syzbot


BUG: soft lockup in ser_release (4)

Status: upstream: reported on 2024/12/10 10:35
Subsystems: net
[Documentation on labels]
Reported-by: syzbot+635b76a41cfd2daa1d90@syzkaller.appspotmail.com
First crash: 111d, last: 45d
Discussions (1)
Title Replies (including bot) Last reply
[syzbot] [net?] BUG: soft lockup in ser_release (4) 0 (1) 2024/12/10 10:35
Similar bugs (6)
Kernel Title Repro Cause bisect Fix bisect Count Last Reported Patched Status
upstream BUG: soft lockup in ser_release (2) net 1 657d 653d 0/28 auto-obsoleted due to no activity on 2023/09/07 19:16
linux-5.15 BUG: soft lockup in ser_release (3) 1 11d 11d 0/3 upstream: reported on 2025/03/16 08:34
linux-5.15 BUG: soft lockup in ser_release 1 330d 330d 0/3 auto-obsoleted due to no activity on 2024/08/09 17:40
upstream BUG: soft lockup in ser_release net C 2 872d 931d 0/28 closed as invalid on 2023/01/25 11:26
upstream BUG: soft lockup in ser_release (3) net 1 400d 395d 0/28 auto-obsoleted due to no activity on 2024/05/31 19:36
linux-5.15 BUG: soft lockup in ser_release (2) origin:upstream C error 3 117d 124d 0/3 auto-obsoleted due to no activity on 2025/03/11 03:06

Sample crash report:
watchdog: BUG: soft lockup - CPU#0 stuck for 23s! [kworker/0:3:6490]
Modules linked in:
irq event stamp: 75871
hardirqs last  enabled at (75870): [<ffff80008b807c58>] __exit_to_kernel_mode arch/arm64/kernel/entry-common.c:85 [inline]
hardirqs last  enabled at (75870): [<ffff80008b807c58>] exit_to_kernel_mode+0xdc/0x10c arch/arm64/kernel/entry-common.c:95
hardirqs last disabled at (75871): [<ffff80008b8056d0>] __el1_irq arch/arm64/kernel/entry-common.c:557 [inline]
hardirqs last disabled at (75871): [<ffff80008b8056d0>] el1_interrupt+0x24/0x68 arch/arm64/kernel/entry-common.c:575
softirqs last  enabled at (71244): [<ffff800086237e68>] pppoe_flush_dev drivers/net/ppp/pppoe.c:327 [inline]
softirqs last  enabled at (71244): [<ffff800086237e68>] pppoe_device_event+0x464/0x4a0 drivers/net/ppp/pppoe.c:346
softirqs last disabled at (71246): [<ffff800089af7840>] local_bh_disable+0x10/0x34 include/linux/bottom_half.h:19
CPU: 0 UID: 0 PID: 6490 Comm: kworker/0:3 Not tainted 6.14.0-rc1-syzkaller-g2014c95afece #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024
Workqueue: events ser_release
pstate: 00400005 (nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : queued_spin_lock_slowpath+0x15c/0xd04 kernel/locking/qspinlock.c:380
lr : queued_spin_lock_slowpath+0x168/0xd04 kernel/locking/qspinlock.c:380
sp : ffff8000a2af73e0
x29: ffff8000a2af74a0 x28: 1fffe0001a01f5a0 x27: dfff800000000000
x26: 1ffff0001455eea8 x25: ffff8000a2af7420 x24: dfff800000000000
x23: ffff8000a2af7460 x22: ffff70001455ee84 x21: 0000000000000001
x20: 1ffff0001455ee8c x19: ffff0000d00fad00 x18: ffff8000a2af72e0
x17: 0000000000029cea x16: ffff800080bfa304 x15: 0000000000000001
x14: 1fffe0001a01f5a0 x13: 0000000000000000 x12: 0000000000000000
x11: ffff60001a01f5a1 x10: 1fffe0001a01f5a0 x9 : 0000000000000000
x8 : 0000000000000001 x7 : 0000000000000000 x6 : 0000000000000000
x5 : ffff800093964290 x4 : 0000000000000008 x3 : ffff80008b82a200
x2 : 0000000000000000 x1 : 0000000000000001 x0 : 0000000000000001
Call trace:
 __cmpwait_case_8 arch/arm64/include/asm/cmpxchg.h:229 [inline] (P)
 __cmpwait arch/arm64/include/asm/cmpxchg.h:257 [inline] (P)
 queued_spin_lock_slowpath+0x15c/0xd04 kernel/locking/qspinlock.c:380 (P)
 queued_spin_lock include/asm-generic/qspinlock.h:114 [inline]
 do_raw_spin_lock+0x2ec/0x334 kernel/locking/spinlock_debug.c:116
 __raw_spin_lock include/linux/spinlock_api_smp.h:134 [inline]
 _raw_spin_lock+0x50/0x60 kernel/locking/spinlock.c:154
 spin_lock include/linux/spinlock.h:351 [inline]
 __netif_tx_lock include/linux/netdevice.h:4584 [inline]
 netif_freeze_queues net/sched/sch_generic.c:460 [inline]
 netif_tx_lock+0x9c/0x1d8 net/sched/sch_generic.c:469
 netif_tx_lock_bh include/linux/netdevice.h:4668 [inline]
 netdev_watchdog_down net/sched/sch_generic.c:569 [inline]
 dev_deactivate_many+0x2d0/0xb70 net/sched/sch_generic.c:1367
 __dev_close_many+0x270/0x408 net/core/dev.c:1675
 dev_close_many+0x1e0/0x474 net/core/dev.c:1713
 dev_close+0x174/0x250 net/core/dev.c:1739
 ser_release+0x188/0x238 drivers/net/caif/caif_serial.c:309
 process_one_work+0x7a8/0x15cc kernel/workqueue.c:3236
 process_scheduled_works kernel/workqueue.c:3317 [inline]
 worker_thread+0x97c/0xeec kernel/workqueue.c:3398
 kthread+0x65c/0x7b0 kernel/kthread.c:464
 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:862
Sending NMI from CPU 0 to CPUs 1:
NMI backtrace for cpu 1
CPU: 1 UID: 0 PID: 2366 Comm: aoe_tx0 Not tainted 6.14.0-rc1-syzkaller-g2014c95afece #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024
pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:152 [inline]
pc : _raw_spin_unlock_irqrestore+0x44/0x98 kernel/locking/spinlock.c:194
lr : __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:151 [inline]
lr : _raw_spin_unlock_irqrestore+0x38/0x98 kernel/locking/spinlock.c:194
sp : ffff8000a21576b0
x29: ffff8000a21576b0 x28: ffff0000d01f15b0 x27: dfff800000000000
x26: 0000000000000000 x25: ffff8000915df480 x24: ffff0000c93c8f48
x23: 0000000000000003 x22: 0000000000000000 x21: ffff8000915df480
x20: ffff800097aed880 x19: 0000000000000000 x18: ffff8000a2157360
x17: 000000000002a755 x16: ffff800080469d6c x15: 0000000000000001
x14: 1ffff00012f5db10 x13: ffff8000a2158000 x12: 0000000000000003
x11: 0000000000000202 x10: 0000000000000003 x9 : 0000000000000000
x8 : 00000000000000c0 x7 : ffff800084046f50 x6 : 0000000000000000
x5 : 0000000000000001 x4 : 0000000000000001 x3 : 0000000000000000
x2 : 0000000000000002 x1 : ffff80008b8ba180 x0 : ffff800123c9a000
Call trace:
 __daif_local_irq_restore arch/arm64/include/asm/irqflags.h:175 [inline] (P)
 arch_local_irq_restore arch/arm64/include/asm/irqflags.h:195 [inline] (P)
 __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:151 [inline] (P)
 _raw_spin_unlock_irqrestore+0x44/0x98 kernel/locking/spinlock.c:194 (P)
 spin_unlock_irqrestore include/linux/spinlock.h:406 [inline]
 uart_port_unlock_irqrestore include/linux/serial_core.h:786 [inline]
 uart_write+0x4b0/0x9b4 drivers/tty/serial/serial_core.c:628
 handle_tx+0x200/0x604 drivers/net/caif/caif_serial.c:236
 caif_xmit+0x108/0x150 drivers/net/caif/caif_serial.c:282
 __netdev_start_xmit include/linux/netdevice.h:5144 [inline]
 netdev_start_xmit include/linux/netdevice.h:5153 [inline]
 xmit_one net/core/dev.c:3735 [inline]
 dev_hard_start_xmit+0x274/0x904 net/core/dev.c:3751
 __dev_queue_xmit+0x1680/0x35b4 net/core/dev.c:4584
 dev_queue_xmit include/linux/netdevice.h:3305 [inline]
 tx+0x9c/0x1cc drivers/block/aoe/aoenet.c:62
 kthread+0x1ac/0x374 drivers/block/aoe/aoecmd.c:1237
 kthread+0x65c/0x7b0 kernel/kthread.c:464
 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:862

Crashes (2):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2025/02/11 01:24 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci 2014c95afece 43f51a00 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 BUG: soft lockup in ser_release
2024/12/06 09:30 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci 7b1d1d4cfac0 946d28f0 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 BUG: soft lockup in ser_release
* Struck through repros no longer work on HEAD.