INFO: task syz.2.10797:15242 blocked for more than 143 seconds. Not tainted 6.14.0-rc4-syzkaller-00212-g276f98efb64a #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:syz.2.10797 state:D stack:28208 pid:15242 tgid:15240 ppid:10914 task_flags:0x400140 flags:0x00000004 Call Trace: context_switch kernel/sched/core.c:5378 [inline] __schedule+0xf43/0x5890 kernel/sched/core.c:6765 __schedule_loop kernel/sched/core.c:6842 [inline] schedule+0xe7/0x350 kernel/sched/core.c:6857 schedule_preempt_disabled+0x13/0x30 kernel/sched/core.c:6914 __mutex_lock_common kernel/locking/mutex.c:662 [inline] __mutex_lock+0x6bd/0xb10 kernel/locking/mutex.c:730 tty_open_by_driver drivers/tty/tty_io.c:2046 [inline] tty_open+0x53d/0xf80 drivers/tty/tty_io.c:2129 chrdev_open+0x237/0x6a0 fs/char_dev.c:414 do_dentry_open+0x735/0x1c40 fs/open.c:956 vfs_open+0x82/0x3f0 fs/open.c:1086 do_open fs/namei.c:3830 [inline] path_openat+0x1e88/0x2d80 fs/namei.c:3989 do_filp_open+0x20c/0x470 fs/namei.c:4016 do_sys_openat2+0x17a/0x1e0 fs/open.c:1428 do_sys_open fs/open.c:1443 [inline] __do_sys_openat fs/open.c:1459 [inline] __se_sys_openat fs/open.c:1454 [inline] __x64_sys_openat+0x175/0x210 fs/open.c:1454 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f1f86b8d169 RSP: 002b:00007f1f879ba038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 RAX: ffffffffffffffda RBX: 00007f1f86da5fa0 RCX: 00007f1f86b8d169 RDX: 0000000000040001 RSI: 0000400000000040 RDI: ffffffffffffff9c RBP: 00007f1f86c0e2a0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000000 R14: 00007f1f86da5fa0 R15: 00007ffe81dbfff8 INFO: task syz.1.10798:15243 blocked for more than 143 seconds. Not tainted 6.14.0-rc4-syzkaller-00212-g276f98efb64a #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:syz.1.10798 state:D stack:29040 pid:15243 tgid:15241 ppid:10521 task_flags:0x400140 flags:0x00000004 Call Trace: context_switch kernel/sched/core.c:5378 [inline] __schedule+0xf43/0x5890 kernel/sched/core.c:6765 __schedule_loop kernel/sched/core.c:6842 [inline] schedule+0xe7/0x350 kernel/sched/core.c:6857 schedule_preempt_disabled+0x13/0x30 kernel/sched/core.c:6914 __mutex_lock_common kernel/locking/mutex.c:662 [inline] __mutex_lock+0x6bd/0xb10 kernel/locking/mutex.c:730 tty_open_by_driver drivers/tty/tty_io.c:2046 [inline] tty_open+0x53d/0xf80 drivers/tty/tty_io.c:2129 chrdev_open+0x237/0x6a0 fs/char_dev.c:414 do_dentry_open+0x735/0x1c40 fs/open.c:956 vfs_open+0x82/0x3f0 fs/open.c:1086 do_open fs/namei.c:3830 [inline] path_openat+0x1e88/0x2d80 fs/namei.c:3989 do_filp_open+0x20c/0x470 fs/namei.c:4016 do_sys_openat2+0x17a/0x1e0 fs/open.c:1428 do_sys_open fs/open.c:1443 [inline] __do_sys_openat fs/open.c:1459 [inline] __se_sys_openat fs/open.c:1454 [inline] __x64_sys_openat+0x175/0x210 fs/open.c:1454 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f8b4b98d169 RSP: 002b:00007f8b4c7da038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 RAX: ffffffffffffffda RBX: 00007f8b4bba5fa0 RCX: 00007f8b4b98d169 RDX: 0000000000000001 RSI: 0000400000000080 RDI: ffffffffffffff9c RBP: 00007f8b4ba0e2a0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000000 R14: 00007f8b4bba5fa0 R15: 00007ffe3c1c0008 INFO: lockdep is turned off. NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 30 Comm: khungtaskd Not tainted 6.14.0-rc4-syzkaller-00212-g276f98efb64a #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 Call Trace: __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:120 nmi_cpu_backtrace+0x27b/0x390 lib/nmi_backtrace.c:113 nmi_trigger_cpumask_backtrace+0x29c/0x300 lib/nmi_backtrace.c:62 trigger_all_cpu_backtrace include/linux/nmi.h:162 [inline] check_hung_uninterruptible_tasks kernel/hung_task.c:236 [inline] watchdog+0xf62/0x12b0 kernel/hung_task.c:399 kthread+0x3af/0x750 kernel/kthread.c:464 ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 14753 Comm: kworker/u8:31 Not tainted 6.14.0-rc4-syzkaller-00212-g276f98efb64a #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 Workqueue: events_unbound cfg80211_wiphy_work RIP: 0010:stack_access_ok+0xc/0x200 arch/x86/kernel/unwind_orc.c:389 Code: ff e9 b0 fe ff ff 0f 1f 84 00 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 48 b8 00 00 00 00 00 fc ff df 41 57 <41> 56 4c 8d 77 08 41 55 41 54 49 89 d4 4c 89 f2 55 48 c1 ea 03 48 RSP: 0018:ffffc90000007238 EFLAGS: 00000246 RAX: dffffc0000000000 RBX: 0000000000000002 RCX: ffffffff9185898a RDX: 0000000000000008 RSI: ffffc90000007d40 RDI: ffffc900000072b8 RBP: ffffc90000007300 R08: ffffffff918589c0 R09: ffffffff9185898e R10: ffffc900000072b8 R11: 0000000000083342 R12: ffffc90000007308 R13: ffffc900000072b8 R14: ffffc90000007d48 R15: ffffc90000007d40 FS: 0000000000000000(0000) GS:ffff8880b8600000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000400000008000 CR3: 00000000294cc000 CR4: 00000000003526f0 Call Trace: deref_stack_reg arch/x86/kernel/unwind_orc.c:403 [inline] unwind_next_frame+0xac7/0x20c0 arch/x86/kernel/unwind_orc.c:585 arch_stack_walk+0x95/0x100 arch/x86/kernel/stacktrace.c:25 stack_trace_save+0x95/0xd0 kernel/stacktrace.c:122 kasan_save_stack+0x33/0x60 mm/kasan/common.c:47 kasan_save_track+0x14/0x30 mm/kasan/common.c:68 unpoison_slab_object mm/kasan/common.c:319 [inline] __kasan_slab_alloc+0x89/0x90 mm/kasan/common.c:345 kasan_slab_alloc include/linux/kasan.h:250 [inline] slab_post_alloc_hook mm/slub.c:4115 [inline] slab_alloc_node mm/slub.c:4164 [inline] kmem_cache_alloc_noprof+0x226/0x3d0 mm/slub.c:4171 __skb_ext_alloc+0x1a/0x80 net/core/skbuff.c:6834 skb_ext_add+0x239/0x770 net/core/skbuff.c:6937 nf_bridge_alloc include/net/netfilter/br_netfilter.h:12 [inline] br_nf_pre_routing_ipv6+0xcb/0x8c0 net/bridge/br_netfilter_ipv6.c:172 br_nf_pre_routing+0x860/0x15b0 net/bridge/br_netfilter_hooks.c:508 nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline] nf_hook_bridge_pre net/bridge/br_input.c:282 [inline] br_handle_frame+0xad7/0x14a0 net/bridge/br_input.c:433 __netif_receive_skb_core.constprop.0+0xa20/0x4330 net/core/dev.c:5787 __netif_receive_skb_one_core+0xb1/0x1e0 net/core/dev.c:5891 __netif_receive_skb+0x1d/0x160 net/core/dev.c:6006 process_backlog+0x443/0x15f0 net/core/dev.c:6354 __napi_poll.constprop.0+0xb7/0x550 net/core/dev.c:7188 napi_poll net/core/dev.c:7257 [inline] net_rx_action+0xa94/0x1010 net/core/dev.c:7379 handle_softirqs+0x213/0x8f0 kernel/softirq.c:561 do_softirq kernel/softirq.c:462 [inline] do_softirq+0xb2/0xf0 kernel/softirq.c:449 __local_bh_enable_ip+0x100/0x120 kernel/softirq.c:389 spin_unlock_bh include/linux/spinlock.h:396 [inline] cfg80211_put_bss+0x1b4/0x280 net/wireless/scan.c:3346 ieee80211_rx_bss_put net/mac80211/scan.c:37 [inline] ieee80211_rx_bss_put+0x43/0x60 net/mac80211/scan.c:32 ieee80211_rx_bss_info net/mac80211/ibss.c:1174 [inline] ieee80211_rx_mgmt_probe_beacon net/mac80211/ibss.c:1581 [inline] ieee80211_ibss_rx_queued_mgmt+0x1a18/0x2f50 net/mac80211/ibss.c:1608 ieee80211_iface_process_skb net/mac80211/iface.c:1611 [inline] ieee80211_iface_work+0xc15/0xf50 net/mac80211/iface.c:1665 cfg80211_wiphy_work+0x3ed/0x570 net/wireless/core.c:435 process_one_work+0x9c5/0x1ba0 kernel/workqueue.c:3238 process_scheduled_works kernel/workqueue.c:3319 [inline] worker_thread+0x6c8/0xf00 kernel/workqueue.c:3400 kthread+0x3af/0x750 kernel/kthread.c:464 ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 net_ratelimit: 33160 callbacks suppressed bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:ea:94:0f:4a:75:c0, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:ea:94:0f:4a:75:c0, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:ea:94:0f:4a:75:c0, vlan:0) net_ratelimit: 34008 callbacks suppressed bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:ea:94:0f:4a:75:c0, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:ea:94:0f:4a:75:c0, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)