INFO: task kworker/u8:3:304 blocked for more than 122 seconds. Not tainted 6.12.30-syzkaller-g73009db42b37 #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/u8:3 state:D stack:0 pid:304 tgid:304 ppid:2 flags:0x00004000 Workqueue: events_unbound linkwatch_event Call Trace: context_switch kernel/sched/core.c:5945 [inline] __schedule+0x132b/0x1e00 kernel/sched/core.c:7789 __schedule_loop kernel/sched/core.c:7870 [inline] schedule+0xc6/0x240 kernel/sched/core.c:7885 schedule_preempt_disabled+0x14/0x30 kernel/sched/core.c:7942 __mutex_lock_common kernel/locking/mutex.c:707 [inline] __mutex_lock+0x81e/0x1b50 kernel/locking/mutex.c:803 __mutex_lock_slowpath+0xe/0x20 kernel/locking/mutex.c:1134 mutex_lock+0x102/0x1c0 kernel/locking/mutex.c:285 rtnl_lock+0x19/0x20 net/core/rtnetlink.c:79 linkwatch_event+0x12/0x60 net/core/link_watch.c:285 process_one_work kernel/workqueue.c:3238 [inline] process_scheduled_works+0x7d5/0x1020 kernel/workqueue.c:3319 worker_thread+0xc58/0x1250 kernel/workqueue.c:3400 kthread+0x2c7/0x370 kernel/kthread.c:389 ret_from_fork+0x64/0xa0 arch/x86/kernel/process.c:153 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 37 Comm: khungtaskd Not tainted 6.12.30-syzkaller-g73009db42b37 #0 e78244f41b0e2dd383d6ada64249d7f830c3c2f3 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 Call Trace: __dump_stack+0x21/0x30 lib/dump_stack.c:94 dump_stack_lvl+0x10c/0x190 lib/dump_stack.c:120 dump_stack+0x19/0x20 lib/dump_stack.c:129 nmi_cpu_backtrace+0x2bf/0x2d0 lib/nmi_backtrace.c:113 nmi_trigger_cpumask_backtrace+0x142/0x2c0 lib/nmi_backtrace.c:62 arch_trigger_cpumask_backtrace+0x14/0x20 arch/x86/kernel/apic/hw_nmi.c:41 trigger_all_cpu_backtrace include/linux/nmi.h:158 [inline] check_hung_uninterruptible_tasks kernel/hung_task.c:267 [inline] watchdog+0xd8f/0xed0 kernel/hung_task.c:423 kthread+0x2c7/0x370 kernel/kthread.c:389 ret_from_fork+0x64/0xa0 arch/x86/kernel/process.c:153 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 98 Comm: klogd Not tainted 6.12.30-syzkaller-g73009db42b37 #0 e78244f41b0e2dd383d6ada64249d7f830c3c2f3 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 RIP: 0010:arch_try_cmpxchg128 arch/x86/include/asm/cmpxchg_64.h:-1 [inline] RIP: 0010:__update_freelist_fast mm/slub.c:644 [inline] RIP: 0010:slab_update_freelist+0x70/0x110 mm/slub.c:714 Code: 4c 39 56 20 75 43 48 39 46 28 75 3d 4c 89 46 20 4c 89 4e 28 b2 01 eb 33 4c 89 c3 4c 89 c9 48 89 c2 4c 89 d0 f0 48 0f c7 4e 20 01 75 39 65 48 8b 0c 25 28 00 00 00 48 3b 4d f0 75 3f 48 83 c4 RSP: 0018:ffffc90000e4f9e8 EFLAGS: 00000242 RAX: ffff88814ca47a00 RBX: ffff88814ca473c0 RCX: 00000000000c0008 RDX: 00000000000c0009 RSI: ffffea00053291c0 RDI: ffff888104e55500 RBP: ffffc90000e4fa00 R08: ffff88814ca473c0 R09: 00000000000c0008 R10: ffff88814ca47a00 R11: fffff520001c9f2c R12: ffff88814ca47a00 R13: 0000000000000008 R14: 00000000000c0009 R15: ffffea00053291c0 FS: 00007ff3ee50cc80(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f11f29b6038 CR3: 000000010bf34000 CR4: 00000000003526b0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: __slab_free+0x6f/0x2b0 mm/slub.c:4514 do_slab_free mm/slub.c:4614 [inline] ___cache_free+0xc9/0xe0 mm/slub.c:4725 qlink_free mm/kasan/quarantine.c:163 [inline] qlist_free_all+0xb5/0x130 mm/kasan/quarantine.c:179 kasan_quarantine_reduce+0x14f/0x180 mm/kasan/quarantine.c:286 __kasan_slab_alloc+0x28/0x90 mm/kasan/common.c:329 kasan_slab_alloc include/linux/kasan.h:250 [inline] slab_post_alloc_hook mm/slub.c:4164 [inline] slab_alloc_node mm/slub.c:4213 [inline] __kmalloc_cache_noprof+0x13e/0x3c0 mm/slub.c:4373 kmalloc_noprof include/linux/slab.h:881 [inline] syslog_print+0xf7/0x660 kernel/printk/printk.c:1598 do_syslog+0x539/0x760 kernel/printk/printk.c:1776 __do_sys_syslog kernel/printk/printk.c:1868 [inline] __se_sys_syslog kernel/printk/printk.c:1866 [inline] __x64_sys_syslog+0x80/0x90 kernel/printk/printk.c:1866 x64_sys_call+0x19e6/0x2ee0 arch/x86/include/generated/asm/syscalls_64.h:104 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0x58/0xf0 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x76/0x7e RIP: 0033:0x7ff3ee6d6a37 Code: 73 01 c3 48 8b 0d c1 f3 0c 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 67 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 91 f3 0c 00 f7 d8 64 89 01 48 RSP: 002b:00007ffc1ddb1c68 EFLAGS: 00000206 ORIG_RAX: 0000000000000067 RAX: ffffffffffffffda RBX: 00007ff3ee876490 RCX: 00007ff3ee6d6a37 RDX: 00000000000003ff RSI: 00007ff3ee876490 RDI: 0000000000000002 RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000004000 R11: 0000000000000206 R12: 00007ff3ee876490 R13: 00007ff3ee853dfe R14: 00007ff3ee8764ea R15: 00007ff3ee8764ea net_ratelimit: 131544 callbacks suppressed bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:34:a0:32:4d:af, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:34:a0:32:4d:af, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) net_ratelimit: 139342 callbacks suppressed bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:34:a0:32:4d:af, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:34:a0:32:4d:af, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:22:34:a0:32:4d:af, vlan:0)