RBP: 00007f2835ebc296 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000000 R14: 00007f2836001f80 R15: 00007ffd18657dd8 watchdog: BUG: soft lockup - CPU#1 stuck for 226s! [syz.0.550:3586] Modules linked in: CPU: 1 PID: 3586 Comm: syz.0.550 Not tainted 5.15.167-syzkaller-02003-g5e4635681cf1 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 RIP: 0010:rt6_get_pcpu_route net/ipv6/route.c:1399 [inline] RIP: 0010:ip6_pol_route+0x54b/0x14b0 net/ipv6/route.c:2259 Code: fd 48 8b 9c 24 b0 00 00 00 48 83 c3 50 48 89 d8 48 c1 e8 03 42 80 3c 28 00 74 08 48 89 df e8 ec ae 5a fd 48 8b 03 65 4c 8b 38 <31> ff 4c 89 fe e8 3b 61 18 fd 4d 85 ff 0f 84 ae 00 00 00 49 8d 5f RSP: 0018:ffffc900001cfda0 EFLAGS: 00000246 RAX: 0000607e08c3c2d8 RBX: ffff888112e3c100 RCX: ffffffff874d5f03 RDX: 0000000000000100 RSI: 0000000000000000 RDI: 0000000000000200 RBP: ffffc900001cfef8 R08: ffffffff8457f9db R09: ffff88811fd2cb40 R10: ffffc900001cfd20 R11: dffffc0000000001 R12: ffffc900001d0148 R13: dffffc0000000000 R14: ffffc900001cfe30 R15: ffff888121ec5a00 FS: 0000000000000000(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000020001080 CR3: 000000012931f000 CR4: 00000000003506a0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: ip6_pol_route_input+0x55/0x80 net/ipv6/route.c:2283 pol_lookup_func include/net/ip6_fib.h:592 [inline] fib6_rule_lookup+0x25a/0x620 net/ipv6/fib6_rules.c:115 ip6_route_input_lookup net/ipv6/route.c:2295 [inline] ip6_route_input+0x724/0xb60 net/ipv6/route.c:2591 ip6_rcv_finish_core net/ipv6/ip6_input.c:66 [inline] ip6_rcv_finish+0x150/0x350 net/ipv6/ip6_input.c:77 NF_HOOK include/linux/netfilter.h:305 [inline] ipv6_rcv+0xeb/0x270 net/ipv6/ip6_input.c:300 __netif_receive_skb_one_core net/core/dev.c:5492 [inline] __netif_receive_skb+0x1c6/0x530 net/core/dev.c:5606 netif_receive_skb_internal net/core/dev.c:5692 [inline] netif_receive_skb+0xb0/0x480 net/core/dev.c:5751 br_netif_receive_skb net/bridge/br_input.c:30 [inline] NF_HOOK include/linux/netfilter.h:305 [inline] br_pass_frame_up+0x24b/0x4a0 net/bridge/br_input.c:70 br_handle_frame_finish+0xf6f/0x12b0 nf_hook_bridge_pre net/bridge/br_input.c:264 [inline] br_handle_frame+0x8ea/0xf70 net/bridge/br_input.c:384 __netif_receive_skb_core+0x11af/0x3640 net/core/dev.c:5386 __netif_receive_skb_one_core net/core/dev.c:5490 [inline] __netif_receive_skb+0x11c/0x530 net/core/dev.c:5606 process_backlog+0x31c/0x650 net/core/dev.c:6483 __napi_poll+0xc4/0x5a0 net/core/dev.c:7042 napi_poll net/core/dev.c:7109 [inline] net_rx_action+0x47d/0xc50 net/core/dev.c:7199 handle_softirqs+0x25e/0x5c0 kernel/softirq.c:565 __do_softirq kernel/softirq.c:603 [inline] invoke_softirq kernel/softirq.c:425 [inline] __irq_exit_rcu+0x52/0xf0 kernel/softirq.c:652 irq_exit_rcu+0x9/0x10 kernel/softirq.c:664 sysvec_apic_timer_interrupt+0x9a/0xc0 arch/x86/kernel/apic/apic.c:1096 asm_sysvec_apic_timer_interrupt+0x1b/0x20 arch/x86/include/asm/idtentry.h:638 RIP: 0010:mm_update_next_owner+0x23a/0x630 kernel/exit.c:439 Code: 8b 1f bf 02 00 00 00 89 de e8 12 f6 2d 00 83 fb 01 0f 8e fb 02 00 00 49 8d 9d 5c fb ff ff 48 89 d8 48 c1 e8 03 42 0f b6 04 20 <84> c0 0f 85 15 01 00 00 8b 1b be 00 00 20 00 21 de 31 ff e8 de f5 RSP: 0018:ffffc90000bf7970 EFLAGS: 00000a03 RAX: 0000000000000000 RBX: ffff88811651bb6c RCX: ffffffff814264fe RDX: ffff888107dc93c0 RSI: 0000000000000002 RDI: 0000000000000002 RBP: ffffc90000bf79f0 R08: ffffffff8142651e R09: ffffed1022cfbe9c R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 R13: ffff88811651c010 R14: ffff8881167df868 R15: ffff8881167df4dc exit_mm kernel/exit.c:552 [inline] do_exit+0xb8a/0x2ca0 kernel/exit.c:867 do_group_exit+0x141/0x310 kernel/exit.c:1002 get_signal+0x7a3/0x1630 kernel/signal.c:2904 arch_do_signal_or_restart+0xbd/0x1680 arch/x86/kernel/signal.c:867 handle_signal_work kernel/entry/common.c:154 [inline] exit_to_user_mode_loop+0xa0/0xe0 kernel/entry/common.c:178 exit_to_user_mode_prepare+0x5a/0xa0 kernel/entry/common.c:214 __syscall_exit_to_user_mode_work kernel/entry/common.c:296 [inline] syscall_exit_to_user_mode+0x26/0x160 kernel/entry/common.c:307 do_syscall_64+0x47/0xb0 arch/x86/entry/common.c:86 entry_SYSCALL_64_after_hwframe+0x66/0xd0 RIP: 0033:0x7f2835e49ff9 Code: Unable to access opcode bytes at RIP 0x7f2835e49fcf. RSP: 002b:00007f2834ac3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: 0000000000000000 RBX: 00007f2836001f80 RCX: 00007f2835e49ff9 RDX: 00000000200006c0 RSI: 0000000000005452 RDI: 0000000000000003 RBP: 00007f2835ebc296 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000000 R14: 00007f2836001f80 R15: 00007ffd18657dd8 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 PID: 3590 Comm: syz.2.551 Not tainted 5.15.167-syzkaller-02003-g5e4635681cf1 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 RIP: 0010:queued_write_lock_slowpath+0x154/0x440 kernel/locking/qrwlock.c:78 Code: a2 76 5d 00 f0 41 81 0f 00 01 00 00 48 8b 5c 24 08 43 0f b6 04 2e 84 c0 0f 85 94 00 00 00 41 8b 07 3d 00 01 00 00 74 27 f3 90 <43> 0f b6 04 2e 84 c0 74 eb 44 89 f9 80 e1 07 80 c1 03 38 c1 7c de RSP: 0018:ffffc90000e8fbe0 EFLAGS: 00000006 RAX: 0000000000000300 RBX: 1ffff920001d1f86 RCX: ffffffff815534be RDX: 0000000000000001 RSI: 0000000000000004 RDI: ffffffff86a0a040 RBP: ffffc90000e8fc90 R08: dffffc0000000000 R09: fffffbfff0d41409 R10: 0000000000000000 R11: dffffc0000000001 R12: ffffc90000e8fc30 R13: dffffc0000000000 R14: 1ffffffff0d41408 R15: ffffffff86a0a040 FS: 0000000000000000(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000001b2cd10ff8 CR3: 00000001214f6000 CR4: 00000000003506b0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 Call Trace: queued_write_lock include/asm-generic/qrwlock.h:97 [inline] __raw_write_lock_irq include/linux/rwlock_api_smp.h:197 [inline] _raw_write_lock_irq+0x10b/0x170 kernel/locking/spinlock.c:316 exit_notify kernel/exit.c:720 [inline] do_exit+0xce5/0x2ca0 kernel/exit.c:900 do_group_exit+0x141/0x310 kernel/exit.c:1002 __do_sys_exit_group kernel/exit.c:1013 [inline] __se_sys_exit_group kernel/exit.c:1011 [inline] __x64_sys_exit_group+0x3f/0x40 kernel/exit.c:1011 x64_sys_call+0x610/0x9a0 arch/x86/include/generated/asm/syscalls_64.h:232 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x3b/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x66/0xd0 RIP: 0033:0x7fcd69efcff9 Code: Unable to access opcode bytes at RIP 0x7fcd69efcfcf. RSP: 002b:00007ffee38084a8 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fcd69efcff9 RDX: 0000000000000064 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 00007ffee38084fc R08: 00007ffee380858f R09: 00000000000cd9cf R10: 0000000000000006 R11: 0000000000000246 R12: 0000000000000032 R13: 00000000000cd9cf R14: 00000000000cd3ed R15: 00007ffee3808550