syzbot


KASAN: wild-memory-access Read in __dev_close_many

Status: closed as invalid on 2025/02/03 16:44
Subsystems: wireless
[Documentation on labels]
First crash: 336d, last: 234d

Sample crash report:
bridge0: port 2(bridge_slave_1) entered disabled state
bridge_slave_0: left allmulticast mode
bridge_slave_0: left promiscuous mode
bridge0: port 1(bridge_slave_0) entered disabled state
tipc: Resetting bearer <eth:geneve1>
==================================================================
BUG: KASAN: wild-memory-access in instrument_atomic_read include/linux/instrumented.h:68 [inline]
BUG: KASAN: wild-memory-access in _test_bit include/asm-generic/bitops/instrumented-non-atomic.h:141 [inline]
BUG: KASAN: wild-memory-access in __lock_acquire+0xc94/0x2100 kernel/locking/lockdep.c:5196
Read of size 8 at addr 1fffffff862d68e0 by task kworker/u8:32/30548

CPU: 1 UID: 0 PID: 30548 Comm: kworker/u8:32 Not tainted 6.13.0-rc5-syzkaller-00012-g0bc21e701a6f #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
Workqueue: netns cleanup_net
Call Trace:
 <TASK>
 __dump_stack lib/dump_stack.c:94 [inline]
 dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120
 print_report+0xe8/0x550 mm/kasan/report.c:492
 kasan_report+0x143/0x180 mm/kasan/report.c:602
 kasan_check_range+0x282/0x290 mm/kasan/generic.c:189
 instrument_atomic_read include/linux/instrumented.h:68 [inline]
 _test_bit include/asm-generic/bitops/instrumented-non-atomic.h:141 [inline]
 __lock_acquire+0xc94/0x2100 kernel/locking/lockdep.c:5196
 lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5849
 __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline]
 _raw_spin_lock_irqsave+0xd5/0x120 kernel/locking/spinlock.c:162
 down+0x39/0xc0 kernel/locking/semaphore.c:59
 __dev_close_many+0x107/0x300 net/core/dev.c:1532
 dev_close_many+0x24e/0x4c0 net/core/dev.c:1585
 unregister_netdevice_many_notify+0x530/0x1da0 net/core/dev.c:11500
 cleanup_net+0x75d/0xd50 net/core/net_namespace.c:643
 process_one_work kernel/workqueue.c:3229 [inline]
 process_scheduled_works+0xa66/0x1840 kernel/workqueue.c:3310
 worker_thread+0x870/0xd30 kernel/workqueue.c:3391
 kthread+0x2f0/0x390 kernel/kthread.c:389
 ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
 </TASK>
==================================================================

Crashes (17):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2025/01/03 12:40 upstream 0bc21e701a6f d3ccff63 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce KASAN: wild-memory-access Read in __dev_close_many
2024/12/11 21:44 upstream f92f4749861b ff949d25 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root KASAN: wild-memory-access Read in __dev_close_many
2024/09/26 20:09 upstream 11a299a7933e 0d19f247 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root KASAN: wild-memory-access Read in __dev_close_many
2024/11/10 08:12 upstream de2f378f2b77 6b856513 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 KASAN: wild-memory-access Read in __dev_close_many
2024/10/08 07:41 upstream 87d6aab2389e 402f1df0 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 KASAN: wild-memory-access Read in __dev_close_many
2024/10/31 01:44 net-next d30b56c8666d fb888278 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce KASAN: wild-memory-access Read in __dev_close_many
2024/10/19 06:48 net-next 6d858708d465 cd6fc0a3 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce KASAN: wild-memory-access Read in __dev_close_many
2024/10/18 00:59 net-next 6d858708d465 666f77ed .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce KASAN: wild-memory-access Read in __dev_close_many
2025/01/06 19:37 linux-next 8155b4ef3466 f3558dbf .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root KASAN: wild-memory-access Read in __dev_close_many
2024/10/19 02:37 upstream 4d939780b705 cd6fc0a3 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce BUG: unable to handle kernel paging request in __dev_close_many
2024/10/15 09:45 upstream eca631b8fe80 14943bb8 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root BUG: unable to handle kernel paging request in __dev_close_many
2024/09/26 21:43 upstream 11a299a7933e 0d19f247 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root BUG: unable to handle kernel paging request in __dev_close_many
2024/10/28 07:54 upstream ea1fda89f5b2 65e8686b .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 BUG: unable to handle kernel paging request in __dev_close_many
2024/12/24 02:58 net-next 9268abe611b0 444551c4 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce BUG: unable to handle kernel paging request in __dev_close_many
2024/10/11 13:58 net-next 59ae83dcf102 cd942402 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce BUG: unable to handle kernel paging request in __dev_close_many
2024/10/11 05:13 net-next 59ae83dcf102 8fbfc0c8 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce BUG: unable to handle kernel paging request in __dev_close_many
2024/10/15 18:38 linux-next b852e1e7a038 14943bb8 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root BUG: unable to handle kernel paging request in __dev_close_many
* Struck through repros no longer work on HEAD.