watchdog: BUG: soft lockup - CPU#0 stuck for 139s! [syz.3.2449:9342]
Modules linked in:
CPU: 0 PID: 9342 Comm: syz.3.2449 Tainted: G W 5.10.221-syzkaller-01371-g1240968f7644 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
RIP: 0010:__raw_write_unlock_irq include/linux/rwlock_api_smp.h:268 [inline]
RIP: 0010:_raw_write_unlock_irq+0x2a/0x60 kernel/locking/spinlock.c:343
Code: 55 48 89 e5 53 48 89 fb 48 89 f8 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df 0f b6 04 08 84 c0 75 23 c6 03 00 fb bf 01 00 00 00 <e8> 61 3d 97 fc 65 8b 05 d6 9c 50 7b 85 c0 74 03 5b 5d c3 e8 42 ab
RSP: 0018:ffffc90000dd7d28 EFLAGS: 00000246
RAX: 0000000000000000 RBX: ffffffff8660a040 RCX: dffffc0000000000
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000001
RBP: ffffc90000dd7d30 R08: ffffffff813f2d8a R09: 0000000000000003
R10: fffff520001baf86 R11: dffffc0000000001 R12: 0000000000000000
R13: 1ffff1102231c0a4 R14: ffff888111a8f700 R15: ffff8881118e0524
FS: 0000000000000000(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000000 CR3: 0000000112f0d000 CR4: 00000000003506b0
DR0: 0000000020000300 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff1 DR7: 0000000000000600
Call Trace:
<IRQ>
</IRQ>
exit_notify kernel/exit.c:731 [inline]
do_exit+0x1c03/0x2a50 kernel/exit.c:881
do_group_exit+0x141/0x310 kernel/exit.c:983
__do_sys_exit_group kernel/exit.c:994 [inline]
__se_sys_exit_group kernel/exit.c:992 [inline]
__x64_sys_exit_group+0x3f/0x40 kernel/exit.c:992
do_syscall_64+0x34/0x70
entry_SYSCALL_64_after_hwframe+0x61/0xcb
RIP: 0033:0x7f3a2a5e2b59
Code: Unable to access opcode bytes at RIP 0x7f3a2a5e2b2f.
RSP: 002b:00007ffc27904318 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f3a2a5e2b59
RDX: 0000000000000064 RSI: 0000000000000000 RDI: 0000000000000000
RBP: 0000000000000001 R08: 0000000d2790443f R09: 0000000000000000
R10: 0000000000000001 R11: 0000000000000246 R12: 00007ffc27904400
R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffc27904400
Sending NMI from CPU 0 to CPUs 1:
NMI backtrace for cpu 1
CPU: 1 PID: 7285 Comm: kworker/1:52 Tainted: G W 5.10.221-syzkaller-01371-g1240968f7644 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
Workqueue: wg-crypt-wg1 wg_packet_encrypt_worker
RIP: 0010:__in6_dev_get include/net/addrconf.h:343 [inline]
RIP: 0010:ip6_ignore_linkdown include/net/addrconf.h:434 [inline]
RIP: 0010:find_match+0xb9/0xd70 net/ipv6/route.c:739
Code: 08 48 89 df e8 98 e2 7d fd 48 89 d8 bb e0 02 00 00 48 03 18 48 89 d8 48 c1 e8 03 42 80 3c 20 00 74 08 48 89 df e8 77 e2 7d fd <4c> 8b 23 4d 85 e4 0f 84 30 0a 00 00 49 81 c4 9c 01 00 00 4c 89 e0
RSP: 0018:ffffc9000016fc30 EFLAGS: 00000246
RAX: 1ffff11023d3505c RBX: ffff88811e9a82e0 RCX: ffff88812239cf00
RDX: ffff88812239cf00 RSI: 0000000000000000 RDI: 0000000000000000
RBP: ffffc9000016fcb0 R08: ffffffff842a592f R09: ffffc9000016ff70
R10: ffffc9000016ff60 R11: dffffc0000000001 R12: dffffc0000000000
R13: 1ffff11023e2cc95 R14: 0000000000000000 R15: 0000000000000003
FS: 0000000000000000(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000000 CR3: 000000011dd9d000 CR4: 00000000003506a0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600
Call Trace:
<NMI>
</NMI>
<IRQ>
__find_rr_leaf+0x276/0xb70 net/ipv6/route.c:827
find_rr_leaf net/ipv6/route.c:848 [inline]
rt6_select net/ipv6/route.c:892 [inline]
fib6_table_lookup+0x338/0xaf0 net/ipv6/route.c:2190
ip6_pol_route+0x151/0x14b0 net/ipv6/route.c:2226
ip6_pol_route_input+0x55/0x80 net/ipv6/route.c:2284
pol_lookup_func include/net/ip6_fib.h:594 [inline]
fib6_rule_lookup+0x25a/0x620 net/ipv6/fib6_rules.c:115
ip6_route_input_lookup net/ipv6/route.c:2296 [inline]
ip6_route_input+0x726/0xb00 net/ipv6/route.c:2465
ip6_rcv_finish_core net/ipv6/ip6_input.c:67 [inline]
ip6_rcv_finish+0x14f/0x350 net/ipv6/ip6_input.c:78
NF_HOOK include/linux/netfilter.h:299 [inline]
ipv6_rcv+0xee/0x270 net/ipv6/ip6_input.c:301
__netif_receive_skb_one_core net/core/dev.c:5382 [inline]
__netif_receive_skb+0x1c6/0x530 net/core/dev.c:5496
netif_receive_skb_internal net/core/dev.c:5601 [inline]
netif_receive_skb+0xb0/0x480 net/core/dev.c:5660
br_netif_receive_skb net/bridge/br_input.c:30 [inline]
NF_HOOK include/linux/netfilter.h:299 [inline]
br_pass_frame_up+0x177/0x1f0 net/bridge/br_input.c:72
br_handle_frame_finish+0xe71/0x1180 net/bridge/br_input.c:179
nf_hook_bridge_pre net/bridge/br_input.c:259 [inline]
br_handle_frame+0x3f0/0x8d0 net/bridge/br_input.c:363
__netif_receive_skb_core+0x11a9/0x3760 net/core/dev.c:5276
__netif_receive_skb_one_core net/core/dev.c:5380 [inline]
__netif_receive_skb+0x11c/0x530 net/core/dev.c:5496
process_backlog+0x31c/0x650 net/core/dev.c:6403
napi_poll net/core/dev.c:6854 [inline]
net_rx_action+0x516/0x10d0 net/core/dev.c:6924
__do_softirq+0x268/0x5bb kernel/softirq.c:309
asm_call_irq_on_stack+0xf/0x20
</IRQ>
__run_on_irqstack arch/x86/include/asm/irq_stack.h:26 [inline]
run_on_irqstack_cond arch/x86/include/asm/irq_stack.h:77 [inline]
do_softirq_own_stack+0x60/0x80 arch/x86/kernel/irq_64.c:77
do_softirq+0xca/0x110 kernel/softirq.c:358
__local_bh_enable_ip+0x70/0x80 kernel/softirq.c:194
__raw_spin_unlock_bh include/linux/spinlock_api_smp.h:176 [inline]
_raw_spin_unlock_bh+0x51/0x60 kernel/locking/spinlock.c:207
spin_unlock_bh include/linux/spinlock.h:399 [inline]
ptr_ring_consume_bh include/linux/ptr_ring.h:367 [inline]
wg_packet_encrypt_worker+0x14a0/0x1540 drivers/net/wireguard/send.c:293
process_one_work+0x6dc/0xbd0 kernel/workqueue.c:2301
worker_thread+0xaea/0x1510 kernel/workqueue.c:2447
kthread+0x34b/0x3d0 kernel/kthread.c:313
ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:298
net_ratelimit: 37295 callbacks suppressed
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
net_ratelimit: 65533 callbacks suppressed
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)