watchdog: BUG: soft lockup - CPU#1 stuck for 123s! [syz.2.13713:15279]
Modules linked in:
CPU: 1 PID: 15279 Comm: syz.2.13713 Tainted: G W syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026
RIP: 0010:fib6_node_lookup_1 net/ipv6/ip6_fib.c:1567 [inline]
RIP: 0010:fib6_node_lookup+0x43/0x420 net/ipv6/ip6_fib.c:1639
Code: 8d 63 fd 4d 85 e4 0f 84 d3 03 00 00 49 bd 00 00 00 00 00 fc ff df 4c 89 75 d0 49 8d 5e 20 48 89 d8 48 c1 e8 03 42 0f b6 04 28 <84> c0 75 66 0f b7 03 89 c1 80 e1 1f 80 f1 07 be 01 00 00 00 d3 e6
RSP: 0018:ffffc90000170560 EFLAGS: 00000a02
RAX: 0000000000000000 RBX: ffff888111560820 RCX: ffff8881425162c0
RDX: 0000000000000101 RSI: 0000000000000080 RDI: 0000000000000000
RBP: ffffc900001705d0 R08: ffffc900001707d0 R09: 0000000000000003
R10: dffffc0000000000 R11: fffff5200002e0fe R12: ffffc90000170a88
R13: dffffc0000000000 R14: ffff888111560800 R15: 0000000000000001
FS: 00007f0e77d996c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000001b2d21dff8 CR3: 000000013b6ef000 CR4: 00000000003506a0
DR0: 0000000000000000 DR1: 0000200000000300 DR2: 0000200000000300
DR3: 0000200000000300 DR6: 00000000ffff0ff3 DR7: 0000000000000600
Call Trace:
<IRQ>
fib6_table_lookup+0xae/0xa20 net/ipv6/route.c:2183
ip6_pol_route+0x152/0x1170 net/ipv6/route.c:2226
ip6_pol_route_input+0x56/0x80 net/ipv6/route.c:2284
pol_lookup_func include/net/ip6_fib.h:594 [inline]
fib6_rule_lookup+0x20a/0x5d0 net/ipv6/fib6_rules.c:115
ip6_route_input_lookup net/ipv6/route.c:2296 [inline]
ip6_route_input+0x628/0x840 net/ipv6/route.c:2465
ip6_rcv_finish_core net/ipv6/ip6_input.c:67 [inline]
ip6_rcv_finish+0x155/0x360 net/ipv6/ip6_input.c:78
NF_HOOK include/linux/netfilter.h:299 [inline]
ipv6_rcv+0xf0/0x230 net/ipv6/ip6_input.c:301
__netif_receive_skb_one_core net/core/dev.c:5415 [inline]
__netif_receive_skb+0xc8/0x280 net/core/dev.c:5529
process_backlog+0x368/0x600 net/core/dev.c:6436
napi_poll net/core/dev.c:6887 [inline]
net_rx_action+0x44d/0xe00 net/core/dev.c:6957
__do_softirq+0x255/0x563 kernel/softirq.c:309
asm_call_irq_on_stack+0xf/0x20
</IRQ>
__run_on_irqstack arch/x86/include/asm/irq_stack.h:26 [inline]
run_on_irqstack_cond arch/x86/include/asm/irq_stack.h:77 [inline]
do_softirq_own_stack+0x60/0x80 arch/x86/kernel/irq_64.c:77
invoke_softirq kernel/softirq.c:405 [inline]
__irq_exit_rcu+0x128/0x150 kernel/softirq.c:435
irq_exit_rcu+0x9/0x10 kernel/softirq.c:447
sysvec_apic_timer_interrupt+0xbf/0xe0 arch/x86/kernel/apic/apic.c:1106
asm_sysvec_apic_timer_interrupt+0x12/0x20 arch/x86/include/asm/idtentry.h:635
RIP: 0010:__schedule+0x68/0x1320 kernel/sched/core.c:4688
Code: 41 48 c7 44 24 68 8e 2b bc 85 48 c7 44 24 70 c0 b0 81 84 48 8d 4c 24 60 48 c1 e9 03 48 b8 f1 f1 f1 f1 f8 f3 f3 f3 4a 89 04 29 <48> 89 4c 24 58 42 c6 44 29 04 00 48 c7 84 24 80 00 00 00 00 00 00
RSP: 0018:ffffc90000de7940 EFLAGS: 00000a02
RAX: f3f3f3f8f1f1f1f1 RBX: ffffc90000de7b18 RCX: 1ffff920001bcf34
RDX: 0000000000400140 RSI: 0000000000000000 RDI: 0000000000000001
RBP: ffffc90000de7a30 R08: ffffffff86e79048 R09: ffffffff86e79058
R10: ffffffff86e7905c R11: ffffffff86e79043 R12: 0000000000000001
R13: dffffc0000000000 R14: dffffc0000000000 R15: 1ffff920001bcf48
preempt_schedule_irq+0xaa/0x120 kernel/sched/core.c:5067
irqentry_exit_cond_resched kernel/entry/common.c:365 [inline]
irqentry_exit+0x56/0x60 kernel/entry/common.c:395
sysvec_apic_timer_interrupt+0xcb/0xe0 arch/x86/kernel/apic/apic.c:1106
asm_sysvec_apic_timer_interrupt+0x12/0x20 arch/x86/include/asm/idtentry.h:635
RIP: 0010:__sanitizer_cov_trace_pc+0x45/0x60 kernel/kcov.c:202
Code: ff 00 74 11 f7 c2 00 01 00 00 74 35 83 b9 dc 0a 00 00 00 74 2c 8b 91 b8 0a 00 00 83 fa 02 75 21 48 8b 91 c0 0a 00 00 48 8b 32 <48> 8d 7e 01 8b 89 bc 0a 00 00 48 39 cf 73 08 48 89 44 f2 08 48 89
RSP: 0018:ffffc90000de7bc0 EFLAGS: 00000246
RAX: ffffffff81821833 RBX: ffff88811712b800 RCX: ffff8881425162c0
RDX: ffffc900106b0000 RSI: 0000000000000069 RDI: ffff88811712b800
RBP: ffffc90000de7bc0 R08: ffff88811712b817 R09: 1ffff11022e25702
R10: dffffc0000000000 R11: ffffed1022e25703 R12: ffff88811f5333c8
R13: dffffc0000000000 R14: 0000000000000000 R15: ffff88811f5333c0
put_ctx+0x13/0x1a0 kernel/events/core.c:1301
perf_event_ctx_unlock kernel/events/core.c:1411 [inline]
perf_ioctl+0x22b5/0x2650 kernel/events/core.c:5751
vfs_ioctl fs/ioctl.c:48 [inline]
__do_sys_ioctl fs/ioctl.c:753 [inline]
__se_sys_ioctl+0x121/0x1a0 fs/ioctl.c:739
__x64_sys_ioctl+0x7b/0x90 fs/ioctl.c:739
do_syscall_64+0x31/0x40 arch/x86/entry/common.c:46
entry_SYSCALL_64_after_hwframe+0x61/0xcb
RIP: 0033:0x7f0e7933e819
Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f0e77d99028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: ffffffffffffffda RBX: 00007f0e795b7fa0 RCX: 00007f0e7933e819
RDX: 0000000000000009 RSI: 0000000040042408 RDI: 0000000000000008
RBP: 00007f0e793d4c91 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007f0e795b8038 R14: 00007f0e795b7fa0 R15: 00007fff56de6ec8
Sending NMI from CPU 1 to CPUs 0:
NMI backtrace for cpu 0
CPU: 0 PID: 949 Comm: kworker/0:6 Tainted: G W syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026
Workqueue: wg-kex-wg2 wg_packet_handshake_receive_worker
RIP: 0010:update_stack_state+0x2b0/0x480 arch/x86/kernel/unwind_frame.c:262
Code: f7 e8 34 fd 6f 00 49 83 3e 00 74 26 44 3b 6d ac 75 20 48 8b 45 a0 48 39 45 b0 73 16 31 db 89 d8 48 81 c4 98 00 00 00 5b 41 5c <41> 5d 41 5e 41 5f 5d c3 4c 8b 6d 80 4d 85 ed 4c 89 75 b8 74 6f 49
RSP: 0018:ffffc900000075e0 EFLAGS: 00000292
RAX: 0000000000007601 RBX: ffffc90000007688 RCX: ffffc900012dfc01
RDX: ffffc900012dfc70 RSI: 1ffff92000000ed2 RDI: ffffc900000076e0
RBP: ffffc900000075f8 R08: ffffc90000007750 R09: ffffc90000007748
R10: 0000000000000013 R11: fffff52000000edd R12: 0000000000000000
R13: ffffc900000076b0 R14: ffffc900000076c8 R15: 1ffff92000000ed9
FS: 0000000000000000(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000055558d31f4e8 CR3: 000000015915b000 CR4: 00000000003506b0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600
Call Trace:
<IRQ>
unwind_next_frame+0x3d5/0x700 arch/x86/kernel/unwind_frame.c:316
arch_stack_walk+0x108/0x140 arch/x86/kernel/stacktrace.c:25
stack_trace_save+0xa6/0xf0 kernel/stacktrace.c:121
kasan_save_stack mm/kasan/common.c:38 [inline]
kasan_set_track+0x4a/0x70 mm/kasan/common.c:45
kasan_set_free_info+0x23/0x40 mm/kasan/generic.c:370
____kasan_slab_free+0x125/0x160 mm/kasan/common.c:362
__kasan_slab_free+0x11/0x20 mm/kasan/common.c:370
kasan_slab_free include/linux/kasan.h:220 [inline]
slab_free_hook mm/slub.c:1600 [inline]
slab_free_freelist_hook+0xc5/0x190 mm/slub.c:1626
slab_free mm/slub.c:3208 [inline]
kmem_cache_free+0x100/0x2d0 mm/slub.c:3224
kfree_skbmem+0x10c/0x180 net/core/skbuff.c:-1
__kfree_skb net/core/skbuff.c:695 [inline]
kfree_skb+0xc1/0x2f0 net/core/skbuff.c:713
ip6_mc_input+0x235/0x2a0 net/ipv6/ip6_input.c:574
dst_input include/net/dst.h:461 [inline]
ip6_rcv_finish+0x18c/0x360 net/ipv6/ip6_input.c:80
NF_HOOK include/linux/netfilter.h:299 [inline]
ipv6_rcv+0xf0/0x230 net/ipv6/ip6_input.c:301
__netif_receive_skb_one_core net/core/dev.c:5415 [inline]
__netif_receive_skb+0xc8/0x280 net/core/dev.c:5529
process_backlog+0x368/0x600 net/core/dev.c:6436
napi_poll net/core/dev.c:6887 [inline]
net_rx_action+0x44d/0xe00 net/core/dev.c:6957
__do_softirq+0x255/0x563 kernel/softirq.c:309
asm_call_irq_on_stack+0xf/0x20
</IRQ>
__run_on_irqstack arch/x86/include/asm/irq_stack.h:26 [inline]
run_on_irqstack_cond arch/x86/include/asm/irq_stack.h:77 [inline]
do_softirq_own_stack+0x60/0x80 arch/x86/kernel/irq_64.c:77
do_softirq+0xb0/0xf0 kernel/softirq.c:358
__local_bh_enable_ip+0x70/0x80 kernel/softirq.c:194
local_bh_enable+0x1f/0x30 include/linux/bottom_half.h:32
wg_receive_handshake_packet drivers/net/wireguard/receive.c:206 [inline]
wg_packet_handshake_receive_worker+0x5b1/0x900 drivers/net/wireguard/receive.c:220
process_one_work+0x6e1/0xba0 kernel/workqueue.c:2301
worker_thread+0xa6a/0x13c0 kernel/workqueue.c:2447
kthread+0x346/0x3d0 kernel/kthread.c:313
ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:298
net_ratelimit: 13296 callbacks suppressed
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:70:65:ce:5d:fc, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:70:65:ce:5d:fc, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
net_ratelimit: 58404 callbacks suppressed
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:70:65:ce:5d:fc, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:70:65:ce:5d:fc, vlan:0)