INFO: task kworker/1:0:24 blocked for more than 145 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:0 state:R running task stack:24808 pid:24 tgid:24 ppid:2 task_flags:0x4208060 flags:0x00080000 Workqueue: events_power_efficient reg_check_chans_work Call Trace: context_switch kernel/sched/core.c:5325 [inline] __schedule+0x1798/0x4cc0 kernel/sched/core.c:6929 __schedule_loop kernel/sched/core.c:7011 [inline] schedule+0x165/0x360 kernel/sched/core.c:7026 schedule_preempt_disabled+0x13/0x30 kernel/sched/core.c:7083 __mutex_lock_common kernel/locking/mutex.c:676 [inline] __mutex_lock+0x7e6/0x1350 kernel/locking/mutex.c:760 class_wiphy_constructor include/net/cfg80211.h:6358 [inline] reg_leave_invalid_chans net/wireless/reg.c:2441 [inline] reg_check_chans_work+0x170/0xf40 net/wireless/reg.c:2456 Showing all locks held in the system: 4 locks held by kthreadd/2: 1 lock held by kworker/R-mm_pe/14: 2 locks held by kworker/1:0/24: 1 lock held by khungtaskd/31: #0: ffffffff8df3d2e0 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire include/linux/rcupdate.h:331 [inline] #0: ffffffff8df3d2e0 (rcu_read_lock){....}-{1:3}, at: rcu_read_lock include/linux/rcupdate.h:867 [inline] #0: ffffffff8df3d2e0 (rcu_read_lock){....}-{1:3}, at: debug_show_all_locks+0x2e/0x180 kernel/locking/lockdep.c:6775 5 locks held by kworker/1:2/90: 4 locks held by kworker/0:2/984: 1 lock held by kworker/R-ipv6_/3185: #0: ffffffff8dde3be8 (wq_pool_attach_mutex){+.+.}-{4:4}, at: worker_detach_from_pool kernel/workqueue.c:2736 [inline] #0: ffffffff8dde3be8 (wq_pool_attach_mutex){+.+.}-{4:4}, at: rescuer_thread+0x88b/0xdd0 kernel/workqueue.c:3556 5 locks held by dhcpcd/5497: 2 locks held by getty/5594: #0: ffff88802fdf70a0 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x25/0x70 drivers/tty/tty_ldisc.c:243 #1: ffffc900036bb2f0 (&ldata->atomic_read_lock){+.+.}-{4:4}, at: n_tty_read+0x43e/0x1400 drivers/tty/n_tty.c:2222 2 locks held by syz-executor/5819: 1 lock held by syz-executor/5829: 1 lock held by syz-executor/5839: 1 lock held by syz-executor/5843: 1 lock held by kworker/R-wg-cr/5874: #0: ffffffff8dde3be8 (wq_pool_attach_mutex){+.+.}-{4:4}, at: worker_detach_from_pool kernel/workqueue.c:2736 [inline] #0: ffffffff8dde3be8 (wq_pool_attach_mutex){+.+.}-{4:4}, at: rescuer_thread+0x88b/0xdd0 kernel/workqueue.c:3556 5 locks held by kworker/0:5/5900: 7 locks held by kworker/1:5/5909: 4 locks held by kworker/1:6/5966: 3 locks held by syz.2.757/8607: 3 locks held by syz-executor/8634: ============================================= NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 31 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 Call Trace: dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120 nmi_cpu_backtrace+0x39e/0x3d0 lib/nmi_backtrace.c:113 nmi_trigger_cpumask_backtrace+0x17a/0x300 lib/nmi_backtrace.c:62 trigger_all_cpu_backtrace include/linux/nmi.h:160 [inline] check_hung_uninterruptible_tasks kernel/hung_task.c:332 [inline] watchdog+0xf60/0xfa0 kernel/hung_task.c:495 kthread+0x711/0x8a0 kernel/kthread.c:463 ret_from_fork+0x4bc/0x870 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 12 Comm: kworker/u8:0 Not tainted syzkaller #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 Workqueue: events_unbound nsim_dev_trap_report_work RIP: 0010:__sanitizer_cov_trace_pc+0x5d/0x70 kernel/kcov.c:235 Code: 58 16 00 00 83 fa 02 75 21 48 8b 91 60 16 00 00 48 8b 32 48 8d 7e 01 8b 89 5c 16 00 00 48 39 cf 73 08 48 89 3a 48 89 44 f2 08 4e f0 88 09 cc 66 66 66 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 RSP: 0018:ffffc90000a07d98 EFLAGS: 00000246 RAX: ffffffff89f91e4d RBX: 0000000000000001 RCX: ffff88801ca8dac0 RDX: 0000000000000100 RSI: ffffffff8bbf0440 RDI: ffffffff8bbf0400 RBP: ffffc90000a07eb0 R08: ffffffff8f7cd377 R09: 1ffffffff1ef9a6e R10: dffffc0000000000 R11: fffffbfff1ef9a6f R12: ffff888023b91280 R13: ffffffff89f91c92 R14: dffffc0000000000 R15: ffffffff89f91c92 FS: 0000000000000000(0000) GS:ffff88812623e000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007ff4c6000218 CR3: 000000000dd38000 CR4: 00000000003526f0 Call Trace: rcu_read_unlock include/linux/rcupdate.h:895 [inline] ip6_pol_route+0x31d/0x1180 net/ipv6/route.c:2314 pol_lookup_func include/net/ip6_fib.h:617 [inline] fib6_rule_lookup+0x52f/0x6f0 net/ipv6/fib6_rules.c:120 ip6_route_input_lookup net/ipv6/route.c:2338 [inline] ip6_route_input+0x6de/0xad0 net/ipv6/route.c:2641 ip6_rcv_finish+0x141/0x2e0 net/ipv6/ip6_input.c:77 NF_HOOK+0x30c/0x3a0 include/linux/netfilter.h:318 __netif_receive_skb_one_core net/core/dev.c:6079 [inline] __netif_receive_skb+0xd3/0x380 net/core/dev.c:6192 netif_receive_skb_internal net/core/dev.c:6278 [inline] netif_receive_skb+0x1cb/0x790 net/core/dev.c:6337 NF_HOOK+0xa0/0x390 include/linux/netfilter.h:319 br_handle_frame_finish+0x15c6/0x1c50 net/bridge/br_input.c:235 nf_hook_bridge_pre net/bridge/br_input.c:313 [inline] br_handle_frame+0xb89/0x14c0 net/bridge/br_input.c:442 __netif_receive_skb_core+0x10b9/0x4380 net/core/dev.c:5966 __netif_receive_skb_one_core net/core/dev.c:6077 [inline] __netif_receive_skb+0x72/0x380 net/core/dev.c:6192 process_backlog+0x60e/0x14f0 net/core/dev.c:6544 __napi_poll+0xc7/0x360 net/core/dev.c:7594 napi_poll net/core/dev.c:7657 [inline] net_rx_action+0x5f7/0xdf0 net/core/dev.c:7784 handle_softirqs+0x286/0x870 kernel/softirq.c:622 do_softirq+0xec/0x180 kernel/softirq.c:523 __local_bh_enable_ip+0x17d/0x1c0 kernel/softirq.c:450 spin_unlock_bh include/linux/spinlock.h:396 [inline] nsim_dev_trap_report drivers/net/netdevsim/dev.c:835 [inline] nsim_dev_trap_report_work+0x7c7/0xb80 drivers/net/netdevsim/dev.c:866 process_one_work kernel/workqueue.c:3263 [inline] process_scheduled_works+0xae1/0x17b0 kernel/workqueue.c:3346 worker_thread+0x8a0/0xda0 kernel/workqueue.c:3427 kthread+0x711/0x8a0 kernel/kthread.c:463 ret_from_fork+0x4bc/0x870 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 net_ratelimit: 15941 callbacks suppressed bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)