syzbot


BUG: soft lockup in netif_receive_skb_list

Status: closed as invalid on 2025/11/04 11:39
Subsystems: wireless
[Documentation on labels]
First crash: 130d, last: 130d
Similar bugs (1)
Kernel Title Rank 🛈 Repro Cause bisect Fix bisect Count Last Reported Patched Status
upstream INFO: rcu detected stall in netif_receive_skb_list wireless 1 1 606d 606d 0/29 auto-obsoleted due to no activity on 2024/08/30 21:00

Sample crash report:
watchdog: BUG: soft lockup - CPU#1 stuck for 143s! [syz.0.145:6599]
Modules linked in:
irq event stamp: 11014967
hardirqs last  enabled at (11014966): [<ffffffff8b7a4234>] irqentry_exit+0x74/0x90 kernel/entry/common.c:200
hardirqs last disabled at (11014967): [<ffffffff8b7a2e6e>] sysvec_apic_timer_interrupt+0xe/0xc0 arch/x86/kernel/apic/apic.c:1050
softirqs last  enabled at (34210): [<ffffffff8185050a>] __do_softirq kernel/softirq.c:613 [inline]
softirqs last  enabled at (34210): [<ffffffff8185050a>] invoke_softirq kernel/softirq.c:453 [inline]
softirqs last  enabled at (34210): [<ffffffff8185050a>] __irq_exit_rcu+0xca/0x1f0 kernel/softirq.c:680
softirqs last disabled at (34213): [<ffffffff8185050a>] __do_softirq kernel/softirq.c:613 [inline]
softirqs last disabled at (34213): [<ffffffff8185050a>] invoke_softirq kernel/softirq.c:453 [inline]
softirqs last disabled at (34213): [<ffffffff8185050a>] __irq_exit_rcu+0xca/0x1f0 kernel/softirq.c:680
CPU: 1 UID: 0 PID: 6599 Comm: syz.0.145 Not tainted syzkaller #0 PREEMPT(full) 
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025
RIP: 0010:netif_receive_skb_list+0xc2/0x450 net/core/dev.c:6270
Code: 35 13 02 40 06 0f 92 c3 40 0f 92 c6 bf 02 00 00 00 e8 d2 1f 5c f8 84 db 74 17 e8 b9 cd 42 f8 84 c0 74 15 e8 c0 1c 5c f8 eb 1c <e8> b9 1c 5c f8 eb 15 e8 b2 1c 5c f8 eb 0e 80 3d cb fa 29 06 01 75
RSP: 0018:ffffc90000a08be8 EFLAGS: 00000246
RAX: ffffc90000a08c60 RBX: ffffc90000a08c60 RCX: ffff888030d1da00
RDX: 0000000000000100 RSI: ffffffff8dba9339 RDI: ffffc90000a08c60
RBP: ffffc90000a08ce0 R08: ffffffff8fa3a437 R09: 1ffffffff1f47486
R10: dffffc0000000000 R11: fffffbfff1f47487 R12: dffffc0000000000
R13: dffffc0000000000 R14: 1ffff9200014118c R15: ffffffff8af5ccba
FS:  00007f20004dd6c0(0000) GS:ffff888125d15000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000000 CR3: 000000006f570000 CR4: 00000000003526f0
Call Trace:
 <IRQ>
 ieee80211_rx_napi+0x354/0x3d0 net/mac80211/rx.c:5450
 ieee80211_rx include/net/mac80211.h:5210 [inline]
 ieee80211_handle_queued_frames+0xe8/0x1f0 net/mac80211/main.c:453
 tasklet_action_common+0x36c/0x580 kernel/softirq.c:829
 handle_softirqs+0x283/0x870 kernel/softirq.c:579
 __do_softirq kernel/softirq.c:613 [inline]
 invoke_softirq kernel/softirq.c:453 [inline]
 __irq_exit_rcu+0xca/0x1f0 kernel/softirq.c:680
 irq_exit_rcu+0x9/0x30 kernel/softirq.c:696
 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1050 [inline]
 sysvec_apic_timer_interrupt+0xa6/0xc0 arch/x86/kernel/apic/apic.c:1050
 </IRQ>
 <TASK>
 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702
RIP: 0010:strlen+0x0/0x70 lib/string.c:417
Code: c3 cc cc cc cc cc 89 f9 80 e1 07 38 c1 7c db e8 76 16 ad f6 eb d4 90 0f 0b 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 <f3> 0f 1e fa 41 57 41 56 41 54 53 48 c7 c0 ff ff ff ff 49 be 00 00
RSP: 0018:ffffc9001a9ef7f8 EFLAGS: 00000286
RAX: ffffffff8b8bd560 RBX: ffffffff8e13a0f8 RCX: 0000000000000000
RDX: 0000000000000000 RSI: ffffffff8e13a0e0 RDI: ffffffff8b8bd560
RBP: ffffc9001a9ef900 R08: 0000000000000002 R09: 0000000000000000
R10: 5f65746164696c61 R11: 74735f65676e6172 R12: 1ffff9200353df08
R13: ffffffff8e13a0e0 R14: ffffffff8e009080 R15: dffffc0000000000
 __fortify_strlen include/linux/fortify-string.h:268 [inline]
 trace_event_get_offsets_lock_acquire include/trace/events/lock.h:24 [inline]
 do_perf_trace_lock_acquire include/trace/events/lock.h:24 [inline]
 perf_trace_lock_acquire+0xcb/0x410 include/trace/events/lock.h:24
 __do_trace_lock_acquire include/trace/events/lock.h:24 [inline]
 trace_lock_acquire include/trace/events/lock.h:24 [inline]
 lock_acquire+0x311/0x360 kernel/locking/lockdep.c:5831
 rcu_lock_acquire include/linux/rcupdate.h:331 [inline]
 rcu_read_lock include/linux/rcupdate.h:841 [inline]
 trace_call_bpf+0xd4/0x850 kernel/trace/bpf_trace.c:-1
 perf_trace_run_bpf_submit+0x78/0x170 kernel/events/core.c:10918
 do_perf_trace_lock_acquire include/trace/events/lock.h:24 [inline]
 perf_trace_lock_acquire+0x335/0x410 include/trace/events/lock.h:24
 __do_trace_lock_acquire include/trace/events/lock.h:24 [inline]
 trace_lock_acquire include/trace/events/lock.h:24 [inline]
 lock_acquire+0x311/0x360 kernel/locking/lockdep.c:5831
 fs_reclaim_acquire+0x99/0x100 mm/page_alloc.c:4251
 might_alloc include/linux/sched/mm.h:318 [inline]
 slab_pre_alloc_hook mm/slub.c:4142 [inline]
 slab_alloc_node mm/slub.c:4220 [inline]
 kmem_cache_alloc_noprof+0x44/0x3c0 mm/slub.c:4247
 alloc_empty_file+0x55/0x1d0 fs/file_table.c:237
 alloc_file fs/file_table.c:354 [inline]
 alloc_file_pseudo+0x13d/0x210 fs/file_table.c:383
 sock_alloc_file+0xb8/0x2e0 net/socket.c:470
 sock_map_fd net/socket.c:500 [inline]
 __sys_socket+0x13d/0x1b0 net/socket.c:1740
 __do_sys_socket net/socket.c:1745 [inline]
 __se_sys_socket net/socket.c:1743 [inline]
 __x64_sys_socket+0x7a/0x90 net/socket.c:1743
 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
 do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f1fff58ec29
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f20004dd038 EFLAGS: 00000246 ORIG_RAX: 0000000000000029
RAX: ffffffffffffffda RBX: 00007f1fff7d6090 RCX: 00007f1fff58ec29
RDX: 0000000000000010 RSI: 0000000000000002 RDI: 0000000000000010
RBP: 00007f1fff611e41 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007f1fff7d6128 R14: 00007f1fff7d6090 R15: 00007ffe87fac658
 </TASK>
Sending NMI from CPU 1 to CPUs 0:
NMI backtrace for cpu 0
CPU: 0 UID: 0 PID: 15 Comm: ksoftirqd/0 Not tainted syzkaller #0 PREEMPT(full) 
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025
RIP: 0010:kasan_check_range+0x5/0x2c0 mm/kasan/generic.c:188
Code: ba 8d e8 1e e3 04 ff 90 0f 0b cc cc cc cc cc cc cc cc cc cc cc 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 66 0f 1f 00 55 <41> 57 41 56 41 55 41 54 53 b0 01 48 85 f6 0f 84 ba 01 00 00 4c 8d
RSP: 0018:ffffc90000146f08 EFLAGS: 00000202
RAX: 0000000000000001 RBX: 000000000000000d RCX: ffffffff819cb7a7
RDX: 0000000000000001 RSI: 000000000000000d RDI: ffffe8ffffc6eba0
RBP: ffffc90000147038 R08: 0000000000000004 R09: 0000000000000006
R10: dffffc0000000000 R11: fffffbfff1717aad R12: ffffffff819cb7a7
R13: 000000000000000e R14: ffffffff8b8bd560 R15: ffffe8ffffc6eba0
FS:  0000000000000000(0000) GS:ffff888125c15000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007ffd62ebbf9c CR3: 00000000290e2000 CR4: 00000000003526f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600
Call Trace:
 <TASK>
 __asan_memcpy+0x40/0x70 mm/kasan/shadow.c:106
 do_perf_trace_lock_acquire include/trace/events/lock.h:24 [inline]
 perf_trace_lock_acquire+0x2c7/0x410 include/trace/events/lock.h:24
 __do_trace_lock_acquire include/trace/events/lock.h:24 [inline]
 trace_lock_acquire include/trace/events/lock.h:24 [inline]
 lock_acquire+0x311/0x360 kernel/locking/lockdep.c:5831
 rcu_lock_acquire include/linux/rcupdate.h:331 [inline]
 rcu_read_lock include/linux/rcupdate.h:841 [inline]
 class_rcu_constructor include/linux/rcupdate.h:1155 [inline]
 unwind_next_frame+0xc2/0x2390 arch/x86/kernel/unwind_orc.c:479
 arch_stack_walk+0x11c/0x150 arch/x86/kernel/stacktrace.c:25
 stack_trace_save+0x9c/0xe0 kernel/stacktrace.c:122
 kasan_save_stack mm/kasan/common.c:47 [inline]
 kasan_save_track+0x3e/0x80 mm/kasan/common.c:68
 unpoison_slab_object mm/kasan/common.c:330 [inline]
 __kasan_slab_alloc+0x6c/0x80 mm/kasan/common.c:356
 kasan_slab_alloc include/linux/kasan.h:250 [inline]
 slab_post_alloc_hook mm/slub.c:4191 [inline]
 slab_alloc_node mm/slub.c:4240 [inline]
 kmem_cache_alloc_node_noprof+0x1bb/0x3c0 mm/slub.c:4292
 kmalloc_reserve+0xbd/0x290 net/core/skbuff.c:578
 __alloc_skb+0x142/0x2d0 net/core/skbuff.c:669
 __netdev_alloc_skb+0x108/0x970 net/core/skbuff.c:733
 netdev_alloc_skb include/linux/skbuff.h:3437 [inline]
 dev_alloc_skb include/linux/skbuff.h:3450 [inline]
 __ieee80211_beacon_get+0xc06/0x1880 net/mac80211/tx.c:5555
 ieee80211_beacon_get_tim+0xb4/0x2b0 net/mac80211/tx.c:5677
 ieee80211_beacon_get include/net/mac80211.h:5663 [inline]
 mac80211_hwsim_beacon_tx+0x3ce/0x860 drivers/net/wireless/virtual/mac80211_hwsim.c:2319
 __iterate_interfaces+0x2ab/0x590 net/mac80211/util.c:761
 ieee80211_iterate_active_interfaces_atomic+0xdb/0x180 net/mac80211/util.c:797
 mac80211_hwsim_beacon+0xbb/0x1c0 drivers/net/wireless/virtual/mac80211_hwsim.c:2353
 __run_hrtimer kernel/time/hrtimer.c:1761 [inline]
 __hrtimer_run_queues+0x52c/0xc60 kernel/time/hrtimer.c:1825
 hrtimer_run_softirq+0x187/0x2b0 kernel/time/hrtimer.c:1842
 handle_softirqs+0x283/0x870 kernel/softirq.c:579
 run_ksoftirqd+0x9b/0x100 kernel/softirq.c:968
 smpboot_thread_fn+0x53f/0xa60 kernel/smpboot.c:160
 kthread+0x70e/0x8a0 kernel/kthread.c:463
 ret_from_fork+0x436/0x7d0 arch/x86/kernel/process.c:148
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245
 </TASK>

Crashes (1):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2025/09/20 06:29 bpf f36caa7c14f4 67c37560 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-kasan-gce BUG: soft lockup in netif_receive_skb_list
* Struck through repros no longer work on HEAD.