syzbot


kernel panic: corrupted stack end in cleanup_net

Status: internal: reported on 2022/05/23 05:54
Reported-by: syzbot+@syzkaller.appspotmail.com
Fix commit: b81d591386c3 riscv: Increase stack size under KASAN
Patched on: [ci-qemu-upstream ci-qemu-upstream-386 ci-qemu2-arm32 ci-qemu2-arm64 ci-qemu2-arm64-compat ci-qemu2-arm64-mte ci-upstream-bpf-kasan-gce ci-upstream-bpf-next-kasan-gce ci-upstream-gce-leak ci-upstream-kasan-gce ci-upstream-kasan-gce-386 ci-upstream-kasan-gce-root ci-upstream-kasan-gce-selinux-root ci-upstream-kasan-gce-smack-root ci-upstream-kmsan-gce ci-upstream-kmsan-gce-386 ci-upstream-linux-next-kasan-gce-root ci-upstream-net-kasan-gce ci-upstream-net-this-kasan-gce ci2-upstream-kcsan-gce ci2-upstream-usb], missing on: [ci-qemu2-riscv64]
First crash: 35d, last: 35d

Sample crash report:
device hsr_slave_0 left promiscuous mode
device hsr_slave_1 left promiscuous mode
bond0 (unregistering): (slave bond_slave_1): Releasing backup interface
bond0 (unregistering): (slave bond_slave_0): Releasing backup interface
Kernel panic - not syncing: corrupted stack end detected inside scheduler
CPU: 0 PID: 2072 Comm: kworker/u4:2 Not tainted 5.17.0-rc1-syzkaller-00002-g0966d385830d #0
Hardware name: riscv-virtio,qemu (DT)
Workqueue: netns cleanup_net
Call Trace:
[<ffffffff8000a228>] dump_backtrace+0x2e/0x3c arch/riscv/kernel/stacktrace.c:113
[<ffffffff831668cc>] show_stack+0x34/0x40 arch/riscv/kernel/stacktrace.c:119
[<ffffffff831756ba>] __dump_stack lib/dump_stack.c:88 [inline]
[<ffffffff831756ba>] dump_stack_lvl+0xe4/0x150 lib/dump_stack.c:106
[<ffffffff83175742>] dump_stack+0x1c/0x24 lib/dump_stack.c:113
[<ffffffff83166fa8>] panic+0x24a/0x634 kernel/panic.c:233
[<ffffffff831a688a>] schedule_debug kernel/sched/core.c:5541 [inline]
[<ffffffff831a688a>] schedule+0x0/0x14c kernel/sched/core.c:6187
[<ffffffff831a6b00>] preempt_schedule_common+0x4e/0xde kernel/sched/core.c:6462
[<ffffffff831a6bc4>] preempt_schedule+0x34/0x36 kernel/sched/core.c:6487
[<ffffffff831afd78>] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:152 [inline]
[<ffffffff831afd78>] _raw_spin_unlock_irqrestore+0x8c/0x98 kernel/locking/spinlock.c:194
[<ffffffff8046dedc>] spin_unlock_irqrestore include/linux/spinlock.h:404 [inline]
[<ffffffff8046dedc>] __unfreeze_partials+0x15a/0x18e mm/slub.c:2529
[<ffffffff8046e006>] put_cpu_partial+0xf6/0x162 mm/slub.c:2612
[<ffffffff8046d0ec>] __slab_free+0x166/0x29c mm/slub.c:3378
[<ffffffff8047258c>] do_slab_free mm/slub.c:3497 [inline]
[<ffffffff8047258c>] ___cache_free+0x17c/0x354 mm/slub.c:3516
[<ffffffff8047692e>] qlink_free mm/kasan/quarantine.c:157 [inline]
[<ffffffff8047692e>] qlist_free_all+0x7c/0x132 mm/kasan/quarantine.c:176
[<ffffffff80476ed4>] kasan_quarantine_reduce+0x14c/0x1c8 mm/kasan/quarantine.c:283
[<ffffffff804742b2>] __kasan_slab_alloc+0x5c/0x98 mm/kasan/common.c:446
[<ffffffff80470296>] kasan_slab_alloc include/linux/kasan.h:260 [inline]
[<ffffffff80470296>] slab_post_alloc_hook mm/slab.h:732 [inline]
[<ffffffff80470296>] slab_alloc_node mm/slub.c:3230 [inline]
[<ffffffff80470296>] kmem_cache_alloc_node+0x368/0x41c mm/slub.c:3266
[<ffffffff826ed85a>] __alloc_skb+0x234/0x2e4 net/core/skbuff.c:414
[<ffffffff82d3e414>] alloc_skb include/linux/skbuff.h:1158 [inline]
[<ffffffff82d3e414>] nlmsg_new include/net/netlink.h:953 [inline]
[<ffffffff82d3e414>] inet6_netconf_notify_devconf+0xb6/0x1f2 net/ipv6/addrconf.c:584
[<ffffffff82d409c2>] __addrconf_sysctl_unregister net/ipv6/addrconf.c:7064 [inline]
[<ffffffff82d409c2>] addrconf_sysctl_unregister+0xaa/0xdc net/ipv6/addrconf.c:7088
[<ffffffff82d42108>] addrconf_ifdown.isra.0+0xb5e/0xe96 net/ipv6/addrconf.c:3870
[<ffffffff82d4dc68>] addrconf_notify+0xca/0x1360 net/ipv6/addrconf.c:3651
[<ffffffff800aac84>] notifier_call_chain+0xb8/0x188 kernel/notifier.c:84
[<ffffffff800aad7e>] raw_notifier_call_chain+0x2a/0x38 kernel/notifier.c:392
[<ffffffff8271d086>] call_netdevice_notifiers_info+0x9e/0x10c net/core/dev.c:1919
[<ffffffff8272cd34>] call_netdevice_notifiers_extack net/core/dev.c:1931 [inline]
[<ffffffff8272cd34>] call_netdevice_notifiers net/core/dev.c:1945 [inline]
[<ffffffff8272cd34>] unregister_netdevice_many+0x77a/0xf50 net/core/dev.c:10415
[<ffffffff8272da5c>] default_device_exit_batch+0x28a/0x2dc net/core/dev.c:10945
[<ffffffff8270dc76>] ops_exit_list+0xcc/0xe8 net/core/net_namespace.c:173
[<ffffffff8270f544>] cleanup_net+0x430/0x732 net/core/net_namespace.c:597
[<ffffffff80093b44>] process_one_work+0x654/0xffe kernel/workqueue.c:2307
[<ffffffff8009484e>] worker_thread+0x360/0x8fa kernel/workqueue.c:2454
[<ffffffff800a7f58>] kthread+0x19e/0x1fa kernel/kthread.c:377
[<ffffffff80005724>] ret_from_exception+0x0/0x10
SMP: stopping secondary CPUs
Rebooting in 86400 seconds..

Crashes (1):
Manager Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Title
ci-qemu2-riscv64 2022/05/23 05:53 git://git.kernel.org/pub/scm/linux/kernel/git/riscv/linux.git fixes 0966d385830d 7268fa62 .config log report info kernel panic: corrupted stack end in cleanup_net