syzbot


BUG: soft lockup in sys_openat

Status: premoderation: reported on 2025/09/21 20:57
Reported-by: syzbot+435809ef17736d14830a@syzkaller.appspotmail.com
First crash: 21d, last: 21d
Similar bugs (8)
Kernel Title Rank 🛈 Repro Cause bisect Fix bisect Count Last Reported Patched Status
android-5-15 BUG: soft lockup in sys_openat (2) origin:lts 1 C error 5 397d 447d 0/2 auto-obsoleted due to no activity on 2024/12/19 09:52
android-5-15 BUG: soft lockup in sys_openat 1 21 498d 553d 0/2 auto-obsoleted due to no activity on 2024/07/21 23:03
upstream INFO: rcu detected stall in sys_openat (3) mm 1 C error 457 1d05h 770d 0/29 upstream: reported C repro on 2023/09/03 11:10
linux-6.1 INFO: rcu detected stall in sys_openat 1 3 766d 799d 0/3 auto-obsoleted due to no activity on 2023/12/16 21:24
linux-5.15 INFO: rcu detected stall in sys_openat missing-backport origin:upstream 1 C done 40 1d22h 846d 0/3 upstream: reported C repro on 2023/06/19 20:52
linux-6.6 INFO: rcu detected stall in sys_openat origin:lts-only 1 C inconclusive 6 32d 94d 0/2 upstream: reported C repro on 2025/07/10 07:34
linux-6.1 INFO: rcu detected stall in sys_openat (2) origin:upstream 1 C error 19 10d 578d 0/3 upstream: reported C repro on 2024/03/13 11:37
upstream INFO: rcu detected stall in sys_openat (2) kernfs 1 8 1346d 1558d 0/29 closed as invalid on 2022/02/08 09:50

Sample crash report:
watchdog: BUG: soft lockup - CPU#0 stuck for 123s! [syz-executor:19160]
Modules linked in:
CPU: 0 PID: 19160 Comm: syz-executor Tainted: G        W         syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025
RIP: 0010:native_restore_fl arch/x86/include/asm/irqflags.h:41 [inline]
RIP: 0010:arch_local_irq_restore arch/x86/include/asm/irqflags.h:84 [inline]
RIP: 0010:kvm_wait+0xc2/0x120 arch/x86/kernel/kvm.c:926
Code: 38 f0 75 26 41 f7 c4 00 02 00 00 75 0f 0f 1f 44 00 00 0f 00 2d 3f 98 98 03 f4 eb 0e 0f 1f 44 00 00 0f 00 2d 30 98 98 03 fb f4 <4c> 89 64 24 18 ff 74 24 18 9d 48 c7 44 24 20 0e 36 e0 45 4b c7 04
RSP: 0018:ffffc900014cf5a0 EFLAGS: 00000246
RAX: 0000000000000003 RBX: ffffffff86cd5740 RCX: 0000000086cd5700
RDX: 0000000000000001 RSI: 0000000000000003 RDI: ffffffff86cd5740
RBP: ffffc900014cf650 R08: 0000000000000004 R09: 0000000000000000
R10: fffffbfff0d9aae8 R11: 1ffffffff0d9aae8 R12: 0000000000000246
R13: 1ffffffff0d9aae8 R14: dffffc0000000000 R15: 1ffff92000299eb8
FS:  000055557de7c500(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f2ab10ea740 CR3: 000000012131c000 CR4: 00000000003506b0
DR0: 0000200000000300 DR1: 0000200000000300 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600
Call Trace:
 pv_wait arch/x86/include/asm/paravirt.h:564 [inline]
 pv_wait_head_or_lock kernel/locking/qspinlock_paravirt.h:470 [inline]
 __pv_queued_spin_lock_slowpath+0x714/0xb70 kernel/locking/qspinlock.c:508
 pv_queued_spin_lock_slowpath arch/x86/include/asm/paravirt.h:554 [inline]
 queued_spin_lock_slowpath+0x47/0x50 arch/x86/include/asm/qspinlock.h:51
 queued_spin_lock include/asm-generic/qspinlock.h:85 [inline]
 do_raw_spin_lock include/linux/spinlock.h:183 [inline]
 __raw_spin_lock include/linux/spinlock_api_smp.h:143 [inline]
 _raw_spin_lock+0xd8/0xe0 kernel/locking/spinlock.c:151
 spin_lock include/linux/spinlock.h:354 [inline]
 sysctl_head_grab fs/proc/proc_sysctl.c:312 [inline]
 grab_header fs/proc/proc_sysctl.c:496 [inline]
 proc_sys_permission+0xb9/0x3e0 fs/proc/proc_sysctl.c:801
 do_inode_permission fs/namei.c:401 [inline]
 inode_permission+0x277/0x520 fs/namei.c:466
 may_lookup fs/namei.c:1669 [inline]
 link_path_walk+0x240/0xb80 fs/namei.c:2217
 path_openat+0x27c/0x3160 fs/namei.c:3505
 do_filp_open+0x1b3/0x3e0 fs/namei.c:3536
 do_sys_openat2+0x14c/0x6d0 fs/open.c:1217
 do_sys_open fs/open.c:1233 [inline]
 __do_sys_openat fs/open.c:1249 [inline]
 __se_sys_openat fs/open.c:1244 [inline]
 __x64_sys_openat+0x136/0x160 fs/open.c:1244
 do_syscall_64+0x31/0x40 arch/x86/entry/common.c:46
 entry_SYSCALL_64_after_hwframe+0x61/0xcb
RIP: 0033:0x7f2ab1115511
Code: 75 57 89 f0 25 00 00 41 00 3d 00 00 41 00 74 49 80 3d 5a b0 21 00 00 74 6d 89 da 48 89 ee bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 93 00 00 00 48 8b 54 24 28 64 48 2b 14 25
RSP: 002b:00007ffccb2abb40 EFLAGS: 00000202 ORIG_RAX: 0000000000000101
RAX: ffffffffffffffda RBX: 0000000000080001 RCX: 00007f2ab1115511
RDX: 0000000000080001 RSI: 00007f2ab11b4637 RDI: 00000000ffffff9c
RBP: 00007f2ab11b4637 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000008
R13: 00007ffccb2abbe0 R14: 0000000000000009 R15: 0000000000000000
Sending NMI from CPU 0 to CPUs 1:
NMI backtrace for cpu 1
CPU: 1 PID: 19141 Comm: syz.0.5207 Tainted: G        W         syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025
RIP: 0010:__sanitizer_cov_trace_pc+0x0/0x60 kernel/kcov.c:190
Code: 00 00 00 0f 0b 0f 1f 44 00 00 55 48 89 e5 53 48 89 fb e8 13 00 00 00 48 8b 3d fc a7 3f 05 48 89 de e8 04 4e 39 00 5b 5d c3 00 <55> 48 89 e5 48 8b 45 08 65 48 8b 0d 60 c7 9e 7e 65 8b 15 65 c7 9e
RSP: 0018:ffffc9000016f978 EFLAGS: 00000046
RAX: 0000000000000000 RBX: 0000000000000190 RCX: ffff888119facf00
RDX: 0000000000010101 RSI: 0000000000000000 RDI: 0000000000000000
RBP: ffffc9000016fa70 R08: dffffc0000000000 R09: ffffed10233f59e1
R10: ffffed10233f59e1 R11: 1ffff110233f59e0 R12: dffffc0000000000
R13: ffffc9000016fb26 R14: 0000000000000020 R15: ffffc9000016fc80
FS:  00007f78acb746c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f13c39cedac CR3: 000000011e160000 CR4: 00000000003506a0
DR0: 0000000000000000 DR1: 0000200000000300 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600
Call Trace:
 <IRQ>
 __perf_event_output kernel/events/core.c:7410 [inline]
 perf_event_output_forward+0xb5/0x160 kernel/events/core.c:7430
 __perf_event_overflow+0x1b3/0x340 kernel/events/core.c:9086
 perf_swevent_hrtimer+0x3db/0x530 kernel/events/core.c:10489
 __run_hrtimer kernel/time/hrtimer.c:1587 [inline]
 __hrtimer_run_queues+0x37a/0x960 kernel/time/hrtimer.c:1651
 hrtimer_interrupt+0x3a6/0xdc0 kernel/time/hrtimer.c:1713
 local_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1095 [inline]
 __sysvec_apic_timer_interrupt+0xfa/0x3f0 arch/x86/kernel/apic/apic.c:1112
 run_sysvec_on_irqstack_cond arch/x86/include/asm/irq_stack.h:91 [inline]
 sysvec_apic_timer_interrupt+0xba/0xe0 arch/x86/kernel/apic/apic.c:1106
 asm_sysvec_apic_timer_interrupt+0x12/0x20 arch/x86/include/asm/idtentry.h:635
RIP: 0010:__kernel_text_address+0x1/0x100 kernel/extable.c:104
Code: df b8 01 00 00 00 eb b0 90 55 48 89 e5 48 81 ff 00 00 20 86 0f 93 c0 48 81 ff c0 64 a4 86 0f 92 c1 20 c1 0f b6 c1 5d c3 90 55 <48> 89 e5 41 57 41 56 41 54 53 48 81 ff 00 00 00 81 0f 93 c0 48 81
RSP: 0018:ffffc90000170190 EFLAGS: 00000246
RAX: 0000000000000000 RBX: ffffc90000170210 RCX: 0000000000170201
RDX: ffffc90001a47798 RSI: 1ffff9200002e03a RDI: ffffffff81c40ff3
RBP: ffffc900001701b8 R08: ffffc90000170290 R09: ffffc90000170288
R10: 000000000000001c R11: 1ffff9200002e039 R12: ffff888119facf00
R13: 0000000000000000 R14: dffffc0000000000 R15: 1ffff9200002e042
 arch_stack_walk+0xee/0x140 arch/x86/kernel/stacktrace.c:26
 stack_trace_save+0x98/0xe0 kernel/stacktrace.c:121
 kasan_save_stack mm/kasan/common.c:38 [inline]
 kasan_set_track+0x4a/0x70 mm/kasan/common.c:45
 kasan_set_free_info+0x23/0x40 mm/kasan/generic.c:370
 ____kasan_slab_free+0x125/0x160 mm/kasan/common.c:362
 __kasan_slab_free+0x11/0x20 mm/kasan/common.c:370
 kasan_slab_free include/linux/kasan.h:220 [inline]
 slab_free_hook mm/slub.c:1600 [inline]
 slab_free_freelist_hook+0xc5/0x190 mm/slub.c:1626
 slab_free mm/slub.c:3208 [inline]
 kmem_cache_free+0x100/0x2d0 mm/slub.c:3224
 kfree_skbmem+0x10c/0x180 net/core/skbuff.c:-1
 __kfree_skb net/core/skbuff.c:695 [inline]
 kfree_skb+0xc1/0x2f0 net/core/skbuff.c:713
 ip6_mc_input+0x235/0x2a0 net/ipv6/ip6_input.c:574
 dst_input include/net/dst.h:461 [inline]
 ip6_rcv_finish+0x18c/0x360 net/ipv6/ip6_input.c:80
 NF_HOOK include/linux/netfilter.h:299 [inline]
 ipv6_rcv+0xec/0x210 net/ipv6/ip6_input.c:301
 __netif_receive_skb_one_core net/core/dev.c:5402 [inline]
 __netif_receive_skb+0xc8/0x280 net/core/dev.c:5516
 netif_receive_skb_internal net/core/dev.c:5621 [inline]
 netif_receive_skb+0x9b/0x3d0 net/core/dev.c:5680
 br_netif_receive_skb net/bridge/br_input.c:30 [inline]
 NF_HOOK include/linux/netfilter.h:299 [inline]
 br_pass_frame_up+0x164/0x1e0 net/bridge/br_input.c:72
 br_handle_frame_finish+0xd2e/0x1180 net/bridge/br_input.c:179
 nf_hook_bridge_pre net/bridge/br_input.c:259 [inline]
 br_handle_frame+0x407/0x8e0 net/bridge/br_input.c:363
 __netif_receive_skb_core+0xe95/0x2f90 net/core/dev.c:5296
 __netif_receive_skb_one_core net/core/dev.c:5400 [inline]
 __netif_receive_skb+0x72/0x280 net/core/dev.c:5516
 process_backlog+0x368/0x600 net/core/dev.c:6423
 napi_poll net/core/dev.c:6874 [inline]
 net_rx_action+0x432/0xdd0 net/core/dev.c:6944
 __do_softirq+0x255/0x563 kernel/softirq.c:309
 asm_call_irq_on_stack+0xf/0x20
 </IRQ>
 __run_on_irqstack arch/x86/include/asm/irq_stack.h:26 [inline]
 run_on_irqstack_cond arch/x86/include/asm/irq_stack.h:77 [inline]
 do_softirq_own_stack+0x60/0x80 arch/x86/kernel/irq_64.c:77
 invoke_softirq kernel/softirq.c:405 [inline]
 __irq_exit_rcu+0x128/0x150 kernel/softirq.c:435
 irq_exit_rcu+0x9/0x10 kernel/softirq.c:447
 sysvec_apic_timer_interrupt+0xbf/0xe0 arch/x86/kernel/apic/apic.c:1106
 asm_sysvec_apic_timer_interrupt+0x12/0x20 arch/x86/include/asm/idtentry.h:635
RIP: 0010:__sanitizer_cov_trace_pc+0x59/0x60 kernel/kcov.c:205
Code: 2c 8b 91 b8 0a 00 00 83 fa 02 75 21 48 8b 91 c0 0a 00 00 48 8b 32 48 8d 7e 01 8b 89 bc 0a 00 00 48 39 cf 73 08 48 89 44 f2 08 <48> 89 3a 5d c3 66 90 55 48 89 e5 48 8b 45 08 65 48 8b 15 00 c7 9e
RSP: 0018:ffffc90001a476e0 EFLAGS: 00000283
RAX: ffffffff81c41ace RBX: ffff888111cb61d0 RCX: 0000000000080000
RDX: ffffc9000450b000 RSI: 0000000000012e1b RDI: 0000000000012e1c
RBP: ffffc90001a476e0 R08: 0000000000000000 R09: 0000000036d3a600
R10: ffffed1022396d69 R11: 1ffff11022396d67 R12: ffffffff8552e100
R13: 00000000fffffffe R14: 00000000fffffffe R15: 0000000000000016
 insert_entry fs/proc/proc_sysctl.c:165 [inline]
 insert_header+0x9de/0xdb0 fs/proc/proc_sysctl.c:240
 __register_sysctl_table+0x1153/0x1250 fs/proc/proc_sysctl.c:1358
 register_net_sysctl+0x2c/0x40 net/sysctl_net.c:121
 ipv4_sysctl_init_net+0x1d7/0x3b0 net/ipv4/sysctl_net_ipv4.c:1337
 ops_init+0x1ba/0x4a0 net/core/net_namespace.c:144
 setup_net+0x36d/0xb50 net/core/net_namespace.c:345
 copy_net_ns+0x314/0x520 net/core/net_namespace.c:486
 create_new_namespaces+0x3a2/0x650 kernel/nsproxy.c:110
 copy_namespaces+0x1d1/0x220 kernel/nsproxy.c:179
 copy_process+0x11b8/0x32c0 kernel/fork.c:2271
 kernel_clone+0x23f/0x940 kernel/fork.c:2650
 __do_sys_clone kernel/fork.c:2776 [inline]
 __se_sys_clone kernel/fork.c:2760 [inline]
 __x64_sys_clone+0x176/0x1d0 kernel/fork.c:2760
 do_syscall_64+0x31/0x40 arch/x86/entry/common.c:46
 entry_SYSCALL_64_after_hwframe+0x61/0xcb
RIP: 0033:0x7f78ae10bc29
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f78acb73fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038
RAX: ffffffffffffffda RBX: 00007f78ae352fa0 RCX: 00007f78ae10bc29
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000
RBP: 00007f78ae18ee41 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000000
R13: 00007f78ae353038 R14: 00007f78ae352fa0 R15: 00007ffc32262da8
net_ratelimit: 554 callbacks suppressed
bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0)
bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0)
bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0)
bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0)
bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0)
net_ratelimit: 579 callbacks suppressed
bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0)
bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0)
bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:18, vlan:0)
bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0 with own address as source address (addr:aa:aa:aa:aa:aa:19, vlan:0)
bridge0: received packet on veth1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
NMI backtrace for cpu 1
CPU: 1 PID: 7883 Comm: kworker/1:37 Tainted: G        W    L    syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025
Workqueue: events rht_deferred_worker
RIP: 0010:__sanitizer_cov_trace_pc+0x0/0x60 kernel/kcov.c:190
Code: 00 00 00 0f 0b 0f 1f 44 00 00 55 48 89 e5 53 48 89 fb e8 13 00 00 00 48 8b 3d fc a7 3f 05 48 89 de e8 04 4e 39 00 5b 5d c3 00 <55> 48 89 e5 48 8b 45 08 65 48 8b 0d 60 c7 9e 7e 65 8b 15 65 c7 9e
RSP: 0018:ffffc9000016ff98 EFLAGS: 00000246
RAX: 0000000000000000 RBX: 1ffff110222bff0a RCX: 0000000080000101
RDX: ffff88811582a780 RSI: 0000000000000000 RDI: 0000000000000000
RBP: ffffc900001700f8 R08: ffffc90000170220 R09: ffffc90000170230
R10: fffff5200002e066 R11: 1ffff9200002e062 R12: 0000000000000100
R13: dffffc0000000000 R14: ffff8881115ff800 R15: 0000000000000001
FS:  0000000000000000(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f13c39cedac CR3: 000000011e160000 CR4: 00000000003506a0
DR0: 0000000000000000 DR1: 0000200000000300 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600
Call Trace:
 <IRQ>
 find_rr_leaf net/ipv6/route.c:848 [inline]
 rt6_select net/ipv6/route.c:892 [inline]
 fib6_table_lookup+0x2f4/0x9f0 net/ipv6/route.c:2190
 ip6_pol_route+0x145/0x1110 net/ipv6/route.c:2226
 ip6_pol_route_input+0x56/0x80 net/ipv6/route.c:2284
 pol_lookup_func include/net/ip6_fib.h:594 [inline]
 fib6_rule_lookup+0x1c6/0x560 net/ipv6/fib6_rules.c:115
 ip6_route_input_lookup net/ipv6/route.c:2296 [inline]
 ip6_route_input+0x58b/0x780 net/ipv6/route.c:2465
 ip6_rcv_finish_core net/ipv6/ip6_input.c:67 [inline]
 ip6_rcv_finish+0x155/0x360 net/ipv6/ip6_input.c:78
 NF_HOOK include/linux/netfilter.h:299 [inline]
 ipv6_rcv+0xec/0x210 net/ipv6/ip6_input.c:301
 __netif_receive_skb_one_core net/core/dev.c:5402 [inline]
 __netif_receive_skb+0xc8/0x280 net/core/dev.c:5516
 netif_receive_skb_internal net/core/dev.c:5621 [inline]
 netif_receive_skb+0x9b/0x3d0 net/core/dev.c:5680
 br_netif_receive_skb net/bridge/br_input.c:30 [inline]
 NF_HOOK include/linux/netfilter.h:299 [inline]
 br_pass_frame_up+0x164/0x1e0 net/bridge/br_input.c:72
 br_handle_frame_finish+0xd2e/0x1180 net/bridge/br_input.c:179
 nf_hook_bridge_pre net/bridge/br_input.c:259 [inline]
 br_handle_frame+0x407/0x8e0 net/bridge/br_input.c:363
 __netif_receive_skb_core+0xe95/0x2f90 net/core/dev.c:5296
 __netif_receive_skb_one_core net/core/dev.c:5400 [inline]
 __netif_receive_skb+0x72/0x280 net/core/dev.c:5516
 process_backlog+0x368/0x600 net/core/dev.c:6423
 napi_poll net/core/dev.c:6874 [inline]
 net_rx_action+0x432/0xdd0 net/core/dev.c:6944
 __do_softirq+0x255/0x563 kernel/softirq.c:309
 asm_call_irq_on_stack+0xf/0x20
 </IRQ>
 __run_on_irqstack arch/x86/include/asm/irq_stack.h:26 [inline]
 run_on_irqstack_cond arch/x86/include/asm/irq_stack.h:77 [inline]
 do_softirq_own_stack+0x60/0x80 arch/x86/kernel/irq_64.c:77
 do_softirq+0x9e/0xe0 kernel/softirq.c:358
 __local_bh_enable_ip+0x70/0x80 kernel/softirq.c:194
 local_bh_enable+0x1f/0x30 include/linux/bottom_half.h:32
 rht_unlock include/linux/rhashtable.h:348 [inline]
 rhashtable_rehash_chain lib/rhashtable.c:290 [inline]
 rhashtable_rehash_table lib/rhashtable.c:325 [inline]
 rht_deferred_worker+0xc48/0x10a0 lib/rhashtable.c:429
 process_one_work+0x6e1/0xba0 kernel/workqueue.c:2301
 worker_thread+0xa6a/0x13b0 kernel/workqueue.c:2447
 kthread+0x346/0x3d0 kernel/kthread.c:313
 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:298

Crashes (1):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2025/09/21 20:56 android13-5.10-lts 911f602c2237 67c37560 .config console log report info [disk image] [vmlinux] [kernel image] ci2-android-5-10-perf BUG: soft lockup in sys_openat
* Struck through repros no longer work on HEAD.