INFO: task kworker/1:2:2205 blocked for more than 143 seconds.
      Not tainted syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:2     state:D stack:23536 pid:2205  tgid:2205  ppid:2      task_flags:0x4208060 flags:0x00004000
Workqueue: events switchdev_deferred_process_work
Call Trace:
 <TASK>
 __schedule+0x1798/0x4cc0
 schedule+0x165/0x360
 schedule_preempt_disabled+0x13/0x30
 __mutex_lock+0x7e6/0x1350
 switchdev_deferred_process_work+0xe/0x20
 process_scheduled_works+0xae1/0x17b0
 worker_thread+0x8a0/0xda0
 kthread+0x711/0x8a0
 ret_from_fork+0x3fc/0x770
 ret_from_fork_asm+0x1a/0x30
 </TASK>
INFO: task dhcpcd:5592 blocked for more than 145 seconds.
      Not tainted syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:dhcpcd          state:D stack:21352 pid:5592  tgid:5592  ppid:5591   task_flags:0x400140 flags:0x00004002
Call Trace:
 <TASK>
 __schedule+0x1798/0x4cc0
 schedule+0x165/0x360
 schedule_preempt_disabled+0x13/0x30
 __mutex_lock+0x7e6/0x1350
 rtnl_dumpit+0x92/0x200
 netlink_dump+0x6e4/0xe90
 __netlink_dump_start+0x5cb/0x7e0
 rtnetlink_rcv_msg+0x9eb/0xb70
 netlink_rcv_skb+0x208/0x470
 netlink_unicast+0x82f/0x9e0
 netlink_sendmsg+0x805/0xb30
 __sock_sendmsg+0x21c/0x270
 __sys_sendto+0x3bd/0x520
 __x64_sys_sendto+0xde/0x100
 do_syscall_64+0xfa/0x3b0
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7efdfccd6ad7
RSP: 002b:00007ffd6049f838 EFLAGS: 00000246 ORIG_RAX: 000000000000002c
RAX: ffffffffffffffda RBX: 00007ffd604a0960 RCX: 00007efdfccd6ad7
RDX: 0000000000000014 RSI: 00007ffd604a0880 RDI: 0000000000000015
RBP: 00007ffd604a08f0 R08: 00007ffd604a0864 R09: 000000000000000c
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000012
R13: 00007ffd604a0864 R14: 00007ffd604a0880 R15: 0000000000000105
 </TASK>
INFO: task syz-executor:10379 blocked for more than 147 seconds.
      Not tainted syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:syz-executor    state:D stack:23912 pid:10379 tgid:10379 ppid:1      task_flags:0x400140 flags:0x00004006
Call Trace:
 <TASK>
 __schedule+0x1798/0x4cc0
 schedule+0x165/0x360
 schedule_preempt_disabled+0x13/0x30
 __mutex_lock+0x7e6/0x1350
 wg_netns_pre_exit+0x1c/0x1d0
 ops_undo_list+0x187/0x990
 setup_net+0x2d3/0x320
 copy_net_ns+0x31b/0x4d0
 create_new_namespaces+0x3f3/0x720
 unshare_nsproxy_namespaces+0x11c/0x170
 ksys_unshare+0x4c8/0x8c0
 __x64_sys_unshare+0x38/0x50
 do_syscall_64+0xfa/0x3b0
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f2f063903e7
RSP: 002b:00007ffc983ff848 EFLAGS: 00000206 ORIG_RAX: 0000000000000110
RAX: ffffffffffffffda RBX: 00007f2f065c5f40 RCX: 00007f2f063903e7
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000
RBP: 00007f2f065c67b8 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000008
R13: 0000000000000003 R14: 0000000000000009 R15: 0000000000000000
 </TASK>
INFO: task kworker/u8:5:10383 blocked for more than 147 seconds.
      Not tainted syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/u8:5    state:D stack:26264 pid:10383 tgid:10383 ppid:2      task_flags:0x4208060 flags:0x00004000
Workqueue: ipv6_addrconf addrconf_verify_work
Call Trace:
 <TASK>
 __schedule+0x1798/0x4cc0
 schedule+0x165/0x360
 schedule_preempt_disabled+0x13/0x30
 __mutex_lock+0x7e6/0x1350
 addrconf_verify_work+0x19/0x30
 process_scheduled_works+0xae1/0x17b0
 worker_thread+0x8a0/0xda0
 kthread+0x711/0x8a0
 ret_from_fork+0x3fc/0x770
 ret_from_fork_asm+0x1a/0x30
 </TASK>
INFO: task syz-executor:10395 blocked for more than 147 seconds.
      Not tainted syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:syz-executor    state:D stack:23912 pid:10395 tgid:10395 ppid:1      task_flags:0x400140 flags:0x00004006
Call Trace:
 <TASK>
 __schedule+0x1798/0x4cc0
 schedule+0x165/0x360
 schedule_preempt_disabled+0x13/0x30
 __mutex_lock+0x7e6/0x1350
 ib_get_eth_speed+0x151/0x7b0
 rxe_query_port+0x93/0x3b0
 ib_query_port+0x170/0x830
 ib_setup_port_attrs+0x24e/0x2070
 add_one_compat_dev+0x3d6/0x5c0
 rdma_dev_init_net+0x1dd/0x270
 ops_init+0x35c/0x5c0
 setup_net+0x10c/0x320
 copy_net_ns+0x31b/0x4d0
 create_new_namespaces+0x3f3/0x720
 unshare_nsproxy_namespaces+0x11c/0x170
 ksys_unshare+0x4c8/0x8c0
 __x64_sys_unshare+0x38/0x50
 do_syscall_64+0xfa/0x3b0
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f72ba5903e7
RSP: 002b:00007ffd4b26c088 EFLAGS: 00000202 ORIG_RAX: 0000000000000110
RAX: ffffffffffffffda RBX: 00007f72ba7c5f40 RCX: 00007f72ba5903e7
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000
RBP: 00007f72ba7c67b8 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000008
R13: 0000000000000003 R14: 0000000000000009 R15: 0000000000000000
 </TASK>
INFO: task syz-executor:10402 blocked for more than 147 seconds.
      Not tainted syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:syz-executor    state:D stack:25848 pid:10402 tgid:10402 ppid:1      task_flags:0x400140 flags:0x00004006
Call Trace:
 <TASK>
 __schedule+0x1798/0x4cc0
 schedule+0x165/0x360
 schedule_preempt_disabled+0x13/0x30
 __mutex_lock+0x7e6/0x1350
 ip_tunnel_init_net+0x2ab/0x800
 ops_init+0x35c/0x5c0
 setup_net+0x10c/0x320
 copy_net_ns+0x31b/0x4d0
 create_new_namespaces+0x3f3/0x720
 unshare_nsproxy_namespaces+0x11c/0x170
 ksys_unshare+0x4c8/0x8c0
 __x64_sys_unshare+0x38/0x50
 do_syscall_64+0xfa/0x3b0
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f1fc1b903e7
RSP: 002b:00007ffd9a82cdd8 EFLAGS: 00000202 ORIG_RAX: 0000000000000110
RAX: ffffffffffffffda RBX: 00007f1fc1dc5f40 RCX: 00007f1fc1b903e7
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000
RBP: 00007f1fc1dc67b8 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000008
R13: 0000000000000003 R14: 0000000000000009 R15: 0000000000000000
 </TASK>
INFO: task syz-executor:10404 blocked for more than 147 seconds.
      Not tainted syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:syz-executor    state:D stack:25680 pid:10404 tgid:10404 ppid:1      task_flags:0x400140 flags:0x00004006
Call Trace:
 <TASK>
 __schedule+0x1798/0x4cc0
 schedule+0x165/0x360
 schedule_preempt_disabled+0x13/0x30
 __mutex_lock+0x7e6/0x1350
 add_one_compat_dev+0xee/0x5c0
 rdma_dev_init_net+0x1dd/0x270
 ops_init+0x35c/0x5c0
 setup_net+0x10c/0x320
 copy_net_ns+0x31b/0x4d0
 create_new_namespaces+0x3f3/0x720
 unshare_nsproxy_namespaces+0x11c/0x170
 ksys_unshare+0x4c8/0x8c0
 __x64_sys_unshare+0x38/0x50
 do_syscall_64+0xfa/0x3b0
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f3c72f903e7
RSP: 002b:00007ffe4fa83618 EFLAGS: 00000206 ORIG_RAX: 0000000000000110
RAX: ffffffffffffffda RBX: 00007f3c731c5f40 RCX: 00007f3c72f903e7
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000
RBP: 00007f3c731c67b8 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000008
R13: 0000000000000003 R14: 0000000000000009 R15: 0000000000000000
 </TASK>

Showing all locks held in the system:
4 locks held by kworker/u8:1/13:
1 lock held by khungtaskd/34:
 #0: ffffffff8e139ee0 (rcu_read_lock){....}-{1:3}, at: debug_show_all_locks+0x2e/0x180
3 locks held by kworker/1:2/2205:
 #0: ffff88801a480d48 ((wq_completion)events){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0
 #1: ffffc9000a9c7bc0 (deferred_process_work){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0
 #2: ffffffff8f538bc8 (rtnl_mutex){+.+.}-{4:4}, at: switchdev_deferred_process_work+0xe/0x20
3 locks held by kworker/u10:6/3583:
2 locks held by dhcpcd/5592:
 #0: ffff8881059026d8 (nlk_cb_mutex-ROUTE){+.+.}-{4:4}, at: __netlink_dump_start+0xfe/0x7e0
 #1: ffffffff8f538bc8 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_dumpit+0x92/0x200
2 locks held by getty/5673:
 #0: ffff88802280d0a0 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x25/0x70
 #1: ffffc900029032f0 (&ldata->atomic_read_lock){+.+.}-{4:4}, at: n_tty_read+0x43e/0x1400
8 locks held by kworker/u11:2/5846:
7 locks held by kworker/u11:4/5850:
 #0: ffff8880318c8948 ((wq_completion)hci0){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0
 #1: ffffc900031efbc0 ((work_completion)(&hdev->cmd_sync_work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0
 #2: ffff88803422cdc0 (&hdev->req_lock){+.+.}-{4:4}, at: hci_cmd_sync_work+0x1d4/0x3a0
 #3: ffff88803422c0b8 (&hdev->lock){+.+.}-{4:4}, at: hci_abort_conn_sync+0x242/0xe30
 #4: ffffffff8f69da08 (hci_cb_list_lock){+.+.}-{4:4}, at: hci_conn_failed+0x165/0x310
 #5: ffff8880318cf338 (&conn->lock#2){+.+.}-{4:4}, at: l2cap_conn_del+0x70/0x680
 #6: ffffffff8e13f978 (rcu_state.exp_mutex){+.+.}-{4:4}, at: synchronize_rcu_expedited+0x3b9/0x730
2 locks held by kworker/u8:3/5872:
2 locks held by syz-executor/10379:
 #0: ffffffff8f52bd10 (pernet_ops_rwsem){++++}-{4:4}, at: copy_net_ns+0x304/0x4d0
 #1: ffffffff8f538bc8 (rtnl_mutex){+.+.}-{4:4}, at: wg_netns_pre_exit+0x1c/0x1d0
3 locks held by kworker/u8:5/10383:
 #0: ffff88802447a948 ((wq_completion)ipv6_addrconf){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0
 #1: ffffc90028967bc0 ((work_completion)(&(&net->ipv6.addr_chk_work)->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0
 #2: ffffffff8f538bc8 (rtnl_mutex){+.+.}-{4:4}, at: addrconf_verify_work+0x19/0x30
6 locks held by syz-executor/10395:
 #0: ffffffff8f52bd10 (pernet_ops_rwsem){++++}-{4:4}, at: copy_net_ns+0x304/0x4d0
 #1: ffffffff8f28bb50 (devices_rwsem){++++}-{4:4}, at: rdma_dev_init_net+0x19a/0x270
 #2: ffffffff8f28bd10 (rdma_nets_rwsem){++++}-{4:4}, at: rdma_dev_init_net+0x1d2/0x270
 #3: ffff888029160f98 (&device->compat_devs_mutex){+.+.}-{4:4}, at: add_one_compat_dev+0xee/0x5c0
 #4: ffff888029161290 (&rxe->usdev_lock){+.+.}-{4:4}, at: rxe_query_port+0x7e/0x3b0
 #5: ffffffff8f538bc8 (rtnl_mutex){+.+.}-{4:4}, at: ib_get_eth_speed+0x151/0x7b0
2 locks held by syz-executor/10402:
 #0: ffffffff8f52bd10 (pernet_ops_rwsem){++++}-{4:4}, at: copy_net_ns+0x304/0x4d0
 #1: ffffffff8f538bc8 (rtnl_mutex){+.+.}-{4:4}, at: ip_tunnel_init_net+0x2ab/0x800
4 locks held by syz-executor/10404:
 #0: ffffffff8f52bd10 (pernet_ops_rwsem){++++}-{4:4}, at: copy_net_ns+0x304/0x4d0
 #1: ffffffff8f28bb50 (devices_rwsem){++++}-{4:4}, at: rdma_dev_init_net+0x19a/0x270
 #2: ffffffff8f28bd10 (rdma_nets_rwsem){++++}-{4:4}, at: rdma_dev_init_net+0x1d2/0x270
 #3: ffff888029160f98 (&device->compat_devs_mutex){+.+.}-{4:4}, at: add_one_compat_dev+0xee/0x5c0
1 lock held by syz-executor/10413:
 #0: ffffffff8f538bc8 (rtnl_mutex){+.+.}-{4:4}, at: inet_rtm_newaddr+0x3b0/0x18b0
1 lock held by syz-executor/10418:
 #0: ffffffff8f538bc8 (rtnl_mutex){+.+.}-{4:4}, at: inet_rtm_newaddr+0x3b0/0x18b0
1 lock held by syz-executor/10420:
 #0: ffffffff8f538bc8 (rtnl_mutex){+.+.}-{4:4}, at: inet_rtm_newaddr+0x3b0/0x18b0
1 lock held by syz-executor/10427:
 #0: ffffffff8f538bc8 (rtnl_mutex){+.+.}-{4:4}, at: inet_rtm_newaddr+0x3b0/0x18b0
1 lock held by syz-executor/10429:
 #0: ffffffff8f538bc8 (rtnl_mutex){+.+.}-{4:4}, at: inet_rtm_newaddr+0x3b0/0x18b0
1 lock held by syz-executor/10431:
 #0: ffffffff8f538bc8 (rtnl_mutex){+.+.}-{4:4}, at: inet_rtm_newaddr+0x3b0/0x18b0

=============================================

NMI backtrace for cpu 1
CPU: 1 UID: 0 PID: 34 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT(full) 
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-debian-1.16.2-1 04/01/2014
Call Trace:
 <TASK>
 dump_stack_lvl+0x189/0x250
 nmi_cpu_backtrace+0x39e/0x3d0
 nmi_trigger_cpumask_backtrace+0x17a/0x300
 watchdog+0xf93/0xfe0
 kthread+0x711/0x8a0
 ret_from_fork+0x3fc/0x770
 ret_from_fork_asm+0x1a/0x30
 </TASK>
Sending NMI from CPU 1 to CPUs 0:
net_ratelimit: 102309 callbacks suppressed
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
NMI backtrace for cpu 0
CPU: 0 UID: 0 PID: 5872 Comm: kworker/u8:3 Not tainted syzkaller #0 PREEMPT(full) 
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-debian-1.16.2-1 04/01/2014
Workqueue: bat_events batadv_bla_periodic_work
RIP: 0010:fs_reclaim_release+0x28/0xa0
Code: 90 90 f3 0f 1e fa 55 53 65 48 8b 1c 25 08 a0 a0 92 48 83 c3 2c 48 89 d8 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df 0f b6 04 08 <84> c0 75 5a 8b 03 a9 00 00 0c 10 75 30 a9 00 08 00 00 75 21 81 e7
RSP: 0018:ffffc90000007108 EFLAGS: 00000a07
RAX: 0000000000000000 RBX: ffff88810809802c RCX: dffffc0000000000
RDX: 0000000000000100 RSI: 0000000000000820 RDI: 0000000000000820
RBP: 0000000000000820 R08: ffff888108098000 R09: 0000000000000003
R10: 0000000000000002 R11: 0000000000000100 R12: dffffc0000000000
R13: 0000000000000820 R14: ffff888100ab1a00 R15: 0000000000000000
FS:  0000000000000000(0000) GS:ffff8880b8616000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007efc59887e20 CR3: 000000000df36000 CR4: 00000000000006f0
Call Trace:
 <IRQ>
 kmem_cache_alloc_noprof+0x4b/0x3c0
 skb_clone+0x212/0x3a0
 br_flood+0x414/0x6a0
 br_handle_frame_finish+0x14b4/0x19b0
 br_nf_hook_thresh+0x3c6/0x4a0
 br_nf_pre_routing_finish_ipv6+0x999/0xd60
 br_nf_pre_routing_ipv6+0x37e/0x6b0
 br_handle_frame+0x982/0x14c0
 __netif_receive_skb_core+0x10b9/0x4020
 __netif_receive_skb+0x72/0x380
 process_backlog+0x60e/0x14f0
 __napi_poll+0xc7/0x360
 net_rx_action+0x707/0xe30
 handle_softirqs+0x286/0x870
 do_softirq+0xec/0x180
 </IRQ>
 <TASK>
 __local_bh_enable_ip+0x17d/0x1c0
 batadv_bla_purge_backbone_gw+0x44c/0x4f0
 batadv_bla_periodic_work+0xc7/0xac0
 process_scheduled_works+0xae1/0x17b0
 worker_thread+0x8a0/0xda0
 kthread+0x711/0x8a0
 ret_from_fork+0x3fc/0x770
 ret_from_fork_asm+0x1a/0x30
 </TASK>
clocksource: Long readout interval, skipping watchdog check: cs_nsec: 1192673191 wd_nsec: 1192673165
