syzbot


BUG: soft lockup in xfrm_policy_timer

Status: upstream: reported on 2025/10/20 11:38
Subsystems: net
[Documentation on labels]
Reported-by: syzbot+4eba0fa4e072709f8c2d@syzkaller.appspotmail.com
First crash: 8d21h, last: 8d21h
Discussions (1)
Title Replies (including bot) Last reply
[syzbot] [net?] BUG: soft lockup in xfrm_policy_timer 0 (1) 2025/10/20 11:38

Sample crash report:
watchdog: BUG: soft lockup - CPU#0 stuck for 22s! [swapper/0:0]
Modules linked in:
irq event stamp: 314797
hardirqs last  enabled at (314796): [<ffff80008b062b20>] __exit_to_kernel_mode arch/arm64/kernel/entry-common.c:68 [inline]
hardirqs last  enabled at (314796): [<ffff80008b062b20>] exit_to_kernel_mode+0x10/0x1c arch/arm64/kernel/entry-common.c:75
hardirqs last disabled at (314797): [<ffff80008b062af0>] __enter_from_kernel_mode arch/arm64/kernel/entry-common.c:43 [inline]
hardirqs last disabled at (314797): [<ffff80008b062af0>] enter_from_kernel_mode+0x14/0x34 arch/arm64/kernel/entry-common.c:50
softirqs last  enabled at (310210): [<ffff8000803db160>] softirq_handle_end kernel/softirq.c:425 [inline]
softirqs last  enabled at (310210): [<ffff8000803db160>] handle_softirqs+0xaf8/0xc88 kernel/softirq.c:607
softirqs last disabled at (310295): [<ffff800080022028>] __do_softirq+0x14/0x20 kernel/softirq.c:613
CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Not tainted syzkaller #0 PREEMPT 
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025
pstate: 03400005 (nzcv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--)
pc : queued_spin_lock_slowpath+0x138/0xaec kernel/locking/qspinlock.c:197
lr : queued_spin_lock_slowpath+0x144/0xaec kernel/locking/qspinlock.c:197
sp : ffff800097c17940
x29: ffff800097c179e0 x28: 1fffe0001b7fe7a1 x27: 1ffff00011f10c32
x26: ffff80008f886180 x25: dfff800000000000 x24: ffff700012f82f2c
x23: 0000000000000001 x22: ffff80008f886190 x21: ffff0000dbff3d08
x20: ffff0000dbff3d10 x19: ffff0000dbff3d00 x18: 1fffe00033771c88
x17: ffff80010c3e8000 x16: ffff800080537d14 x15: 0000000000000001
x14: 1fffe0001b7fe7a0 x13: 0000000000000000 x12: 0000000000000000
x11: ffff60001b7fe7a1 x10: dfff800000000000 x9 : 0000000000000000
x8 : 0000000000000001 x7 : ffff800089d8c26c x6 : 0000000000000000
x5 : 0000000000000000 x4 : 0000000000000001 x3 : ffff80008b0885f8
x2 : 0000000000000000 x1 : 0000000000000001 x0 : 0000000000000001
Call trace:
 __cmpwait_case_8 arch/arm64/include/asm/cmpxchg.h:229 [inline] (P)
 __cmpwait arch/arm64/include/asm/cmpxchg.h:257 [inline] (P)
 queued_spin_lock_slowpath+0x138/0xaec kernel/locking/qspinlock.c:197 (P)
 queued_spin_lock include/asm-generic/qspinlock.h:114 [inline]
 do_raw_spin_lock+0x2a8/0x2cc kernel/locking/spinlock_debug.c:116
 __raw_spin_lock_bh include/linux/spinlock_api_smp.h:127 [inline]
 _raw_spin_lock_bh+0x50/0x60 kernel/locking/spinlock.c:178
 spin_lock_bh include/linux/spinlock.h:356 [inline]
 xfrm_policy_kill+0x238/0x4a4 net/xfrm/xfrm_policy.c:498
 xfrm_policy_delete net/xfrm/xfrm_policy.c:2372 [inline]
 xfrm_policy_timer+0x2fc/0x640 net/xfrm/xfrm_policy.c:419
 call_timer_fn+0x1b4/0x818 kernel/time/timer.c:1747
 expire_timers kernel/time/timer.c:1798 [inline]
 __run_timers kernel/time/timer.c:2372 [inline]
 __run_timer_base+0x51c/0x76c kernel/time/timer.c:2384
 run_timer_base kernel/time/timer.c:2393 [inline]
 run_timer_softirq+0xcc/0x194 kernel/time/timer.c:2403
 handle_softirqs+0x328/0xc88 kernel/softirq.c:579
 __do_softirq+0x14/0x20 kernel/softirq.c:613
 ____do_softirq+0x14/0x20 arch/arm64/kernel/irq.c:68
 call_on_irq_stack+0x30/0x48 arch/arm64/kernel/entry.S:891
 do_softirq_own_stack+0x20/0x2c arch/arm64/kernel/irq.c:73
 invoke_softirq kernel/softirq.c:460 [inline]
 __irq_exit_rcu+0x1b0/0x478 kernel/softirq.c:680
 irq_exit_rcu+0x14/0x84 kernel/softirq.c:696
 __el1_irq arch/arm64/kernel/entry-common.c:520 [inline]
 el1_interrupt+0x40/0x60 arch/arm64/kernel/entry-common.c:532
 el1h_64_irq_handler+0x18/0x24 arch/arm64/kernel/entry-common.c:537
 el1h_64_irq+0x6c/0x70 arch/arm64/kernel/entry.S:592
 __daif_local_irq_enable arch/arm64/include/asm/irqflags.h:26 [inline] (P)
 arch_local_irq_enable+0x8/0xc arch/arm64/include/asm/irqflags.h:48 (P)
 cpuidle_idle_call kernel/sched/idle.c:190 [inline]
 do_idle+0x1d8/0x454 kernel/sched/idle.c:330
 cpu_startup_entry+0x5c/0x74 kernel/sched/idle.c:428
 rest_init+0x2d8/0x2f4 init/main.c:744
 start_kernel+0x390/0x3e0 init/main.c:1097
 __primary_switched+0x8c/0x94 arch/arm64/kernel/head.S:246
Sending NMI from CPU 0 to CPUs 1:
NMI backtrace for cpu 1
CPU: 1 UID: 0 PID: 7396 Comm: syz.1.139 Not tainted syzkaller #0 PREEMPT 
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025
pstate: 83400005 (Nzcv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--)
pc : __sanitizer_cov_trace_pc+0x8/0x84 kernel/kcov.c:213
lr : xfrm_state_lookup_spi_proto net/xfrm/xfrm_state.c:1708 [inline]
lr : xfrm_alloc_spi+0x48c/0xd04 net/xfrm/xfrm_state.c:2589
sp : ffff8000a2e76f30
x29: ffff8000a2e77040 x28: 0000000000000033 x27: 0000000000000003
x26: ffff0000dbff2440 x25: ffff0000dbff38e0 x24: dfff800000000000
x23: ffff0000f4c69540 x22: ffff0000dbff38e0 x21: 00000000000018c0
x20: 00000000634d0100 x19: 0000000000060000 x18: 0000000000000000
x17: 00000000ffff0000 x16: ffff80008b065bd0 x15: ffff7000145cedd0
x14: 1ffff000145cedd0 x13: 0000000000000004 x12: ffffffffffffffff
x11: 0000000000080000 x10: 0000000000ff0100 x9 : 0000000000000002
x8 : ffff0000dbf2db80 x7 : ffff800089dc6ba0 x6 : 0000000000000000
x5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000002
x2 : 0000000000000008 x1 : 00000000634d0100 x0 : 0000000000060000
Call trace:
 __sanitizer_cov_trace_pc+0x8/0x84 kernel/kcov.c:210 (P)
 xfrm_alloc_userspi+0x55c/0x9c8 net/xfrm/xfrm_user.c:1873
 xfrm_user_rcv_msg+0x588/0x7c4 net/xfrm/xfrm_user.c:3501
 netlink_rcv_skb+0x220/0x3fc net/netlink/af_netlink.c:2552
 xfrm_netlink_rcv+0x80/0x9c net/xfrm/xfrm_user.c:3523
 netlink_unicast_kernel net/netlink/af_netlink.c:1320 [inline]
 netlink_unicast+0x694/0x8c4 net/netlink/af_netlink.c:1346
 netlink_sendmsg+0x648/0x930 net/netlink/af_netlink.c:1896
 sock_sendmsg_nosec net/socket.c:714 [inline]
 __sock_sendmsg net/socket.c:729 [inline]
 ____sys_sendmsg+0x490/0x7b8 net/socket.c:2614
 ___sys_sendmsg+0x204/0x278 net/socket.c:2668
 __sys_sendmsg net/socket.c:2700 [inline]
 __do_sys_sendmsg net/socket.c:2705 [inline]
 __se_sys_sendmsg net/socket.c:2703 [inline]
 __arm64_sys_sendmsg+0x184/0x238 net/socket.c:2703
 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline]
 invoke_syscall+0x98/0x254 arch/arm64/kernel/syscall.c:49
 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132
 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151
 el0_svc+0x5c/0x254 arch/arm64/kernel/entry-common.c:744
 el0t_64_sync_handler+0x84/0x12c arch/arm64/kernel/entry-common.c:763
 el0t_64_sync+0x198/0x19c arch/arm64/kernel/entry.S:596

Crashes (1):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2025/10/14 18:50 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci bf45a62baffc b6605ba8 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 BUG: soft lockup in xfrm_policy_timer
* Struck through repros no longer work on HEAD.