syzbot


BUG: soft lockup in sys_exit_group

Status: premoderation: reported on 2024/07/21 10:18
Reported-by: syzbot+dd18fd66ac06bd1d0798@syzkaller.appspotmail.com
First crash: 48d, last: 48d
Similar bugs (8)
Kernel Title Repro Cause bisect Fix bisect Count Last Reported Patched Status
android-5-15 BUG: soft lockup in sys_exit_group origin:downstream C 7 10d 153d 0/2 upstream: reported C repro on 2024/04/07 14:27
upstream BUG: soft lockup in sys_exit_group usb C 6 1631d 1654d 15/27 fixed on 2020/04/15 17:19
upstream INFO: rcu detected stall in sys_exit_group (7) net C unreliable inconclusive 90 61d 1058d 0/27 upstream: reported C repro on 2021/10/15 18:41
linux-5.15 INFO: rcu detected stall in sys_exit_group (2) 3 142d 177d 0/3 auto-obsoleted due to no activity on 2024/07/27 04:53
linux-6.1 INFO: rcu detected stall in sys_exit_group (3) origin:upstream C 9 21d 228d 0/3 upstream: reported C repro on 2024/01/23 11:05
linux-6.1 INFO: rcu detected stall in sys_exit_group (2) 1 375d 375d 0/3 auto-obsoleted due to no activity on 2023/12/07 20:57
linux-6.1 INFO: rcu detected stall in sys_exit_group 1 486d 486d 0/3 auto-obsoleted due to no activity on 2023/08/23 09:06
linux-5.15 INFO: rcu detected stall in sys_exit_group 1 437d 437d 0/3 auto-obsoleted due to no activity on 2023/10/06 21:30

Sample crash report:
watchdog: BUG: soft lockup - CPU#0 stuck for 139s! [syz.3.2449:9342]
Modules linked in:
CPU: 0 PID: 9342 Comm: syz.3.2449 Tainted: G        W         5.10.221-syzkaller-01371-g1240968f7644 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
RIP: 0010:__raw_write_unlock_irq include/linux/rwlock_api_smp.h:268 [inline]
RIP: 0010:_raw_write_unlock_irq+0x2a/0x60 kernel/locking/spinlock.c:343
Code: 55 48 89 e5 53 48 89 fb 48 89 f8 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df 0f b6 04 08 84 c0 75 23 c6 03 00 fb bf 01 00 00 00 <e8> 61 3d 97 fc 65 8b 05 d6 9c 50 7b 85 c0 74 03 5b 5d c3 e8 42 ab
RSP: 0018:ffffc90000dd7d28 EFLAGS: 00000246
RAX: 0000000000000000 RBX: ffffffff8660a040 RCX: dffffc0000000000
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000001
RBP: ffffc90000dd7d30 R08: ffffffff813f2d8a R09: 0000000000000003
R10: fffff520001baf86 R11: dffffc0000000001 R12: 0000000000000000
R13: 1ffff1102231c0a4 R14: ffff888111a8f700 R15: ffff8881118e0524
FS:  0000000000000000(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000000 CR3: 0000000112f0d000 CR4: 00000000003506b0
DR0: 0000000020000300 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff1 DR7: 0000000000000600
Call Trace:
 <IRQ>
 </IRQ>
 exit_notify kernel/exit.c:731 [inline]
 do_exit+0x1c03/0x2a50 kernel/exit.c:881
 do_group_exit+0x141/0x310 kernel/exit.c:983
 __do_sys_exit_group kernel/exit.c:994 [inline]
 __se_sys_exit_group kernel/exit.c:992 [inline]
 __x64_sys_exit_group+0x3f/0x40 kernel/exit.c:992
 do_syscall_64+0x34/0x70
 entry_SYSCALL_64_after_hwframe+0x61/0xcb
RIP: 0033:0x7f3a2a5e2b59
Code: Unable to access opcode bytes at RIP 0x7f3a2a5e2b2f.
RSP: 002b:00007ffc27904318 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f3a2a5e2b59
RDX: 0000000000000064 RSI: 0000000000000000 RDI: 0000000000000000
RBP: 0000000000000001 R08: 0000000d2790443f R09: 0000000000000000
R10: 0000000000000001 R11: 0000000000000246 R12: 00007ffc27904400
R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffc27904400
Sending NMI from CPU 0 to CPUs 1:
NMI backtrace for cpu 1
CPU: 1 PID: 7285 Comm: kworker/1:52 Tainted: G        W         5.10.221-syzkaller-01371-g1240968f7644 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
Workqueue: wg-crypt-wg1 wg_packet_encrypt_worker
RIP: 0010:__in6_dev_get include/net/addrconf.h:343 [inline]
RIP: 0010:ip6_ignore_linkdown include/net/addrconf.h:434 [inline]
RIP: 0010:find_match+0xb9/0xd70 net/ipv6/route.c:739
Code: 08 48 89 df e8 98 e2 7d fd 48 89 d8 bb e0 02 00 00 48 03 18 48 89 d8 48 c1 e8 03 42 80 3c 20 00 74 08 48 89 df e8 77 e2 7d fd <4c> 8b 23 4d 85 e4 0f 84 30 0a 00 00 49 81 c4 9c 01 00 00 4c 89 e0
RSP: 0018:ffffc9000016fc30 EFLAGS: 00000246
RAX: 1ffff11023d3505c RBX: ffff88811e9a82e0 RCX: ffff88812239cf00
RDX: ffff88812239cf00 RSI: 0000000000000000 RDI: 0000000000000000
RBP: ffffc9000016fcb0 R08: ffffffff842a592f R09: ffffc9000016ff70
R10: ffffc9000016ff60 R11: dffffc0000000001 R12: dffffc0000000000
R13: 1ffff11023e2cc95 R14: 0000000000000000 R15: 0000000000000003
FS:  0000000000000000(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000000 CR3: 000000011dd9d000 CR4: 00000000003506a0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600
Call Trace:
 <NMI>
 </NMI>
 <IRQ>
 __find_rr_leaf+0x276/0xb70 net/ipv6/route.c:827
 find_rr_leaf net/ipv6/route.c:848 [inline]
 rt6_select net/ipv6/route.c:892 [inline]
 fib6_table_lookup+0x338/0xaf0 net/ipv6/route.c:2190
 ip6_pol_route+0x151/0x14b0 net/ipv6/route.c:2226
 ip6_pol_route_input+0x55/0x80 net/ipv6/route.c:2284
 pol_lookup_func include/net/ip6_fib.h:594 [inline]
 fib6_rule_lookup+0x25a/0x620 net/ipv6/fib6_rules.c:115
 ip6_route_input_lookup net/ipv6/route.c:2296 [inline]
 ip6_route_input+0x726/0xb00 net/ipv6/route.c:2465
 ip6_rcv_finish_core net/ipv6/ip6_input.c:67 [inline]
 ip6_rcv_finish+0x14f/0x350 net/ipv6/ip6_input.c:78
 NF_HOOK include/linux/netfilter.h:299 [inline]
 ipv6_rcv+0xee/0x270 net/ipv6/ip6_input.c:301
 __netif_receive_skb_one_core net/core/dev.c:5382 [inline]
 __netif_receive_skb+0x1c6/0x530 net/core/dev.c:5496
 netif_receive_skb_internal net/core/dev.c:5601 [inline]
 netif_receive_skb+0xb0/0x480 net/core/dev.c:5660
 br_netif_receive_skb net/bridge/br_input.c:30 [inline]
 NF_HOOK include/linux/netfilter.h:299 [inline]
 br_pass_frame_up+0x177/0x1f0 net/bridge/br_input.c:72
 br_handle_frame_finish+0xe71/0x1180 net/bridge/br_input.c:179
 nf_hook_bridge_pre net/bridge/br_input.c:259 [inline]
 br_handle_frame+0x3f0/0x8d0 net/bridge/br_input.c:363
 __netif_receive_skb_core+0x11a9/0x3760 net/core/dev.c:5276
 __netif_receive_skb_one_core net/core/dev.c:5380 [inline]
 __netif_receive_skb+0x11c/0x530 net/core/dev.c:5496
 process_backlog+0x31c/0x650 net/core/dev.c:6403
 napi_poll net/core/dev.c:6854 [inline]
 net_rx_action+0x516/0x10d0 net/core/dev.c:6924
 __do_softirq+0x268/0x5bb kernel/softirq.c:309
 asm_call_irq_on_stack+0xf/0x20
 </IRQ>
 __run_on_irqstack arch/x86/include/asm/irq_stack.h:26 [inline]
 run_on_irqstack_cond arch/x86/include/asm/irq_stack.h:77 [inline]
 do_softirq_own_stack+0x60/0x80 arch/x86/kernel/irq_64.c:77
 do_softirq+0xca/0x110 kernel/softirq.c:358
 __local_bh_enable_ip+0x70/0x80 kernel/softirq.c:194
 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:176 [inline]
 _raw_spin_unlock_bh+0x51/0x60 kernel/locking/spinlock.c:207
 spin_unlock_bh include/linux/spinlock.h:399 [inline]
 ptr_ring_consume_bh include/linux/ptr_ring.h:367 [inline]
 wg_packet_encrypt_worker+0x14a0/0x1540 drivers/net/wireguard/send.c:293
 process_one_work+0x6dc/0xbd0 kernel/workqueue.c:2301
 worker_thread+0xaea/0x1510 kernel/workqueue.c:2447
 kthread+0x34b/0x3d0 kernel/kthread.c:313
 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:298
net_ratelimit: 37295 callbacks suppressed
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
net_ratelimit: 65533 callbacks suppressed
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)

Crashes (1):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2024/07/21 10:17 android13-5.10-lts 1240968f7644 b88348e9 .config console log report info [disk image] [vmlinux] [kernel image] ci2-android-5-10-perf BUG: soft lockup in sys_exit_group
* Struck through repros no longer work on HEAD.