syzbot


BUG: soft lockup in cleanup_net

Status: premoderation: reported on 2025/05/08 14:39
Reported-by: syzbot+4ab4d54f43e1675f808c@syzkaller.appspotmail.com
First crash: 31d, last: 31d
Similar bugs (10)
Kernel Title Repro Cause bisect Fix bisect Count Last Reported Patched Status
linux-4.19 INFO: rcu detected stall in cleanup_net (2) 4 1442d 1574d 0/1 auto-closed as invalid on 2021/10/25 03:43
linux-4.19 BUG: soft lockup in cleanup_net (2) C 3 826d 938d 0/1 upstream: reported C repro on 2022/11/13 07:04
android-5-15 BUG: soft lockup in cleanup_net origin:lts syz 6 272d 399d 0/2 auto-obsoleted due to no activity on 2024/12/08 05:58
android-6-1 BUG: soft lockup in cleanup_net 1 142d 142d 0/2 auto-obsoleted due to no activity on 2025/04/17 10:35
linux-4.19 BUG: soft lockup in cleanup_net 4 1071d 1285d 0/1 auto-obsoleted due to no activity on 2022/10/30 18:15
upstream INFO: rcu detected stall in cleanup_net (6) net 63 639d 882d 0/28 closed as invalid on 2023/10/27 14:39
upstream INFO: rcu detected stall in cleanup_net (5) net 24 1220d 1480d 0/28 closed as invalid on 2022/02/08 10:00
linux-6.1 INFO: rcu detected stall in cleanup_net origin:lts-only syz inconclusive 140 211d 697d 0/3 upstream: reported syz repro on 2023/07/12 14:45
upstream INFO: rcu detected stall in cleanup_net (7) kernfs rdma bridge 15 192d 570d 0/28 auto-obsoleted due to no activity on 2025/02/25 20:50
linux-5.15 INFO: rcu detected stall in cleanup_net origin:upstream syz error 111 2h10m 698d 0/3 upstream: reported syz repro on 2023/07/11 05:04

Sample crash report:
 kthread+0x346/0x3d0 kernel/kthread.c:313
 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:298
watchdog: BUG: soft lockup - CPU#1 stuck for 123s! [kworker/u4:3:289]
Modules linked in:
CPU: 1 PID: 289 Comm: kworker/u4:3 Tainted: G        W         5.10.237-syzkaller-00309-g7e2543346ff7 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025
Workqueue: netns cleanup_net
RIP: 0010:tipc_topsrv_stop net/tipc/topsrv.c:700 [inline]
RIP: 0010:tipc_topsrv_exit_net+0x134/0x340 net/tipc/topsrv.c:725
Code: 03 41 0f b6 44 1d 00 84 c0 0f 85 fb 01 00 00 45 8b 3e 31 db 31 ff 44 89 fe e8 88 50 07 fd 45 85 ff 74 79 48 63 f3 48 8b 7d d0 <e8> 57 6b f9 fd 48 85 c0 74 22 49 89 c7 e8 ba 4c 07 fd 4c 89 e7 e8
RSP: 0000:ffffc90007987c08 EFLAGS: 00000283
RAX: ffffffff845c4684 RBX: 00000000fe066143 RCX: ffff888125110000
RDX: 0000000000000000 RSI: fffffffffe066143 RDI: ffff88811fa36600
RBP: ffffc90007987c50 R08: 0000000000000004 R09: 0000000000000003
R10: fffff52000f30f70 R11: 1ffff92000f30f70 R12: ffff88811fa36618
R13: 1ffff11023f46cc3 R14: ffff88811fa3661c R15: ffff88810f91e500
FS:  0000000000000000(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fb7603e9000 CR3: 000000011e81e000 CR4: 00000000003506a0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 ops_exit_list net/core/net_namespace.c:185 [inline]
 cleanup_net+0x586/0xb70 net/core/net_namespace.c:609
 process_one_work+0x6e1/0xba0 kernel/workqueue.c:2301
 worker_thread+0xa6a/0x13b0 kernel/workqueue.c:2447
 kthread+0x346/0x3d0 kernel/kthread.c:313
 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:298
Sending NMI from CPU 1 to CPUs 0:
NMI backtrace for cpu 0
CPU: 0 PID: 7 Comm: kworker/u4:0 Tainted: G        W         5.10.237-syzkaller-00309-g7e2543346ff7 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025
Workqueue: tipc_rcv tipc_conn_recv_work
RIP: 0010:native_restore_fl arch/x86/include/asm/irqflags.h:41 [inline]
RIP: 0010:arch_local_irq_restore arch/x86/include/asm/irqflags.h:84 [inline]
RIP: 0010:kvm_wait+0xc2/0x120 arch/x86/kernel/kvm.c:926
Code: 38 f0 75 26 41 f7 c4 00 02 00 00 75 0f 0f 1f 44 00 00 0f 00 2d ff 9d 98 03 f4 eb 0e 0f 1f 44 00 00 0f 00 2d f0 9d 98 03 fb f4 <4c> 89 64 24 18 ff 74 24 18 9d 48 c7 44 24 20 0e 36 e0 45 4b c7 04
RSP: 0018:ffffc900000778a0 EFLAGS: 00000246
RAX: 0000000000000003 RBX: ffff88811fa36618 RCX: ffffffff814b15ba
RDX: 0000000000000001 RSI: 0000000000000003 RDI: ffff88811fa36618
RBP: ffffc90000077950 R08: dffffc0000000000 R09: ffffed1023f46cc4
R10: ffffed1023f46cc4 R11: 1ffff11023f46cc3 R12: 0000000000000246
R13: 1ffff11023f46cc3 R14: dffffc0000000000 R15: 1ffff9200000ef18
FS:  0000000000000000(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fde4e5f6ffc CR3: 000000011fd5d000 CR4: 00000000003506b0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 pv_wait arch/x86/include/asm/paravirt.h:564 [inline]
 pv_wait_head_or_lock kernel/locking/qspinlock_paravirt.h:470 [inline]
 __pv_queued_spin_lock_slowpath+0x714/0xb70 kernel/locking/qspinlock.c:508
 pv_queued_spin_lock_slowpath arch/x86/include/asm/paravirt.h:554 [inline]
 queued_spin_lock_slowpath+0x47/0x50 arch/x86/include/asm/qspinlock.h:51
 queued_spin_lock include/asm-generic/qspinlock.h:85 [inline]
 do_raw_spin_lock include/linux/spinlock.h:183 [inline]
 __raw_spin_lock_bh include/linux/spinlock_api_smp.h:136 [inline]
 _raw_spin_lock_bh+0xd8/0xe0 kernel/locking/spinlock.c:175
 spin_lock_bh include/linux/spinlock.h:359 [inline]
 tipc_conn_kref_release net/tipc/topsrv.c:129 [inline]
 kref_put include/linux/kref.h:65 [inline]
 conn_put+0x78/0x320 net/tipc/topsrv.c:147
 tipc_conn_recv_work+0x391/0x3f0 net/tipc/topsrv.c:432
 process_one_work+0x6e1/0xba0 kernel/workqueue.c:2301
 worker_thread+0xa6a/0x13b0 kernel/workqueue.c:2447
 kthread+0x346/0x3d0 kernel/kthread.c:313
 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:298

Crashes (1):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2025/05/08 14:38 android13-5.10-lts 7e2543346ff7 dbf35fa1 .config console log report info [disk image] [vmlinux] [kernel image] ci2-android-5-10 BUG: soft lockup in cleanup_net
* Struck through repros no longer work on HEAD.