RBP: 00007f2835ebc296 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 0000000000000000 R14: 00007f2836001f80 R15: 00007ffd18657dd8
watchdog: BUG: soft lockup - CPU#1 stuck for 226s! [syz.0.550:3586]
Modules linked in:
CPU: 1 PID: 3586 Comm: syz.0.550 Not tainted 5.15.167-syzkaller-02003-g5e4635681cf1 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
RIP: 0010:rt6_get_pcpu_route net/ipv6/route.c:1399 [inline]
RIP: 0010:ip6_pol_route+0x54b/0x14b0 net/ipv6/route.c:2259
Code: fd 48 8b 9c 24 b0 00 00 00 48 83 c3 50 48 89 d8 48 c1 e8 03 42 80 3c 28 00 74 08 48 89 df e8 ec ae 5a fd 48 8b 03 65 4c 8b 38 <31> ff 4c 89 fe e8 3b 61 18 fd 4d 85 ff 0f 84 ae 00 00 00 49 8d 5f
RSP: 0018:ffffc900001cfda0 EFLAGS: 00000246
RAX: 0000607e08c3c2d8 RBX: ffff888112e3c100 RCX: ffffffff874d5f03
RDX: 0000000000000100 RSI: 0000000000000000 RDI: 0000000000000200
RBP: ffffc900001cfef8 R08: ffffffff8457f9db R09: ffff88811fd2cb40
R10: ffffc900001cfd20 R11: dffffc0000000001 R12: ffffc900001d0148
R13: dffffc0000000000 R14: ffffc900001cfe30 R15: ffff888121ec5a00
FS: 0000000000000000(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000020001080 CR3: 000000012931f000 CR4: 00000000003506a0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
ip6_pol_route_input+0x55/0x80 net/ipv6/route.c:2283
pol_lookup_func include/net/ip6_fib.h:592 [inline]
fib6_rule_lookup+0x25a/0x620 net/ipv6/fib6_rules.c:115
ip6_route_input_lookup net/ipv6/route.c:2295 [inline]
ip6_route_input+0x724/0xb60 net/ipv6/route.c:2591
ip6_rcv_finish_core net/ipv6/ip6_input.c:66 [inline]
ip6_rcv_finish+0x150/0x350 net/ipv6/ip6_input.c:77
NF_HOOK include/linux/netfilter.h:305 [inline]
ipv6_rcv+0xeb/0x270 net/ipv6/ip6_input.c:300
__netif_receive_skb_one_core net/core/dev.c:5492 [inline]
__netif_receive_skb+0x1c6/0x530 net/core/dev.c:5606
netif_receive_skb_internal net/core/dev.c:5692 [inline]
netif_receive_skb+0xb0/0x480 net/core/dev.c:5751
br_netif_receive_skb net/bridge/br_input.c:30 [inline]
NF_HOOK include/linux/netfilter.h:305 [inline]
br_pass_frame_up+0x24b/0x4a0 net/bridge/br_input.c:70
br_handle_frame_finish+0xf6f/0x12b0
nf_hook_bridge_pre net/bridge/br_input.c:264 [inline]
br_handle_frame+0x8ea/0xf70 net/bridge/br_input.c:384
__netif_receive_skb_core+0x11af/0x3640 net/core/dev.c:5386
__netif_receive_skb_one_core net/core/dev.c:5490 [inline]
__netif_receive_skb+0x11c/0x530 net/core/dev.c:5606
process_backlog+0x31c/0x650 net/core/dev.c:6483
__napi_poll+0xc4/0x5a0 net/core/dev.c:7042
napi_poll net/core/dev.c:7109 [inline]
net_rx_action+0x47d/0xc50 net/core/dev.c:7199
handle_softirqs+0x25e/0x5c0 kernel/softirq.c:565
__do_softirq kernel/softirq.c:603 [inline]
invoke_softirq kernel/softirq.c:425 [inline]
__irq_exit_rcu+0x52/0xf0 kernel/softirq.c:652
irq_exit_rcu+0x9/0x10 kernel/softirq.c:664
sysvec_apic_timer_interrupt+0x9a/0xc0 arch/x86/kernel/apic/apic.c:1096
asm_sysvec_apic_timer_interrupt+0x1b/0x20 arch/x86/include/asm/idtentry.h:638
RIP: 0010:mm_update_next_owner+0x23a/0x630 kernel/exit.c:439
Code: 8b 1f bf 02 00 00 00 89 de e8 12 f6 2d 00 83 fb 01 0f 8e fb 02 00 00 49 8d 9d 5c fb ff ff 48 89 d8 48 c1 e8 03 42 0f b6 04 20 <84> c0 0f 85 15 01 00 00 8b 1b be 00 00 20 00 21 de 31 ff e8 de f5
RSP: 0018:ffffc90000bf7970 EFLAGS: 00000a03
RAX: 0000000000000000 RBX: ffff88811651bb6c RCX: ffffffff814264fe
RDX: ffff888107dc93c0 RSI: 0000000000000002 RDI: 0000000000000002
RBP: ffffc90000bf79f0 R08: ffffffff8142651e R09: ffffed1022cfbe9c
R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000
R13: ffff88811651c010 R14: ffff8881167df868 R15: ffff8881167df4dc
exit_mm kernel/exit.c:552 [inline]
do_exit+0xb8a/0x2ca0 kernel/exit.c:867
do_group_exit+0x141/0x310 kernel/exit.c:1002
get_signal+0x7a3/0x1630 kernel/signal.c:2904
arch_do_signal_or_restart+0xbd/0x1680 arch/x86/kernel/signal.c:867
handle_signal_work kernel/entry/common.c:154 [inline]
exit_to_user_mode_loop+0xa0/0xe0 kernel/entry/common.c:178
exit_to_user_mode_prepare+0x5a/0xa0 kernel/entry/common.c:214
__syscall_exit_to_user_mode_work kernel/entry/common.c:296 [inline]
syscall_exit_to_user_mode+0x26/0x160 kernel/entry/common.c:307
do_syscall_64+0x47/0xb0 arch/x86/entry/common.c:86
entry_SYSCALL_64_after_hwframe+0x66/0xd0
RIP: 0033:0x7f2835e49ff9
Code: Unable to access opcode bytes at RIP 0x7f2835e49fcf.
RSP: 002b:00007f2834ac3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: 0000000000000000 RBX: 00007f2836001f80 RCX: 00007f2835e49ff9
RDX: 00000000200006c0 RSI: 0000000000005452 RDI: 0000000000000003
RBP: 00007f2835ebc296 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 0000000000000000 R14: 00007f2836001f80 R15: 00007ffd18657dd8
Sending NMI from CPU 1 to CPUs 0:
NMI backtrace for cpu 0
CPU: 0 PID: 3590 Comm: syz.2.551 Not tainted 5.15.167-syzkaller-02003-g5e4635681cf1 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
RIP: 0010:queued_write_lock_slowpath+0x154/0x440 kernel/locking/qrwlock.c:78
Code: a2 76 5d 00 f0 41 81 0f 00 01 00 00 48 8b 5c 24 08 43 0f b6 04 2e 84 c0 0f 85 94 00 00 00 41 8b 07 3d 00 01 00 00 74 27 f3 90 <43> 0f b6 04 2e 84 c0 74 eb 44 89 f9 80 e1 07 80 c1 03 38 c1 7c de
RSP: 0018:ffffc90000e8fbe0 EFLAGS: 00000006
RAX: 0000000000000300 RBX: 1ffff920001d1f86 RCX: ffffffff815534be
RDX: 0000000000000001 RSI: 0000000000000004 RDI: ffffffff86a0a040
RBP: ffffc90000e8fc90 R08: dffffc0000000000 R09: fffffbfff0d41409
R10: 0000000000000000 R11: dffffc0000000001 R12: ffffc90000e8fc30
R13: dffffc0000000000 R14: 1ffffffff0d41408 R15: ffffffff86a0a040
FS: 0000000000000000(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000001b2cd10ff8 CR3: 00000001214f6000 CR4: 00000000003506b0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600
Call Trace:
queued_write_lock include/asm-generic/qrwlock.h:97 [inline]
__raw_write_lock_irq include/linux/rwlock_api_smp.h:197 [inline]
_raw_write_lock_irq+0x10b/0x170 kernel/locking/spinlock.c:316
exit_notify kernel/exit.c:720 [inline]
do_exit+0xce5/0x2ca0 kernel/exit.c:900
do_group_exit+0x141/0x310 kernel/exit.c:1002
__do_sys_exit_group kernel/exit.c:1013 [inline]
__se_sys_exit_group kernel/exit.c:1011 [inline]
__x64_sys_exit_group+0x3f/0x40 kernel/exit.c:1011
x64_sys_call+0x610/0x9a0 arch/x86/include/generated/asm/syscalls_64.h:232
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x3b/0xb0 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x66/0xd0
RIP: 0033:0x7fcd69efcff9
Code: Unable to access opcode bytes at RIP 0x7fcd69efcfcf.
RSP: 002b:00007ffee38084a8 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fcd69efcff9
RDX: 0000000000000064 RSI: 0000000000000000 RDI: 0000000000000000
RBP: 00007ffee38084fc R08: 00007ffee380858f R09: 00000000000cd9cf
R10: 0000000000000006 R11: 0000000000000246 R12: 0000000000000032
R13: 00000000000cd9cf R14: 00000000000cd3ed R15: 00007ffee3808550