From nobody Sat Feb 7 15:22:32 2026 Received: from mail-oo1-f70.google.com (mail-oo1-f70.google.com [209.85.161.70]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 43619311596 for ; Sun, 18 Jan 2026 23:26:44 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.161.70 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1768778805; cv=none; b=ZG0S8zlIAzPpKdXIbb57yxCLD3ju9Q0An2+GWMnfqimaGKWclrvmEabc/Z3MnVCCexQzVZnDaREbn+Rfc3Hv1r3Xz+m1IY2vAJEM8dvOq52SbMV6blZGq5uIcavDiF7lBfp5MPz084ZlynvT6RSVm+o5SuuwiUPiRAuyN+YQObI= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1768778805; c=relaxed/simple; bh=UvReGtHfXgL6Y/cQ/Lk8i3DWQ2rCNQVxFw//XL78d7o=; h=MIME-Version:Date:In-Reply-To:Message-ID:Subject:From:To: Content-Type; b=Ic7bBPZiqeLu09xFtgQb22EVJE1z+lB1AFOxeQHoQxdvAAW0xR5C9Eg8bptPaoB9rMEbg97iWWAyRju+r+177gKWq4eqSMOdSGfEzAb4zOe/Pl6kAdj8bACXYpMrGovf+ie7lCRUkIFJPe3M+Sx3Grl+xZFRPnRZjal6YQWgL/Q= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=fail (p=none dis=none) header.from=syzkaller.appspotmail.com; spf=pass smtp.mailfrom=M3KW2WVRGUFZ5GODRSRYTGD7.apphosting.bounces.google.com; arc=none smtp.client-ip=209.85.161.70 Authentication-Results: smtp.subspace.kernel.org; dmarc=fail (p=none dis=none) header.from=syzkaller.appspotmail.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=M3KW2WVRGUFZ5GODRSRYTGD7.apphosting.bounces.google.com Received: by mail-oo1-f70.google.com with SMTP id 006d021491bc7-661024254c8so10642476eaf.2 for ; Sun, 18 Jan 2026 15:26:44 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1768778803; x=1769383603; h=to:from:subject:message-id:in-reply-to:date:mime-version :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=+DXi2j5JjwNhqKCZ8cXjnBts7tRDJJ1JecR52BgFoCg=; b=ncXAIITZDCkqRe8yA8cx6D9/ymPbXalFmWlMn9tS3L7K+zZ2MBlN63gagxA1YfAAgQ wiqwVZVtDf7eZSH061eGDnZ0WL5dJmugKIv5ddfgfytKNVaisbg+1wwinAQwwyrSHcI+ H5EqUX2TO/I9ZwDtt7ihA0RUJvncPvcchGqZ4hVLw3XsST8LkB+yqV0yz1cKHt/b3Ing MA+GuROUmNkARKqV5YhBJIqsmkKbt1fklT6WxAVl9DdT6I1y9uU9PYC5wa9ELxzmkdxd g6//xY8FtU6nrCvlvsYhKuqNyTefNRxQm4H3I+2P2sjWDl80En7gXleQkQAVe4FfNjuX WRQw== X-Gm-Message-State: AOJu0YwqJ+dqZfAE4CZlfVSnAVI48acaIkMJnu1htrR5g8hb89Lf2Ngd ihFdZyruTkO9EkW+IGDXC3k1tPUSdX8J9+0FJhrCDlitLuQAiYCM9HxEr1JZFvnKDVZIcLHYNfd m7HSIQLCvKL8JTmKeo3EkASbbl5Hxke8qZliiWSgsFxD0aqVOD+6ZsmXRHNc= Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-Received: by 2002:a05:6820:82a:b0:659:9a49:8fd5 with SMTP id 006d021491bc7-661189e0d15mr4077649eaf.78.1768778803305; Sun, 18 Jan 2026 15:26:43 -0800 (PST) Date: Sun, 18 Jan 2026 15:26:43 -0800 In-Reply-To: <696d4ffd.050a0220.3390f1.0024.GAE@google.com> X-Google-Appengine-App-Id: s~syzkaller X-Google-Appengine-App-Id-Alias: syzkaller Message-ID: <696d6c33.050a0220.3390f1.0030.GAE@google.com> Subject: Forwarded: Private message regarding: [syzbot] [wireless?] WARNING in drv_get_tsf (2) From: syzbot To: linux-kernel@vger.kernel.org, syzkaller-bugs@googlegroups.com Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" For archival purposes, forwarding an incoming command email to linux-kernel@vger.kernel.org, syzkaller-bugs@googlegroups.com. *** Subject: Private message regarding: [syzbot] [wireless?] WARNING in drv_get= _tsf (2) Author: kapoorarnav43@gmail.com #syz test From e0dd0088f4b871d8c44d5b9ba17dd9eba1f770a0 Mon Sep 17 00:00:00 2001 From: Arnav Kapoor Date: Mon, 19 Jan 2026 04:48:19 +0530 Subject: [PATCH] netfilter: nf_conntrack: add entry limit and cond_resched=20 in gc_worker Further limit the gc_worker to process at most 100 entries per bucket and add cond_resched() at the start of each entry processing to ensure frequent yielding and prevent RCU stalls. Reported-by: syzbot+8bb3e2bee8a429cc76dd@syzkaller.appspotmail.com Closes: https://syzkaller.appspot.com/bug?extid=3D8bb3e2bee8a429cc76dd --- net/netfilter/nf_conntrack_core.c | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/net/netfilter/nf_conntrack_core.c=20 b/net/netfilter/nf_conntrack_core.c index 8a2cdd172..ff901a2b4 100644 --- a/net/netfilter/nf_conntrack_core.c +++ b/net/netfilter/nf_conntrack_core.c @@ -1552,13 +1552,17 @@ static void gc_worker(struct work_struct *work) break; } =20 + int entry_count =3D 0; hlist_nulls_for_each_entry_rcu(h, n, &ct_hash[i], hnnode) { struct nf_conntrack_net *cnet; struct net *net; long expires; =20 tmp =3D nf_ct_tuplehash_to_ctrack(h); + entry_count++; =20 + if (entry_count > 100) break; + cond_resched(); if (expired_count > GC_SCAN_EXPIRED_MAX) { rcu_read_unlock(); =20 --=20 2.43.0From e0dd0088f4b871d8c44d5b9ba17dd9eba1f770a0 Mon Sep 17 00:00:00 2001 From: Arnav Kapoor Date: Mon, 19 Jan 2026 04:48:19 +0530 Subject: [PATCH] netfilter: nf_conntrack: add entry limit and cond_resched=20 in gc_worker Further limit the gc_worker to process at most 100 entries per bucket and add cond_resched() at the start of each entry processing to ensure frequent yielding and prevent RCU stalls. Reported-by: syzbot+8bb3e2bee8a429cc76dd@syzkaller.appspotmail.com Closes: https://syzkaller.appspot.com/bug?extid=3D8bb3e2bee8a429cc76dd --- net/netfilter/nf_conntrack_core.c | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/net/netfilter/nf_conntrack_core.c=20 b/net/netfilter/nf_conntrack_core.c index 8a2cdd172..ff901a2b4 100644 --- a/net/netfilter/nf_conntrack_core.c +++ b/net/netfilter/nf_conntrack_core.c @@ -1552,13 +1552,17 @@ static void gc_worker(struct work_struct *work) break; } =20 + int entry_count =3D 0; hlist_nulls_for_each_entry_rcu(h, n, &ct_hash[i], hnnode) { struct nf_conntrack_net *cnet; struct net *net; long expires; =20 tmp =3D nf_ct_tuplehash_to_ctrack(h); + entry_count++; =20 + if (entry_count > 100) break; + cond_resched(); if (expired_count > GC_SCAN_EXPIRED_MAX) { rcu_read_unlock(); =20 --=20 2.43.0From e0dd0088f4b871d8c44d5b9ba17dd9eba1f770a0 Mon Sep 17 00:00:00 2001 From: Arnav Kapoor Date: Mon, 19 Jan 2026 04:48:19 +0530 Subject: [PATCH] netfilter: nf_conntrack: add entry limit and cond_resched=20 in gc_worker Further limit the gc_worker to process at most 100 entries per bucket and add cond_resched() at the start of each entry processing to ensure frequent yielding and prevent RCU stalls. Reported-by: syzbot+8bb3e2bee8a429cc76dd@syzkaller.appspotmail.com Closes: https://syzkaller.appspot.com/bug?extid=3D8bb3e2bee8a429cc76dd --- net/netfilter/nf_conntrack_core.c | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/net/netfilter/nf_conntrack_core.c=20 b/net/netfilter/nf_conntrack_core.c index 8a2cdd172..ff901a2b4 100644 --- a/net/netfilter/nf_conntrack_core.c +++ b/net/netfilter/nf_conntrack_core.c @@ -1552,13 +1552,17 @@ static void gc_worker(struct work_struct *work) break; } =20 + int entry_count =3D 0; hlist_nulls_for_each_entry_rcu(h, n, &ct_hash[i], hnnode) { struct nf_conntrack_net *cnet; struct net *net; long expires; =20 tmp =3D nf_ct_tuplehash_to_ctrack(h); + entry_count++; =20 + if (entry_count > 100) break; + cond_resched(); if (expired_count > GC_SCAN_EXPIRED_MAX) { rcu_read_unlock(); =20 --=20 2.43.0From e0dd0088f4b871d8c44d5b9ba17dd9eba1f770a0 Mon Sep 17 00:00:00 2001 From: Arnav Kapoor Date: Mon, 19 Jan 2026 04:48:19 +0530 Subject: [PATCH] netfilter: nf_conntrack: add entry limit and cond_resched=20 in gc_worker Further limit the gc_worker to process at most 100 entries per bucket and add cond_resched() at the start of each entry processing to ensure frequent yielding and prevent RCU stalls. Reported-by: syzbot+8bb3e2bee8a429cc76dd@syzkaller.appspotmail.com Closes: https://syzkaller.appspot.com/bug?extid=3D8bb3e2bee8a429cc76dd --- net/netfilter/nf_conntrack_core.c | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/net/netfilter/nf_conntrack_core.c=20 b/net/netfilter/nf_conntrack_core.c index 8a2cdd172..ff901a2b4 100644 --- a/net/netfilter/nf_conntrack_core.c +++ b/net/netfilter/nf_conntrack_core.c @@ -1552,13 +1552,17 @@ static void gc_worker(struct work_struct *work) break; } =20 + int entry_count =3D 0; hlist_nulls_for_each_entry_rcu(h, n, &ct_hash[i], hnnode) { struct nf_conntrack_net *cnet; struct net *net; long expires; =20 tmp =3D nf_ct_tuplehash_to_ctrack(h); + entry_count++; =20 + if (entry_count > 100) break; + cond_resched(); if (expired_count > GC_SCAN_EXPIRED_MAX) { rcu_read_unlock(); =20 --=20 2.43.0From e0dd0088f4b871d8c44d5b9ba17dd9eba1f770a0 Mon Sep 17 00:00:00 2001 From: Arnav Kapoor Date: Mon, 19 Jan 2026 04:48:19 +0530 Subject: [PATCH] netfilter: nf_conntrack: add entry limit and cond_resched=20 in gc_worker Further limit the gc_worker to process at most 100 entries per bucket and add cond_resched() at the start of each entry processing to ensure frequent yielding and prevent RCU stalls. Reported-by: syzbot+8bb3e2bee8a429cc76dd@syzkaller.appspotmail.com Closes: https://syzkaller.appspot.com/bug?extid=3D8bb3e2bee8a429cc76dd --- net/netfilter/nf_conntrack_core.c | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/net/netfilter/nf_conntrack_core.c=20 b/net/netfilter/nf_conntrack_core.c index 8a2cdd172..ff901a2b4 100644 --- a/net/netfilter/nf_conntrack_core.c +++ b/net/netfilter/nf_conntrack_core.c @@ -1552,13 +1552,17 @@ static void gc_worker(struct work_struct *work) break; } =20 + int entry_count =3D 0; hlist_nulls_for_each_entry_rcu(h, n, &ct_hash[i], hnnode) { struct nf_conntrack_net *cnet; struct net *net; long expires; =20 tmp =3D nf_ct_tuplehash_to_ctrack(h); + entry_count++; =20 + if (entry_count > 100) break; + cond_resched(); if (expired_count > GC_SCAN_EXPIRED_MAX) { rcu_read_unlock(); =20 --=20 2.43.0 On Monday, 19 January 2026 at 04:50:05 UTC+5:30 syzbot wrote: Hello,=20 syzbot tried to test the proposed patch but the build/boot failed:=20 net/mac80211/debugfs_netdev.c:662:70: error: expected ')' before 'return'=20 net/mac80211/debugfs_netdev.c:665:1: error: expected expression before '}'=20 token=20 net/mac80211/debugfs_netdev.c:664:80: error: expected ';' before '}' token=20 net/mac80211/debugfs_netdev.c:665:1: error: no return statement in function=20 returning non-void [-Werror=3Dreturn-type]=20 Tested on:=20 commit: e84d9601 Merge tag 'for-6.19-rc5-tag' of git://git.ker..=20 git tree: upstream=20 kernel config: https://syzkaller.appspot.com/x/.config?x=3Dae589cd0a6acd9be=20 dashboard link: https://syzkaller.appspot.com/bug?extid=3D2cecf0e829ae2219d= 419=20 compiler: gcc (Debian 12.2.0-14+deb12u1) 12.2.0, GNU ld (GNU Binutils for=20 Debian) 2.40=20 patch: https://syzkaller.appspot.com/x/patch.diff?x=3D100fdb9a580000