syzbot


BUG: soft lockup in hci_sock_release (2)

Status: upstream: reported on 2023/02/20 13:15
Reported-by: syzbot+baaeba49c3dd07d66610@syzkaller.appspotmail.com
First crash: 483d, last: 483d
Similar bugs (2)
Kernel Title Repro Cause bisect Fix bisect Count Last Reported Patched Status
linux-4.14 BUG: soft lockup in hci_sock_release 15 681d 926d 0/1 auto-obsoleted due to no activity on 2022/12/04 07:28
linux-4.14 INFO: rcu detected stall in hci_sock_release 9 1139d 1242d 0/1 auto-closed as invalid on 2021/09/03 05:06

Sample crash report:
netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'.
netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'.
watchdog: BUG: soft lockup - CPU#0 stuck for 22s! [syz-executor.5:10168]
Modules linked in:
irq event stamp: 14340
hardirqs last  enabled at (14339): [<ffffffff812317db>] kvm_wait arch/x86/kernel/kvm.c:600 [inline]
hardirqs last  enabled at (14339): [<ffffffff812317db>] kvm_wait+0x14b/0x240 arch/x86/kernel/kvm.c:580
hardirqs last disabled at (14340): [<ffffffff87401a1e>] apic_timer_interrupt+0x8e/0xa0 arch/x86/entry/entry_64.S:796
softirqs last  enabled at (4324): [<ffffffff8760068b>] __do_softirq+0x68b/0x9ff kernel/softirq.c:314
softirqs last disabled at (4213): [<ffffffff81322e33>] invoke_softirq kernel/softirq.c:368 [inline]
softirqs last disabled at (4213): [<ffffffff81322e33>] irq_exit+0x193/0x240 kernel/softirq.c:409
CPU: 0 PID: 10168 Comm: syz-executor.5 Not tainted 4.14.305-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/21/2023
task: ffff8880ab4e0180 task.stack: ffff8880a6338000
RIP: 0010:native_safe_halt+0xe/0x10 arch/x86/include/asm/irqflags.h:61
RSP: 0018:ffff8880a633fb68 EFLAGS: 000002c6 ORIG_RAX: ffffffffffffff10
RAX: 1ffffffff11e13dc RBX: ffffffff89ddac2c RCX: 1ffff1101569c154
RDX: dffffc0000000000 RSI: ffff8880ab4e0a80 RDI: ffff8880ab4e0a04
RBP: 0000000000000003 R08: 0000000000000001 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000286
R13: dffffc0000000000 R14: ffffffff89ddac2d R15: ffffed10174869f8
FS:  0000555555951400(0000) GS:ffff8880ba400000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f2d48b1d9f0 CR3: 000000009ba99000 CR4: 00000000003406f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 arch_safe_halt arch/x86/include/asm/paravirt.h:94 [inline]
 kvm_wait arch/x86/kernel/kvm.c:600 [inline]
 kvm_wait+0x179/0x240 arch/x86/kernel/kvm.c:580
 pv_wait arch/x86/include/asm/paravirt.h:679 [inline]
 pv_wait_head_or_lock kernel/locking/qspinlock_paravirt.h:447 [inline]
 __pv_queued_spin_lock_slowpath+0x722/0x910 kernel/locking/qspinlock.c:465
 pv_queued_spin_lock_slowpath arch/x86/include/asm/paravirt.h:669 [inline]
 queued_spin_lock_slowpath arch/x86/include/asm/qspinlock.h:52 [inline]
 queued_spin_lock include/asm-generic/qspinlock.h:90 [inline]
 queued_read_lock_slowpath+0x150/0x190 kernel/locking/qrwlock.c:90
 hci_send_to_channel+0x3c/0x200 net/bluetooth/hci_sock.c:272
 hci_send_monitor_ctrl_event+0x3dd/0x500 net/bluetooth/hci_sock.c:402
 mgmt_send_event+0x2b3/0x330 net/bluetooth/mgmt_util.c:86
 mgmt_index_event net/bluetooth/mgmt.c:256 [inline]
 mgmt_index_added+0x1d5/0x210 net/bluetooth/mgmt.c:6565
 hci_sock_release+0x3d7/0x4c0 net/bluetooth/hci_sock.c:871
 __sock_release+0xcd/0x2b0 net/socket.c:602
 sock_close+0x15/0x20 net/socket.c:1139
 __fput+0x25f/0x7a0 fs/file_table.c:210
 task_work_run+0x11f/0x190 kernel/task_work.c:113
 tracehook_notify_resume include/linux/tracehook.h:191 [inline]
 exit_to_usermode_loop+0x1ad/0x200 arch/x86/entry/common.c:164
 prepare_exit_to_usermode arch/x86/entry/common.c:199 [inline]
 syscall_return_slowpath arch/x86/entry/common.c:270 [inline]
 do_syscall_64+0x4a3/0x640 arch/x86/entry/common.c:297
 entry_SYSCALL_64_after_hwframe+0x5e/0xd3
RIP: 0033:0x7f2ca7a73fab
RSP: 002b:00007ffe38e3d7d0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003
RAX: 0000000000000000 RBX: 0000000000000005 RCX: 00007f2ca7a73fab
RDX: 00007f2ca7638190 RSI: ffffffffffffffff RDI: 0000000000000004
RBP: 00007f2ca7be3980 R08: 0000000000000000 R09: 00007f2ca7636000
R10: 00007f2ca7638198 R11: 0000000000000293 R12: 0000000000217f49
R13: 00007ffe38e3d8d0 R14: 00007f2ca7be1f80 R15: 0000000000000032
Code: 35 5a fa e9 4f ff ff ff 48 89 ef e8 ad 35 5a fa eb 93 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 00 00 0f 00 2d f4 b2 62 00 fb f4 <c3> 90 0f 1f 44 00 00 0f 00 2d e4 b2 62 00 f4 c3 90 90 41 55 41 
Sending NMI from CPU 0 to CPUs 1:
NMI backtrace for cpu 1
CPU: 1 PID: 10172 Comm: syz-executor.2 Not tainted 4.14.305-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/21/2023
task: ffff888091590300 task.stack: ffff88809f3a0000
RIP: 0010:__read_once_size include/linux/compiler.h:185 [inline]
RIP: 0010:atomic_read arch/x86/include/asm/atomic.h:27 [inline]
RIP: 0010:queued_write_lock_slowpath+0xcb/0x1d0 kernel/locking/qrwlock.c:139
RSP: 0018:ffff88809f3a7d10 EFLAGS: 00000206
RAX: 0000000000000101 RBX: ffffffff89ddac28 RCX: 00000000000042b4
RDX: 0000000000000000 RSI: 0000000000000001 RDI: ffffffff89ddac28
RBP: ffffffff89ddac2c R08: ffffffff8b9c7120 R09: 0000000000040591
R10: ffff888091590bd8 R11: ffff888091590300 R12: 0000000000000003
R13: fffffbfff13bb585 R14: 00000000000000ff R15: ffff8880b523b5d0
FS:  0000555556524400(0000) GS:ffff8880ba500000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f70ace54ff8 CR3: 00000000a3b70000 CR4: 00000000003406e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 queued_write_lock include/asm-generic/qrwlock.h:134 [inline]
 do_raw_write_lock+0xc2/0x1d0 kernel/locking/spinlock_debug.c:203
 bt_sock_unlink+0x1d/0x170 net/bluetooth/af_bluetooth.c:151
 hci_sock_release+0xc1/0x4c0 net/bluetooth/hci_sock.c:855
 __sock_release+0xcd/0x2b0 net/socket.c:602
 sock_close+0x15/0x20 net/socket.c:1139
 __fput+0x25f/0x7a0 fs/file_table.c:210
 task_work_run+0x11f/0x190 kernel/task_work.c:113
 tracehook_notify_resume include/linux/tracehook.h:191 [inline]
 exit_to_usermode_loop+0x1ad/0x200 arch/x86/entry/common.c:164
 prepare_exit_to_usermode arch/x86/entry/common.c:199 [inline]
 syscall_return_slowpath arch/x86/entry/common.c:270 [inline]
 do_syscall_64+0x4a3/0x640 arch/x86/entry/common.c:297
 entry_SYSCALL_64_after_hwframe+0x5e/0xd3
RIP: 0033:0x7f70ae894fab
RSP: 002b:00007ffc18efb7b0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003
RAX: 0000000000000000 RBX: 0000000000000005 RCX: 00007f70ae894fab
RDX: 00007f70ae4578a0 RSI: ffffffffffffffff RDI: 0000000000000004
RBP: 00007f70aea04980 R08: 0000000000000000 R09: 00007f70ae457000
R10: 00007f70ae4578a8 R11: 0000000000000293 R12: 0000000000217f49
R13: 00007ffc18efb8b0 R14: 00007f70aea02f80 R15: 0000000000000032
Code: 75 dc 49 89 dd 49 89 dc 41 be ff 00 00 00 49 c1 ed 03 41 83 e4 07 48 b8 00 00 00 00 00 fc ff df 49 01 c5 41 83 c4 03 eb 02 f3 90 <41> 0f b6 45 00 41 38 c4 7c 08 84 c0 0f 85 9e 00 00 00 8b 03 83 

Crashes (1):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2023/02/20 13:15 linux-4.14.y a8ad60f2af58 bcdf85f8 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-4-14 BUG: soft lockup in hci_sock_release
* Struck through repros no longer work on HEAD.