syzbot


BUG: soft lockup in xfrm_policy_timer

Status: upstream: reported on 2025/10/20 11:38
Subsystems: net
[Documentation on labels]
Reported-by: syzbot+4eba0fa4e072709f8c2d@syzkaller.appspotmail.com
First crash: 26d, last: 10d
Discussions (1)
Title Replies (including bot) Last reply
[syzbot] [net?] BUG: soft lockup in xfrm_policy_timer 0 (1) 2025/10/20 11:38

Sample crash report:
watchdog: BUG: soft lockup - CPU#0 stuck for 144s! [syz.6.1022:9532]
Modules linked in:
irq event stamp: 7130837
hardirqs last  enabled at (7130836): [<ffffffff8b462c14>] irqentry_exit+0x74/0x90 kernel/entry/common.c:214
hardirqs last disabled at (7130837): [<ffffffff8b46184e>] sysvec_apic_timer_interrupt+0xe/0xc0 arch/x86/kernel/apic/apic.c:1052
softirqs last  enabled at (74): [<ffffffff8168f738>] local_bh_enable include/linux/bottom_half.h:33 [inline]
softirqs last  enabled at (74): [<ffffffff8168f738>] fpregs_unlock arch/x86/include/asm/fpu/api.h:77 [inline]
softirqs last  enabled at (74): [<ffffffff8168f738>] kernel_fpu_end+0xc8/0x120 arch/x86/kernel/fpu/core.c:479
softirqs last disabled at (473): [<ffffffff8184ccfa>] __do_softirq kernel/softirq.c:656 [inline]
softirqs last disabled at (473): [<ffffffff8184ccfa>] invoke_softirq kernel/softirq.c:496 [inline]
softirqs last disabled at (473): [<ffffffff8184ccfa>] __irq_exit_rcu+0xca/0x1f0 kernel/softirq.c:723
CPU: 0 UID: 0 PID: 9532 Comm: syz.6.1022 Not tainted syzkaller #0 PREEMPT(full) 
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025
RIP: 0010:lock_acquire+0x175/0x360 kernel/locking/lockdep.c:5872
Code: 00 00 00 00 9c 8f 44 24 30 f7 44 24 30 00 02 00 00 0f 85 cd 00 00 00 f7 44 24 08 00 02 00 00 74 01 fb 65 48 8b 05 fb cc d0 10 <48> 3b 44 24 58 0f 85 f2 00 00 00 48 83 c4 60 5b 41 5c 41 5d 41 5e
RSP: 0018:ffffc900000072f8 EFLAGS: 00000206
RAX: d46d2fac08d93a00 RBX: 0000000000000000 RCX: d46d2fac08d93a00
RDX: 0000000000000000 RSI: ffffffff8d8f29a6 RDI: ffffffff8bbf03e0
RBP: ffffffff81738d25 R08: 0000000000000000 R09: ffffffff81738d25
R10: ffffc900000074b8 R11: ffffffff81ac2cd0 R12: 0000000000000002
R13: ffffffff8df3d2e0 R14: 0000000000000000 R15: 0000000000000246
FS:  00007efdc04126c0(0000) GS:ffff88812613e000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000100000001 CR3: 0000000073dfe000 CR4: 00000000003526f0
DR0: 0000200000000300 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600
Call Trace:
 <IRQ>
 rcu_lock_acquire include/linux/rcupdate.h:331 [inline]
 rcu_read_lock include/linux/rcupdate.h:867 [inline]
 class_rcu_constructor include/linux/rcupdate.h:1195 [inline]
 unwind_next_frame+0xc2/0x2390 arch/x86/kernel/unwind_orc.c:479
 arch_stack_walk+0x11c/0x150 arch/x86/kernel/stacktrace.c:25
 stack_trace_save+0x9c/0xe0 kernel/stacktrace.c:122
 kasan_save_stack mm/kasan/common.c:56 [inline]
 kasan_save_track+0x3e/0x80 mm/kasan/common.c:77
 unpoison_slab_object mm/kasan/common.c:342 [inline]
 __kasan_slab_alloc+0x6c/0x80 mm/kasan/common.c:368
 kasan_slab_alloc include/linux/kasan.h:252 [inline]
 slab_post_alloc_hook mm/slub.c:4962 [inline]
 slab_alloc_node mm/slub.c:5272 [inline]
 kmem_cache_alloc_node_noprof+0x433/0x710 mm/slub.c:5324
 __alloc_skb+0x112/0x2d0 net/core/skbuff.c:660
 alloc_skb include/linux/skbuff.h:1383 [inline]
 nlmsg_new include/net/netlink.h:1055 [inline]
 xfrm_exp_policy_notify net/xfrm/xfrm_user.c:3956 [inline]
 xfrm_send_policy_notify+0x5e4/0x1bb0 net/xfrm/xfrm_user.c:4076
 km_policy_notify+0x121/0x200 net/xfrm/xfrm_state.c:2731
 km_policy_expired+0xb8/0x100 net/xfrm/xfrm_state.c:2821
 xfrm_policy_timer+0x364/0x630 net/xfrm/xfrm_policy.c:420
 call_timer_fn+0x17e/0x5f0 kernel/time/timer.c:1747
 expire_timers kernel/time/timer.c:1798 [inline]
 __run_timers kernel/time/timer.c:2372 [inline]
 __run_timer_base+0x61a/0x860 kernel/time/timer.c:2384
 run_timer_base kernel/time/timer.c:2393 [inline]
 run_timer_softirq+0xb7/0x180 kernel/time/timer.c:2403
 handle_softirqs+0x286/0x870 kernel/softirq.c:622
 __do_softirq kernel/softirq.c:656 [inline]
 invoke_softirq kernel/softirq.c:496 [inline]
 __irq_exit_rcu+0xca/0x1f0 kernel/softirq.c:723
 irq_exit_rcu+0x9/0x30 kernel/softirq.c:739
 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1052 [inline]
 sysvec_apic_timer_interrupt+0xa6/0xc0 arch/x86/kernel/apic/apic.c:1052
 </IRQ>
 <TASK>
 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:697
RIP: 0010:generic_exec_single+0x481/0x500 kernel/smp.c:453
Code: 75 11 e8 b2 7f 0b 00 48 85 db 75 16 e8 a8 7f 0b 00 eb 15 e8 a1 7f 0b 00 e8 bc 9d 91 09 48 85 db 74 ea e8 92 7f 0b 00 fb 31 c0 <48> c7 44 24 20 0e 36 e0 45 4b c7 04 2c 00 00 00 00 66 43 c7 44 2c
RSP: 0018:ffffc900055d79c0 EFLAGS: 00000246
RAX: 0000000000000000 RBX: 0000000000000200 RCX: 0000000000080000
RDX: ffffc9000c792000 RSI: 0000000000000543 RDI: 0000000000000544
RBP: ffffc900055d7a90 R08: ffffffff8f7cd177 R09: 1ffffffff1ef9a2e
R10: dffffc0000000000 R11: fffffbfff1ef9a2f R12: 1ffff92000abaf3c
R13: dffffc0000000000 R14: 0000000000000000 R15: 1ffff92000abaf5d
 smp_call_function_single+0x351/0x590 kernel/smp.c:684
 task_function_call kernel/events/core.c:121 [inline]
 perf_install_in_context+0x593/0x8f0 kernel/events/core.c:3107
 __do_sys_perf_event_open kernel/events/core.c:13735 [inline]
 __se_sys_perf_event_open+0x193a/0x1d70 kernel/events/core.c:13377
 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
 do_syscall_64+0xfa/0xfa0 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7efdbf58efc9
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007efdc0412038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a
RAX: ffffffffffffffda RBX: 00007efdbf7e6090 RCX: 00007efdbf58efc9
RDX: ffffffffffffffff RSI: 0000000000000000 RDI: 00002000000003c0
RBP: 00007efdbf611f91 R08: 0000000000000000 R09: 0000000000000000
R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000000
R13: 00007efdbf7e6128 R14: 00007efdbf7e6090 R15: 00007ffe42726678
 </TASK>
Sending NMI from CPU 0 to CPUs 1:
NMI backtrace for cpu 1
CPU: 1 UID: 0 PID: 60 Comm: kworker/u8:4 Not tainted syzkaller #0 PREEMPT(full) 
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025
Workqueue: events_unbound toggle_allocation_gate
RIP: 0010:csd_lock_wait kernel/smp.c:342 [inline]
RIP: 0010:smp_call_function_many_cond+0xd33/0x12d0 kernel/smp.c:877
Code: 45 8b 2c 24 44 89 ee 83 e6 01 31 ff e8 96 73 0b 00 41 83 e5 01 49 bd 00 00 00 00 00 fc ff df 75 07 e8 41 6f 0b 00 eb 38 f3 90 <42> 0f b6 04 2b 84 c0 75 11 41 f7 04 24 01 00 00 00 74 1e e8 25 6f
RSP: 0018:ffffc9000211f640 EFLAGS: 00000293
RAX: ffffffff81b494cb RBX: 1ffff11017108431 RCX: ffff88801bfb5ac0
RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000
RBP: ffffc9000211f7c0 R08: ffffffff8f7cd177 R09: 1ffffffff1ef9a2e
R10: dffffc0000000000 R11: fffffbfff1ef9a2f R12: ffff8880b8842188
R13: dffffc0000000000 R14: ffff8880b893b1c0 R15: 0000000000000000
FS:  0000000000000000(0000) GS:ffff88812623e000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f7659d15000 CR3: 000000000dd38000 CR4: 00000000003526f0
DR0: 0000200000000300 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600
Call Trace:
 <TASK>
 on_each_cpu_cond_mask+0x3f/0x80 kernel/smp.c:1043
 on_each_cpu include/linux/smp.h:71 [inline]
 smp_text_poke_sync_each_cpu arch/x86/kernel/alternative.c:2713 [inline]
 smp_text_poke_batch_finish+0x5f9/0x1130 arch/x86/kernel/alternative.c:2923
 arch_jump_label_transform_apply+0x1c/0x30 arch/x86/kernel/jump_label.c:146
 static_key_enable_cpuslocked+0x128/0x250 kernel/jump_label.c:210
 static_key_enable+0x1a/0x20 kernel/jump_label.c:223
 toggle_allocation_gate+0xad/0x240 mm/kfence/core.c:852
 process_one_work kernel/workqueue.c:3263 [inline]
 process_scheduled_works+0xae1/0x17b0 kernel/workqueue.c:3346
 worker_thread+0x8a0/0xda0 kernel/workqueue.c:3427
 kthread+0x711/0x8a0 kernel/kthread.c:463
 ret_from_fork+0x4bc/0x870 arch/x86/kernel/process.c:158
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245
 </TASK>

Crashes (2):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2025/10/31 02:58 bpf-next 5701d5aefa19 2c50b6a9 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce BUG: soft lockup in xfrm_policy_timer
2025/10/14 18:50 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci bf45a62baffc b6605ba8 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 BUG: soft lockup in xfrm_policy_timer
* Struck through repros no longer work on HEAD.