INFO: task syz.0.5216:656 blocked for more than 143 seconds. Tainted: G L syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:syz.0.5216 state:D stack:28376 pid:656 tgid:654 ppid:25463 task_flags:0x400040 flags:0x00080002 Call Trace: context_switch kernel/sched/core.c:5258 [inline] __schedule+0x150e/0x5070 kernel/sched/core.c:6866 __schedule_loop kernel/sched/core.c:6948 [inline] schedule+0x165/0x360 kernel/sched/core.c:6963 schedule_preempt_disabled+0x13/0x30 kernel/sched/core.c:7020 __mutex_lock_common kernel/locking/mutex.c:692 [inline] __mutex_lock+0x7e6/0x1350 kernel/locking/mutex.c:776 blk_trace_startstop+0xa3/0x640 kernel/trace/blktrace.c:901 blk_trace_ioctl+0x283/0x6e0 kernel/trace/blktrace.c:947 blkdev_common_ioctl+0x11ad/0x2c70 block/ioctl.c:712 blkdev_ioctl+0x553/0x710 block/ioctl.c:786 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:597 [inline] __se_sys_ioctl+0xfc/0x170 fs/ioctl.c:583 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xfa/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7fe52978f749 RSP: 002b:00007fe52a5ea038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 00007fe5299e6090 RCX: 00007fe52978f749 RDX: 0000000000000000 RSI: 0000000000001274 RDI: 0000000000000009 RBP: 00007fe529813f91 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007fe5299e6128 R14: 00007fe5299e6090 R15: 00007fffa35673e8 INFO: task syz.0.5216:672 blocked for more than 144 seconds. Tainted: G L syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:syz.0.5216 state:D stack:28568 pid:672 tgid:654 ppid:25463 task_flags:0x400040 flags:0x00080002 Call Trace: context_switch kernel/sched/core.c:5258 [inline] __schedule+0x150e/0x5070 kernel/sched/core.c:6866 __schedule_loop kernel/sched/core.c:6948 [inline] schedule+0x165/0x360 kernel/sched/core.c:6963 schedule_preempt_disabled+0x13/0x30 kernel/sched/core.c:7020 __mutex_lock_common kernel/locking/mutex.c:692 [inline] __mutex_lock+0x7e6/0x1350 kernel/locking/mutex.c:776 blk_trace_remove kernel/trace/blktrace.c:562 [inline] blk_trace_ioctl+0x314/0x6e0 kernel/trace/blktrace.c:950 blkdev_common_ioctl+0x11ad/0x2c70 block/ioctl.c:712 blkdev_ioctl+0x553/0x710 block/ioctl.c:786 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:597 [inline] __se_sys_ioctl+0xfc/0x170 fs/ioctl.c:583 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xfa/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7fe52978f749 RSP: 002b:00007fe52a5c9038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 00007fe5299e6180 RCX: 00007fe52978f749 RDX: 0000000000000000 RSI: 0000000000001276 RDI: 0000000000000009 RBP: 00007fe529813f91 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007fe5299e6218 R14: 00007fe5299e6180 R15: 00007fffa35673e8 Showing all locks held in the system: 1 lock held by khungtaskd/31: #0: ffffffff8e33f2e0 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire include/linux/rcupdate.h:331 [inline] #0: ffffffff8e33f2e0 (rcu_read_lock){....}-{1:3}, at: rcu_read_lock include/linux/rcupdate.h:867 [inline] #0: ffffffff8e33f2e0 (rcu_read_lock){....}-{1:3}, at: debug_show_all_locks+0x2e/0x180 kernel/locking/lockdep.c:6775 4 locks held by kworker/u8:5/1004: #0: ffff88801bae7148 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x841/0x15a0 kernel/workqueue.c:3254 #1: ffffc90003f3fb80 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x868/0x15a0 kernel/workqueue.c:3255 #2: ffffffff8f71ef50 (pernet_ops_rwsem){++++}-{4:4}, at: cleanup_net+0xf7/0x7a0 net/core/net_namespace.c:670 #3: ffffffff8f72c588 (rtnl_mutex){+.+.}-{4:4}, at: fib6_rules_net_exit_batch+0x20/0xc0 net/ipv6/fib6_rules.c:641 3 locks held by kworker/u8:12/4514: #0: ffff88814c9d4148 ((wq_completion)ipv6_addrconf){+.+.}-{0:0}, at: process_one_work+0x841/0x15a0 kernel/workqueue.c:3254 #1: ffffc9000e5bfb80 ((work_completion)(&(&ifa->dad_work)->work)){+.+.}-{0:0}, at: process_one_work+0x868/0x15a0 kernel/workqueue.c:3255 #2: ffffffff8f72c588 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_net_lock include/linux/rtnetlink.h:130 [inline] #2: ffffffff8f72c588 (rtnl_mutex){+.+.}-{4:4}, at: addrconf_dad_work+0x112/0x14b0 net/ipv6/addrconf.c:4194 1 lock held by klogd/5187: 1 lock held by dhcpcd/5493: #0: ffffffff8f72c588 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_net_lock include/linux/rtnetlink.h:130 [inline] #0: ffffffff8f72c588 (rtnl_mutex){+.+.}-{4:4}, at: inet_rtm_deladdr+0x198/0x740 net/ipv4/devinet.c:670 2 locks held by getty/5586: #0: ffff88814de9d0a0 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x25/0x70 drivers/tty/tty_ldisc.c:243 #1: ffffc9000332b2f0 (&ldata->atomic_read_lock){+.+.}-{4:4}, at: n_tty_read+0x449/0x1460 drivers/tty/n_tty.c:2211 3 locks held by kworker/0:6/5876: #0: ffff88813fe55948 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x841/0x15a0 kernel/workqueue.c:3254 #1: ffffc900044afb80 ((fqdir_free_work).work){+.+.}-{0:0}, at: process_one_work+0x868/0x15a0 kernel/workqueue.c:3255 #2: ffffffff8e344d00 (rcu_state.barrier_mutex){+.+.}-{4:4}, at: rcu_barrier+0x4c/0x570 kernel/rcu/tree.c:3816 3 locks held by kworker/u8:18/15915: 2 locks held by dhcpcd/16884: #0: ffff888079c3e3c8 (&sb->s_type->i_mutex_key#13){+.+.}-{4:4}, at: inode_lock include/linux/fs.h:1028 [inline] #0: ffff888079c3e3c8 (&sb->s_type->i_mutex_key#13){+.+.}-{4:4}, at: __sock_release+0x89/0x250 net/socket.c:665 #1: ffffffff8e344e38 (rcu_state.exp_mutex){+.+.}-{4:4}, at: exp_funnel_lock kernel/rcu/tree_exp.h:311 [inline] #1: ffffffff8e344e38 (rcu_state.exp_mutex){+.+.}-{4:4}, at: synchronize_rcu_expedited+0x2f6/0x730 kernel/rcu/tree_exp.h:956 2 locks held by kworker/1:8/19252: 3 locks held by kworker/u8:19/21660: #0: ffff88813fe69948 ((wq_completion)events_unbound#2){+.+.}-{0:0}, at: process_one_work+0x841/0x15a0 kernel/workqueue.c:3254 #1: ffffc9000df5fb80 ((linkwatch_work).work){+.+.}-{0:0}, at: process_one_work+0x868/0x15a0 kernel/workqueue.c:3255 #2: ffffffff8f72c588 (rtnl_mutex){+.+.}-{4:4}, at: linkwatch_event+0xe/0x60 net/core/link_watch.c:303 2 locks held by kworker/1:10/29688: 2 locks held by syz.0.5216/655: 1 lock held by syz.0.5216/656: #0: ffff888025c788e0 (&q->debugfs_mutex){+.+.}-{4:4}, at: blk_trace_startstop+0xa3/0x640 kernel/trace/blktrace.c:901 1 lock held by syz.0.5216/672: #0: ffff888025c788e0 (&q->debugfs_mutex){+.+.}-{4:4}, at: blk_trace_remove kernel/trace/blktrace.c:562 [inline] #0: ffff888025c788e0 (&q->debugfs_mutex){+.+.}-{4:4}, at: blk_trace_ioctl+0x314/0x6e0 kernel/trace/blktrace.c:950 6 locks held by kworker/1:14/2031: 1 lock held by syz-executor/3663: #0: ffffffff8f72c588 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_net_lock include/linux/rtnetlink.h:130 [inline] #0: ffffffff8f72c588 (rtnl_mutex){+.+.}-{4:4}, at: inet_rtm_newaddr+0x3b0/0x18b0 net/ipv4/devinet.c:978 3 locks held by syz-executor/4057: #0: ffffffff8eeaf468 (&ops->srcu#2){.+.+}-{0:0}, at: rcu_lock_acquire include/linux/rcupdate.h:331 [inline] #0: ffffffff8eeaf468 (&ops->srcu#2){.+.+}-{0:0}, at: rcu_read_lock include/linux/rcupdate.h:867 [inline] #0: ffffffff8eeaf468 (&ops->srcu#2){.+.+}-{0:0}, at: rtnl_link_ops_get+0x23/0x250 net/core/rtnetlink.c:570 #1: ffffffff8f72c588 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_lock net/core/rtnetlink.c:80 [inline] #1: ffffffff8f72c588 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_nets_lock net/core/rtnetlink.c:341 [inline] #1: ffffffff8f72c588 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_newlink+0x8ec/0x1c90 net/core/rtnetlink.c:4071 #2: ffffffff8e344e38 (rcu_state.exp_mutex){+.+.}-{4:4}, at: exp_funnel_lock kernel/rcu/tree_exp.h:343 [inline] #2: ffffffff8e344e38 (rcu_state.exp_mutex){+.+.}-{4:4}, at: synchronize_rcu_expedited+0x3b9/0x730 kernel/rcu/tree_exp.h:956 ============================================= NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 31 Comm: khungtaskd Tainted: G L syzkaller #0 PREEMPT(full) Tainted: [L]=SOFTLOCKUP Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 Call Trace: dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120 nmi_cpu_backtrace+0x39e/0x3d0 lib/nmi_backtrace.c:113 nmi_trigger_cpumask_backtrace+0x17a/0x300 lib/nmi_backtrace.c:62 trigger_all_cpu_backtrace include/linux/nmi.h:160 [inline] __sys_info lib/sys_info.c:157 [inline] sys_info+0x135/0x170 lib/sys_info.c:165 check_hung_uninterruptible_tasks kernel/hung_task.c:363 [inline] watchdog+0xe40/0xe90 kernel/hung_task.c:557 kthread+0x711/0x8a0 kernel/kthread.c:463 ret_from_fork+0x599/0xb30 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:246 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 5889 Comm: kworker/1:4 Tainted: G L syzkaller #0 PREEMPT(full) Tainted: [L]=SOFTLOCKUP Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 Workqueue: wg-crypt-wg0 wg_packet_encrypt_worker RIP: 0010:kasan_mem_to_shadow include/linux/kasan.h:65 [inline] RIP: 0010:memory_is_poisoned_n mm/kasan/generic.c:140 [inline] RIP: 0010:memory_is_poisoned mm/kasan/generic.c:172 [inline] RIP: 0010:check_region_inline mm/kasan/generic.c:191 [inline] RIP: 0010:kasan_check_range+0x53/0x2c0 mm/kasan/generic.c:200 Code: 00 00 00 00 80 ff ff eb 11 cc cc cc f3 0f 1e fa 49 b9 00 00 00 00 00 00 00 ff f3 0f 1e fa 4c 39 cf 0f 82 58 02 00 00 49 89 ff <49> c1 ef 03 49 ba 00 00 00 00 00 fc ff df 4f 8d 1c 17 49 ff c8 4d RSP: 0018:ffffc90000a080f8 EFLAGS: 00000202 RAX: 0000000000000001 RBX: ffff8881edde3c80 RCX: ffffffff893d6097 RDX: 0000000000000001 RSI: 0000000000000004 RDI: ffff8881edde3d64 RBP: 1ffff1103dbbbf32 R08: ffff8881edde3d68 R09: ffff800000000000 R10: 0038dd8600000000 R11: 0000000000020010 R12: ffff8881edddf990 R13: 0000000000000001 R14: ffff8881edde3d64 R15: ffff8881edde3d64 FS: 0000000000000000(0000) GS:ffff888125adc000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fe773f94e9c CR3: 000000003282e000 CR4: 00000000003526f0 DR0: ffffffffffffffff DR1: 00000000000001f8 DR2: 0000000000000083 DR3: 0000000000000006 DR6: 00000000ffff0ff0 DR7: 0000000000000400 Call Trace: instrument_atomic_write include/linux/instrumented.h:82 [inline] atomic_set include/linux/atomic/atomic-instrumented.h:67 [inline] refcount_set include/linux/refcount.h:134 [inline] __skb_clone+0x417/0x7a0 net/core/skbuff.c:1602 skb_clone+0x246/0x3a0 net/core/skbuff.c:2094 deliver_clone net/bridge/br_forward.c:125 [inline] br_flood+0x414/0x6a0 net/bridge/br_forward.c:250 br_handle_frame_finish+0x15a3/0x1c90 net/bridge/br_input.c:229 br_nf_hook_thresh+0x3c6/0x4a0 net/bridge/br_netfilter_hooks.c:-1 br_nf_pre_routing_finish_ipv6+0x999/0xd60 net/bridge/br_netfilter_ipv6.c:-1 NF_HOOK include/linux/netfilter.h:318 [inline] br_nf_pre_routing_ipv6+0x37e/0x6b0 net/bridge/br_netfilter_ipv6.c:184 nf_hook_entry_hookfn include/linux/netfilter.h:158 [inline] nf_hook_bridge_pre net/bridge/br_input.c:291 [inline] br_handle_frame+0x96e/0x14f0 net/bridge/br_input.c:442 __netif_receive_skb_core+0x95f/0x2f90 net/core/dev.c:6025 __netif_receive_skb_one_core net/core/dev.c:6136 [inline] __netif_receive_skb+0x72/0x380 net/core/dev.c:6251 process_backlog+0x622/0x1500 net/core/dev.c:6603 __napi_poll+0xae/0x320 net/core/dev.c:7667 napi_poll net/core/dev.c:7730 [inline] net_rx_action+0x672/0xe50 net/core/dev.c:7882 handle_softirqs+0x27d/0x850 kernel/softirq.c:626 do_softirq+0xec/0x180 kernel/softirq.c:523 __local_bh_enable_ip+0x17d/0x1c0 kernel/softirq.c:450 spin_unlock_bh include/linux/spinlock.h:396 [inline] ptr_ring_consume_bh include/linux/ptr_ring.h:377 [inline] wg_packet_encrypt_worker+0x1660/0x1700 drivers/net/wireguard/send.c:293 process_one_work+0x93a/0x15a0 kernel/workqueue.c:3279 process_scheduled_works kernel/workqueue.c:3362 [inline] worker_thread+0x9b0/0xee0 kernel/workqueue.c:3443 kthread+0x711/0x8a0 kernel/kthread.c:463 ret_from_fork+0x599/0xb30 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:246 net_ratelimit: 9328 callbacks suppressed bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:8a:dd:e7:5f:f5:1e, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:8a:dd:e7:5f:f5:1e, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) net_ratelimit: 9033 callbacks suppressed bridge0: received packet on veth0_to_bridge with own address as source address (addr:8a:dd:e7:5f:f5:1e, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:8a:dd:e7:5f:f5:1e, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:8a:dd:e7:5f:f5:1e, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)