INFO: task kworker/1:0:24 blocked for more than 145 seconds.
Not tainted syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:0 state:R running task stack:24808 pid:24 tgid:24 ppid:2 task_flags:0x4208060 flags:0x00080000
Workqueue: events_power_efficient reg_check_chans_work
Call Trace:
context_switch kernel/sched/core.c:5325 [inline]
__schedule+0x1798/0x4cc0 kernel/sched/core.c:6929
__schedule_loop kernel/sched/core.c:7011 [inline]
schedule+0x165/0x360 kernel/sched/core.c:7026
schedule_preempt_disabled+0x13/0x30 kernel/sched/core.c:7083
__mutex_lock_common kernel/locking/mutex.c:676 [inline]
__mutex_lock+0x7e6/0x1350 kernel/locking/mutex.c:760
class_wiphy_constructor include/net/cfg80211.h:6358 [inline]
reg_leave_invalid_chans net/wireless/reg.c:2441 [inline]
reg_check_chans_work+0x170/0xf40 net/wireless/reg.c:2456
Showing all locks held in the system:
4 locks held by kthreadd/2:
1 lock held by kworker/R-mm_pe/14:
2 locks held by kworker/1:0/24:
1 lock held by khungtaskd/31:
#0: ffffffff8df3d2e0 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire include/linux/rcupdate.h:331 [inline]
#0: ffffffff8df3d2e0 (rcu_read_lock){....}-{1:3}, at: rcu_read_lock include/linux/rcupdate.h:867 [inline]
#0: ffffffff8df3d2e0 (rcu_read_lock){....}-{1:3}, at: debug_show_all_locks+0x2e/0x180 kernel/locking/lockdep.c:6775
5 locks held by kworker/1:2/90:
4 locks held by kworker/0:2/984:
1 lock held by kworker/R-ipv6_/3185:
#0: ffffffff8dde3be8 (wq_pool_attach_mutex){+.+.}-{4:4}, at: worker_detach_from_pool kernel/workqueue.c:2736 [inline]
#0: ffffffff8dde3be8 (wq_pool_attach_mutex){+.+.}-{4:4}, at: rescuer_thread+0x88b/0xdd0 kernel/workqueue.c:3556
5 locks held by dhcpcd/5497:
2 locks held by getty/5594:
#0: ffff88802fdf70a0 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x25/0x70 drivers/tty/tty_ldisc.c:243
#1: ffffc900036bb2f0 (&ldata->atomic_read_lock){+.+.}-{4:4}, at: n_tty_read+0x43e/0x1400 drivers/tty/n_tty.c:2222
2 locks held by syz-executor/5819:
1 lock held by syz-executor/5829:
1 lock held by syz-executor/5839:
1 lock held by syz-executor/5843:
1 lock held by kworker/R-wg-cr/5874:
#0: ffffffff8dde3be8 (wq_pool_attach_mutex){+.+.}-{4:4}, at: worker_detach_from_pool kernel/workqueue.c:2736 [inline]
#0: ffffffff8dde3be8 (wq_pool_attach_mutex){+.+.}-{4:4}, at: rescuer_thread+0x88b/0xdd0 kernel/workqueue.c:3556
5 locks held by kworker/0:5/5900:
7 locks held by kworker/1:5/5909:
4 locks held by kworker/1:6/5966:
3 locks held by syz.2.757/8607:
3 locks held by syz-executor/8634:
=============================================
NMI backtrace for cpu 0
CPU: 0 UID: 0 PID: 31 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT(full)
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025
Call Trace:
dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120
nmi_cpu_backtrace+0x39e/0x3d0 lib/nmi_backtrace.c:113
nmi_trigger_cpumask_backtrace+0x17a/0x300 lib/nmi_backtrace.c:62
trigger_all_cpu_backtrace include/linux/nmi.h:160 [inline]
check_hung_uninterruptible_tasks kernel/hung_task.c:332 [inline]
watchdog+0xf60/0xfa0 kernel/hung_task.c:495
kthread+0x711/0x8a0 kernel/kthread.c:463
ret_from_fork+0x4bc/0x870 arch/x86/kernel/process.c:158
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245
Sending NMI from CPU 0 to CPUs 1:
NMI backtrace for cpu 1
CPU: 1 UID: 0 PID: 12 Comm: kworker/u8:0 Not tainted syzkaller #0 PREEMPT(full)
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025
Workqueue: events_unbound nsim_dev_trap_report_work
RIP: 0010:__sanitizer_cov_trace_pc+0x5d/0x70 kernel/kcov.c:235
Code: 58 16 00 00 83 fa 02 75 21 48 8b 91 60 16 00 00 48 8b 32 48 8d 7e 01 8b 89 5c 16 00 00 48 39 cf 73 08 48 89 3a 48 89 44 f2 08 4e f0 88 09 cc 66 66 66 66 2e 0f 1f 84 00 00 00 00 00 90 90 90
RSP: 0018:ffffc90000a07d98 EFLAGS: 00000246
RAX: ffffffff89f91e4d RBX: 0000000000000001 RCX: ffff88801ca8dac0
RDX: 0000000000000100 RSI: ffffffff8bbf0440 RDI: ffffffff8bbf0400
RBP: ffffc90000a07eb0 R08: ffffffff8f7cd377 R09: 1ffffffff1ef9a6e
R10: dffffc0000000000 R11: fffffbfff1ef9a6f R12: ffff888023b91280
R13: ffffffff89f91c92 R14: dffffc0000000000 R15: ffffffff89f91c92
FS: 0000000000000000(0000) GS:ffff88812623e000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007ff4c6000218 CR3: 000000000dd38000 CR4: 00000000003526f0
Call Trace:
rcu_read_unlock include/linux/rcupdate.h:895 [inline]
ip6_pol_route+0x31d/0x1180 net/ipv6/route.c:2314
pol_lookup_func include/net/ip6_fib.h:617 [inline]
fib6_rule_lookup+0x52f/0x6f0 net/ipv6/fib6_rules.c:120
ip6_route_input_lookup net/ipv6/route.c:2338 [inline]
ip6_route_input+0x6de/0xad0 net/ipv6/route.c:2641
ip6_rcv_finish+0x141/0x2e0 net/ipv6/ip6_input.c:77
NF_HOOK+0x30c/0x3a0 include/linux/netfilter.h:318
__netif_receive_skb_one_core net/core/dev.c:6079 [inline]
__netif_receive_skb+0xd3/0x380 net/core/dev.c:6192
netif_receive_skb_internal net/core/dev.c:6278 [inline]
netif_receive_skb+0x1cb/0x790 net/core/dev.c:6337
NF_HOOK+0xa0/0x390 include/linux/netfilter.h:319
br_handle_frame_finish+0x15c6/0x1c50 net/bridge/br_input.c:235
nf_hook_bridge_pre net/bridge/br_input.c:313 [inline]
br_handle_frame+0xb89/0x14c0 net/bridge/br_input.c:442
__netif_receive_skb_core+0x10b9/0x4380 net/core/dev.c:5966
__netif_receive_skb_one_core net/core/dev.c:6077 [inline]
__netif_receive_skb+0x72/0x380 net/core/dev.c:6192
process_backlog+0x60e/0x14f0 net/core/dev.c:6544
__napi_poll+0xc7/0x360 net/core/dev.c:7594
napi_poll net/core/dev.c:7657 [inline]
net_rx_action+0x5f7/0xdf0 net/core/dev.c:7784
handle_softirqs+0x286/0x870 kernel/softirq.c:622
do_softirq+0xec/0x180 kernel/softirq.c:523
__local_bh_enable_ip+0x17d/0x1c0 kernel/softirq.c:450
spin_unlock_bh include/linux/spinlock.h:396 [inline]
nsim_dev_trap_report drivers/net/netdevsim/dev.c:835 [inline]
nsim_dev_trap_report_work+0x7c7/0xb80 drivers/net/netdevsim/dev.c:866
process_one_work kernel/workqueue.c:3263 [inline]
process_scheduled_works+0xae1/0x17b0 kernel/workqueue.c:3346
worker_thread+0x8a0/0xda0 kernel/workqueue.c:3427
kthread+0x711/0x8a0 kernel/kthread.c:463
ret_from_fork+0x4bc/0x870 arch/x86/kernel/process.c:158
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245
net_ratelimit: 15941 callbacks suppressed
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)