watchdog: BUG: soft lockup - CPU#1 stuck for 143s! [syz.4.620:8575] Modules linked in: irq event stamp: 13888155 hardirqs last enabled at (13888154): [] irqentry_exit+0x59c/0x620 kernel/entry/common.c:219 hardirqs last disabled at (13888155): [] sysvec_apic_timer_interrupt+0xe/0xc0 arch/x86/kernel/apic/apic.c:1056 softirqs last enabled at (13817304): [] __do_softirq kernel/softirq.c:656 [inline] softirqs last enabled at (13817304): [] invoke_softirq kernel/softirq.c:496 [inline] softirqs last enabled at (13817304): [] __irq_exit_rcu+0x5f/0x150 kernel/softirq.c:723 softirqs last disabled at (13817309): [] __do_softirq kernel/softirq.c:656 [inline] softirqs last disabled at (13817309): [] invoke_softirq kernel/softirq.c:496 [inline] softirqs last disabled at (13817309): [] __irq_exit_rcu+0x5f/0x150 kernel/softirq.c:723 CPU: 1 UID: 0 PID: 8575 Comm: syz.4.620 Not tainted syzkaller #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 RIP: 0010:rcu_read_unlock_special+0x1d/0x420 kernel/rcu/tree_plugin.h:770 Code: 90 90 90 90 90 90 90 90 90 90 90 90 90 55 41 57 41 56 41 55 41 54 53 48 83 ec 10 65 8b 2d eb 2f 48 11 f7 c5 00 00 f0 00 74 14 <48> 83 c4 10 5b 41 5c 41 5d 41 5e 41 5f 5d e9 40 c2 ef 09 cc 49 89 RSP: 0018:ffffc90000a08220 EFLAGS: 00000206 RAX: 0000000000000006 RBX: 0000000000000246 RCX: 0000000000000101 RDX: 0000000000000002 RSI: ffffffff8dccc94a RDI: ffffffff8c073c80 RBP: ffff8881257f7000 R08: ffffffff8fef0077 R09: 1ffffffff1fde00e R10: dffffc0000000000 R11: fffffbfff1fde00f R12: ffffffff8e5605b8 R13: dffffc0000000000 R14: 0000000000000002 R15: ffff8880b873b8e8 FS: 00007f4a170e16c0(0000) GS:ffff8881257f7000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f118db5e9b0 CR3: 00000000747c2000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 Call Trace: __rcu_read_unlock+0x83/0xe0 kernel/rcu/tree_plugin.h:438 rcu_read_unlock include/linux/rcupdate.h:899 [inline] class_rcu_destructor include/linux/rcupdate.h:1195 [inline] unwind_next_frame+0x1aaf/0x23c0 arch/x86/kernel/unwind_orc.c:695 arch_stack_walk+0x11b/0x150 arch/x86/kernel/stacktrace.c:25 stack_trace_save+0xa9/0x100 kernel/stacktrace.c:122 kasan_save_stack mm/kasan/common.c:57 [inline] kasan_save_track+0x3e/0x80 mm/kasan/common.c:78 unpoison_slab_object mm/kasan/common.c:340 [inline] __kasan_slab_alloc+0x6c/0x80 mm/kasan/common.c:366 kasan_slab_alloc include/linux/kasan.h:253 [inline] slab_post_alloc_hook mm/slub.c:4953 [inline] kmem_cache_alloc_bulk_noprof+0x48c/0x740 mm/slub.c:7521 napi_skb_cache_get+0x41e/0x780 net/core/skbuff.c:291 __alloc_skb+0x152/0x390 net/core/skbuff.c:668 napi_alloc_skb+0x84/0x7c0 net/core/skbuff.c:832 page_to_skb+0x2ce/0x870 drivers/net/virtio_net.c:904 receive_mergeable drivers/net/virtio_net.c:2514 [inline] receive_buf+0x546/0x1900 drivers/net/virtio_net.c:2660 virtnet_receive_packets drivers/net/virtio_net.c:3023 [inline] virtnet_receive drivers/net/virtio_net.c:3047 [inline] virtnet_poll+0x2193/0x3000 drivers/net/virtio_net.c:3136 __napi_poll+0xae/0x340 net/core/dev.c:7668 napi_poll net/core/dev.c:7731 [inline] net_rx_action+0x627/0xf70 net/core/dev.c:7883 handle_softirqs+0x22a/0x7c0 kernel/softirq.c:622 __do_softirq kernel/softirq.c:656 [inline] invoke_softirq kernel/softirq.c:496 [inline] __irq_exit_rcu+0x5f/0x150 kernel/softirq.c:723 irq_exit_rcu+0x9/0x30 kernel/softirq.c:739 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1056 [inline] sysvec_apic_timer_interrupt+0xa6/0xc0 arch/x86/kernel/apic/apic.c:1056 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:697 RIP: 0010:rcu_read_unlock_special+0x1d/0x420 kernel/rcu/tree_plugin.h:770 Code: 90 90 90 90 90 90 90 90 90 90 90 90 90 55 41 57 41 56 41 55 41 54 53 48 83 ec 10 65 8b 2d eb 2f 48 11 f7 c5 00 00 f0 00 74 14 <48> 83 c4 10 5b 41 5c 41 5d 41 5e 41 5f 5d e9 40 c2 ef 09 cc 49 89 RSP: 0018:ffffc9000cbb70e0 EFLAGS: 00000206 RAX: 0000000000000006 RBX: 0000000000000246 RCX: 0000000000000001 RDX: 0000000000000007 RSI: ffffffff8dccc94a RDI: ffffffff8c073c80 RBP: ffff8881257f7000 R08: ffffffff8fef0077 R09: 1ffffffff1fde00e R10: dffffc0000000000 R11: fffffbfff1fde00f R12: ffffffff8e5605b8 R13: dffffc0000000000 R14: 0000000000000002 R15: ffff8880b873b8e8 __rcu_read_unlock+0x83/0xe0 kernel/rcu/tree_plugin.h:438 rcu_read_unlock include/linux/rcupdate.h:899 [inline] class_rcu_destructor include/linux/rcupdate.h:1195 [inline] unwind_next_frame+0x1aaf/0x23c0 arch/x86/kernel/unwind_orc.c:695 arch_stack_walk+0x11b/0x150 arch/x86/kernel/stacktrace.c:25 stack_trace_save+0xa9/0x100 kernel/stacktrace.c:122 kasan_save_stack+0x3e/0x60 mm/kasan/common.c:57 kasan_record_aux_stack+0xbd/0xd0 mm/kasan/generic.c:556 __call_rcu_common kernel/rcu/tree.c:3119 [inline] call_rcu+0xee/0x890 kernel/rcu/tree.c:3239 context_switch kernel/sched/core.c:5259 [inline] __schedule+0x14f2/0x5050 kernel/sched/core.c:6863 preempt_schedule_irq+0x4d/0xa0 kernel/sched/core.c:7190 irqentry_exit+0x597/0x620 kernel/entry/common.c:216 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:697 RIP: 0010:memset_orig+0x36/0xb0 arch/x86/lib/memset_64.S:70 Code: 01 01 01 01 01 48 0f af c1 41 89 f9 41 83 e1 07 75 74 48 89 d1 48 c1 e9 06 74 39 66 0f 1f 84 00 00 00 00 00 48 ff c9 48 89 07 <48> 89 47 08 48 89 47 10 48 89 47 18 48 89 47 20 48 89 47 28 48 89 RSP: 0018:ffffc9000cbb7960 EFLAGS: 00000216 RAX: ffffffffffffffff RBX: ffffea0001e8c200 RCX: 000000000000003f RDX: 0000000000001000 RSI: 00000000000000ff RDI: ffffed100f461000 RBP: 0000000000000003 R08: dffffc0000000000 R09: 0000000000000000 R10: ffffed100f461000 R11: fffffbfff1fde00f R12: 0000000000000000 R13: 0000000000008000 R14: 0000000000000008 R15: 0000000000000000 kasan_poison_pages include/linux/kasan.h:118 [inline] free_pages_prepare mm/page_alloc.c:1428 [inline] __free_frozen_pages+0x542/0xd70 mm/page_alloc.c:2943 discard_slab mm/slub.c:3346 [inline] __put_partials+0x146/0x170 mm/slub.c:3886 __slab_free+0x294/0x320 mm/slub.c:5952 qlink_free mm/kasan/quarantine.c:163 [inline] qlist_free_all+0x97/0x100 mm/kasan/quarantine.c:179 kasan_quarantine_reduce+0x148/0x160 mm/kasan/quarantine.c:286 __kasan_slab_alloc+0x22/0x80 mm/kasan/common.c:350 kasan_slab_alloc include/linux/kasan.h:253 [inline] slab_post_alloc_hook mm/slub.c:4953 [inline] slab_alloc_node mm/slub.c:5263 [inline] __kmalloc_cache_noprof+0x36f/0x6e0 mm/slub.c:5771 kmalloc_noprof include/linux/slab.h:957 [inline] kzalloc_noprof include/linux/slab.h:1094 [inline] ref_tracker_alloc+0x161/0x4d0 lib/ref_tracker.c:271 __netns_tracker_alloc include/net/net_namespace.h:362 [inline] netns_tracker_alloc include/net/net_namespace.h:371 [inline] get_net_track+0x16e/0x230 include/net/net_namespace.h:388 sk_alloc+0x1d6/0x390 net/core/sock.c:2318 inet_create+0x7a0/0x1000 net/ipv4/af_inet.c:328 __sock_create+0x4b2/0x9d0 net/socket.c:1605 sock_create net/socket.c:1663 [inline] __sys_socket_create net/socket.c:1700 [inline] __sys_socket+0xd6/0x1b0 net/socket.c:1747 __do_sys_socket net/socket.c:1761 [inline] __se_sys_socket net/socket.c:1759 [inline] __x64_sys_socket+0x7a/0x90 net/socket.c:1759 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xe2/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f4a1619aeb9 Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f4a170e1028 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 RAX: ffffffffffffffda RBX: 00007f4a16415fa0 RCX: 00007f4a1619aeb9 RDX: 0000000000000106 RSI: 0000922000000001 RDI: 0000000000000002 RBP: 00007f4a16208c1f R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007f4a16416038 R14: 00007f4a16415fa0 R15: 00007fff31a02728 Sending NMI from CPU 1 to CPUs 0: bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 8584 Comm: syz.8.622 Not tainted syzkaller #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 RIP: 0010:__remove_hrtimer kernel/time/hrtimer.c:-1 [inline] RIP: 0010:__run_hrtimer kernel/time/hrtimer.c:1757 [inline] RIP: 0010:__hrtimer_run_queues+0x360/0xc30 kernel/time/hrtimer.c:1841 Code: 0f 85 7a 04 00 00 44 0f b6 3a c6 02 00 44 89 fe 83 e6 01 31 ff e8 e0 16 13 00 41 f6 c7 01 75 0a e8 d5 13 13 00 e9 84 00 00 00 <48> 8b bc 24 90 00 00 00 4c 89 e6 e8 d0 ae e1 09 84 c0 74 07 e8 b7 RSP: 0018:ffffc90000006d80 EFLAGS: 00000002 RAX: ffffffff81b16290 RBX: ffff8880b8628308 RCX: 0000000000010100 RDX: ffff88807b88db80 RSI: 0000000000000001 RDI: 0000000000000000 RBP: ffffc90000006ed0 R08: ffffffff8fef0077 R09: 1ffffffff1fde00e R10: dffffc0000000000 R11: fffffbfff1fde00f R12: ffff888054f04040 R13: dffffc0000000000 R14: ffff8880b8628240 R15: 0000000000000001 FS: 00007f81b31ee6c0(0000) GS:ffff8881256f7000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f118d985e9c CR3: 00000000698a2000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000200000000300 DR2: 0000200000000300 DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 Call Trace: hrtimer_interrupt+0x42b/0x1010 kernel/time/hrtimer.c:1903 local_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1045 [inline] __sysvec_apic_timer_interrupt+0x102/0x3d0 arch/x86/kernel/apic/apic.c:1062 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1056 [inline] sysvec_apic_timer_interrupt+0x52/0xc0 arch/x86/kernel/apic/apic.c:1056 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:697 RIP: 0010:console_trylock_spinning kernel/printk/printk.c:2037 [inline] RIP: 0010:vprintk_emit+0x45d/0x560 kernel/printk/printk.c:2425 Code: 0f 84 44 ff ff ff e8 22 44 21 00 fb eb 44 e8 1a 44 21 00 e8 c5 0c f4 09 4d 85 f6 74 94 e8 0b 44 21 00 fb 48 c7 c7 a0 c7 54 8e <31> f6 ba 01 00 00 00 31 c9 41 b8 01 00 00 00 45 31 c9 53 e8 3b 1b RSP: 0018:ffffc90000007100 EFLAGS: 00000246 RAX: ffffffff81a33265 RBX: ffffffff81a330df RCX: ffff88807b88db80 RDX: 0000000000000100 RSI: 0000000000000000 RDI: ffffffff8e54c7a0 RBP: ffffc900000071b0 R08: ffffffff8fef0077 R09: 1ffffffff1fde00e R10: dffffc0000000000 R11: fffffbfff1fde00f R12: 0000000000000000 R13: 000000000000006e R14: 0000000000000200 R15: 1ffff92000000e24 _printk+0xdd/0x130 kernel/printk/printk.c:2451 br_fdb_update+0x62d/0x690 net/bridge/br_fdb.c:999 br_handle_frame_finish+0x573/0x1b40 net/bridge/br_input.c:144 br_nf_hook_thresh+0x3dd/0x4c0 net/bridge/br_netfilter_hooks.c:-1 br_nf_pre_routing_finish_ipv6+0xa3a/0xd70 net/bridge/br_netfilter_ipv6.c:-1 NF_HOOK include/linux/netfilter.h:318 [inline] br_nf_pre_routing_ipv6+0x374/0x6f0 net/bridge/br_netfilter_ipv6.c:184 nf_hook_entry_hookfn include/linux/netfilter.h:158 [inline] nf_hook_bridge_pre net/bridge/br_input.c:291 [inline] br_handle_frame+0x989/0x1520 net/bridge/br_input.c:442 __netif_receive_skb_core+0x98f/0x30a0 net/core/dev.c:6026 __netif_receive_skb_one_core net/core/dev.c:6137 [inline] __netif_receive_skb net/core/dev.c:6252 [inline] process_backlog+0x76d/0x1950 net/core/dev.c:6604 __napi_poll+0xae/0x340 net/core/dev.c:7668 napi_poll net/core/dev.c:7731 [inline] net_rx_action+0x627/0xf70 net/core/dev.c:7883 handle_softirqs+0x22a/0x7c0 kernel/softirq.c:622 __do_softirq kernel/softirq.c:656 [inline] invoke_softirq kernel/softirq.c:496 [inline] __irq_exit_rcu+0x5f/0x150 kernel/softirq.c:723 irq_exit_rcu+0x9/0x30 kernel/softirq.c:739 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1056 [inline] sysvec_apic_timer_interrupt+0xa6/0xc0 arch/x86/kernel/apic/apic.c:1056 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:697 RIP: 0010:schedule_debug kernel/sched/core.c:5815 [inline] RIP: 0010:__schedule+0x19b/0x5050 kernel/sched/core.c:6740 Code: f6 48 8b 1b 48 89 d8 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df 80 3c 08 00 74 08 48 89 df e8 4c 85 95 f6 48 81 3b 9d 6e ac 57 <0f> 85 a5 19 00 00 45 85 ed 7f 54 49 8d 5e 18 48 89 d8 48 c1 e8 03 RSP: 0018:ffffc9000d3075c0 EFLAGS: 00000246 RAX: 1ffff92001a60000 RBX: ffffc9000d300000 RCX: dffffc0000000000 RDX: 0000000000000000 RSI: ffffffff8c073c60 RDI: ffffffff8c073c20 RBP: ffffc9000d3077b8 R08: ffffffff8fef0077 R09: 1ffffffff1fde00e R10: dffffc0000000000 R11: fffffbfff1fde00f R12: ffff8881256f7000 R13: 0000000000000001 R14: ffff88807b88db80 R15: 1ffff110170c7680 preempt_schedule_common+0x82/0xd0 kernel/sched/core.c:7047 preempt_schedule_thunk+0x16/0x30 arch/x86/entry/thunk.S:12 __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:152 [inline] _raw_spin_unlock_irqrestore+0x74/0x80 kernel/locking/spinlock.c:194 __debug_check_no_obj_freed lib/debugobjects.c:1108 [inline] debug_check_no_obj_freed+0x52e/0x550 lib/debugobjects.c:1129 free_pages_prepare mm/page_alloc.c:1413 [inline] __free_frozen_pages+0x521/0xd70 mm/page_alloc.c:2943 discard_slab mm/slub.c:3346 [inline] __put_partials+0x146/0x170 mm/slub.c:3886 __slab_free+0x294/0x320 mm/slub.c:5952 qlink_free mm/kasan/quarantine.c:163 [inline] qlist_free_all+0x97/0x100 mm/kasan/quarantine.c:179 kasan_quarantine_reduce+0x148/0x160 mm/kasan/quarantine.c:286 __kasan_slab_alloc+0x22/0x80 mm/kasan/common.c:350 kasan_slab_alloc include/linux/kasan.h:253 [inline] slab_post_alloc_hook mm/slub.c:4953 [inline] slab_alloc_node mm/slub.c:5263 [inline] kmem_cache_alloc_lru_noprof+0x35f/0x6c0 mm/slub.c:5282 __d_alloc+0x37/0x6f0 fs/dcache.c:1730 d_alloc_pseudo+0x21/0xc0 fs/dcache.c:1861 alloc_path_pseudo fs/file_table.c:363 [inline] alloc_file_pseudo+0xdd/0x240 fs/file_table.c:379 __anon_inode_getfile fs/anon_inodes.c:166 [inline] anon_inode_getfile+0xc5/0x1a0 fs/anon_inodes.c:204 __do_sys_perf_event_open kernel/events/core.c:13760 [inline] __se_sys_perf_event_open+0xf05/0x1d60 kernel/events/core.c:13462 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xe2/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f81b4f9aeb9 Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f81b31ee028 EFLAGS: 00000246 ORIG_RAX: 000000000000012a RAX: ffffffffffffffda RBX: 00007f81b5215fa0 RCX: 00007f81b4f9aeb9 RDX: ffffffffffffffff RSI: 0000000000000000 RDI: 0000200000000540 RBP: 00007f81b5008c1f R08: 0000000000000002 R09: 0000000000000000 R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000000 R13: 00007f81b5216038 R14: 00007f81b5215fa0 R15: 00007ffc96e49458 bridge0: received packet on veth0_to_bridge with own address as source address (addr:ea:4d:b7:48:16:8c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:ea:4d:b7:48:16:8c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:ea:4d:b7:48:16:8c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:ea:4d:b7:48:16:8c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) net_ratelimit: 2 callbacks suppressed bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)