watchdog: BUG: soft lockup - CPU#0 stuck for 139s! [syz.3.2449:9342] Modules linked in: CPU: 0 PID: 9342 Comm: syz.3.2449 Tainted: G W 5.10.221-syzkaller-01371-g1240968f7644 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 RIP: 0010:__raw_write_unlock_irq include/linux/rwlock_api_smp.h:268 [inline] RIP: 0010:_raw_write_unlock_irq+0x2a/0x60 kernel/locking/spinlock.c:343 Code: 55 48 89 e5 53 48 89 fb 48 89 f8 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df 0f b6 04 08 84 c0 75 23 c6 03 00 fb bf 01 00 00 00 61 3d 97 fc 65 8b 05 d6 9c 50 7b 85 c0 74 03 5b 5d c3 e8 42 ab RSP: 0018:ffffc90000dd7d28 EFLAGS: 00000246 RAX: 0000000000000000 RBX: ffffffff8660a040 RCX: dffffc0000000000 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000001 RBP: ffffc90000dd7d30 R08: ffffffff813f2d8a R09: 0000000000000003 R10: fffff520001baf86 R11: dffffc0000000001 R12: 0000000000000000 R13: 1ffff1102231c0a4 R14: ffff888111a8f700 R15: ffff8881118e0524 FS: 0000000000000000(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000000 CR3: 0000000112f0d000 CR4: 00000000003506b0 DR0: 0000000020000300 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000ffff0ff1 DR7: 0000000000000600 Call Trace: exit_notify kernel/exit.c:731 [inline] do_exit+0x1c03/0x2a50 kernel/exit.c:881 do_group_exit+0x141/0x310 kernel/exit.c:983 __do_sys_exit_group kernel/exit.c:994 [inline] __se_sys_exit_group kernel/exit.c:992 [inline] __x64_sys_exit_group+0x3f/0x40 kernel/exit.c:992 do_syscall_64+0x34/0x70 entry_SYSCALL_64_after_hwframe+0x61/0xcb RIP: 0033:0x7f3a2a5e2b59 Code: Unable to access opcode bytes at RIP 0x7f3a2a5e2b2f. RSP: 002b:00007ffc27904318 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f3a2a5e2b59 RDX: 0000000000000064 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 0000000000000001 R08: 0000000d2790443f R09: 0000000000000000 R10: 0000000000000001 R11: 0000000000000246 R12: 00007ffc27904400 R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffc27904400 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 PID: 7285 Comm: kworker/1:52 Tainted: G W 5.10.221-syzkaller-01371-g1240968f7644 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 Workqueue: wg-crypt-wg1 wg_packet_encrypt_worker RIP: 0010:__in6_dev_get include/net/addrconf.h:343 [inline] RIP: 0010:ip6_ignore_linkdown include/net/addrconf.h:434 [inline] RIP: 0010:find_match+0xb9/0xd70 net/ipv6/route.c:739 Code: 08 48 89 df e8 98 e2 7d fd 48 89 d8 bb e0 02 00 00 48 03 18 48 89 d8 48 c1 e8 03 42 80 3c 20 00 74 08 48 89 df e8 77 e2 7d fd <4c> 8b 23 4d 85 e4 0f 84 30 0a 00 00 49 81 c4 9c 01 00 00 4c 89 e0 RSP: 0018:ffffc9000016fc30 EFLAGS: 00000246 RAX: 1ffff11023d3505c RBX: ffff88811e9a82e0 RCX: ffff88812239cf00 RDX: ffff88812239cf00 RSI: 0000000000000000 RDI: 0000000000000000 RBP: ffffc9000016fcb0 R08: ffffffff842a592f R09: ffffc9000016ff70 R10: ffffc9000016ff60 R11: dffffc0000000001 R12: dffffc0000000000 R13: 1ffff11023e2cc95 R14: 0000000000000000 R15: 0000000000000003 FS: 0000000000000000(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000000 CR3: 000000011dd9d000 CR4: 00000000003506a0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 Call Trace: __find_rr_leaf+0x276/0xb70 net/ipv6/route.c:827 find_rr_leaf net/ipv6/route.c:848 [inline] rt6_select net/ipv6/route.c:892 [inline] fib6_table_lookup+0x338/0xaf0 net/ipv6/route.c:2190 ip6_pol_route+0x151/0x14b0 net/ipv6/route.c:2226 ip6_pol_route_input+0x55/0x80 net/ipv6/route.c:2284 pol_lookup_func include/net/ip6_fib.h:594 [inline] fib6_rule_lookup+0x25a/0x620 net/ipv6/fib6_rules.c:115 ip6_route_input_lookup net/ipv6/route.c:2296 [inline] ip6_route_input+0x726/0xb00 net/ipv6/route.c:2465 ip6_rcv_finish_core net/ipv6/ip6_input.c:67 [inline] ip6_rcv_finish+0x14f/0x350 net/ipv6/ip6_input.c:78 NF_HOOK include/linux/netfilter.h:299 [inline] ipv6_rcv+0xee/0x270 net/ipv6/ip6_input.c:301 __netif_receive_skb_one_core net/core/dev.c:5382 [inline] __netif_receive_skb+0x1c6/0x530 net/core/dev.c:5496 netif_receive_skb_internal net/core/dev.c:5601 [inline] netif_receive_skb+0xb0/0x480 net/core/dev.c:5660 br_netif_receive_skb net/bridge/br_input.c:30 [inline] NF_HOOK include/linux/netfilter.h:299 [inline] br_pass_frame_up+0x177/0x1f0 net/bridge/br_input.c:72 br_handle_frame_finish+0xe71/0x1180 net/bridge/br_input.c:179 nf_hook_bridge_pre net/bridge/br_input.c:259 [inline] br_handle_frame+0x3f0/0x8d0 net/bridge/br_input.c:363 __netif_receive_skb_core+0x11a9/0x3760 net/core/dev.c:5276 __netif_receive_skb_one_core net/core/dev.c:5380 [inline] __netif_receive_skb+0x11c/0x530 net/core/dev.c:5496 process_backlog+0x31c/0x650 net/core/dev.c:6403 napi_poll net/core/dev.c:6854 [inline] net_rx_action+0x516/0x10d0 net/core/dev.c:6924 __do_softirq+0x268/0x5bb kernel/softirq.c:309 asm_call_irq_on_stack+0xf/0x20 __run_on_irqstack arch/x86/include/asm/irq_stack.h:26 [inline] run_on_irqstack_cond arch/x86/include/asm/irq_stack.h:77 [inline] do_softirq_own_stack+0x60/0x80 arch/x86/kernel/irq_64.c:77 do_softirq+0xca/0x110 kernel/softirq.c:358 __local_bh_enable_ip+0x70/0x80 kernel/softirq.c:194 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:176 [inline] _raw_spin_unlock_bh+0x51/0x60 kernel/locking/spinlock.c:207 spin_unlock_bh include/linux/spinlock.h:399 [inline] ptr_ring_consume_bh include/linux/ptr_ring.h:367 [inline] wg_packet_encrypt_worker+0x14a0/0x1540 drivers/net/wireguard/send.c:293 process_one_work+0x6dc/0xbd0 kernel/workqueue.c:2301 worker_thread+0xaea/0x1510 kernel/workqueue.c:2447 kthread+0x34b/0x3d0 kernel/kthread.c:313 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:298 net_ratelimit: 37295 callbacks suppressed bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) net_ratelimit: 65533 callbacks suppressed bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)