watchdog: BUG: soft lockup - CPU#1 stuck for 123s! [syz.7.5545:20020]
Modules linked in:
CPU: 1 PID: 20020 Comm: syz.7.5545 Tainted: G W syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026
RIP: 0010:__sanitizer_cov_trace_switch+0x4/0xe0 kernel/kcov.c:303
Code: 28 4d 39 ca 77 1e 4a c7 44 02 08 07 00 00 00 4a 89 7c 02 10 4a 89 74 02 18 4a 89 44 02 20 48 ff c1 48 89 0a 5d c3 48 8b 4e 08 <48> 83 c1 f8 48 c1 c1 3d 48 83 f9 08 0f 92 c0 b2 8b d2 ea 20 c2 80
RSP: 0018:ffffc90000170c18 EFLAGS: 00000246
RAX: 0000000000000000 RBX: 000000000000dd86 RCX: 0000000000000010
RDX: 0000000000000101 RSI: ffffffff86b543a0 RDI: 000000000000dd86
RBP: ffffc90000170d18 R08: ffff8881d8a8e2c0 R09: 0000000000000002
R10: 000000000000dd86 R11: 0000000000000101 R12: ffff88814c5c3c18
R13: ffff88814c5c3c08 R14: dffffc0000000000 R15: ffff88814c5c3c00
FS: 00007f76c91ef6c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000001b2fd20ff8 CR3: 00000001d5730000 CR4: 00000000003506a0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600
Call Trace:
<IRQ>
br_multicast_host_leave net/bridge/br_multicast.c:1216 [inline]
br_multicast_group_expired+0x2b2/0x5f0 net/bridge/br_multicast.c:541
call_timer_fn+0x38/0x290 kernel/time/timer.c:1450
expire_timers kernel/time/timer.c:1495 [inline]
__run_timers+0x650/0x9e0 kernel/time/timer.c:1789
run_timer_softirq+0x6a/0xf0 kernel/time/timer.c:1802
__do_softirq+0x255/0x563 kernel/softirq.c:309
asm_call_irq_on_stack+0xf/0x20
</IRQ>
__run_on_irqstack arch/x86/include/asm/irq_stack.h:26 [inline]
run_on_irqstack_cond arch/x86/include/asm/irq_stack.h:77 [inline]
do_softirq_own_stack+0x60/0x80 arch/x86/kernel/irq_64.c:77
invoke_softirq kernel/softirq.c:405 [inline]
__irq_exit_rcu+0x128/0x150 kernel/softirq.c:435
irq_exit_rcu+0x9/0x10 kernel/softirq.c:447
sysvec_apic_timer_interrupt+0xbf/0xe0 arch/x86/kernel/apic/apic.c:1106
asm_sysvec_apic_timer_interrupt+0x12/0x20 arch/x86/include/asm/idtentry.h:635
RIP: 0010:do_inode_permission fs/namei.c:399 [inline]
RIP: 0010:inode_permission+0x6d/0x520 fs/namei.c:466
Code: 00 00 e8 c6 30 bb ff 4c 89 f3 4d 8d 66 02 4d 89 e7 49 c1 ef 03 4d 89 ee 43 0f b6 04 2f 84 c0 0f 85 97 03 00 00 45 0f b7 2c 24 <44> 89 ee 83 e6 01 31 ff e8 b6 33 bb ff 41 83 e5 01 0f 84 84 01 00
RSP: 0018:ffffc9000922fa30 EFLAGS: 00000246
RAX: 0000000000000000 RBX: ffff8881d0f8fa60 RCX: 0000000000080000
RDX: ffffc9005ee98000 RSI: 000000000000011c RDI: 000000000000011d
RBP: ffffc9000922fa70 R08: ffffc9000922fc2f R09: 1ffff92001245f85
R10: dffffc0000000000 R11: fffff52001245f86 R12: ffff8881d0f8fa62
R13: 000000000000000b R14: dffffc0000000000 R15: 1ffff1103a1f1f4c
may_lookup fs/namei.c:1677 [inline]
link_path_walk+0x240/0xba0 fs/namei.c:2225
path_parentat fs/namei.c:2487 [inline]
filename_parentat+0x200/0x5e0 fs/namei.c:2509
filename_create+0xd4/0x680 fs/namei.c:3598
user_path_create fs/namei.c:3673 [inline]
do_mkdirat+0x5e/0x340 fs/namei.c:3813
__do_sys_mkdirat fs/namei.c:3831 [inline]
__se_sys_mkdirat fs/namei.c:3829 [inline]
__x64_sys_mkdirat+0x7b/0x90 fs/namei.c:3829
do_syscall_64+0x31/0x40 arch/x86/entry/common.c:46
entry_SYSCALL_64_after_hwframe+0x61/0xcb
RIP: 0033:0x7f76ca7b5819
Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f76c91ef028 EFLAGS: 00000246 ORIG_RAX: 0000000000000102
RAX: ffffffffffffffda RBX: 00007f76caa2f090 RCX: 00007f76ca7b5819
RDX: 00000000000001ff RSI: 0000200000000000 RDI: ffffffffffffff9c
RBP: 00007f76ca84bc91 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007f76caa2f128 R14: 00007f76caa2f090 R15: 00007ffc20be5548
Sending NMI from CPU 1 to CPUs 0:
NMI backtrace for cpu 0
CPU: 0 PID: 1954 Comm: kworker/0:25 Tainted: G W syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026
Workqueue: events bpf_map_free_deferred
RIP: 0010:__find_rr_leaf+0x318/0x9e0 net/ipv6/route.c:-1
Code: c0 0f 85 3c 03 00 00 0f b6 1b 48 8b 44 24 70 42 0f b6 04 28 84 c0 0f 85 41 03 00 00 48 8b 44 24 20 88 18 eb 1b e8 48 9c 64 fd <eb> 05 e8 41 9c 64 fd 49 bd 00 00 00 00 00 fc ff df 4c 8b 7c 24 38
RSP: 0018:ffffc90000007440 EFLAGS: 00000246
RAX: ffffffff84001708 RBX: 1ffff11024a2fe8a RCX: ffff88811118cf00
RDX: 0000000080000101 RSI: 00000000fffffffd RDI: 00000000fffffffd
RBP: ffffc900000075b8 R08: ffffc900000076e0 R09: ffffc900000076f0
R10: dffffc0000000000 R11: fffff52000000efe R12: ffff88812517f4a8
R13: ffff88812517f498 R14: ffff88812517f400 R15: 0000000000000001
FS: 0000000000000000(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f2d3473cff8 CR3: 0000000195970000 CR4: 00000000003506b0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600
Call Trace:
<IRQ>
find_rr_leaf net/ipv6/route.c:848 [inline]
rt6_select net/ipv6/route.c:892 [inline]
fib6_table_lookup+0x314/0xa20 net/ipv6/route.c:2190
ip6_pol_route+0x152/0x1170 net/ipv6/route.c:2226
ip6_pol_route_input+0x56/0x80 net/ipv6/route.c:2284
pol_lookup_func include/net/ip6_fib.h:594 [inline]
fib6_rule_lookup+0x20a/0x5d0 net/ipv6/fib6_rules.c:115
ip6_route_input_lookup net/ipv6/route.c:2296 [inline]
ip6_route_input+0x628/0x840 net/ipv6/route.c:2465
ip6_rcv_finish_core net/ipv6/ip6_input.c:67 [inline]
ip6_rcv_finish+0x155/0x360 net/ipv6/ip6_input.c:78
NF_HOOK include/linux/netfilter.h:299 [inline]
ipv6_rcv+0xf0/0x230 net/ipv6/ip6_input.c:301
__netif_receive_skb_one_core net/core/dev.c:5415 [inline]
__netif_receive_skb+0xc8/0x280 net/core/dev.c:5529
process_backlog+0x368/0x600 net/core/dev.c:6436
napi_poll net/core/dev.c:6887 [inline]
net_rx_action+0x44d/0xe00 net/core/dev.c:6957
__do_softirq+0x255/0x563 kernel/softirq.c:309
asm_call_irq_on_stack+0xf/0x20
</IRQ>
__run_on_irqstack arch/x86/include/asm/irq_stack.h:26 [inline]
run_on_irqstack_cond arch/x86/include/asm/irq_stack.h:77 [inline]
do_softirq_own_stack+0x60/0x80 arch/x86/kernel/irq_64.c:77
do_softirq+0xb0/0xf0 kernel/softirq.c:358
__local_bh_enable_ip+0x70/0x80 kernel/softirq.c:194
__raw_spin_unlock_bh include/linux/spinlock_api_smp.h:176 [inline]
_raw_spin_unlock_bh+0x51/0x60 kernel/locking/spinlock.c:207
sock_hash_free+0x2cd/0x5f0 net/core/sock_map.c:1206
bpf_map_free_deferred+0xaf/0x110 kernel/bpf/syscall.c:486
process_one_work+0x6e1/0xba0 kernel/workqueue.c:2301
worker_thread+0xa6a/0x13c0 kernel/workqueue.c:2447
kthread+0x346/0x3d0 kernel/kthread.c:313
ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:298
net_ratelimit: 35256 callbacks suppressed
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:ec:b6:b1:8d:c9, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:20:00:00, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:ec:b6:b1:8d:c9, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:fa:ec:b6:b1:8d:c9, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:20:00:00, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)