INFO: task kworker/1:4:5130 blocked for more than 152 seconds. Not tainted 6.8.0-syzkaller-08951-gfe46a7dd189e #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:4 state:D stack:25584 pid:5130 tgid:5130 ppid:2 flags:0x00004000 Workqueue: events_power_efficient reg_check_chans_work Call Trace: context_switch kernel/sched/core.c:5409 [inline] __schedule+0xf15/0x5c70 kernel/sched/core.c:6736 __schedule_loop kernel/sched/core.c:6813 [inline] schedule+0xe7/0x350 kernel/sched/core.c:6828 schedule_preempt_disabled+0x13/0x30 kernel/sched/core.c:6885 __mutex_lock_common kernel/locking/mutex.c:684 [inline] __mutex_lock+0x5b8/0x9c0 kernel/locking/mutex.c:752 wiphy_lock include/net/cfg80211.h:5951 [inline] reg_leave_invalid_chans net/wireless/reg.c:2466 [inline] reg_check_chans_work+0x10a/0x1080 net/wireless/reg.c:2481 process_one_work+0x9a9/0x1a60 kernel/workqueue.c:3254 process_scheduled_works kernel/workqueue.c:3335 [inline] worker_thread+0x6c8/0xf70 kernel/workqueue.c:3416 kthread+0x2c1/0x3a0 kernel/kthread.c:388 ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:243 Showing all locks held in the system: 5 locks held by kworker/0:0/7: 3 locks held by kworker/u8:0/10: 3 locks held by kworker/u8:1/11: 3 locks held by kworker/1:0/24: 1 lock held by khungtaskd/29: #0: ffffffff8d7b08e0 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire include/linux/rcupdate.h:298 [inline] #0: ffffffff8d7b08e0 (rcu_read_lock){....}-{1:2}, at: rcu_read_lock include/linux/rcupdate.h:750 [inline] #0: ffffffff8d7b08e0 (rcu_read_lock){....}-{1:2}, at: debug_show_all_locks+0x75/0x340 kernel/locking/lockdep.c:6614 3 locks held by kworker/u8:2/38: #0: ffff888029a35948 ((wq_completion)ipv6_addrconf){+.+.}-{0:0}, at: process_one_work+0x1296/0x1a60 kernel/workqueue.c:3229 #1: ffffc90000ae7d80 ((work_completion)(&(&net->ipv6.addr_chk_work)->work)){+.+.}-{0:0}, at: process_one_work+0x906/0x1a60 kernel/workqueue.c:3230 #2: ffffffff8f2f63c8 (rtnl_mutex){+.+.}-{3:3}, at: addrconf_verify_work+0x12/0x30 net/ipv6/addrconf.c:4731 4 locks held by kworker/1:1/44: 2 locks held by kworker/u8:3/50: 3 locks held by kworker/u8:4/61: 2 locks held by kworker/u8:5/76: 2 locks held by kworker/u8:6/145: 3 locks held by kworker/1:2/929: 3 locks held by kworker/u8:7/2841: 3 locks held by kworker/u8:8/2861: 3 locks held by syslogd/4496: 1 lock held by klogd/4503: 2 locks held by udevd/4514: 2 locks held by dhcpcd/4727: 2 locks held by dhcpcd/4728: 2 locks held by getty/4816: #0: ffff888029c350a0 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x24/0x80 drivers/tty/tty_ldisc.c:243 #1: ffffc900015e02f0 (&ldata->atomic_read_lock){+.+.}-{3:3}, at: n_tty_read+0xfc8/0x1490 drivers/tty/n_tty.c:2201 3 locks held by sshd/5052: 5 locks held by syz-fuzzer/5058: 3 locks held by syz-fuzzer/5061: 1 lock held by syz-fuzzer/5068: 2 locks held by syz-fuzzer/5073: 3 locks held by syz-fuzzer/5167: 3 locks held by syz-fuzzer/5522: 2 locks held by kworker/1:3/5129: 4 locks held by kworker/1:4/5130: #0: ffff888015079948 ((wq_completion)events_power_efficient){+.+.}-{0:0}, at: process_one_work+0x1296/0x1a60 kernel/workqueue.c:3229 #1: ffffc9000382fd80 ((reg_check_chans).work){+.+.}-{0:0}, at: process_one_work+0x906/0x1a60 kernel/workqueue.c:3230 #2: ffffffff8f2f63c8 (rtnl_mutex){+.+.}-{3:3}, at: reg_check_chans_work+0x7d/0x1080 net/wireless/reg.c:2478 #3: ffff88801d3c8768 (&rdev->wiphy.mtx){+.+.}-{3:3}, at: wiphy_lock include/net/cfg80211.h:5951 [inline] #3: ffff88801d3c8768 (&rdev->wiphy.mtx){+.+.}-{3:3}, at: reg_leave_invalid_chans net/wireless/reg.c:2466 [inline] #3: ffff88801d3c8768 (&rdev->wiphy.mtx){+.+.}-{3:3}, at: reg_check_chans_work+0x10a/0x1080 net/wireless/reg.c:2481 4 locks held by kworker/1:5/5136: 1 lock held by syz-executor.1/5343: 1 lock held by syz-executor.3/6500: 4 locks held by kworker/1:13/7461: 2 locks held by kworker/1:15/7468: 2 locks held by kworker/1:16/7469: 3 locks held by kworker/0:10/7475: 3 locks held by kworker/0:13/7478: #0: ffff888015078948 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x1296/0x1a60 kernel/workqueue.c:3229 #1: ffffc9000404fd80 (free_ipc_work){+.+.}-{0:0}, at: process_one_work+0x906/0x1a60 kernel/workqueue.c:3230 #2: ffffffff8d7bc4b8 (rcu_state.exp_mutex){+.+.}-{3:3}, at: exp_funnel_lock kernel/rcu/tree_exp.h:291 [inline] #2: ffffffff8d7bc4b8 (rcu_state.exp_mutex){+.+.}-{3:3}, at: synchronize_rcu_expedited+0x682/0x7a0 kernel/rcu/tree_exp.h:939 2 locks held by kworker/0:15/7487: 5 locks held by kworker/0:16/7568: 4 locks held by udevd/8749: 6 locks held by syz-executor.4/9043: 1 lock held by syz-executor.2/9052: 4 locks held by kworker/u8:9/9054: #0: ffff888025417948 ((wq_completion)wg-kex-wg2#5){+.+.}-{0:0}, at: process_one_work+0x1296/0x1a60 kernel/workqueue.c:3229 #1: ffffc900035bfd80 ((work_completion)(&peer->transmit_handshake_work)){+.+.}-{0:0}, at: process_one_work+0x906/0x1a60 kernel/workqueue.c:3230 #2: ffff888062269228 (&wg->static_identity.lock){++++}-{3:3}, at: wg_noise_handshake_create_initiation+0xed/0x650 drivers/net/wireguard/noise.c:529 #3: ffff88802eafbb78 (&handshake->lock){++++}-{3:3}, at: wg_noise_handshake_create_initiation+0x101/0x650 drivers/net/wireguard/noise.c:530 ============================================= NMI backtrace for cpu 1 CPU: 1 PID: 29 Comm: khungtaskd Not tainted 6.8.0-syzkaller-08951-gfe46a7dd189e #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:114 nmi_cpu_backtrace+0x27b/0x390 lib/nmi_backtrace.c:113 nmi_trigger_cpumask_backtrace+0x29c/0x300 lib/nmi_backtrace.c:62 trigger_all_cpu_backtrace include/linux/nmi.h:160 [inline] check_hung_uninterruptible_tasks kernel/hung_task.c:222 [inline] watchdog+0xf86/0x1210 kernel/hung_task.c:379 kthread+0x2c1/0x3a0 kernel/kthread.c:388 ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:243 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 PID: 61 Comm: kworker/u8:4 Not tainted 6.8.0-syzkaller-08951-gfe46a7dd189e #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 Workqueue: bat_events batadv_purge_orig RIP: 0010:br_validate_ipv6+0x29/0x730 net/bridge/br_netfilter_ipv6.c:44 Code: 90 f3 0f 1e fa 41 57 41 56 41 55 41 54 55 48 bd 00 00 00 00 00 fc ff df 53 48 89 f3 48 83 ec 70 4c 8d 6c 24 10 48 89 7c 24 08 <48> c7 44 24 10 b3 8a b5 41 49 c1 ed 03 48 c7 44 24 18 fa 7c 20 8d RSP: 0018:ffffc900000071e0 EFLAGS: 00000282 RAX: dffffc0000000000 RBX: ffff88805c51a640 RCX: ffffffff89aafc43 RDX: 1ffff92000000e7c RSI: ffff88805c51a640 RDI: ffff888063265640 RBP: dffffc0000000000 R08: 0000000000000001 R09: 000000000000000a R10: 000000000000000a R11: 0200000000000000 R12: ffffc900000073c0 R13: ffffc900000071f0 R14: ffff88805c51a6f4 R15: ffffc900000073e0 FS: 0000000000000000(0000) GS:ffff8880b9400000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000c003e80000 CR3: 000000007945a000 CR4: 00000000003506f0 Call Trace: br_nf_forward_ip.part.0+0x43f/0x820 net/bridge/br_netfilter_hooks.c:717 br_nf_forward_ip net/bridge/br_netfilter_hooks.c:688 [inline] br_nf_forward+0xf11/0x1bd0 net/bridge/br_netfilter_hooks.c:785 nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline] nf_hook_slow+0xbb/0x200 net/netfilter/core.c:626 nf_hook+0x474/0x7d0 include/linux/netfilter.h:269 NF_HOOK include/linux/netfilter.h:312 [inline] __br_forward+0x1be/0x5b0 net/bridge/br_forward.c:115 deliver_clone+0x5b/0xa0 net/bridge/br_forward.c:131 br_flood+0x493/0x5c0 net/bridge/br_forward.c:245 br_handle_frame_finish+0xd8a/0x1c40 net/bridge/br_input.c:210 br_nf_hook_thresh+0x303/0x410 net/bridge/br_netfilter_hooks.c:1166 br_nf_pre_routing_finish_ipv6+0x76a/0xfb0 net/bridge/br_netfilter_ipv6.c:154 NF_HOOK include/linux/netfilter.h:314 [inline] br_nf_pre_routing_ipv6+0x3ce/0x8c0 net/bridge/br_netfilter_ipv6.c:184 br_nf_pre_routing+0x85e/0x15a0 net/bridge/br_netfilter_hooks.c:527 nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline] nf_hook_bridge_pre net/bridge/br_input.c:272 [inline] br_handle_frame+0x9e9/0x1450 net/bridge/br_input.c:417 __netif_receive_skb_core.constprop.0+0xa16/0x4030 net/core/dev.c:5432 __netif_receive_skb_one_core+0xb1/0x1e0 net/core/dev.c:5536 __netif_receive_skb+0x1f/0x1b0 net/core/dev.c:5652 process_backlog+0x12f/0x6f0 net/core/dev.c:5981 __napi_poll.constprop.0+0xb7/0x550 net/core/dev.c:6632 napi_poll net/core/dev.c:6701 [inline] net_rx_action+0x9ad/0xf10 net/core/dev.c:6813 __do_softirq+0x218/0x8de kernel/softirq.c:554 do_softirq kernel/softirq.c:455 [inline] do_softirq+0xb2/0xf0 kernel/softirq.c:442 __local_bh_enable_ip+0x100/0x120 kernel/softirq.c:382 spin_unlock_bh include/linux/spinlock.h:396 [inline] batadv_purge_orig_ref+0xec0/0x1520 net/batman-adv/originator.c:1287 batadv_purge_orig+0x19/0x60 net/batman-adv/originator.c:1300 process_one_work+0x9a9/0x1a60 kernel/workqueue.c:3254 process_scheduled_works kernel/workqueue.c:3335 [inline] worker_thread+0x6c8/0xf70 kernel/workqueue.c:3416 kthread+0x2c1/0x3a0 kernel/kthread.c:388 ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:243 net_ratelimit: 6702 callbacks suppressed bridge0: received packet on veth1_to_bridge with own address as source address (addr:76:02:db:17:ac:23, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth1_to_bridge with own address as source address (addr:76:02:db:17:ac:23, vlan:0) bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) bridge0: received packet on veth1_to_bridge with own address as source address (addr:76:02:db:17:ac:23, vlan:0) bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)