INFO: task kworker/1:4:5130 blocked for more than 152 seconds.
Not tainted 6.8.0-syzkaller-08951-gfe46a7dd189e #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:4 state:D stack:25584 pid:5130 tgid:5130 ppid:2 flags:0x00004000
Workqueue: events_power_efficient reg_check_chans_work
Call Trace:
context_switch kernel/sched/core.c:5409 [inline]
__schedule+0xf15/0x5c70 kernel/sched/core.c:6736
__schedule_loop kernel/sched/core.c:6813 [inline]
schedule+0xe7/0x350 kernel/sched/core.c:6828
schedule_preempt_disabled+0x13/0x30 kernel/sched/core.c:6885
__mutex_lock_common kernel/locking/mutex.c:684 [inline]
__mutex_lock+0x5b8/0x9c0 kernel/locking/mutex.c:752
wiphy_lock include/net/cfg80211.h:5951 [inline]
reg_leave_invalid_chans net/wireless/reg.c:2466 [inline]
reg_check_chans_work+0x10a/0x1080 net/wireless/reg.c:2481
process_one_work+0x9a9/0x1a60 kernel/workqueue.c:3254
process_scheduled_works kernel/workqueue.c:3335 [inline]
worker_thread+0x6c8/0xf70 kernel/workqueue.c:3416
kthread+0x2c1/0x3a0 kernel/kthread.c:388
ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:243
Showing all locks held in the system:
5 locks held by kworker/0:0/7:
3 locks held by kworker/u8:0/10:
3 locks held by kworker/u8:1/11:
3 locks held by kworker/1:0/24:
1 lock held by khungtaskd/29:
#0: ffffffff8d7b08e0 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire include/linux/rcupdate.h:298 [inline]
#0: ffffffff8d7b08e0 (rcu_read_lock){....}-{1:2}, at: rcu_read_lock include/linux/rcupdate.h:750 [inline]
#0: ffffffff8d7b08e0 (rcu_read_lock){....}-{1:2}, at: debug_show_all_locks+0x75/0x340 kernel/locking/lockdep.c:6614
3 locks held by kworker/u8:2/38:
#0: ffff888029a35948 ((wq_completion)ipv6_addrconf){+.+.}-{0:0}, at: process_one_work+0x1296/0x1a60 kernel/workqueue.c:3229
#1: ffffc90000ae7d80 ((work_completion)(&(&net->ipv6.addr_chk_work)->work)){+.+.}-{0:0}, at: process_one_work+0x906/0x1a60 kernel/workqueue.c:3230
#2: ffffffff8f2f63c8 (rtnl_mutex){+.+.}-{3:3}, at: addrconf_verify_work+0x12/0x30 net/ipv6/addrconf.c:4731
4 locks held by kworker/1:1/44:
2 locks held by kworker/u8:3/50:
3 locks held by kworker/u8:4/61:
2 locks held by kworker/u8:5/76:
2 locks held by kworker/u8:6/145:
3 locks held by kworker/1:2/929:
3 locks held by kworker/u8:7/2841:
3 locks held by kworker/u8:8/2861:
3 locks held by syslogd/4496:
1 lock held by klogd/4503:
2 locks held by udevd/4514:
2 locks held by dhcpcd/4727:
2 locks held by dhcpcd/4728:
2 locks held by getty/4816:
#0: ffff888029c350a0 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x24/0x80 drivers/tty/tty_ldisc.c:243
#1: ffffc900015e02f0 (&ldata->atomic_read_lock){+.+.}-{3:3}, at: n_tty_read+0xfc8/0x1490 drivers/tty/n_tty.c:2201
3 locks held by sshd/5052:
5 locks held by syz-fuzzer/5058:
3 locks held by syz-fuzzer/5061:
1 lock held by syz-fuzzer/5068:
2 locks held by syz-fuzzer/5073:
3 locks held by syz-fuzzer/5167:
3 locks held by syz-fuzzer/5522:
2 locks held by kworker/1:3/5129:
4 locks held by kworker/1:4/5130:
#0: ffff888015079948 ((wq_completion)events_power_efficient){+.+.}-{0:0}, at: process_one_work+0x1296/0x1a60 kernel/workqueue.c:3229
#1: ffffc9000382fd80 ((reg_check_chans).work){+.+.}-{0:0}, at: process_one_work+0x906/0x1a60 kernel/workqueue.c:3230
#2: ffffffff8f2f63c8 (rtnl_mutex){+.+.}-{3:3}, at: reg_check_chans_work+0x7d/0x1080 net/wireless/reg.c:2478
#3: ffff88801d3c8768 (&rdev->wiphy.mtx){+.+.}-{3:3}, at: wiphy_lock include/net/cfg80211.h:5951 [inline]
#3: ffff88801d3c8768 (&rdev->wiphy.mtx){+.+.}-{3:3}, at: reg_leave_invalid_chans net/wireless/reg.c:2466 [inline]
#3: ffff88801d3c8768 (&rdev->wiphy.mtx){+.+.}-{3:3}, at: reg_check_chans_work+0x10a/0x1080 net/wireless/reg.c:2481
4 locks held by kworker/1:5/5136:
1 lock held by syz-executor.1/5343:
1 lock held by syz-executor.3/6500:
4 locks held by kworker/1:13/7461:
2 locks held by kworker/1:15/7468:
2 locks held by kworker/1:16/7469:
3 locks held by kworker/0:10/7475:
3 locks held by kworker/0:13/7478:
#0: ffff888015078948 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x1296/0x1a60 kernel/workqueue.c:3229
#1: ffffc9000404fd80 (free_ipc_work){+.+.}-{0:0}, at: process_one_work+0x906/0x1a60 kernel/workqueue.c:3230
#2: ffffffff8d7bc4b8 (rcu_state.exp_mutex){+.+.}-{3:3}, at: exp_funnel_lock kernel/rcu/tree_exp.h:291 [inline]
#2: ffffffff8d7bc4b8 (rcu_state.exp_mutex){+.+.}-{3:3}, at: synchronize_rcu_expedited+0x682/0x7a0 kernel/rcu/tree_exp.h:939
2 locks held by kworker/0:15/7487:
5 locks held by kworker/0:16/7568:
4 locks held by udevd/8749:
6 locks held by syz-executor.4/9043:
1 lock held by syz-executor.2/9052:
4 locks held by kworker/u8:9/9054:
#0: ffff888025417948 ((wq_completion)wg-kex-wg2#5){+.+.}-{0:0}, at: process_one_work+0x1296/0x1a60 kernel/workqueue.c:3229
#1: ffffc900035bfd80 ((work_completion)(&peer->transmit_handshake_work)){+.+.}-{0:0}, at: process_one_work+0x906/0x1a60 kernel/workqueue.c:3230
#2: ffff888062269228 (&wg->static_identity.lock){++++}-{3:3}, at: wg_noise_handshake_create_initiation+0xed/0x650 drivers/net/wireguard/noise.c:529
#3: ffff88802eafbb78 (&handshake->lock){++++}-{3:3}, at: wg_noise_handshake_create_initiation+0x101/0x650 drivers/net/wireguard/noise.c:530
=============================================
NMI backtrace for cpu 1
CPU: 1 PID: 29 Comm: khungtaskd Not tainted 6.8.0-syzkaller-08951-gfe46a7dd189e #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024
Call Trace:
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:114
nmi_cpu_backtrace+0x27b/0x390 lib/nmi_backtrace.c:113
nmi_trigger_cpumask_backtrace+0x29c/0x300 lib/nmi_backtrace.c:62
trigger_all_cpu_backtrace include/linux/nmi.h:160 [inline]
check_hung_uninterruptible_tasks kernel/hung_task.c:222 [inline]
watchdog+0xf86/0x1210 kernel/hung_task.c:379
kthread+0x2c1/0x3a0 kernel/kthread.c:388
ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:243
Sending NMI from CPU 1 to CPUs 0:
NMI backtrace for cpu 0
CPU: 0 PID: 61 Comm: kworker/u8:4 Not tainted 6.8.0-syzkaller-08951-gfe46a7dd189e #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024
Workqueue: bat_events batadv_purge_orig
RIP: 0010:br_validate_ipv6+0x29/0x730 net/bridge/br_netfilter_ipv6.c:44
Code: 90 f3 0f 1e fa 41 57 41 56 41 55 41 54 55 48 bd 00 00 00 00 00 fc ff df 53 48 89 f3 48 83 ec 70 4c 8d 6c 24 10 48 89 7c 24 08 <48> c7 44 24 10 b3 8a b5 41 49 c1 ed 03 48 c7 44 24 18 fa 7c 20 8d
RSP: 0018:ffffc900000071e0 EFLAGS: 00000282
RAX: dffffc0000000000 RBX: ffff88805c51a640 RCX: ffffffff89aafc43
RDX: 1ffff92000000e7c RSI: ffff88805c51a640 RDI: ffff888063265640
RBP: dffffc0000000000 R08: 0000000000000001 R09: 000000000000000a
R10: 000000000000000a R11: 0200000000000000 R12: ffffc900000073c0
R13: ffffc900000071f0 R14: ffff88805c51a6f4 R15: ffffc900000073e0
FS: 0000000000000000(0000) GS:ffff8880b9400000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000000c003e80000 CR3: 000000007945a000 CR4: 00000000003506f0
Call Trace:
br_nf_forward_ip.part.0+0x43f/0x820 net/bridge/br_netfilter_hooks.c:717
br_nf_forward_ip net/bridge/br_netfilter_hooks.c:688 [inline]
br_nf_forward+0xf11/0x1bd0 net/bridge/br_netfilter_hooks.c:785
nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline]
nf_hook_slow+0xbb/0x200 net/netfilter/core.c:626
nf_hook+0x474/0x7d0 include/linux/netfilter.h:269
NF_HOOK include/linux/netfilter.h:312 [inline]
__br_forward+0x1be/0x5b0 net/bridge/br_forward.c:115
deliver_clone+0x5b/0xa0 net/bridge/br_forward.c:131
br_flood+0x493/0x5c0 net/bridge/br_forward.c:245
br_handle_frame_finish+0xd8a/0x1c40 net/bridge/br_input.c:210
br_nf_hook_thresh+0x303/0x410 net/bridge/br_netfilter_hooks.c:1166
br_nf_pre_routing_finish_ipv6+0x76a/0xfb0 net/bridge/br_netfilter_ipv6.c:154
NF_HOOK include/linux/netfilter.h:314 [inline]
br_nf_pre_routing_ipv6+0x3ce/0x8c0 net/bridge/br_netfilter_ipv6.c:184
br_nf_pre_routing+0x85e/0x15a0 net/bridge/br_netfilter_hooks.c:527
nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline]
nf_hook_bridge_pre net/bridge/br_input.c:272 [inline]
br_handle_frame+0x9e9/0x1450 net/bridge/br_input.c:417
__netif_receive_skb_core.constprop.0+0xa16/0x4030 net/core/dev.c:5432
__netif_receive_skb_one_core+0xb1/0x1e0 net/core/dev.c:5536
__netif_receive_skb+0x1f/0x1b0 net/core/dev.c:5652
process_backlog+0x12f/0x6f0 net/core/dev.c:5981
__napi_poll.constprop.0+0xb7/0x550 net/core/dev.c:6632
napi_poll net/core/dev.c:6701 [inline]
net_rx_action+0x9ad/0xf10 net/core/dev.c:6813
__do_softirq+0x218/0x8de kernel/softirq.c:554
do_softirq kernel/softirq.c:455 [inline]
do_softirq+0xb2/0xf0 kernel/softirq.c:442
__local_bh_enable_ip+0x100/0x120 kernel/softirq.c:382
spin_unlock_bh include/linux/spinlock.h:396 [inline]
batadv_purge_orig_ref+0xec0/0x1520 net/batman-adv/originator.c:1287
batadv_purge_orig+0x19/0x60 net/batman-adv/originator.c:1300
process_one_work+0x9a9/0x1a60 kernel/workqueue.c:3254
process_scheduled_works kernel/workqueue.c:3335 [inline]
worker_thread+0x6c8/0xf70 kernel/workqueue.c:3416
kthread+0x2c1/0x3a0 kernel/kthread.c:388
ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:243
net_ratelimit: 6702 callbacks suppressed
bridge0: received packet on veth1_to_bridge with own address as source address (addr:76:02:db:17:ac:23, vlan:0)
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth1_to_bridge with own address as source address (addr:76:02:db:17:ac:23, vlan:0)
bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0)
bridge0: received packet on veth1_to_bridge with own address as source address (addr:76:02:db:17:ac:23, vlan:0)
bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)