INFO: task kworker/1:3:5469 blocked for more than 143 seconds.
Not tainted syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:3 state:D stack:20184 pid:5469 tgid:5469 ppid:2 task_flags:0x4208060 flags:0x00080000
Workqueue: events console_callback
Call Trace:
context_switch kernel/sched/core.c:5325 [inline]
__schedule+0x1798/0x4cc0 kernel/sched/core.c:6929
__schedule_loop kernel/sched/core.c:7011 [inline]
schedule+0x165/0x360 kernel/sched/core.c:7026
schedule_timeout+0x9a/0x270 kernel/time/sleep_timeout.c:75
___down_common kernel/locking/semaphore.c:268 [inline]
__down_common+0x319/0x6a0 kernel/locking/semaphore.c:293
down+0x80/0xd0 kernel/locking/semaphore.c:100
console_lock+0x58/0x90 kernel/printk/printk.c:2822
class_console_lock_constructor include/linux/console.h:669 [inline]
console_callback+0x69/0x440 drivers/tty/vt/vt.c:3256
process_one_work kernel/workqueue.c:3263 [inline]
process_scheduled_works+0xae1/0x17b0 kernel/workqueue.c:3346
worker_thread+0x8a0/0xda0 kernel/workqueue.c:3427
kthread+0x711/0x8a0 kernel/kthread.c:463
ret_from_fork+0x4bc/0x870 arch/x86/kernel/process.c:158
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245
INFO: task syz.1.9705:26709 blocked for more than 143 seconds.
Not tainted syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:syz.1.9705 state:D stack:27368 pid:26709 tgid:26708 ppid:5834 task_flags:0x400040 flags:0x00080002
Call Trace:
context_switch kernel/sched/core.c:5325 [inline]
__schedule+0x1798/0x4cc0 kernel/sched/core.c:6929
__schedule_loop kernel/sched/core.c:7011 [inline]
schedule+0x165/0x360 kernel/sched/core.c:7026
schedule_timeout+0x9a/0x270 kernel/time/sleep_timeout.c:75
___down_common kernel/locking/semaphore.c:268 [inline]
__down_common+0x319/0x6a0 kernel/locking/semaphore.c:293
down+0x80/0xd0 kernel/locking/semaphore.c:100
console_lock+0x58/0x90 kernel/printk/printk.c:2822
class_console_lock_constructor include/linux/console.h:669 [inline]
con_font_get drivers/tty/vt/vt.c:4854 [inline]
con_font_op+0x443/0xfd0 drivers/tty/vt/vt.c:4962
vt_k_ioctl drivers/tty/vt/vt_ioctl.c:472 [inline]
vt_ioctl+0x1a89/0x1f20 drivers/tty/vt/vt_ioctl.c:743
tty_ioctl+0x929/0xde0 drivers/tty/tty_io.c:2792
vfs_ioctl fs/ioctl.c:51 [inline]
__do_sys_ioctl fs/ioctl.c:597 [inline]
__se_sys_ioctl+0xfc/0x170 fs/ioctl.c:583
do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
do_syscall_64+0xfa/0xfa0 arch/x86/entry/syscall_64.c:94
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f4d0a78efc9
RSP: 002b:00007f4d0b62b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: ffffffffffffffda RBX: 00007f4d0a9e5fa0 RCX: 00007f4d0a78efc9
RDX: 0000200000000100 RSI: 0000000000004b72 RDI: 0000000000000003
RBP: 00007f4d0a811f91 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007f4d0a9e6038 R14: 00007f4d0a9e5fa0 R15: 00007f4d0ab0fa28
Showing all locks held in the system:
1 lock held by pool_workqueue_/3:
#0: ffffffff8df42d78 (rcu_state.exp_mutex){+.+.}-{4:4}, at: exp_funnel_lock kernel/rcu/tree_exp.h:343 [inline]
#0: ffffffff8df42d78 (rcu_state.exp_mutex){+.+.}-{4:4}, at: synchronize_rcu_expedited+0x3b9/0x730 kernel/rcu/tree_exp.h:957
1 lock held by khungtaskd/31:
#0: ffffffff8df3d2e0 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire include/linux/rcupdate.h:331 [inline]
#0: ffffffff8df3d2e0 (rcu_read_lock){....}-{1:3}, at: rcu_read_lock include/linux/rcupdate.h:867 [inline]
#0: ffffffff8df3d2e0 (rcu_read_lock){....}-{1:3}, at: debug_show_all_locks+0x2e/0x180 kernel/locking/lockdep.c:6775
2 locks held by kworker/1:3/5469:
#0: ffff88801a055948 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work kernel/workqueue.c:3238 [inline]
#0: ffff88801a055948 ((wq_completion)events){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 kernel/workqueue.c:3346
#1: ffffc90003407ba0 (console_work){+.+.}-{0:0}, at: process_one_work kernel/workqueue.c:3239 [inline]
#1: ffffc90003407ba0 (console_work){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 kernel/workqueue.c:3346
2 locks held by getty/5587:
#0: ffff88802f9a10a0 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x25/0x70 drivers/tty/tty_ldisc.c:243
#1: ffffc9000332b2f0 (&ldata->atomic_read_lock){+.+.}-{4:4}, at: n_tty_read+0x43e/0x1400 drivers/tty/n_tty.c:2222
4 locks held by syz-executor/5845:
6 locks held by syz.4.9610/26552:
1 lock held by syz.2.9670/26634:
7 locks held by kworker/u8:3/26895:
4 locks held by kworker/u8:8/26971:
2 locks held by syz.6.10269/28466:
1 lock held by syz.7.10282/28465:
#0: ffff88807c4f9760 (&mm->mmap_lock){++++}-{4:4}, at: mmap_write_lock_killable include/linux/mmap_lock.h:330 [inline]
#0: ffff88807c4f9760 (&mm->mmap_lock){++++}-{4:4}, at: vm_mmap_pgoff+0x211/0x4d0 mm/util.c:579
4 locks held by syz.7.10282/28470:
=============================================
NMI backtrace for cpu 1
CPU: 1 UID: 0 PID: 31 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT(full)
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025
Call Trace:
dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120
nmi_cpu_backtrace+0x39e/0x3d0 lib/nmi_backtrace.c:113
nmi_trigger_cpumask_backtrace+0x17a/0x300 lib/nmi_backtrace.c:62
trigger_all_cpu_backtrace include/linux/nmi.h:160 [inline]
check_hung_uninterruptible_tasks kernel/hung_task.c:332 [inline]
watchdog+0xf60/0xfa0 kernel/hung_task.c:495
kthread+0x711/0x8a0 kernel/kthread.c:463
ret_from_fork+0x4bc/0x870 arch/x86/kernel/process.c:158
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245
Sending NMI from CPU 1 to CPUs 0:
NMI backtrace for cpu 0
CPU: 0 UID: 0 PID: 26895 Comm: kworker/u8:3 Not tainted syzkaller #0 PREEMPT(full)
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025
Workqueue: events_unbound nsim_dev_trap_report_work
RIP: 0010:check_preemption_disabled+0x40/0x120 lib/smp_processor_id.c:53
Code: 08 65 8b 05 e6 f4 27 07 65 8b 0d db f4 27 07 f7 c1 ff ff ff 7f 74 23 65 48 8b 0d bb f4 27 07 48 3b 4c 24 08 0f 85 cc 00 00 00 <48> 83 c4 10 5b 41 5e 41 5f 5d c3 cc cc cc cc cc 48 c7 04 24 00 00
RSP: 0018:ffffc90000007858 EFLAGS: 00000246
RAX: 0000000000000000 RBX: 0000000000000000 RCX: 785ba94a2dba1800
RDX: ffff8880480c8000 RSI: ffffffff8bbf0440 RDI: ffffffff8bbf0400
RBP: ffffc90000007990 R08: ffff8880480c8000 R09: 0000000000000002
R10: 00000000fffffff5 R11: ffffffff89f522a0 R12: dffffc0000000000
R13: ffff888032882000 R14: 0000000000000001 R15: ffff88802853a000
FS: 0000000000000000(0000) GS:ffff88812613e000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f231373c44a CR3: 0000000077272000 CR4: 00000000003526f0
Call Trace:
rcu_is_watching_curr_cpu include/linux/context_tracking.h:128 [inline]
rcu_is_watching+0x15/0xb0 kernel/rcu/tree.c:751
rcu_read_lock_held_common kernel/rcu/update.c:109 [inline]
rcu_read_lock_held+0x15/0x50 kernel/rcu/update.c:349
__in6_dev_get_safely include/net/addrconf.h:380 [inline]
ip6_mc_input+0x17c/0xb70 net/ipv6/ip6_input.c:516
NF_HOOK+0x30c/0x3a0 include/linux/netfilter.h:318
__netif_receive_skb_one_core net/core/dev.c:6079 [inline]
__netif_receive_skb+0xd3/0x380 net/core/dev.c:6192
process_backlog+0x60e/0x14f0 net/core/dev.c:6544
__napi_poll+0xc7/0x360 net/core/dev.c:7594
napi_poll net/core/dev.c:7657 [inline]
net_rx_action+0x5f7/0xdf0 net/core/dev.c:7784
handle_softirqs+0x286/0x870 kernel/softirq.c:622
do_softirq+0xec/0x180 kernel/softirq.c:523
__local_bh_enable_ip+0x17d/0x1c0 kernel/softirq.c:450
spin_unlock_bh include/linux/spinlock.h:396 [inline]
nsim_dev_trap_report drivers/net/netdevsim/dev.c:835 [inline]
nsim_dev_trap_report_work+0x7c7/0xb80 drivers/net/netdevsim/dev.c:866
process_one_work kernel/workqueue.c:3263 [inline]
process_scheduled_works+0xae1/0x17b0 kernel/workqueue.c:3346
worker_thread+0x8a0/0xda0 kernel/workqueue.c:3427
kthread+0x711/0x8a0 kernel/kthread.c:463
ret_from_fork+0x4bc/0x870 arch/x86/kernel/process.c:158
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245
net_ratelimit: 11670 callbacks suppressed
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
cm109 1-1:0.8: cm109_urb_ctl_callback: urb status -71
cm109 1-1:0.8: cm109_urb_ctl_callback: urb status -71
cm109 1-1:0.8: cm109_urb_ctl_callback: urb status -71
cm109 1-1:0.8: cm109_urb_ctl_callback: urb status -71
cm109 1-1:0.8: cm109_urb_ctl_callback: urb status -71
cm109 1-1:0.8: cm109_urb_ctl_callback: urb status -71
cm109 1-1:0.8: cm109_urb_ctl_callback: urb status -71
cm109 1-1:0.8: cm109_urb_ctl_callback: urb status -71
cm109 1-1:0.8: cm109_urb_ctl_callback: urb status -71
cm109 1-1:0.8: cm109_urb_ctl_callback: urb status -71
cm109 1-1:0.8: cm109_submit_buzz_toggle: usb_submit_urb (urb_ctl) failed -19
net_ratelimit: 11516 callbacks suppressed
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
net_ratelimit: 11954 callbacks suppressed
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
net_ratelimit: 11959 callbacks suppressed
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
INFO: task kworker/1:3:5469 blocked for more than 163 seconds.
Not tainted syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:3 state:D stack:20184 pid:5469 tgid:5469 ppid:2 task_flags:0x4208060 flags:0x00080000
Workqueue: events console_callback
Call Trace:
context_switch kernel/sched/core.c:5325 [inline]
__schedule+0x1798/0x4cc0 kernel/sched/core.c:6929
__schedule_loop kernel/sched/core.c:7011 [inline]
schedule+0x165/0x360 kernel/sched/core.c:7026
schedule_timeout+0x9a/0x270 kernel/time/sleep_timeout.c:75
___down_common kernel/locking/semaphore.c:268 [inline]
__down_common+0x319/0x6a0 kernel/locking/semaphore.c:293
down+0x80/0xd0 kernel/locking/semaphore.c:100
console_lock+0x58/0x90 kernel/printk/printk.c:2822
class_console_lock_constructor include/linux/console.h:669 [inline]
console_callback+0x69/0x440 drivers/tty/vt/vt.c:3256
process_one_work kernel/workqueue.c:3263 [inline]
process_scheduled_works+0xae1/0x17b0 kernel/workqueue.c:3346
worker_thread+0x8a0/0xda0 kernel/workqueue.c:3427
kthread+0x711/0x8a0 kernel/kthread.c:463
ret_from_fork+0x4bc/0x870 arch/x86/kernel/process.c:158
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245
INFO: task syz.1.9705:26709 blocked for more than 163 seconds.
Not tainted syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:syz.1.9705 state:D stack:27368 pid:26709 tgid:26708 ppid:5834 task_flags:0x400040 flags:0x00080002
Call Trace:
context_switch kernel/sched/core.c:5325 [inline]
__schedule+0x1798/0x4cc0 kernel/sched/core.c:6929
__schedule_loop kernel/sched/core.c:7011 [inline]
schedule+0x165/0x360 kernel/sched/core.c:7026
schedule_timeout+0x9a/0x270 kernel/time/sleep_timeout.c:75
___down_common kernel/locking/semaphore.c:268 [inline]
__down_common+0x319/0x6a0 kernel/locking/semaphore.c:293
down+0x80/0xd0 kernel/locking/semaphore.c:100
console_lock+0x58/0x90 kernel/printk/printk.c:2822
class_console_lock_constructor include/linux/console.h:669 [inline]
con_font_get drivers/tty/vt/vt.c:4854 [inline]
con_font_op+0x443/0xfd0 drivers/tty/vt/vt.c:4962
vt_k_ioctl drivers/tty/vt/vt_ioctl.c:472 [inline]
vt_ioctl+0x1a89/0x1f20 drivers/tty/vt/vt_ioctl.c:743
tty_ioctl+0x929/0xde0 drivers/tty/tty_io.c:2792
vfs_ioctl fs/ioctl.c:51 [inline]
__do_sys_ioctl fs/ioctl.c:597 [inline]
__se_sys_ioctl+0xfc/0x170 fs/ioctl.c:583
do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
do_syscall_64+0xfa/0xfa0 arch/x86/entry/syscall_64.c:94
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f4d0a78efc9
RSP: 002b:00007f4d0b62b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: ffffffffffffffda RBX: 00007f4d0a9e5fa0 RCX: 00007f4d0a78efc9
RDX: 0000200000000100 RSI: 0000000000004b72 RDI: 0000000000000003
RBP: 00007f4d0a811f91 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007f4d0a9e6038 R14: 00007f4d0a9e5fa0 R15: 00007f4d0ab0fa28
Showing all locks held in the system:
1 lock held by khungtaskd/31:
#0: ffffffff8df3d2e0 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire include/linux/rcupdate.h:331 [inline]
#0: ffffffff8df3d2e0 (rcu_read_lock){....}-{1:3}, at: rcu_read_lock include/linux/rcupdate.h:867 [inline]
#0: ffffffff8df3d2e0 (rcu_read_lock){....}-{1:3}, at: debug_show_all_locks+0x2e/0x180 kernel/locking/lockdep.c:6775
4 locks held by kworker/1:2/981:
#0: ffff8880216c9548 ((wq_completion)usb_hub_wq){+.+.}-{0:0}, at: process_one_work kernel/workqueue.c:3238 [inline]
#0: ffff8880216c9548 ((wq_completion)usb_hub_wq){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 kernel/workqueue.c:3346
#1: ffffc90003a67ba0 ((work_completion)(&hub->events)){+.+.}-{0:0}, at: process_one_work kernel/workqueue.c:3239 [inline]
#1: ffffc90003a67ba0 ((work_completion)(&hub->events)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 kernel/workqueue.c:3346
#2: ffff888027b01198 (&dev->mutex){....}-{4:4}, at: device_lock include/linux/device.h:914 [inline]
#2: ffff888027b01198 (&dev->mutex){....}-{4:4}, at: hub_event+0x184/0x4a20 drivers/usb/core/hub.c:5898
#3: ffff888022294198 (&dev->mutex){....}-{4:4}, at: device_lock include/linux/device.h:914 [inline]
#3: ffff888022294198 (&dev->mutex){....}-{4:4}, at: usb_disconnect+0xf8/0x950 drivers/usb/core/hub.c:2335
2 locks held by kworker/u8:6/1116:
#0: ffff88801a069948 ((wq_completion)events_unbound#2){+.+.}-{0:0}, at: process_one_work kernel/workqueue.c:3238 [inline]
#0: ffff88801a069948 ((wq_completion)events_unbound#2){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 kernel/workqueue.c:3346
#1: ffffc90003f8fba0 ((reaper_work).work){+.+.}-{0:0}, at: process_one_work kernel/workqueue.c:3239 [inline]
#1: ffffc90003f8fba0 ((reaper_work).work){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 kernel/workqueue.c:3346
2 locks held by kworker/1:3/5469:
#0: ffff88801a055948 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work kernel/workqueue.c:3238 [inline]
#0: ffff88801a055948 ((wq_completion)events){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 kernel/workqueue.c:3346
#1: ffffc90003407ba0 (console_work){+.+.}-{0:0}, at: process_one_work kernel/workqueue.c:3239 [inline]
#1: ffffc90003407ba0 (console_work){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 kernel/workqueue.c:3346
2 locks held by getty/5587:
#0: ffff88802f9a10a0 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x25/0x70 drivers/tty/tty_ldisc.c:243
#1: ffffc9000332b2f0 (&ldata->atomic_read_lock){+.+.}-{4:4}, at: n_tty_read+0x43e/0x1400 drivers/tty/n_tty.c:2222
4 locks held by syz-executor/5845:
7 locks held by kworker/0:6/5932:
2 locks held by kworker/0:8/5983:
6 locks held by syz.4.9610/26552:
1 lock held by syz.2.9670/26634:
4 locks held by syz-executor/26756:
2 locks held by kworker/u8:8/26971:
#0: ffff88801a069948 ((wq_completion)events_unbound#2){+.+.}-{0:0}, at: process_one_work kernel/workqueue.c:3238 [inline]
#0: ffff88801a069948 ((wq_completion)events_unbound#2){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 kernel/workqueue.c:3346
#1: ffffc9000bbf7ba0 (connector_reaper_work){+.+.}-{0:0}, at: process_one_work kernel/workqueue.c:3239 [inline]
#1: ffffc9000bbf7ba0 (connector_reaper_work){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 kernel/workqueue.c:3346
1 lock held by udevd/27003:
1 lock held by udevd/27007:
2 locks held by syz.6.10381/28704:
2 locks held by syz.3.10384/28711:
=============================================
NMI backtrace for cpu 1
CPU: 1 UID: 0 PID: 31 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT(full)
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025
Call Trace:
dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120
nmi_cpu_backtrace+0x39e/0x3d0 lib/nmi_backtrace.c:113
nmi_trigger_cpumask_backtrace+0x17a/0x300 lib/nmi_backtrace.c:62
trigger_all_cpu_backtrace include/linux/nmi.h:160 [inline]
check_hung_uninterruptible_tasks kernel/hung_task.c:332 [inline]
watchdog+0xf60/0xfa0 kernel/hung_task.c:495
kthread+0x711/0x8a0 kernel/kthread.c:463
ret_from_fork+0x4bc/0x870 arch/x86/kernel/process.c:158
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245
Sending NMI from CPU 1 to CPUs 0:
NMI backtrace for cpu 0
CPU: 0 UID: 0 PID: 5932 Comm: kworker/0:6 Not tainted syzkaller #0 PREEMPT(full)
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025
Workqueue: events_power_efficient neigh_periodic_work
RIP: 0010:ebt_do_table+0x101/0x2820 net/bridge/netfilter/ebtables.c:213
Code: e8 54 ea 20 01 48 83 eb 80 48 89 d8 48 c1 e8 03 42 80 3c 38 00 74 08 48 89 df e8 ca f7 fd f7 4c 89 b4 24 80 00 00 00 48 8b 1b <48> 8d 7b 04 48 89 f8 48 c1 e8 03 42 0f b6 04 38 84 c0 0f 85 0f 26
RSP: 0000:ffffc900000068e0 EFLAGS: 00000246
RAX: 1ffff1100ede86f0 RBX: ffffc9000333d000 RCX: ffffffff819dfcad
RDX: 0000000000000001 RSI: 0000000000000004 RDI: ffff888076f43740
RBP: ffffc90000006ac0 R08: ffff888076f43743 R09: 1ffff1100ede86e8
R10: dffffc0000000000 R11: ffffed100ede86e9 R12: ffffc90000006a20
R13: ffff88807c88d888 R14: ffffc90000006b80 R15: dffffc0000000000
FS: 0000000000000000(0000) GS:ffff88812613e000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000001b30e23ffc CR3: 000000000dd38000 CR4: 00000000003526f0
Call Trace:
nf_hook_entry_hookfn include/linux/netfilter.h:158 [inline]
nf_hook_slow+0xc5/0x220 net/netfilter/core.c:623
nf_hook include/linux/netfilter.h:273 [inline]
NF_HOOK+0x215/0x3c0 include/linux/netfilter.h:316
br_forward_finish+0xd3/0x130 net/bridge/br_forward.c:66
br_nf_hook_thresh net/bridge/br_netfilter_hooks.c:-1 [inline]
br_nf_forward_finish+0xa40/0xe60 net/bridge/br_netfilter_hooks.c:662
NF_HOOK+0x61b/0x6b0 include/linux/netfilter.h:318
br_nf_forward_ip+0x647/0x7e0 net/bridge/br_netfilter_hooks.c:716
nf_hook_entry_hookfn include/linux/netfilter.h:158 [inline]
nf_hook_slow+0xc5/0x220 net/netfilter/core.c:623
nf_hook include/linux/netfilter.h:273 [inline]
NF_HOOK+0x215/0x3c0 include/linux/netfilter.h:316
__br_forward+0x41e/0x600 net/bridge/br_forward.c:115
deliver_clone net/bridge/br_forward.c:131 [inline]
maybe_deliver+0xb5/0x160 net/bridge/br_forward.c:191
br_flood+0x31a/0x6a0 net/bridge/br_forward.c:238
br_handle_frame_finish+0x15a3/0x1c50 net/bridge/br_input.c:229
br_nf_hook_thresh+0x3c6/0x4a0 net/bridge/br_netfilter_hooks.c:-1
br_nf_pre_routing_finish_ipv6+0x999/0xd60 net/bridge/br_netfilter_ipv6.c:-1
NF_HOOK include/linux/netfilter.h:318 [inline]
br_nf_pre_routing_ipv6+0x37e/0x6b0 net/bridge/br_netfilter_ipv6.c:184
nf_hook_entry_hookfn include/linux/netfilter.h:158 [inline]
nf_hook_bridge_pre net/bridge/br_input.c:291 [inline]
br_handle_frame+0x982/0x14c0 net/bridge/br_input.c:442
__netif_receive_skb_core+0x10b9/0x4380 net/core/dev.c:5966
__netif_receive_skb_one_core net/core/dev.c:6077 [inline]
__netif_receive_skb+0x72/0x380 net/core/dev.c:6192
process_backlog+0x60e/0x14f0 net/core/dev.c:6544
__napi_poll+0xc7/0x360 net/core/dev.c:7594
napi_poll net/core/dev.c:7657 [inline]
net_rx_action+0x5f7/0xdf0 net/core/dev.c:7784
handle_softirqs+0x286/0x870 kernel/softirq.c:622
do_softirq+0xec/0x180 kernel/softirq.c:523
__local_bh_enable_ip+0x17d/0x1c0 kernel/softirq.c:450
neigh_periodic_work+0xc28/0xe50 net/core/neighbour.c:1040
process_one_work kernel/workqueue.c:3263 [inline]
process_scheduled_works+0xae1/0x17b0 kernel/workqueue.c:3346
worker_thread+0x8a0/0xda0 kernel/workqueue.c:3427
kthread+0x711/0x8a0 kernel/kthread.c:463
ret_from_fork+0x4bc/0x870 arch/x86/kernel/process.c:158
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245
net_ratelimit: 12598 callbacks suppressed
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
net_ratelimit: 12618 callbacks suppressed
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
net_ratelimit: 12322 callbacks suppressed
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
net_ratelimit: 11498 callbacks suppressed
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
INFO: task kworker/1:3:5469 blocked for more than 184 seconds.
Not tainted syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:3 state:D stack:20184 pid:5469 tgid:5469 ppid:2 task_flags:0x4208060 flags:0x00080000
Workqueue: events console_callback
Call Trace:
context_switch kernel/sched/core.c:5325 [inline]
__schedule+0x1798/0x4cc0 kernel/sched/core.c:6929
__schedule_loop kernel/sched/core.c:7011 [inline]
schedule+0x165/0x360 kernel/sched/core.c:7026
schedule_timeout+0x9a/0x270 kernel/time/sleep_timeout.c:75
___down_common kernel/locking/semaphore.c:268 [inline]
__down_common+0x319/0x6a0 kernel/locking/semaphore.c:293
down+0x80/0xd0 kernel/locking/semaphore.c:100
console_lock+0x58/0x90 kernel/printk/printk.c:2822
class_console_lock_constructor include/linux/console.h:669 [inline]
console_callback+0x69/0x440 drivers/tty/vt/vt.c:3256
process_one_work kernel/workqueue.c:3263 [inline]
process_scheduled_works+0xae1/0x17b0 kernel/workqueue.c:3346
worker_thread+0x8a0/0xda0 kernel/workqueue.c:3427
kthread+0x711/0x8a0 kernel/kthread.c:463
ret_from_fork+0x4bc/0x870 arch/x86/kernel/process.c:158
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245
INFO: task syz.1.9705:26709 blocked for more than 184 seconds.
Not tainted syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:syz.1.9705 state:D stack:27368 pid:26709 tgid:26708 ppid:5834 task_flags:0x400040 flags:0x00080002
Call Trace:
context_switch kernel/sched/core.c:5325 [inline]
__schedule+0x1798/0x4cc0 kernel/sched/core.c:6929
__schedule_loop kernel/sched/core.c:7011 [inline]
schedule+0x165/0x360 kernel/sched/core.c:7026
schedule_timeout+0x9a/0x270 kernel/time/sleep_timeout.c:75
___down_common kernel/locking/semaphore.c:268 [inline]
__down_common+0x319/0x6a0 kernel/locking/semaphore.c:293
down+0x80/0xd0 kernel/locking/semaphore.c:100
console_lock+0x58/0x90 kernel/printk/printk.c:2822
class_console_lock_constructor include/linux/console.h:669 [inline]
con_font_get drivers/tty/vt/vt.c:4854 [inline]
con_font_op+0x443/0xfd0 drivers/tty/vt/vt.c:4962
vt_k_ioctl drivers/tty/vt/vt_ioctl.c:472 [inline]
vt_ioctl+0x1a89/0x1f20 drivers/tty/vt/vt_ioctl.c:743
tty_ioctl+0x929/0xde0 drivers/tty/tty_io.c:2792
vfs_ioctl fs/ioctl.c:51 [inline]
__do_sys_ioctl fs/ioctl.c:597 [inline]
__se_sys_ioctl+0xfc/0x170 fs/ioctl.c:583
do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
do_syscall_64+0xfa/0xfa0 arch/x86/entry/syscall_64.c:94
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f4d0a78efc9
RSP: 002b:00007f4d0b62b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: ffffffffffffffda RBX: 00007f4d0a9e5fa0 RCX: 00007f4d0a78efc9
RDX: 0000200000000100 RSI: 0000000000004b72 RDI: 0000000000000003
RBP: 00007f4d0a811f91 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007f4d0a9e6038 R14: 00007f4d0a9e5fa0 R15: 00007f4d0ab0fa28
Showing all locks held in the system:
1 lock held by khungtaskd/31:
#0: ffffffff8df3d2e0 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire include/linux/rcupdate.h:331 [inline]
#0: ffffffff8df3d2e0 (rcu_read_lock){....}-{1:3}, at: rcu_read_lock include/linux/rcupdate.h:867 [inline]
#0: ffffffff8df3d2e0 (rcu_read_lock){....}-{1:3}, at: debug_show_all_locks+0x2e/0x180 kernel/locking/lockdep.c:6775
3 locks held by kworker/1:2/981:
#0: ffff8880216c9548 ((wq_completion)usb_hub_wq){+.+.}-{0:0}, at: process_one_work kernel/workqueue.c:3238 [inline]
#0: ffff8880216c9548 ((wq_completion)usb_hub_wq){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 kernel/workqueue.c:3346
#1: ffffc90003a67ba0 ((work_completion)(&hub->events)){+.+.}-{0:0}, at: process_one_work kernel/workqueue.c:3239 [inline]
#1: ffffc90003a67ba0 ((work_completion)(&hub->events)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 kernel/workqueue.c:3346
#2: ffff888144fed198 (&dev->mutex){....}-{4:4}, at: device_lock include/linux/device.h:914 [inline]
#2: ffff888144fed198 (&dev->mutex){....}-{4:4}, at: hub_event+0x184/0x4a20 drivers/usb/core/hub.c:5898
2 locks held by kworker/1:3/5469:
#0: ffff88801a055948 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work kernel/workqueue.c:3238 [inline]
#0: ffff88801a055948 ((wq_completion)events){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 kernel/workqueue.c:3346
#1: ffffc90003407ba0 (console_work){+.+.}-{0:0}, at: process_one_work kernel/workqueue.c:3239 [inline]
#1: ffffc90003407ba0 (console_work){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 kernel/workqueue.c:3346
2 locks held by getty/5587:
#0: ffff88802f9a10a0 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x25/0x70 drivers/tty/tty_ldisc.c:243
#1: ffffc9000332b2f0 (&ldata->atomic_read_lock){+.+.}-{4:4}, at: n_tty_read+0x43e/0x1400 drivers/tty/n_tty.c:2222
2 locks held by kworker/0:8/5983:
6 locks held by syz.4.9610/26552:
1 lock held by syz.2.9670/26634:
4 locks held by kworker/u8:3/26895:
3 locks held by syz.3.10448/28863:
2 locks held by syz-executor/28922:
#0: ffffffff8f2be2b0 (pernet_ops_rwsem){++++}-{4:4}, at: copy_net_ns+0x337/0x4e0 net/core/net_namespace.c:576
#1: ffffffff8f2cb148 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_net_lock include/linux/rtnetlink.h:130 [inline]
#1: ffffffff8f2cb148 (rtnl_mutex){+.+.}-{4:4}, at: register_netdevice_notifier_net+0x1a/0xa0 net/core/dev.c:2082
2 locks held by syz.0.10478/28959:
2 locks held by syz.7.10480/28943:
#0: ffff8881442b06e8 (nlk_cb_mutex-ROUTE){+.+.}-{4:4}, at: __netlink_dump_start+0xfe/0x7e0 net/netlink/af_netlink.c:2406
#1: ffffffff8f2cb148 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_lock net/core/rtnetlink.c:80 [inline]
#1: ffffffff8f2cb148 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_dumpit+0x92/0x200 net/core/rtnetlink.c:6822
1 lock held by syz.6.10485/28963:
4 locks held by dhcpcd-run-hook/28965:
=============================================
NMI backtrace for cpu 0
CPU: 0 UID: 0 PID: 31 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT(full)
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025
Call Trace:
dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120
nmi_cpu_backtrace+0x39e/0x3d0 lib/nmi_backtrace.c:113
nmi_trigger_cpumask_backtrace+0x17a/0x300 lib/nmi_backtrace.c:62
trigger_all_cpu_backtrace include/linux/nmi.h:160 [inline]
check_hung_uninterruptible_tasks kernel/hung_task.c:332 [inline]
watchdog+0xf60/0xfa0 kernel/hung_task.c:495
kthread+0x711/0x8a0 kernel/kthread.c:463
ret_from_fork+0x4bc/0x870 arch/x86/kernel/process.c:158
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245
Sending NMI from CPU 0 to CPUs 1:
NMI backtrace for cpu 1
CPU: 1 UID: 0 PID: 12 Comm: kworker/u8:0 Not tainted syzkaller #0 PREEMPT(full)
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025
Workqueue: events_unbound nsim_dev_trap_report_work
RIP: 0010:lockdep_softirqs_off+0x5d/0x120 kernel/locking/lockdep.c:4575
Code: 20 6e 92 83 b8 2c 0b 00 00 00 75 63 83 3d 0a 24 dc 17 00 75 15 48 c7 04 24 00 00 00 00 9c 8f 04 24 f7 04 24 00 02 00 00 75 5e <83> b8 10 0b 00 00 00 74 3c c7 80 10 0b 00 00 00 00 00 00 48 89 b8
RSP: 0018:ffffc90000a08d68 EFLAGS: 00000046
RAX: ffff88801c6ddac0 RBX: 0000000000000100 RCX: 933abdc81a94b400
RDX: 0000000000010000 RSI: 0000000000000100 RDI: ffffffff8184cc7a
RBP: ffffc90000a08e30 R08: ffffffff8f7cd377 R09: 1ffffffff1ef9a6e
R10: dffffc0000000000 R11: fffffbfff1ef9a6f R12: 1ffff920001411b0
R13: 0000000000000000 R14: 0000000000000046 R15: dffffc0000000000
FS: 0000000000000000(0000) GS:ffff88812623e000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000001b30e20ff8 CR3: 000000004c440000 CR4: 00000000003526f0
Call Trace:
__local_bh_disable_ip+0xb2/0x190 kernel/softirq.c:390
softirq_handle_begin kernel/softirq.c:463 [inline]
handle_softirqs+0x106/0x870 kernel/softirq.c:598
__do_softirq kernel/softirq.c:656 [inline]
invoke_softirq kernel/softirq.c:496 [inline]
__irq_exit_rcu+0xca/0x1f0 kernel/softirq.c:723
irq_exit_rcu+0x9/0x30 kernel/softirq.c:739
instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1052 [inline]
sysvec_apic_timer_interrupt+0xa6/0xc0 arch/x86/kernel/apic/apic.c:1052
asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:697
RIP: 0010:crng_make_state+0x406/0x700 drivers/char/random.c:394
Code: 77 8e e8 2d aa 30 06 e9 56 fe ff ff e8 d3 07 a8 fc e8 ee 15 2e 06 4d 85 f6 74 8c e8 c4 07 a8 fc fb 48 c7 44 24 40 0e 36 e0 45 <48> 8b 44 24 38 4a c7 04 20 00 00 00 00 66 42 c7 44 20 09 00 00 42
RSP: 0018:ffffc90000117720 EFLAGS: 00000293
RAX: ffffffff8517fc2c RBX: 0000000000000000 RCX: ffff88801c6ddac0
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
RBP: ffffc90000117810 R08: ffffffff8f7cd377 R09: 1ffffffff1ef9a6e
R10: dffffc0000000000 R11: fffffbfff1ef9a6f R12: dffffc0000000000
R13: ffff8880b8936390 R14: 0000000000000200 R15: ffff8880b89363e0
_get_random_bytes+0xd5/0x210 drivers/char/random.c:406
nsim_dev_trap_skb_build drivers/net/netdevsim/dev.c:790 [inline]
nsim_dev_trap_report drivers/net/netdevsim/dev.c:820 [inline]
nsim_dev_trap_report_work+0x69e/0xb80 drivers/net/netdevsim/dev.c:866
process_one_work kernel/workqueue.c:3263 [inline]
process_scheduled_works+0xae1/0x17b0 kernel/workqueue.c:3346
worker_thread+0x8a0/0xda0 kernel/workqueue.c:3427
kthread+0x711/0x8a0 kernel/kthread.c:463
ret_from_fork+0x4bc/0x870 arch/x86/kernel/process.c:158
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245
net_ratelimit: 11200 callbacks suppressed
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
net_ratelimit: 12016 callbacks suppressed
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
net_ratelimit: 12528 callbacks suppressed
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
net_ratelimit: 12426 callbacks suppressed
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
INFO: task kworker/1:3:5469 blocked for more than 204 seconds.
Not tainted syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:3 state:D stack:20184 pid:5469 tgid:5469 ppid:2 task_flags:0x4208060 flags:0x00080000
Workqueue: events console_callback
Call Trace:
context_switch kernel/sched/core.c:5325 [inline]
__schedule+0x1798/0x4cc0 kernel/sched/core.c:6929
__schedule_loop kernel/sched/core.c:7011 [inline]
schedule+0x165/0x360 kernel/sched/core.c:7026
schedule_timeout+0x9a/0x270 kernel/time/sleep_timeout.c:75
___down_common kernel/locking/semaphore.c:268 [inline]
__down_common+0x319/0x6a0 kernel/locking/semaphore.c:293
down+0x80/0xd0 kernel/locking/semaphore.c:100
console_lock+0x58/0x90 kernel/printk/printk.c:2822
class_console_lock_constructor include/linux/console.h:669 [inline]
console_callback+0x69/0x440 drivers/tty/vt/vt.c:3256
process_one_work kernel/workqueue.c:3263 [inline]
process_scheduled_works+0xae1/0x17b0 kernel/workqueue.c:3346
worker_thread+0x8a0/0xda0 kernel/workqueue.c:3427
kthread+0x711/0x8a0 kernel/kthread.c:463
ret_from_fork+0x4bc/0x870 arch/x86/kernel/process.c:158
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245
INFO: task syz.1.9705:26709 blocked for more than 204 seconds.
Not tainted syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:syz.1.9705 state:D stack:27368 pid:26709 tgid:26708 ppid:5834 task_flags:0x400040 flags:0x00080002
Call Trace:
context_switch kernel/sched/core.c:5325 [inline]
__schedule+0x1798/0x4cc0 kernel/sched/core.c:6929
__schedule_loop kernel/sched/core.c:7011 [inline]
schedule+0x165/0x360 kernel/sched/core.c:7026
schedule_timeout+0x9a/0x270 kernel/time/sleep_timeout.c:75
___down_common kernel/locking/semaphore.c:268 [inline]
__down_common+0x319/0x6a0 kernel/locking/semaphore.c:293
down+0x80/0xd0 kernel/locking/semaphore.c:100
console_lock+0x58/0x90 kernel/printk/printk.c:2822
class_console_lock_constructor include/linux/console.h:669 [inline]
con_font_get drivers/tty/vt/vt.c:4854 [inline]
con_font_op+0x443/0xfd0 drivers/tty/vt/vt.c:4962
vt_k_ioctl drivers/tty/vt/vt_ioctl.c:472 [inline]
vt_ioctl+0x1a89/0x1f20 drivers/tty/vt/vt_ioctl.c:743
tty_ioctl+0x929/0xde0 drivers/tty/tty_io.c:2792
vfs_ioctl fs/ioctl.c:51 [inline]
__do_sys_ioctl fs/ioctl.c:597 [inline]
__se_sys_ioctl+0xfc/0x170 fs/ioctl.c:583
do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
do_syscall_64+0xfa/0xfa0 arch/x86/entry/syscall_64.c:94
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f4d0a78efc9
RSP: 002b:00007f4d0b62b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: ffffffffffffffda RBX: 00007f4d0a9e5fa0 RCX: 00007f4d0a78efc9
RDX: 0000200000000100 RSI: 0000000000004b72 RDI: 0000000000000003
RBP: 00007f4d0a811f91 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007f4d0a9e6038 R14: 00007f4d0a9e5fa0 R15: 00007f4d0ab0fa28
Showing all locks held in the system:
1 lock held by khungtaskd/31:
#0: ffffffff8df3d2e0 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire include/linux/rcupdate.h:331 [inline]
#0: ffffffff8df3d2e0 (rcu_read_lock){....}-{1:3}, at: rcu_read_lock include/linux/rcupdate.h:867 [inline]
#0: ffffffff8df3d2e0 (rcu_read_lock){....}-{1:3}, at: debug_show_all_locks+0x2e/0x180 kernel/locking/lockdep.c:6775
3 locks held by kworker/u8:2/36:
#0: ffff88802ee62948 ((wq_completion)ipv6_addrconf){+.+.}-{0:0}, at: process_one_work kernel/workqueue.c:3238 [inline]
#0: ffff88802ee62948 ((wq_completion)ipv6_addrconf){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 kernel/workqueue.c:3346
#1: ffffc90000ac7ba0 ((work_completion)(&(&ifa->dad_work)->work)){+.+.}-{0:0}, at: process_one_work kernel/workqueue.c:3239 [inline]
#1: ffffc90000ac7ba0 ((work_completion)(&(&ifa->dad_work)->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 kernel/workqueue.c:3346
#2: ffffffff8f2cb148 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_net_lock include/linux/rtnetlink.h:130 [inline]
#2: ffffffff8f2cb148 (rtnl_mutex){+.+.}-{4:4}, at: addrconf_dad_work+0x112/0x14b0 net/ipv6/addrconf.c:4194
3 locks held by kworker/1:2/981:
#0: ffff88801a055948 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work kernel/workqueue.c:3238 [inline]
#0: ffff88801a055948 ((wq_completion)events){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 kernel/workqueue.c:3346
#1: ffffc90003a67ba0 (key_gc_work){+.+.}-{0:0}, at: process_one_work kernel/workqueue.c:3239 [inline]
#1: ffffc90003a67ba0 (key_gc_work){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 kernel/workqueue.c:3346
#2: ffffffff8df42d78 (rcu_state.exp_mutex){+.+.}-{4:4}, at: exp_funnel_lock kernel/rcu/tree_exp.h:311 [inline]
#2: ffffffff8df42d78 (rcu_state.exp_mutex){+.+.}-{4:4}, at: synchronize_rcu_expedited+0x2f6/0x730 kernel/rcu/tree_exp.h:957
2 locks held by kworker/u8:5/1094:
#0: ffff88801a069948 ((wq_completion)events_unbound#2){+.+.}-{0:0}, at: process_one_work kernel/workqueue.c:3238 [inline]
#0: ffff88801a069948 ((wq_completion)events_unbound#2){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 kernel/workqueue.c:3346
#1: ffffc90003f2fba0 ((reaper_work).work){+.+.}-{0:0}, at: process_one_work kernel/workqueue.c:3239 [inline]
#1: ffffc90003f2fba0 ((reaper_work).work){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 kernel/workqueue.c:3346
2 locks held by kworker/u8:6/1116:
#0: ffff88801a069948 ((wq_completion)events_unbound#2){+.+.}-{0:0}, at: process_one_work kernel/workqueue.c:3238 [inline]
#0: ffff88801a069948 ((wq_completion)events_unbound#2){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 kernel/workqueue.c:3346
#1: ffffc90003f8fba0 (connector_reaper_work){+.+.}-{0:0}, at: process_one_work kernel/workqueue.c:3239 [inline]
#1: ffffc90003f8fba0 (connector_reaper_work){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 kernel/workqueue.c:3346
3 locks held by kworker/u8:7/5126:
#0: ffff88801a069948 ((wq_completion)events_unbound#2){+.+.}-{0:0}, at: process_one_work kernel/workqueue.c:3238 [inline]
#0: ffff88801a069948 ((wq_completion)events_unbound#2){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 kernel/workqueue.c:3346
#1: ffffc9000e447ba0 ((linkwatch_work).work){+.+.}-{0:0}, at: process_one_work kernel/workqueue.c:3239 [inline]
#1: ffffc9000e447ba0 ((linkwatch_work).work){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 kernel/workqueue.c:3346
#2: ffffffff8f2cb148 (rtnl_mutex){+.+.}-{4:4}, at: linkwatch_event+0xe/0x60 net/core/link_watch.c:303
2 locks held by kworker/1:3/5469:
#0: ffff88801a055948 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work kernel/workqueue.c:3238 [inline]
#0: ffff88801a055948 ((wq_completion)events){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 kernel/workqueue.c:3346
#1: ffffc90003407ba0 (console_work){+.+.}-{0:0}, at: process_one_work kernel/workqueue.c:3239 [inline]
#1: ffffc90003407ba0 (console_work){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 kernel/workqueue.c:3346
2 locks held by getty/5587:
#0: ffff88802f9a10a0 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x25/0x70 drivers/tty/tty_ldisc.c:243
#1: ffffc9000332b2f0 (&ldata->atomic_read_lock){+.+.}-{4:4}, at: n_tty_read+0x43e/0x1400 drivers/tty/n_tty.c:2222
9 locks held by kworker/0:6/5932:
3 locks held by kworker/0:9/15161:
3 locks held by kworker/1:4/24125:
#0: ffff8880216c9548 ((wq_completion)usb_hub_wq){+.+.}-{0:0}, at: process_one_work kernel/workqueue.c:3238 [inline]
#0: ffff8880216c9548 ((wq_completion)usb_hub_wq){+.+.}-{0:0}, at: process_scheduled_works+0x9b4/0x17b0 kernel/workqueue.c:3346
#1: ffffc9000497fba0 ((work_completion)(&hub->events)){+.+.}-{0:0}, at: process_one_work kernel/workqueue.c:3239 [inline]
#1: ffffc9000497fba0 ((work_completion)(&hub->events)){+.+.}-{0:0}, at: process_scheduled_works+0x9ef/0x17b0 kernel/workqueue.c:3346
#2: ffff888027ad8198 (&dev->mutex){....}-{4:4}, at: device_lock include/linux/device.h:914 [inline]
#2: ffff888027ad8198 (&dev->mutex){....}-{4:4}, at: hub_event+0x184/0x4a20 drivers/usb/core/hub.c:5898
6 locks held by syz.4.9610/26552:
1 lock held by syz.2.9670/26634:
4 locks held by syz-executor/26856:
1 lock held by udevd/27003:
3 locks held by udevd/27007:
4 locks held by syz-executor/28922:
1 lock held by syz.3.10548/29146:
#0: ffff88801a05cd20 (&mm->mmap_lock){++++}-{4:4}, at: mmap_write_lock_killable include/linux/mmap_lock.h:330 [inline]
#0: ffff88801a05cd20 (&mm->mmap_lock){++++}-{4:4}, at: vm_mmap_pgoff+0x211/0x4d0 mm/util.c:579
2 locks held by syz.3.10548/29147:
2 locks held by dhcpcd-run-hook/29153:
=============================================
NMI backtrace for cpu 1
CPU: 1 UID: 0 PID: 31 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT(full)
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025
Call Trace:
dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120
nmi_cpu_backtrace+0x39e/0x3d0 lib/nmi_backtrace.c:113
nmi_trigger_cpumask_backtrace+0x17a/0x300 lib/nmi_backtrace.c:62
trigger_all_cpu_backtrace include/linux/nmi.h:160 [inline]
check_hung_uninterruptible_tasks kernel/hung_task.c:332 [inline]
watchdog+0xf60/0xfa0 kernel/hung_task.c:495
kthread+0x711/0x8a0 kernel/kthread.c:463
ret_from_fork+0x4bc/0x870 arch/x86/kernel/process.c:158
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245
Sending NMI from CPU 1 to CPUs 0:
NMI backtrace for cpu 0
CPU: 0 UID: 0 PID: 5932 Comm: kworker/0:6 Not tainted syzkaller #0 PREEMPT(full)
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025
Workqueue: wg-kex-wg0 wg_packet_handshake_receive_worker
RIP: 0010:check_kcov_mode kernel/kcov.c:183 [inline]
RIP: 0010:write_comp_data kernel/kcov.c:246 [inline]
RIP: 0010:__sanitizer_cov_trace_const_cmp4+0x18/0x90 kernel/kcov.c:314
Code: 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 48 8b 04 24 65 48 8b 14 25 08 20 6e 92 65 8b 0d e8 17 ae 10 <81> e1 00 01 ff 00 74 11 81 f9 00 01 00 00 75 5b 83 ba 7c 16 00 00
RSP: 0018:ffffc90000006500 EFLAGS: 00000246
RAX: ffffffff89f8c2bc RBX: 000000000000000d RCX: 0000000080000101
RDX: ffff888025a25ac0 RSI: 000000000000000d RDI: 0000000000000000
RBP: 0000000000000003 R08: ffffc90000006840 R09: ffffc90000006850
R10: ffffc900000066a0 R11: fffff52000000cd6 R12: dffffc0000000000
R13: dffffc0000000000 R14: ffff8880577dc0c8 R15: 0000000000000001
FS: 0000000000000000(0000) GS:ffff88812613e000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00002000000001c0 CR3: 000000000dd38000 CR4: 00000000003526f0
Call Trace:
rt6_score_route+0x2c/0x380 net/ipv6/route.c:753
find_match+0x1b0/0xc90 net/ipv6/route.c:785
__find_rr_leaf+0x23a/0x6d0 net/ipv6/route.c:868
find_rr_leaf net/ipv6/route.c:889 [inline]
rt6_select net/ipv6/route.c:933 [inline]
fib6_table_lookup+0x39f/0xa80 net/ipv6/route.c:2233
ip6_pol_route+0x222/0x1180 net/ipv6/route.c:2269
pol_lookup_func include/net/ip6_fib.h:617 [inline]
__fib6_rule_action net/ipv6/fib6_rules.c:237 [inline]
fib6_rule_action+0x674/0x7d0 net/ipv6/fib6_rules.c:275
fib_rules_lookup+0x767/0xe90 net/core/fib_rules.c:339
fib6_rule_lookup+0x18e/0x6f0 net/ipv6/fib6_rules.c:112
ip6_route_input_lookup net/ipv6/route.c:2338 [inline]
ip6_route_input+0x6de/0xad0 net/ipv6/route.c:2641
ip6_rcv_finish+0x141/0x2e0 net/ipv6/ip6_input.c:77
ip_sabotage_in+0x1e1/0x270 net/bridge/br_netfilter_hooks.c:990
nf_hook_entry_hookfn include/linux/netfilter.h:158 [inline]
nf_hook_slow+0xc5/0x220 net/netfilter/core.c:623
nf_hook include/linux/netfilter.h:273 [inline]
NF_HOOK+0x206/0x3a0 include/linux/netfilter.h:316
__netif_receive_skb_one_core net/core/dev.c:6079 [inline]
__netif_receive_skb+0xd3/0x380 net/core/dev.c:6192
netif_receive_skb_internal net/core/dev.c:6278 [inline]
netif_receive_skb+0x1cb/0x790 net/core/dev.c:6337
NF_HOOK+0xa0/0x390 include/linux/netfilter.h:319
br_handle_frame_finish+0x15c6/0x1c50 net/bridge/br_input.c:235
br_nf_hook_thresh+0x3c6/0x4a0 net/bridge/br_netfilter_hooks.c:-1
br_nf_pre_routing_finish_ipv6+0x999/0xd60 net/bridge/br_netfilter_ipv6.c:-1
NF_HOOK include/linux/netfilter.h:318 [inline]
br_nf_pre_routing_ipv6+0x37e/0x6b0 net/bridge/br_netfilter_ipv6.c:184
nf_hook_entry_hookfn include/linux/netfilter.h:158 [inline]
nf_hook_bridge_pre net/bridge/br_input.c:291 [inline]
br_handle_frame+0x982/0x14c0 net/bridge/br_input.c:442
__netif_receive_skb_core+0x10b9/0x4380 net/core/dev.c:5966
__netif_receive_skb_one_core net/core/dev.c:6077 [inline]
__netif_receive_skb+0x72/0x380 net/core/dev.c:6192
process_backlog+0x60e/0x14f0 net/core/dev.c:6544
__napi_poll+0xc7/0x360 net/core/dev.c:7594
napi_poll net/core/dev.c:7657 [inline]
net_rx_action+0x5f7/0xdf0 net/core/dev.c:7784
handle_softirqs+0x286/0x870 kernel/softirq.c:622
do_softirq+0xec/0x180 kernel/softirq.c:523
__local_bh_enable_ip+0x17d/0x1c0 kernel/softirq.c:450
local_bh_enable include/linux/bottom_half.h:33 [inline]
fpregs_unlock arch/x86/include/asm/fpu/api.h:77 [inline]
kernel_fpu_end+0xd2/0x120 arch/x86/kernel/fpu/core.c:479
blake2s_compress+0xe9/0x1b80 lib/crypto/x86/blake2s.h:44
blake2s_final+0x116/0x260 lib/crypto/blake2s.c:148
hmac+0x1c6/0x330 drivers/net/wireguard/noise.c:325
kdf drivers/net/wireguard/noise.c:360 [inline]
message_ephemeral+0x1c0/0x280 drivers/net/wireguard/noise.c:493
wg_noise_handshake_create_response+0x24d/0x8f0 drivers/net/wireguard/noise.c:692
wg_packet_send_handshake_response+0xf6/0x2d0 drivers/net/wireguard/send.c:94
wg_receive_handshake_packet drivers/net/wireguard/receive.c:154 [inline]
wg_packet_handshake_receive_worker+0x629/0xfd0 drivers/net/wireguard/receive.c:213
process_one_work kernel/workqueue.c:3263 [inline]
process_scheduled_works+0xae1/0x17b0 kernel/workqueue.c:3346
worker_thread+0x8a0/0xda0 kernel/workqueue.c:3427
kthread+0x711/0x8a0 kernel/kthread.c:463
ret_from_fork+0x4bc/0x870 arch/x86/kernel/process.c:158
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245
net_ratelimit: 12469 callbacks suppressed
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
net_ratelimit: 11389 callbacks suppressed
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ca:b5:f0:d8:96:fc, vlan:0)