INFO: task kworker/1:1:47 blocked for more than 143 seconds.
      Not tainted 6.16.0-rc6-syzkaller-00128-g81e0db8e8398-dirty #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:1     state:D stack:24488 pid:47    tgid:47    ppid:2      task_flags:0x4208060 flags:0x00004000
Workqueue: events switchdev_deferred_process_work
Call Trace:
 <TASK>
 __schedule+0x16f5/0x4d00
 schedule+0x165/0x360
 schedule_preempt_disabled+0x13/0x30
 __mutex_lock+0x724/0xe80
 switchdev_deferred_process_work+0xe/0x20
 process_scheduled_works+0xae1/0x17b0
 worker_thread+0x8a0/0xda0
 kthread+0x711/0x8a0
 ret_from_fork+0x3fc/0x770
 ret_from_fork_asm+0x1a/0x30
 </TASK>
INFO: task dhcpcd:5573 blocked for more than 145 seconds.
      Not tainted 6.16.0-rc6-syzkaller-00128-g81e0db8e8398-dirty #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:dhcpcd          state:D stack:21384 pid:5573  tgid:5573  ppid:5572   task_flags:0x400140 flags:0x00004002
Call Trace:
 <TASK>
 __schedule+0x16f5/0x4d00
 schedule+0x165/0x360
 schedule_preempt_disabled+0x13/0x30
 __mutex_lock+0x724/0xe80
 rtnl_dumpit+0x92/0x200
 netlink_dump+0x6de/0xe60
 netlink_recvmsg+0x676/0xa30
 sock_recvmsg+0x22c/0x270
 ____sys_recvmsg+0x1c9/0x460
 ___sys_recvmsg+0x1b5/0x510
 __x64_sys_recvmsg+0x198/0x260
 do_syscall_64+0xfa/0x3b0
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7fc0b7f7291e
RSP: 002b:00007ffe4faa9208 EFLAGS: 00000246 ORIG_RAX: 000000000000002f
RAX: ffffffffffffffda RBX: 00007ffe4faaa330 RCX: 00007fc0b7f7291e
RDX: 0000000000000000 RSI: 00007ffe4faaa250 RDI: 000000000000000c
RBP: 00007ffe4faaa2c0 R08: 0000000000000000 R09: 0000000000000000
R10: 00000000000000d9 R11: 0000000000000246 R12: 0000000000000c84
R13: 00007ffe4faaa234 R14: 00007ffe4faaa250 R15: 00007ffe4faaa240
 </TASK>
INFO: task syz-executor:7812 blocked for more than 147 seconds.
      Not tainted 6.16.0-rc6-syzkaller-00128-g81e0db8e8398-dirty #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:syz-executor    state:D stack:25576 pid:7812  tgid:7812  ppid:1      task_flags:0x400140 flags:0x00004004
Call Trace:
 <TASK>
 __schedule+0x16f5/0x4d00
 schedule+0x165/0x360
 schedule_preempt_disabled+0x13/0x30
 __mutex_lock+0x724/0xe80
 __tun_chr_ioctl+0x37a/0x1df0
 __se_sys_ioctl+0xfc/0x170
 do_syscall_64+0xfa/0x3b0
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7fde8eb8e5ab
RSP: 002b:00007ffeddf35ae0 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: ffffffffffffffda RBX: 00007fde8edb5f40 RCX: 00007fde8eb8e5ab
RDX: 00007ffeddf35b60 RSI: 00000000400454ca RDI: 00000000000000c8
RBP: 00007fde8edb6738 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000008
R13: 0000000000000003 R14: 0000000000000009 R15: 0000000000000000
 </TASK>
INFO: task syz-executor:7814 blocked for more than 148 seconds.
      Not tainted 6.16.0-rc6-syzkaller-00128-g81e0db8e8398-dirty #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:syz-executor    state:D stack:25992 pid:7814  tgid:7814  ppid:1      task_flags:0x400140 flags:0x00004004
Call Trace:
 <TASK>
 __schedule+0x16f5/0x4d00
 schedule+0x165/0x360
 schedule_preempt_disabled+0x13/0x30
 __mutex_lock+0x724/0xe80
 rtnetlink_rcv_msg+0x71c/0xb70
 netlink_rcv_skb+0x208/0x470
 netlink_unicast+0x75c/0x8e0
 netlink_sendmsg+0x805/0xb30
 __sock_sendmsg+0x21c/0x270
 __sys_sendto+0x3bd/0x520
 __x64_sys_sendto+0xde/0x100
 do_syscall_64+0xfa/0x3b0
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f64b4b9083c
RSP: 002b:00007ffe60a3ede0 EFLAGS: 00000293 ORIG_RAX: 000000000000002c
RAX: ffffffffffffffda RBX: 00007f64b58e4620 RCX: 00007f64b4b9083c
RDX: 0000000000000030 RSI: 00007f64b58e4670 RDI: 0000000000000003
RBP: 0000000000000000 R08: 00007ffe60a3ee34 R09: 000000000000000c
R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000003
R13: 0000000000000000 R14: 00007f64b58e4670 R15: 0000000000000000
 </TASK>

Showing all locks held in the system:
6 locks held by kworker/u8:0/12:
5 locks held by kworker/u8:1/13:
 #0: ffff88801b2f6948 ((wq_completion)netns){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0
 #1: ffffc90000107bc0 (net_cleanup_work){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0
 #2: ffffffff8f50f050 (pernet_ops_rwsem){++++}-{4:4}, at: cleanup_net+0xf7/0x800
 #3: ffffffff8f51bc48 (rtnl_mutex){+.+.}-{4:4}, at: ops_undo_list+0x2a4/0x990
 #4: ffffffff8e144bf8 (rcu_state.exp_mutex){+.+.}-{4:4}, at: synchronize_rcu_expedited+0x2f6/0x730
1 lock held by khungtaskd/34:
 #0: ffffffff8e13f0e0 (rcu_read_lock){....}-{1:3}, at: debug_show_all_locks+0x2e/0x180
3 locks held by kworker/u10:1/36:
 #0: ffff88801a489148 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0
 #1: ffffc900006afbc0 ((linkwatch_work).work){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0
 #2: ffffffff8f51bc48 (rtnl_mutex){+.+.}-{4:4}, at: linkwatch_event+0xe/0x60
3 locks held by kworker/1:1/47:
 #0: ffff88801a480d48 ((wq_completion)events){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0
 #1: ffffc9000075fbc0 (deferred_process_work){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0
 #2: ffffffff8f51bc48 (rtnl_mutex){+.+.}-{4:4}, at: switchdev_deferred_process_work+0xe/0x20
3 locks held by kworker/0:3/5550:
 #0: ffff88801a481d48 ((wq_completion)events_power_efficient){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0
 #1: ffffc90002c9fbc0 ((reg_check_chans).work){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0
 #2: ffffffff8f51bc48 (rtnl_mutex){+.+.}-{4:4}, at: reg_check_chans_work+0x95/0xf00
2 locks held by dhcpcd/5573:
 #0: ffff8881229156d0 (nlk_cb_mutex-ROUTE){+.+.}-{4:4}, at: netlink_dump+0xb7/0xe60
 #1: ffffffff8f51bc48 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_dumpit+0x92/0x200
2 locks held by getty/5653:
 #0: ffff88810c4590a0 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x25/0x70
 #1: ffffc900029062f0 (&ldata->atomic_read_lock){+.+.}-{4:4}, at: n_tty_read+0x43e/0x1400
3 locks held by kworker/u8:2/5840:
 #0: ffff8881081d9148 ((wq_completion)ipv6_addrconf){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0
 #1: ffffc90003b2fbc0 ((work_completion)(&(&net->ipv6.addr_chk_work)->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0
 #2: ffffffff8f51bc48 (rtnl_mutex){+.+.}-{4:4}, at: addrconf_verify_work+0x19/0x30
1 lock held by syz-executor/7812:
 #0: ffffffff8f51bc48 (rtnl_mutex){+.+.}-{4:4}, at: __tun_chr_ioctl+0x37a/0x1df0
1 lock held by syz-executor/7814:
 #0: ffffffff8f51bc48 (rtnl_mutex){+.+.}-{4:4}, at: rtnetlink_rcv_msg+0x71c/0xb70
1 lock held by syz-executor/7816:
 #0: ffffffff8f51bc48 (rtnl_mutex){+.+.}-{4:4}, at: __tun_chr_ioctl+0x37a/0x1df0
1 lock held by syz-executor/7835:
 #0: ffffffff8f51bc48 (rtnl_mutex){+.+.}-{4:4}, at: inet_rtm_newaddr+0x3b0/0x18b0
1 lock held by syz-executor/7839:
 #0: ffffffff8f51bc48 (rtnl_mutex){+.+.}-{4:4}, at: inet_rtm_newaddr+0x3b0/0x18b0
1 lock held by syz-executor/7842:
 #0: ffffffff8f51bc48 (rtnl_mutex){+.+.}-{4:4}, at: inet_rtm_newaddr+0x3b0/0x18b0
1 lock held by syz-executor/7851:
 #0: ffffffff8f51bc48 (rtnl_mutex){+.+.}-{4:4}, at: inet_rtm_newaddr+0x3b0/0x18b0
1 lock held by syz-executor/7856:
 #0: ffffffff8f51bc48 (rtnl_mutex){+.+.}-{4:4}, at: inet_rtm_newaddr+0x3b0/0x18b0
1 lock held by syz-executor/7858:
 #0: ffffffff8f51bc48 (rtnl_mutex){+.+.}-{4:4}, at: inet_rtm_newaddr+0x3b0/0x18b0
3 locks held by kworker/u10:6/7860:
1 lock held by syz-executor/7864:
 #0: ffffffff8f51bc48 (rtnl_mutex){+.+.}-{4:4}, at: inet_rtm_newaddr+0x3b0/0x18b0

=============================================

NMI backtrace for cpu 1
CPU: 1 UID: 0 PID: 34 Comm: khungtaskd Not tainted 6.16.0-rc6-syzkaller-00128-g81e0db8e8398-dirty #0 PREEMPT(full) 
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-debian-1.16.2-1 04/01/2014
Call Trace:
 <TASK>
 dump_stack_lvl+0x189/0x250
 nmi_cpu_backtrace+0x39e/0x3d0
 nmi_trigger_cpumask_backtrace+0x17a/0x300
 watchdog+0xfee/0x1030
 kthread+0x711/0x8a0
 ret_from_fork+0x3fc/0x770
 ret_from_fork_asm+0x1a/0x30
 </TASK>
Sending NMI from CPU 1 to CPUs 0:
NMI backtrace for cpu 0
CPU: 0 UID: 0 PID: 29 Comm: kworker/u9:1 Not tainted 6.16.0-rc6-syzkaller-00128-g81e0db8e8398-dirty #0 PREEMPT(full) 
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-debian-1.16.2-1 04/01/2014
Workqueue: wg-kex-wg0 wg_packet_handshake_send_worker
RIP: 0010:rcu_is_watching+0x1c/0xb0
Code: 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 41 57 41 56 53 65 ff 05 c0 a3 f8 10 e8 7b 75 c6 09 89 c3 83 f8 08 73 65 <49> bf 00 00 00 00 00 fc ff df 4c 8d 34 dd 70 cc bb 8d 4c 89 f0 48
RSP: 0018:ffffc900000071f0 EFLAGS: 00000293
RAX: 0000000000000000 RBX: 0000000000000000 RCX: 02776204d6725f00
RDX: ffff88801caf9cc0 RSI: ffffffff8be28be0 RDI: ffffffff8be28ba0
RBP: ffffc90000007378 R08: ffffc900000074a0 R09: ffffc900000074b0
R10: ffffc90000007300 R11: fffff52000000e62 R12: 1ffff11004ab6d0c
R13: dffffc0000000000 R14: ffff8880255b7400 R15: ffffc90000007478
FS:  0000000000000000(0000) GS:ffff8880b8623000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000560a8d0f7e08 CR3: 000000000df38000 CR4: 00000000000006f0
Call Trace:
 <IRQ>
 rcu_read_lock_held+0x15/0x50
 __find_rr_leaf+0x345/0x6d0
 fib6_table_lookup+0x39f/0xa80
 ip6_pol_route+0x222/0x1180
 fib6_rule_lookup+0x52f/0x6f0
 ip6_route_input+0x6ce/0xa50
 ip6_rcv_finish+0x141/0x2d0
 NF_HOOK+0x30c/0x3a0
 __netif_receive_skb+0xd3/0x380
 process_backlog+0x60e/0x14f0
 __napi_poll+0xc7/0x480
 net_rx_action+0x707/0xe30
 handle_softirqs+0x286/0x870
 do_softirq+0xec/0x180
 </IRQ>
 <TASK>
 __local_bh_enable_ip+0x17d/0x1c0
 wg_packet_handshake_send_worker+0x1e3/0x320
 process_scheduled_works+0xae1/0x17b0
 worker_thread+0x8a0/0xda0
 kthread+0x711/0x8a0
 ret_from_fork+0x3fc/0x770
 ret_from_fork_asm+0x1a/0x30
 </TASK>
net_ratelimit: 39385 callbacks suppressed
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:b2:71:89:d7:5b:ce, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
