syzbot


BUG: soft lockup in wg_packet_handshake_send_worker

Status: upstream: reported on 2024/11/16 07:32
Reported-by: syzbot+92d358f9ab4bd8a4863c@syzkaller.appspotmail.com
First crash: 5d10h, last: 5d10h
Similar bugs (7)
Kernel Title Repro Cause bisect Fix bisect Count Last Reported Patched Status
android-5-15 BUG: soft lockup in wg_packet_handshake_send_worker 2 490d 496d 0/2 auto-obsoleted due to no activity on 2023/10/18 09:06
android-5-10 BUG: soft lockup in wg_packet_handshake_send_worker 6 462d 502d 0/2 auto-obsoleted due to no activity on 2023/11/15 02:30
upstream INFO: rcu detected stall in wg_packet_handshake_send_worker (4) wireguard 1 492d 492d 0/28 auto-obsoleted due to no activity on 2023/10/15 22:40
linux-5.15 INFO: rcu detected stall in wg_packet_handshake_send_worker 1 227d 227d 0/3 auto-obsoleted due to no activity on 2024/07/16 21:11
upstream INFO: rcu detected stall in wg_packet_handshake_send_worker (5) wireguard 1 356d 356d 0/28 auto-obsoleted due to no activity on 2024/02/29 10:43
upstream INFO: rcu detected stall in wg_packet_handshake_send_worker (3) kernel 1 701d 701d 0/28 auto-obsoleted due to no activity on 2023/04/12 00:54
linux-6.1 INFO: rcu detected stall in wg_packet_handshake_send_worker 1 173d 173d 0/3 auto-obsoleted due to no activity on 2024/09/09 01:47

Sample crash report:
watchdog: BUG: soft lockup - CPU#1 stuck for 21s! [kworker/u4:0:9]
Modules linked in:
irq event stamp: 1107351
hardirqs last  enabled at (1107350): [<ffff800011ab9be4>] __exit_to_kernel_mode arch/arm64/kernel/entry-common.c:81 [inline]
hardirqs last  enabled at (1107350): [<ffff800011ab9be4>] exit_to_kernel_mode+0x100/0x178 arch/arm64/kernel/entry-common.c:91
hardirqs last disabled at (1107351): [<ffff800011ab9e2c>] enter_el1_irq_or_nmi+0x10/0x1c arch/arm64/kernel/entry-common.c:227
softirqs last  enabled at (1102748): [<ffff80000c83fe34>] local_bh_enable+0x10/0x34 include/linux/bottom_half.h:31
softirqs last disabled at (1102752): [<ffff80000c84af2c>] wg_socket_send_skb_to_peer+0x64/0x1a8 drivers/net/wireguard/socket.c:173
CPU: 1 PID: 9 Comm: kworker/u4:0 Not tainted 5.15.172-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
Workqueue: wg-kex-wg0 wg_packet_handshake_send_worker
pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : fq_dequeue+0x5a4/0x18fc net/sched/sch_fq.c:561
lr : fq_dequeue+0x578/0x18fc net/sched/sch_fq.c:551
sp : ffff80001bc37000
x29: ffff80001bc37120 x28: 1fffe0001a3aec08 x27: 0000003bb0f19a78
x26: dfff800000000000 x25: ffff0000d1d76000 x24: ffff0000e37f42e8
x23: 1fffe0001a3aec09 x22: ffff0000d1d76040 x21: ffff0000e37f42d0
x20: 1fffe0001c6fe85a x19: ffff0000d1d76048 x18: 0000000000000802
x17: 0000000000000000 x16: ffff8000082ec8b8 x15: 0000000000000001
x14: 1ffff0000295806a x13: dfff800000000000 x12: 0000000000000003
x11: 0000000000000802 x10: 0000000000000000 x9 : ffff0000c0948000
x8 : 0000000000000000 x7 : 0000000000000000 x6 : 0000000000000000
x5 : 0000000000000080 x4 : 0000000000000000 x3 : ffff80000804605c
x2 : 0000000000000002 x1 : 00000000f5060902 x0 : 0000000000000001
Call trace:
 fq_dequeue+0x5a4/0x18fc net/sched/sch_fq.c:561
 dequeue_skb net/sched/sch_generic.c:292 [inline]
 qdisc_restart net/sched/sch_generic.c:397 [inline]
 __qdisc_run+0x1ec/0x1fc0 net/sched/sch_generic.c:415
 __dev_xmit_skb net/core/dev.c:3910 [inline]
 __dev_queue_xmit+0x1038/0x2ac8 net/core/dev.c:4221
 dev_queue_xmit+0x24/0x34 net/core/dev.c:4289
 neigh_hh_output include/net/neighbour.h:493 [inline]
 neigh_output include/net/neighbour.h:507 [inline]
 ip6_finish_output2+0x132c/0x1cec net/ipv6/ip6_output.c:130
 __ip6_finish_output+0x580/0x6ec net/ipv6/ip6_output.c:201
 ip6_finish_output+0x40/0x218 net/ipv6/ip6_output.c:211
 NF_HOOK_COND include/linux/netfilter.h:291 [inline]
 ip6_output+0x274/0x594 net/ipv6/ip6_output.c:234
 dst_output include/net/dst.h:443 [inline]
 ip6_local_out+0x120/0x160 net/ipv6/output_core.c:161
 ip6tunnel_xmit include/net/ip6_tunnel.h:160 [inline]
 udp_tunnel6_xmit_skb+0x43c/0x938 net/ipv6/ip6_udp_tunnel.c:109
 send6+0x560/0x930 drivers/net/wireguard/socket.c:152
 wg_socket_send_skb_to_peer+0xfc/0x1a8 drivers/net/wireguard/socket.c:178
 wg_socket_send_buffer_to_peer+0xec/0x144 drivers/net/wireguard/socket.c:200
 wg_packet_send_handshake_initiation drivers/net/wireguard/send.c:40 [inline]
 wg_packet_handshake_send_worker+0x1a8/0x2a4 drivers/net/wireguard/send.c:51
 process_one_work+0x790/0x11b8 kernel/workqueue.c:2310
 worker_thread+0x910/0x1034 kernel/workqueue.c:2457
 kthread+0x37c/0x45c kernel/kthread.c:334
 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:870

Crashes (1):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2024/11/16 07:31 linux-5.15.y d98fd109f827 cfe3a04a .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-5-15-kasan-arm64 BUG: soft lockup in wg_packet_handshake_send_worker
* Struck through repros no longer work on HEAD.