syzbot


INFO: task hung in linkwatch_event (3)

Status: upstream: reported on 2022/11/22 17:04
Subsystems: net
[Documentation on labels]
Reported-by: syzbot+d4b2f8282f84f54e87a1@syzkaller.appspotmail.com
First crash: 702d, last: 7d00h
Discussions (3)
Title Replies (including bot) Last reply
[syzbot] Monthly net report (Feb 2024) 0 (1) 2024/02/27 09:32
[syzbot] Monthly net report (Nov 2023) 5 (6) 2023/11/28 15:05
[syzbot] INFO: task hung in linkwatch_event (3) 0 (1) 2022/11/22 17:04
Similar bugs (12)
Kernel Title Repro Cause bisect Fix bisect Count Last Reported Patched Status
android-414 INFO: task hung in linkwatch_event C 7 1611d 1831d 0/1 public: reported C repro on 2019/04/10 16:14
linux-4.14 INFO: task hung in linkwatch_event (2) 1 632d 632d 0/1 auto-obsoleted due to no activity on 2022/11/19 11:58
android-44 INFO: task hung in linkwatch_event 6 2047d 2192d 0/2 auto-closed as invalid on 2019/03/05 13:11
linux-5.15 INFO: task hung in linkwatch_event 26 27d 94d 0/3 upstream: reported on 2024/01/11 11:32
upstream INFO: task hung in linkwatch_event net C 82 1639d 2251d 0/26 closed as dup on 2018/02/14 15:33
linux-4.14 INFO: task hung in linkwatch_event 5 1315d 1442d 0/1 auto-closed as invalid on 2021/01/05 01:42
linux-4.19 INFO: task hung in linkwatch_event (2) C error 217 406d 1495d 0/1 upstream: reported C repro on 2020/03/11 20:12
upstream INFO: task hung in linkwatch_event (2) net C done done 1033 720d 1446d 20/26 fixed on 2022/05/13 11:13
linux-4.19 INFO: task hung in linkwatch_event 3 1648d 1762d 0/1 auto-closed as invalid on 2020/02/07 01:11
linux-4.14 INFO: task hung in linkwatch_event (3) 2 466d 467d 0/1 upstream: reported on 2023/01/03 10:49
android-49 INFO: task hung in linkwatch_event 13 1810d 1827d 0/3 auto-closed as invalid on 2019/10/25 08:50
linux-6.1 INFO: task hung in linkwatch_event 2 252d 368d 0/3 auto-obsoleted due to no activity on 2023/11/14 00:59

Sample crash report:
INFO: task kworker/0:3:5077 blocked for more than 141 seconds.
      Not tainted 6.8.0-syzkaller-08073-g480e035fc4c7 #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:3     state:D stack:18840 pid:5077  tgid:5077  ppid:2      flags:0x00004000
Workqueue: events linkwatch_event
Call Trace:
 <TASK>
 context_switch kernel/sched/core.c:5409 [inline]
 __schedule+0x17d3/0x4a20 kernel/sched/core.c:6736
 __schedule_loop kernel/sched/core.c:6813 [inline]
 schedule+0x14b/0x320 kernel/sched/core.c:6828
 schedule_preempt_disabled+0x13/0x30 kernel/sched/core.c:6885
 __mutex_lock_common kernel/locking/mutex.c:684 [inline]
 __mutex_lock+0x6a4/0xd70 kernel/locking/mutex.c:752
 linkwatch_event+0xe/0x60 net/core/link_watch.c:276
 process_one_work kernel/workqueue.c:3254 [inline]
 process_scheduled_works+0xa00/0x1770 kernel/workqueue.c:3335
 worker_thread+0x86d/0xd70 kernel/workqueue.c:3416
 kthread+0x2f0/0x390 kernel/kthread.c:388
 ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:243
 </TASK>
INFO: task syz-executor.4:8884 blocked for more than 141 seconds.
      Not tainted 6.8.0-syzkaller-08073-g480e035fc4c7 #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:syz-executor.4  state:D stack:25744 pid:8884  tgid:8883  ppid:7393   flags:0x00004006
Call Trace:
 <TASK>
 context_switch kernel/sched/core.c:5409 [inline]
 __schedule+0x17d3/0x4a20 kernel/sched/core.c:6736
 __schedule_loop kernel/sched/core.c:6813 [inline]
 schedule+0x14b/0x320 kernel/sched/core.c:6828
 schedule_preempt_disabled+0x13/0x30 kernel/sched/core.c:6885
 __mutex_lock_common kernel/locking/mutex.c:684 [inline]
 __mutex_lock+0x6a4/0xd70 kernel/locking/mutex.c:752
 nl80211_pre_doit+0x5f/0x8b0 net/wireless/nl80211.c:16401
 genl_family_rcv_msg_doit net/netlink/genetlink.c:1108 [inline]
 genl_family_rcv_msg net/netlink/genetlink.c:1193 [inline]
 genl_rcv_msg+0xaaa/0xec0 net/netlink/genetlink.c:1208
 netlink_rcv_skb+0x1e3/0x430 net/netlink/af_netlink.c:2559
 genl_rcv+0x28/0x40 net/netlink/genetlink.c:1217
 netlink_unicast_kernel net/netlink/af_netlink.c:1335 [inline]
 netlink_unicast+0x7ea/0x980 net/netlink/af_netlink.c:1361
 netlink_sendmsg+0x8e1/0xcb0 net/netlink/af_netlink.c:1905
 sock_sendmsg_nosec net/socket.c:730 [inline]
 __sock_sendmsg+0x221/0x270 net/socket.c:745
 ____sys_sendmsg+0x525/0x7d0 net/socket.c:2584
 ___sys_sendmsg net/socket.c:2638 [inline]
 __sys_sendmsg+0x2b0/0x3a0 net/socket.c:2667
 do_syscall_64+0xfb/0x240
 entry_SYSCALL_64_after_hwframe+0x6d/0x75
RIP: 0033:0x7f74bd07de69
RSP: 002b:00007f74bdcff0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
RAX: ffffffffffffffda RBX: 00007f74bd1abf80 RCX: 00007f74bd07de69
RDX: 0000000000000000 RSI: 0000000020000440 RDI: 0000000000000003
RBP: 00007f74bd0ca47a R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 000000000000000b R14: 00007f74bd1abf80 R15: 00007f74bd2cfa48
 </TASK>

Showing all locks held in the system:
2 locks held by kthreadd/2:
5 locks held by kworker/0:0/7:
3 locks held by kworker/0:1/8:
3 locks held by kworker/u8:0/10:
4 locks held by kworker/u8:1/11:
1 lock held by kworker/R-mm_pe/12:
 #0: ffffffff8dfdd368 (wq_pool_attach_mutex){+.+.}-{3:3}, at: worker_detach_from_pool+0x85/0x2f0 kernel/workqueue.c:2751
3 locks held by kworker/1:0/24:
1 lock held by khungtaskd/29:
 #0: ffffffff8e132020 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire include/linux/rcupdate.h:298 [inline]
 #0: ffffffff8e132020 (rcu_read_lock){....}-{1:2}, at: rcu_read_lock include/linux/rcupdate.h:750 [inline]
 #0: ffffffff8e132020 (rcu_read_lock){....}-{1:2}, at: debug_show_all_locks+0x55/0x2a0 kernel/locking/lockdep.c:6614
1 lock held by kworker/R-write/31:
 #0: ffffffff8dfdd368 (wq_pool_attach_mutex){+.+.}-{3:3}, at: worker_attach_to_pool+0x31/0x390 kernel/workqueue.c:2712
1 lock held by khugepaged/35:
 #0: ffffffff8e1e8428 (lock#3){+.+.}-{3:3}, at: __lru_add_drain_all+0x66/0x570 mm/swap.c:852
4 locks held by kworker/1:1/44:
4 locks held by kworker/u8:3/50:
 #0: ffff88802ed8a948 ((wq_completion)wg-kex-wg2#9){+.+.}-{0:0}, at: process_one_work kernel/workqueue.c:3229 [inline]
 #0: ffff88802ed8a948 ((wq_completion)wg-kex-wg2#9){+.+.}-{0:0}, at: process_scheduled_works+0x8e0/0x1770 kernel/workqueue.c:3335
 #1: ffffc90000ba7d00 ((work_completion)(&peer->transmit_handshake_work)){+.+.}-{0:0}, at: process_one_work kernel/workqueue.c:3230 [inline]
 #1: ffffc90000ba7d00 ((work_completion)(&peer->transmit_handshake_work)){+.+.}-{0:0}, at: process_scheduled_works+0x91b/0x1770 kernel/workqueue.c:3335
 #2: ffff88805ea59228 (&wg->static_identity.lock){++++}-{3:3}, at: wg_noise_handshake_create_initiation+0x120/0xf30 drivers/net/wireguard/noise.c:529
 #3: ffff888077b428b8 (&handshake->lock){++++}-{3:3}, at: wg_noise_handshake_create_initiation+0x132/0xf30 drivers/net/wireguard/noise.c:530
3 locks held by kworker/1:2/57:
3 locks held by kworker/u8:4/61:
3 locks held by kworker/u8:5/667:
 #0: ffff888029e73948 ((wq_completion)ipv6_addrconf){+.+.}-{0:0}, at: process_one_work kernel/workqueue.c:3229 [inline]
 #0: ffff888029e73948 ((wq_completion)ipv6_addrconf){+.+.}-{0:0}, at: process_scheduled_works+0x8e0/0x1770 kernel/workqueue.c:3335
 #1: ffffc90003867d00 ((work_completion)(&(&net->ipv6.addr_chk_work)->work)){+.+.}-{0:0}, at: process_one_work kernel/workqueue.c:3230 [inline]
 #1: ffffc90003867d00 ((work_completion)(&(&net->ipv6.addr_chk_work)->work)){+.+.}-{0:0}, at: process_scheduled_works+0x91b/0x1770 kernel/workqueue.c:3335
 #2: ffffffff8f38ce88 (rtnl_mutex){+.+.}-{3:3}, at: addrconf_verify_work+0x19/0x30 net/ipv6/addrconf.c:4731
4 locks held by kworker/u8:6/670:
 #0: ffff888060e03148 ((wq_completion)wg-kex-wg0){+.+.}-{0:0}, at: process_one_work kernel/workqueue.c:3229 [inline]
 #0: ffff888060e03148 ((wq_completion)wg-kex-wg0){+.+.}-{0:0}, at: process_scheduled_works+0x8e0/0x1770 kernel/workqueue.c:3335
 #1: ffffc90003857d00 ((work_completion)(&peer->transmit_handshake_work)){+.+.}-{0:0}, at: process_one_work kernel/workqueue.c:3230 [inline]
 #1: ffffc90003857d00 ((work_completion)(&peer->transmit_handshake_work)){+.+.}-{0:0}, at: process_scheduled_works+0x91b/0x1770 kernel/workqueue.c:3335
 #2: ffff888060df5228 (&wg->static_identity.lock){++++}-{3:3}, at: wg_noise_handshake_create_initiation+0x120/0xf30 drivers/net/wireguard/noise.c:529
 #3: ffff88805eda8338 (&handshake->lock){++++}-{3:3}, at: wg_noise_handshake_create_initiation+0x132/0xf30 drivers/net/wireguard/noise.c:530
2 locks held by kworker/0:2/784:
2 locks held by kworker/u8:7/1268:
1 lock held by kworker/R-dm_bu/2299:
 #0: ffffffff8dfdd368 (wq_pool_attach_mutex){+.+.}-{3:3}, at: worker_attach_to_pool+0x31/0x390 kernel/workqueue.c:2712
2 locks held by kworker/u8:8/2435:
7 locks held by kworker/R-bat_e/2749:
2 locks held by syslogd/4505:
2 locks held by klogd/4512:
2 locks held by udevd/4523:
3 locks held by dhcpcd/4736:
2 locks held by dhcpcd/4737:
2 locks held by getty/4821:
 #0: ffff88802a6a70a0 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x25/0x70 drivers/tty/tty_ldisc.c:243
 #1: ffffc90002efe2f0 (&ldata->atomic_read_lock){+.+.}-{3:3}, at: n_tty_read+0x6b5/0x1e10 drivers/tty/n_tty.c:2201
4 locks held by syz-fuzzer/5061:
3 locks held by syz-fuzzer/5064:
4 locks held by syz-fuzzer/5075:
2 locks held by syz-fuzzer/5076:
4 locks held by syz-fuzzer/5133:
2 locks held by syz-fuzzer/6039:
3 locks held by kworker/0:3/5077:
 #0: ffff888014c78948 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work kernel/workqueue.c:3229 [inline]
 #0: ffff888014c78948 ((wq_completion)events){+.+.}-{0:0}, at: process_scheduled_works+0x8e0/0x1770 kernel/workqueue.c:3335
 #1: ffffc90003ac7d00 ((linkwatch_work).work){+.+.}-{0:0}, at: process_one_work kernel/workqueue.c:3230 [inline]
 #1: ffffc90003ac7d00 ((linkwatch_work).work){+.+.}-{0:0}, at: process_scheduled_works+0x91b/0x1770 kernel/workqueue.c:3335
 #2: ffffffff8f38ce88 (rtnl_mutex){+.+.}-{3:3}, at: linkwatch_event+0xe/0x60 net/core/link_watch.c:276
1 lock held by syz-executor.3/5094:
1 lock held by kworker/R-wg-cr/5107:
 #0: ffffffff8dfdd368 (wq_pool_attach_mutex){+.+.}-{3:3}, at: worker_detach_from_pool+0x85/0x2f0 kernel/workqueue.c:2751
1 lock held by kworker/R-wg-cr/5109:
 #0: ffffffff8dfdd368 (wq_pool_attach_mutex){+.+.}-{3:3}, at: worker_detach_from_pool+0x85/0x2f0 kernel/workqueue.c:2751
1 lock held by kworker/R-wg-cr/5111:
1 lock held by kworker/R-wg-cr/5113:
 #0: ffffffff8dfdd368 (wq_pool_attach_mutex){+.+.}-{3:3}, at: worker_detach_from_pool+0x85/0x2f0 kernel/workqueue.c:2751
1 lock held by kworker/R-wg-cr/5114:
1 lock held by kworker/R-wg-cr/5120:
 #0: ffffffff8dfdd368 (wq_pool_attach_mutex){+.+.}-{3:3}, at: worker_attach_to_pool+0x31/0x390 kernel/workqueue.c:2712
1 lock held by kworker/R-wg-cr/5122:
 #0: ffffffff8dfdd368 (wq_pool_attach_mutex){+.+.}-{3:3}, at: worker_detach_from_pool+0x85/0x2f0 kernel/workqueue.c:2751
3 locks held by kworker/1:3/5123:
3 locks held by kworker/0:4/5127:
2 locks held by kworker/0:5/5128:
3 locks held by kworker/0:6/5129:
 #0: ffff888014c79948 ((wq_completion)events_power_efficient){+.+.}-{0:0}, at: process_one_work kernel/workqueue.c:3229 [inline]
 #0: ffff888014c79948 ((wq_completion)events_power_efficient){+.+.}-{0:0}, at: process_scheduled_works+0x8e0/0x1770 kernel/workqueue.c:3335
 #1: ffffc90004487d00 ((reg_check_chans).work){+.+.}-{0:0}, at: process_one_work kernel/workqueue.c:3230 [inline]
 #1: ffffc90004487d00 ((reg_check_chans).work){+.+.}-{0:0}, at: process_scheduled_works+0x91b/0x1770 kernel/workqueue.c:3335
 #2: ffffffff8f38ce88 (rtnl_mutex){+.+.}-{3:3}, at: reg_check_chans_work+0x91/0xe50 net/wireless/reg.c:2478
2 locks held by kworker/1:4/5130:
2 locks held by kworker/1:5/5131:
1 lock held by kworker/0:7/5132:
 #0: ffffffff8dfdd368 (wq_pool_attach_mutex){+.+.}-{3:3}, at: worker_attach_to_pool+0x31/0x390 kernel/workqueue.c:2712
3 locks held by kworker/1:6/5173:
3 locks held by kworker/u8:9/5466:
3 locks held by kworker/u8:10/7108:
1 lock held by kworker/R-wg-cr/7429:
 #0: ffffffff8dfdd368 (wq_pool_attach_mutex){+.+.}-{3:3}, at: worker_detach_from_pool+0x85/0x2f0 kernel/workqueue.c:2751
1 lock held by kworker/R-wg-cr/7431:
 #0: ffffffff8dfdd368 (wq_pool_attach_mutex){+.+.}-{3:3}, at: worker_detach_from_pool+0x85/0x2f0 kernel/workqueue.c:2751
1 lock held by kworker/R-wg-cr/7436:
 #0: ffffffff8dfdd368 (wq_pool_attach_mutex){+.+.}-{3:3}, at: worker_detach_from_pool+0x85/0x2f0 kernel/workqueue.c:2751
2 locks held by syz-executor.2/8666:
1 lock held by syz-executor.3/8842:
3 locks held by syz-executor.1/8861:
2 locks held by syz-executor.4/8884:
 #0: ffffffff8f3f1a30 (cb_lock){++++}-{3:3}, at: genl_rcv+0x19/0x40 net/netlink/genetlink.c:1216
 #1: ffffffff8f38ce88 (rtnl_mutex){+.+.}-{3:3}, at: nl80211_pre_doit+0x5f/0x8b0 net/wireless/nl80211.c:16401

=============================================

NMI backtrace for cpu 1
CPU: 1 PID: 29 Comm: khungtaskd Not tainted 6.8.0-syzkaller-08073-g480e035fc4c7 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024
Call Trace:
 <TASK>
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0x241/0x360 lib/dump_stack.c:114
 nmi_cpu_backtrace+0x49c/0x4d0 lib/nmi_backtrace.c:113
 nmi_trigger_cpumask_backtrace+0x198/0x320 lib/nmi_backtrace.c:62
 trigger_all_cpu_backtrace include/linux/nmi.h:160 [inline]
 check_hung_uninterruptible_tasks kernel/hung_task.c:222 [inline]
 watchdog+0xfb0/0xff0 kernel/hung_task.c:379
 kthread+0x2f0/0x390 kernel/kthread.c:388
 ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:243
 </TASK>
Sending NMI from CPU 1 to CPUs 0:
NMI backtrace for cpu 0
CPU: 0 PID: 2749 Comm: kworker/R-bat_e Not tainted 6.8.0-syzkaller-08073-g480e035fc4c7 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024
Workqueue: bat_events batadv_tt_purge
RIP: 0010:rcu_read_lock_held_common kernel/rcu/update.c:105 [inline]
RIP: 0010:rcu_read_lock_held+0x5/0x50 kernel/rcu/update.c:349
Code: e8 a0 16 f7 09 e8 0b 82 01 00 e9 f6 85 01 00 66 0f 1f 44 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 53 <e8> 76 22 fa 09 85 c0 74 26 31 db e8 eb 51 01 00 84 c0 74 20 e8 f2
RSP: 0018:ffffc90000006348 EFLAGS: 00000202
RAX: 0000000080000301 RBX: 0000000000000001 RCX: ffff88802ab38000
RDX: ffff88802ab38000 RSI: 0000000000000001 RDI: 0000000000000000
RBP: 0000000000000000 R08: ffffffff8a3c20ba R09: 1ffffffff259c2a0
R10: dffffc0000000000 R11: fffffbfff259c2a1 R12: ffffffff8a3c1fe4
R13: dffffc0000000000 R14: ffff88803ae3b500 R15: 0000000000000038
FS:  0000000000000000(0000) GS:ffff8880b9400000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f916b68a000 CR3: 0000000021bda000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 <NMI>
 </NMI>
 <IRQ>
 run_filter+0x103/0x260 net/packet/af_packet.c:2086
 packet_rcv+0x3bc/0x13e0 net/packet/af_packet.c:2161
 deliver_skb net/core/dev.c:2188 [inline]
 dev_queue_xmit_nit+0x3e1/0xc10 net/core/dev.c:2258
 xmit_one net/core/dev.c:3527 [inline]
 dev_hard_start_xmit+0x15f/0x790 net/core/dev.c:3547
 __dev_queue_xmit+0x19f4/0x3b10 net/core/dev.c:4335
 dev_queue_xmit include/linux/netdevice.h:3091 [inline]
 br_dev_queue_push_xmit+0x701/0x8d0 net/bridge/br_forward.c:53
 NF_HOOK+0x700/0x7c0 include/linux/netfilter.h:314
 br_nf_post_routing+0xa1e/0xe80 net/bridge/br_netfilter_hooks.c:965
 nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline]
 nf_hook_slow+0xc3/0x220 net/netfilter/core.c:626
 nf_hook include/linux/netfilter.h:269 [inline]
 NF_HOOK+0x2a7/0x460 include/linux/netfilter.h:312
 br_forward_finish+0xe5/0x140 net/bridge/br_forward.c:66
 br_nf_forward_finish+0xb43/0xfa0 net/bridge/br_netfilter_hooks.c:674
 NF_HOOK+0x700/0x7c0 include/linux/netfilter.h:314
 br_nf_forward_ip+0x612/0x7a0 net/bridge/br_netfilter_hooks.c:728
 nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline]
 nf_hook_slow+0xc3/0x220 net/netfilter/core.c:626
 nf_hook include/linux/netfilter.h:269 [inline]
 NF_HOOK+0x2a7/0x460 include/linux/netfilter.h:312
 __br_forward+0x489/0x660 net/bridge/br_forward.c:115
 deliver_clone net/bridge/br_forward.c:131 [inline]
 maybe_deliver+0xb3/0x150 net/bridge/br_forward.c:190
 br_flood+0x2e4/0x660 net/bridge/br_forward.c:236
 br_handle_frame_finish+0x1887/0x1f80 net/bridge/br_input.c:210
 br_nf_hook_thresh+0x472/0x590
 br_nf_pre_routing_finish_ipv6+0xa9e/0xdd0
 NF_HOOK include/linux/netfilter.h:314 [inline]
 br_nf_pre_routing_ipv6+0x370/0x760 net/bridge/br_netfilter_ipv6.c:184
 nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline]
 nf_hook_bridge_pre net/bridge/br_input.c:272 [inline]
 br_handle_frame+0x9f3/0x14d0 net/bridge/br_input.c:417
 __netif_receive_skb_core+0x13ce/0x4430 net/core/dev.c:5432
 __netif_receive_skb_one_core net/core/dev.c:5536 [inline]
 __netif_receive_skb+0x12f/0x6a0 net/core/dev.c:5652
 process_backlog+0x39d/0x7a0 net/core/dev.c:5981
 __napi_poll+0xcb/0x490 net/core/dev.c:6632
 napi_poll net/core/dev.c:6701 [inline]
 net_rx_action+0x7bb/0x1090 net/core/dev.c:6813
 __do_softirq+0x2bc/0x943 kernel/softirq.c:554
 do_softirq+0x11b/0x1e0 kernel/softirq.c:455
 </IRQ>
 <TASK>
 __local_bh_enable_ip+0x1bb/0x200 kernel/softirq.c:382
 spin_unlock_bh include/linux/spinlock.h:396 [inline]
 batadv_tt_global_purge net/batman-adv/translation-table.c:2299 [inline]
 batadv_tt_purge+0x4e0/0xa40 net/batman-adv/translation-table.c:3561
 process_one_work kernel/workqueue.c:3254 [inline]
 process_scheduled_works+0xa00/0x1770 kernel/workqueue.c:3335
 rescuer_thread+0x618/0xda0 kernel/workqueue.c:3512
 kthread+0x2f0/0x390 kernel/kthread.c:388
 ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:243
 </TASK>
net_ratelimit: 8125 callbacks suppressed
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:99:53:28:6d:5b, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:99:53:28:6d:5b, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
net_ratelimit: 7917 callbacks suppressed
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:99:53:28:6d:5b, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:99:53:28:6d:5b, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
net_ratelimit: 8180 callbacks suppressed
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:99:53:28:6d:5b, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:99:53:28:6d:5b, vlan:0)
net_ratelimit: 8330 callbacks suppressed
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:99:53:28:6d:5b, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:99:53:28:6d:5b, vlan:0)

Crashes (302):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2024/04/07 20:03 upstream 480e035fc4c7 ca620dd8 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce INFO: task hung in linkwatch_event
2024/03/12 10:56 upstream 855684c7d938 6ee49f2e .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce INFO: task hung in linkwatch_event
2024/03/11 11:23 upstream e8f897f4afef 6ee49f2e .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce INFO: task hung in linkwatch_event
2024/03/07 10:23 upstream 67be068d31d4 f39a7eed .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce INFO: task hung in linkwatch_event
2024/03/05 21:31 upstream 90d35da658da f39a7eed .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root INFO: task hung in linkwatch_event
2024/03/05 08:45 upstream 90d35da658da 5fc53669 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce INFO: task hung in linkwatch_event
2024/03/02 19:19 upstream 5ad3cb0ed525 25905f5d .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root INFO: task hung in linkwatch_event
2024/03/02 11:45 upstream 17ba56605bfd 25905f5d .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce INFO: task hung in linkwatch_event
2024/03/02 08:06 upstream 17ba56605bfd 25905f5d .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce INFO: task hung in linkwatch_event
2024/03/02 07:26 upstream 17ba56605bfd 25905f5d .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root INFO: task hung in linkwatch_event
2024/03/01 10:16 upstream 87adedeba51a 352ab904 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root INFO: task hung in linkwatch_event
2024/02/29 17:36 upstream 805d849d7c3c 352ab904 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce INFO: task hung in linkwatch_event
2024/02/26 19:54 upstream d206a76d7d27 edd6a5e9 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root INFO: task hung in linkwatch_event
2024/02/25 12:34 upstream ab0a97cffa0b 8d446f15 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce INFO: task hung in linkwatch_event
2024/02/24 07:09 upstream 603c04e27c3e 8d446f15 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root INFO: task hung in linkwatch_event
2024/02/22 16:25 upstream 39133352cbed 345111b5 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce INFO: task hung in linkwatch_event
2024/02/18 22:18 upstream c02197fc9076 578f7538 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root INFO: task hung in linkwatch_event
2024/02/18 18:20 upstream c02197fc9076 578f7538 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root INFO: task hung in linkwatch_event
2024/02/18 16:33 upstream c02197fc9076 578f7538 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce INFO: task hung in linkwatch_event
2024/03/09 18:39 upstream 09e5c48fea17 6ee49f2e .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 INFO: task hung in linkwatch_event
2023/05/31 17:38 upstream afead42fdfca 09898419 .config console log report info [disk image] [vmlinux] [kernel image] ci2-upstream-fs INFO: task hung in linkwatch_event
2022/10/10 22:48 upstream 4899a36f91a9 aea5da89 .config console log report info [disk image] [vmlinux] ci-upstream-kasan-gce INFO: task hung in linkwatch_event
2022/07/10 14:33 upstream b1c428b6c368 b5765a15 .config console log report info ci-upstream-kasan-gce-selinux-root INFO: task hung in linkwatch_event
2024/03/09 17:15 net c8a5c731fd12 6ee49f2e .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: task hung in linkwatch_event
2024/03/03 09:47 net 1c61728be22c 25905f5d .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: task hung in linkwatch_event
2024/03/03 00:21 net 1c61728be22c 25905f5d .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: task hung in linkwatch_event
2024/03/02 04:25 net 1c61728be22c 25905f5d .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: task hung in linkwatch_event
2024/03/01 03:14 net b611b776a9c8 352ab904 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: task hung in linkwatch_event
2024/02/28 23:08 net 4adfc94d4aec d367cbe5 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: task hung in linkwatch_event
2024/02/26 20:57 net 1a825e4cdf45 edd6a5e9 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: task hung in linkwatch_event
2024/02/26 17:08 net 1a825e4cdf45 edd6a5e9 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: task hung in linkwatch_event
2024/02/26 09:21 net 2a770cdc4382 8d446f15 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: task hung in linkwatch_event
2024/02/23 22:16 net 3773d65ae515 8d446f15 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: task hung in linkwatch_event
2024/02/23 12:06 net 3773d65ae515 8d446f15 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: task hung in linkwatch_event
2024/02/23 06:12 net 359e54a93ab4 8d446f15 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: task hung in linkwatch_event
2024/02/22 23:41 net 359e54a93ab4 8d446f15 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: task hung in linkwatch_event
2024/02/20 01:05 net 40b9385dd8e6 3af7dd65 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: task hung in linkwatch_event
2024/02/19 00:40 net 398b7c3770c2 578f7538 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: task hung in linkwatch_event
2024/03/12 12:15 net-next 76839e2f1fde 6ee49f2e .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce INFO: task hung in linkwatch_event
2024/03/11 23:05 net-next c2b25092864a 6ee49f2e .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce INFO: task hung in linkwatch_event
2024/03/09 19:45 net-next d7e14e534493 6ee49f2e .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce INFO: task hung in linkwatch_event
2024/03/08 02:07 net-next a148f82c457f 2b789849 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce INFO: task hung in linkwatch_event
2024/03/05 23:09 net-next 885c36e59f46 f39a7eed .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce INFO: task hung in linkwatch_event
2024/03/05 12:22 net-next 09fcde547761 5fc53669 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce INFO: task hung in linkwatch_event
2024/03/01 22:59 net-next e96082570933 25905f5d .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce INFO: task hung in linkwatch_event
2024/02/29 10:25 net-next 4ac828960a60 352ab904 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce INFO: task hung in linkwatch_event
2024/02/28 09:50 net-next 4440873f3655 d367cbe5 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce INFO: task hung in linkwatch_event
2024/02/27 20:07 net-next 25d434257464 05e69c83 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce INFO: task hung in linkwatch_event
2024/02/24 21:58 net-next d662c5b3ce6d 8d446f15 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce INFO: task hung in linkwatch_event
2024/02/21 21:47 net-next ca61ba388527 345111b5 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce INFO: task hung in linkwatch_event
2024/02/21 14:40 net-next 2f3bfa8e30b5 3af7dd65 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce INFO: task hung in linkwatch_event
2024/02/19 03:20 net-next 78e886ba2b54 578f7538 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce INFO: task hung in linkwatch_event
2022/05/13 15:58 net-next-old b67fd3d9d942 107f6434 .config console log report info ci-upstream-net-kasan-gce INFO: task hung in linkwatch_event
2024/02/17 07:06 linux-next 2c3b09aac00d 578f7538 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root INFO: task hung in linkwatch_event
2023/06/01 07:21 https://git.kernel.org/pub/scm/linux/kernel/git/gregkh/usb.git usb-testing 243ff7e6a035 babc4389 .config console log report info [disk image] [vmlinux] [kernel image] ci2-upstream-usb INFO: task hung in linkwatch_event
* Struck through repros no longer work on HEAD.