_receive_worker RIP: 0010:get_current arch/x86/include/asm/current.h:25 [inline] RIP: 0010:write_comp_data kernel/kcov.c:245 [inline] RIP: 0010:__sanitizer_cov_trace_const_cmp4+0x8/0x90 kernel/kcov.c:314 Code: 48 89 44 11 20 e9 98 2f a8 09 cc 0f 1f 80 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 48 8b 04 24 <65> 48 8b 14 25 08 40 c4 92 65 8b 0d 78 43 02 11 81 e1 00 01 ff 00 RSP: 0018:ffffc90000a076b8 EFLAGS: 00000246 RAX: ffffffff8a199046 RBX: ffff88807e00f000 RCX: ffff888064241e80 RDX: ffff888064241e80 RSI: 0000000000000001 RDI: 0000000000000000 RBP: 1ffff11005258b99 R08: ffffc90000a079c0 R09: ffffc90000a079d0 R10: ffffc90000a07820 R11: fffff52000140f06 R12: 0000000000000001 R13: 0000000000000003 R14: 1ffff11005258b9b R15: ffff8880292c5cdf FS: 0000000000000000(0000) GS:ffff888125adc000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fcdd879ae9c CR3: 0000000027ab2000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000008000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400 Call Trace: __in6_dev_get include/net/addrconf.h:347 [inline] ip6_ignore_linkdown include/net/addrconf.h:448 [inline] find_match+0xc6/0xc90 net/ipv6/route.c:780 __find_rr_leaf+0x23a/0x6d0 net/ipv6/route.c:868 find_rr_leaf net/ipv6/route.c:889 [inline] rt6_select net/ipv6/route.c:933 [inline] fib6_table_lookup+0x39f/0xa80 net/ipv6/route.c:2233 ip6_pol_route+0x222/0x1180 net/ipv6/route.c:2269 pol_lookup_func include/net/ip6_fib.h:617 [inline] fib6_rule_lookup+0x52f/0x6f0 net/ipv6/fib6_rules.c:120 ip6_route_input_lookup net/ipv6/route.c:2338 [inline] ip6_route_input+0x6de/0xad0 net/ipv6/route.c:2641 ip6_rcv_finish+0x141/0x2e0 net/ipv6/ip6_input.c:77 ip_sabotage_in+0x1e1/0x270 net/bridge/br_netfilter_hooks.c:990 nf_hook_entry_hookfn include/linux/netfilter.h:158 [inline] nf_hook_slow+0xc5/0x220 net/netfilter/core.c:623 nf_hook include/linux/netfilter.h:273 [inline] NF_HOOK+0x206/0x3a0 include/linux/netfilter.h:316 __netif_receive_skb_one_core net/core/dev.c:6138 [inline] __netif_receive_skb+0xd3/0x380 net/core/dev.c:6251 netif_receive_skb_internal net/core/dev.c:6337 [inline] netif_receive_skb+0x1bb/0x750 net/core/dev.c:6396 NF_HOOK+0xa0/0x390 include/linux/netfilter.h:319 br_handle_frame_finish+0x15c6/0x1c90 net/bridge/br_input.c:235 br_nf_hook_thresh+0x3c6/0x4a0 net/bridge/br_netfilter_hooks.c:-1 br_nf_pre_routing_finish_ipv6+0x999/0xd60 net/bridge/br_netfilter_ipv6.c:-1 NF_HOOK include/linux/netfilter.h:318 [inline] br_nf_pre_routing_ipv6+0x37e/0x6b0 net/bridge/br_netfilter_ipv6.c:184 nf_hook_entry_hookfn include/linux/netfilter.h:158 [inline] nf_hook_bridge_pre net/bridge/br_input.c:291 [inline] br_handle_frame+0x96e/0x14f0 net/bridge/br_input.c:442 __netif_receive_skb_core+0x95f/0x2f90 net/core/dev.c:6025 __netif_receive_skb_one_core net/core/dev.c:6136 [inline] __netif_receive_skb+0x72/0x380 net/core/dev.c:6251 process_backlog+0x622/0x1500 net/core/dev.c:6603 __napi_poll+0xae/0x320 net/core/dev.c:7667 napi_poll net/core/dev.c:7730 [inline] net_rx_action+0x672/0xe50 net/core/dev.c:7882 handle_softirqs+0x27d/0x850 kernel/softirq.c:626 do_softirq+0xec/0x180 kernel/softirq.c:523 __local_bh_enable_ip+0x17d/0x1c0 kernel/softirq.c:450 local_bh_enable include/linux/bottom_half.h:33 [inline] fpregs_unlock arch/x86/include/asm/fpu/api.h:77 [inline] kernel_fpu_end+0xd2/0x120 arch/x86/kernel/fpu/core.c:480 blake2s_compress+0xe0/0x1e30 lib/crypto/x86/blake2s.h:42 blake2s_final+0x116/0x260 lib/crypto/blake2s.c:142 hmac+0x1c6/0x330 drivers/net/wireguard/noise.c:325 kdf drivers/net/wireguard/noise.c:367 [inline] message_ephemeral+0x1e2/0x280 drivers/net/wireguard/noise.c:493 wg_noise_handshake_consume_initiation+0x1cb/0x900 drivers/net/wireguard/noise.c:605 wg_receive_handshake_packet drivers/net/wireguard/receive.c:144 [inline] wg_packet_handshake_receive_worker+0x5ee/0xfc0 drivers/net/wireguard/receive.c:213 process_one_work+0x93a/0x15a0 kernel/workqueue.c:3279 process_scheduled_works kernel/workqueue.c:3362 [inline] worker_thread+0x9b0/0xee0 kernel/workqueue.c:3443 kthread+0x711/0x8a0 kernel/kthread.c:463 ret_from_fork+0x599/0xb30 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:246 net_ratelimit: 8347 callbacks suppressed bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:02:28:48:11:c5:54, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:02:28:48:11:c5:54, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) net_ratelimit: 8453 callbacks suppressed bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:02:28:48:11:c5:54, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:02:28:48:11:c5:54, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)