syzbot


BUG: soft lockup in kvm_vm_release

Status: internal: reported on 2025/10/03 06:47
Reported-by: syzbot+45d36f5025e9b2fbf928@syzkaller.appspotmail.com
First crash: 7d12h, last: 3d23h
Similar bugs (3)
Kernel Title Rank 🛈 Repro Cause bisect Fix bisect Count Last Reported Patched Status
upstream BUG: soft lockup in kvm_vm_release kernel 1 syz done error 3 1923d 2430d 0/29 auto-obsoleted due to no activity on 2022/09/19 05:16
upstream INFO: rcu detected stall in kvm_vm_release (2) fs 1 1 737d 737d 0/29 auto-obsoleted due to no activity on 2024/01/02 09:35
upstream INFO: rcu detected stall in kvm_vm_release (3) bpf net 1 1 495d 495d 0/29 auto-obsoleted due to no activity on 2024/08/30 21:11

Sample crash report:
watchdog: BUG: soft lockup - CPU#0 stuck for 152s! [syz.8.15806:14034]
CPU#0 Utilization every 22s during lockup:
	#1: 100% system,	  1% softirq,	  1% hardirq,	  0% idle
	#2: 100% system,	  1% softirq,	  1% hardirq,	  0% idle
	#3: 100% system,	  1% softirq,	  1% hardirq,	  0% idle
	#4: 100% system,	  1% softirq,	  1% hardirq,	  0% idle
	#5: 100% system,	  1% softirq,	  1% hardirq,	  0% idle
Modules linked in:
CPU: 0 UID: 0 PID: 14034 Comm: syz.8.15806 Not tainted syzkaller #0 274f9aef60e05467e019488b9f7ece6681bb0342
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025
RIP: 0010:pv_wait_head_or_lock kernel/locking/qspinlock_paravirt.h:430 [inline]
RIP: 0010:__pv_queued_spin_lock_slowpath+0x697/0xcc0 kernel/locking/qspinlock.c:508
Code: 01 00 00 c6 03 01 bb 00 80 ff ff 66 c7 84 24 90 00 00 00 00 01 48 8b 44 24 28 42 0f b6 04 30 84 c0 75 4c 80 3f 00 74 08 f3 90 <ff> c3 75 dd eb 59 be 02 00 00 00 e8 69 05 4d fc 48 8d bc 24 90 00
RSP: 0018:ffffc9000477f900 EFLAGS: 00000206
RAX: 0000000000000000 RBX: 00000000ffff9cd2 RCX: ffff88813094df00
RDX: ffff8881f6e50a54 RSI: 0000000000000003 RDI: ffffffff8720d604
RBP: ffffc9000477fa10 R08: ffffffff8720d604 R09: 1ffffffff0e41ac0
R10: dffffc0000000000 R11: fffffbfff0e41ac1 R12: 0000000000000000
R13: 1ffffffff0e5cd9d R14: dffffc0000000000 R15: 1ffffffff0e41ac0
FS:  000055555daee500(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fb04ac4f729 CR3: 000000011804a000 CR4: 00000000003526b0
Call Trace:
 <TASK>
 pv_queued_spin_lock_slowpath arch/x86/include/asm/paravirt.h:584 [inline]
 queued_spin_lock_slowpath arch/x86/include/asm/qspinlock.h:51 [inline]
 queued_spin_lock include/asm-generic/qspinlock.h:114 [inline]
 do_raw_spin_lock include/linux/spinlock.h:187 [inline]
 __raw_spin_lock include/linux/spinlock_api_smp.h:134 [inline]
 _raw_spin_lock+0x109/0x120 kernel/locking/spinlock.c:154
 spin_lock include/linux/spinlock.h:351 [inline]
 write_seqlock include/linux/seqlock.h:876 [inline]
 lock_mount_hash fs/namespace.c:215 [inline]
 mntput_no_expire+0x147/0x6c0 fs/namespace.c:1411
 mntput+0x63/0xd0 fs/namespace.c:1466
 simple_release_fs+0xb4/0xe0 fs/libfs.c:1086
 remove_one+0x368/0x3e0 fs/debugfs/inode.c:810
 simple_recursive_removal+0x71f/0x8f0 fs/libfs.c:631
 debugfs_remove+0x5a/0x80 fs/debugfs/inode.c:832
 kvm_destroy_vm_debugfs virt/kvm/kvm_main.c:1038 [inline]
 kvm_destroy_vm virt/kvm/kvm_main.c:1317 [inline]
 kvm_put_kvm+0x130/0x12c0 virt/kvm/kvm_main.c:1392
 kvm_vm_release+0x47/0x70 virt/kvm/kvm_main.c:1415
 __fput+0x1fe/0xa00 fs/file_table.c:429
 ____fput+0x20/0x30 fs/file_table.c:457
 task_work_run+0x1e0/0x250 kernel/task_work.c:240
 resume_user_mode_work+0x36/0x50 include/linux/resume_user_mode.h:50
 exit_to_user_mode_loop kernel/entry/common.c:114 [inline]
 exit_to_user_mode_prepare include/linux/entry-common.h:328 [inline]
 __syscall_exit_to_user_mode_work kernel/entry/common.c:207 [inline]
 syscall_exit_to_user_mode+0x64/0xb0 kernel/entry/common.c:218
 do_syscall_64+0x64/0xf0 arch/x86/entry/common.c:89
 entry_SYSCALL_64_after_hwframe+0x76/0x7e
RIP: 0033:0x7fc2a5f8eec9
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007ffd29d225c8 EFLAGS: 00000246 ORIG_RAX: 00000000000001b4
RAX: 0000000000000000 RBX: 00007fc2a61e7da0 RCX: 00007fc2a5f8eec9
RDX: 0000000000000000 RSI: 000000000000001e RDI: 0000000000000003
RBP: 00007fc2a61e7da0 R08: 0000000000000158 R09: 0000001329d228bf
R10: 00007fc2a61e7cb0 R11: 0000000000000246 R12: 00000000000c51c2
R13: 00007fc2a61e6180 R14: ffffffffffffffff R15: 00007ffd29d226e0
 </TASK>
Sending NMI from CPU 0 to CPUs 1:
NMI backtrace for cpu 1
CPU: 1 UID: 0 PID: 14035 Comm: syz.8.15806 Not tainted syzkaller #0 274f9aef60e05467e019488b9f7ece6681bb0342
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025
RIP: 0010:next_peer fs/pnode.c:19 [inline]
RIP: 0010:do_make_slave fs/pnode.c:100 [inline]
RIP: 0010:change_mnt_propagation+0x112/0xb00 fs/pnode.c:128
Code: 24 20 4c 89 f0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df 80 3c 08 00 74 08 4c 89 f7 e8 77 4e e7 ff 4d 39 2e 0f 84 8f 00 00 00 <49> 81 c4 d8 00 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc
RSP: 0018:ffffc90003c0f9c0 EFLAGS: 00000283
RAX: 1ffff11022ffc98c RBX: ffffffffffffff28 RCX: dffffc0000000000
RDX: ffffc90010172000 RSI: 000000000007ffff RDI: 0000000000080000
RBP: ffffc90003c0fa10 R08: ffff8881250029ef R09: 0000000000000000
R10: ffff8881250029e0 R11: ffffed1024a0053e R12: ffff888117fe4c40
R13: ffff88813c6dd330 R14: ffff888117fe4c60 R15: ffff888121399a40
FS:  00007fc2a6e096c0(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000200000001000 CR3: 000000011804a000 CR4: 00000000003526b0
Call Trace:
 <TASK>
 umount_tree+0xdfd/0xf70 fs/namespace.c:1803
 attach_recursive_mnt+0x6df/0x21e0 fs/namespace.c:2549
 graft_tree+0x157/0x1c0 fs/namespace.c:2684
 do_loopback+0x364/0x4b0 fs/namespace.c:2816
 path_mount+0x582/0x1050 fs/namespace.c:3858
 do_mount fs/namespace.c:3877 [inline]
 __do_sys_mount fs/namespace.c:4087 [inline]
 __se_sys_mount+0x2bd/0x480 fs/namespace.c:4064
 __x64_sys_mount+0xc3/0xf0 fs/namespace.c:4064
 x64_sys_call+0x2021/0x2ee0 arch/x86/include/generated/asm/syscalls_64.h:166
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0x58/0xf0 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x76/0x7e
RIP: 0033:0x7fc2a5f8eec9
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007fc2a6e09038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5
RAX: ffffffffffffffda RBX: 00007fc2a61e5fa0 RCX: 00007fc2a5f8eec9
RDX: 0000000000000000 RSI: 0000200000000200 RDI: 00002000000002c0
RBP: 00007fc2a6011f91 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000101091 R11: 0000000000000246 R12: 0000000000000000
R13: 00007fc2a61e6038 R14: 00007fc2a61e5fa0 R15: 00007ffd29d22468
 </TASK>

Crashes (2):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2025/10/06 17:51 android16-6.12 6c400c2e2e46 91305dbe .config console log report info [disk image] [vmlinux] [kernel image] ci2-android-6-12-rust BUG: soft lockup in kvm_vm_release
2025/10/03 04:55 android16-6.12 6a4218cc2885 49379ee0 .config console log report info [disk image] [vmlinux] [kernel image] ci2-android-6-12-rust BUG: soft lockup in kvm_vm_release
* Struck through repros no longer work on HEAD.