syzbot


BUG: soft lockup in sys_getsockopt

Status: auto-obsoleted due to no activity on 2024/07/15 21:19
First crash: 144d, last: 144d
Similar bugs (11)
Kernel Title Repro Cause bisect Fix bisect Count Last Reported Patched Status
upstream BUG: soft lockup in sys_getsockopt trace 1 1677d 1677d 0/27 auto-closed as invalid on 2020/05/04 01:54
android-5-15 BUG: soft lockup in sys_getsockopt 6 39d 137d 0/2 premoderation: reported on 2024/04/23 07:54
linux-4.19 INFO: rcu detected stall in sys_getsockopt 1 717d 717d 0/1 auto-obsoleted due to no activity on 2023/01/19 05:52
upstream INFO: rcu detected stall in sys_getsockopt (11) netfilter 4 251d 263d 0/27 auto-obsoleted due to no activity on 2024/03/30 17:47
linux-5.15 INFO: rcu detected stall in sys_getsockopt 1 270d 270d 0/3 auto-obsoleted due to no activity on 2024/03/21 16:23
upstream INFO: rcu detected stall in sys_getsockopt (6) kvm 3 1122d 1190d 0/27 auto-closed as invalid on 2021/11/10 12:58
upstream INFO: rcu detected stall in sys_getsockopt (7) netfilter 2 979d 1028d 0/27 closed as invalid on 2022/02/08 10:10
linux-6.1 INFO: rcu detected stall in sys_getsockopt 4 187d 345d 0/3 auto-obsoleted due to no activity on 2024/06/12 17:46
upstream INFO: rcu detected stall in sys_getsockopt (10) mm 9 382d 464d 0/27 auto-obsoleted due to no activity on 2023/11/20 15:28
upstream INFO: rcu detected stall in sys_getsockopt (9) kernel 6 585d 741d 0/27 auto-obsoleted due to no activity on 2023/05/01 05:21
upstream INFO: rcu detected stall in sys_getsockopt (8) net 2 869d 885d 0/27 auto-closed as invalid on 2022/07/21 00:25

Sample crash report:
watchdog: BUG: soft lockup - CPU#1 stuck for 123s! [syz-executor.4:4867]
Modules linked in:
CPU: 1 PID: 4867 Comm: syz-executor.4 Tainted: G        W         5.4.268-syzkaller-00003-g2d5d8240a7cb #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024
RIP: 0010:native_restore_fl arch/x86/include/asm/irqflags.h:41 [inline]
RIP: 0010:arch_local_irq_restore arch/x86/include/asm/irqflags.h:84 [inline]
RIP: 0010:kvm_wait+0xfa/0x150 arch/x86/kernel/kvm.c:852
Code: 24 14 75 26 41 f7 c7 00 02 00 00 75 0f 0f 1f 44 00 00 0f 00 2d c7 53 77 03 f4 eb 0e 0f 1f 44 00 00 0f 00 2d b8 53 77 03 fb f4 <4c> 89 7c 24 18 ff 74 24 18 9d 48 c7 44 24 20 0e 36 e0 45 49 c7 04
RSP: 0018:ffff8881eb12f660 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13
RAX: 0000000000000003 RBX: 1ffff1103d625ed0 RCX: 0000000086ec5100
RDX: 0000000000000001 RSI: 0000000000000003 RDI: ffffffff86ec51e0
RBP: ffff8881eb12f710 R08: dffffc0000000000 R09: 0000000000000000
R10: ffffffffffffffff R11: dffffc0000000001 R12: dffffc0000000000
R13: ffffffff86ec51e0 R14: ffff8881eb12f6a0 R15: 0000000000000246
FS:  00005555569e2480(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000000 CR3: 00000001ecf05000 CR4: 00000000003406a0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 <IRQ>
 </IRQ>
 pv_wait arch/x86/include/asm/paravirt.h:652 [inline]
 pv_wait_head_or_lock kernel/locking/qspinlock_paravirt.h:470 [inline]
 __pv_queued_spin_lock_slowpath+0x72f/0xc70 kernel/locking/qspinlock.c:507
 pv_queued_spin_lock_slowpath arch/x86/include/asm/paravirt.h:642 [inline]
 queued_spin_lock_slowpath arch/x86/include/asm/qspinlock.h:50 [inline]
 queued_spin_lock include/asm-generic/qspinlock.h:81 [inline]
 do_raw_spin_lock include/linux/spinlock.h:181 [inline]
 __raw_spin_lock include/linux/spinlock_api_smp.h:143 [inline]
 _raw_spin_lock+0x139/0x1b0 kernel/locking/spinlock.c:151
 spin_lock include/linux/spinlock.h:338 [inline]
 alloc_vmap_area+0x29a/0x1ac0 mm/vmalloc.c:1106
 __get_vm_area_node+0x1c7/0x310 mm/vmalloc.c:2066
 __vmalloc_node_range+0xee/0x710 mm/vmalloc.c:2494
 __vmalloc_node mm/vmalloc.c:2554 [inline]
 __vmalloc_node_flags mm/vmalloc.c:2568 [inline]
 vzalloc+0x70/0x80 mm/vmalloc.c:2613
 alloc_counters+0x66/0x550 net/ipv4/netfilter/ip_tables.c:800
 copy_entries_to_user net/ipv4/netfilter/ip_tables.c:822 [inline]
 get_entries net/ipv4/netfilter/ip_tables.c:1024 [inline]
 do_ipt_get_ctl+0x5b8/0xb60 net/ipv4/netfilter/ip_tables.c:1702
 nf_sockopt net/netfilter/nf_sockopt.c:104 [inline]
 nf_getsockopt+0x28c/0x2b0 net/netfilter/nf_sockopt.c:122
 ip_getsockopt+0x15d/0x220 net/ipv4/ip_sockglue.c:1586
 __sys_getsockopt+0x1c0/0x2b0 net/socket.c:2138
 __do_sys_getsockopt net/socket.c:2153 [inline]
 __se_sys_getsockopt net/socket.c:2150 [inline]
 __x64_sys_getsockopt+0xb1/0xc0 net/socket.c:2150
 do_syscall_64+0xca/0x1c0 arch/x86/entry/common.c:290
 entry_SYSCALL_64_after_hwframe+0x5c/0xc1
Sending NMI from CPU 1 to CPUs 0:
NMI backtrace for cpu 0
CPU: 0 PID: 5876 Comm: syz-executor.1 Tainted: G        W         5.4.268-syzkaller-00003-g2d5d8240a7cb #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024
RIP: 0010:arch_static_branch arch/x86/include/asm/msr.h:105 [inline]
RIP: 0010:static_key_false include/linux/jump_label.h:200 [inline]
RIP: 0010:native_write_msr arch/x86/include/asm/msr.h:164 [inline]
RIP: 0010:wrmsr arch/x86/include/asm/msr.h:275 [inline]
RIP: 0010:native_apic_msr_write+0x35/0x50 arch/x86/include/asm/apic.h:207
Code: 74 2d 83 ff 30 74 28 eb 10 81 ff d0 00 00 00 74 1e 81 ff e0 00 00 00 74 16 c1 ef 04 81 c7 00 08 00 00 89 f9 89 f0 31 d2 0f 30 <e9> 01 00 00 00 c3 89 f6 31 d2 e9 0c 09 1a 01 66 66 2e 0f 1f 84 00
RSP: 0018:ffff8881f6e09008 EFLAGS: 00000046
RAX: 0000000000000084 RBX: ffffffff856311e0 RCX: 0000000000000838
RDX: 0000000000000000 RSI: 0000000000000084 RDI: 0000000000000838
RBP: 0000000000000084 R08: ffffffff8157cddb R09: ffffffff8157cd67
R10: ffff8881e1a16e40 R11: 0000000000000002 R12: dffffc0000000000
R13: 0000000000000001 R14: 0000000000000084 R15: dffffc0000000000
FS:  00007f4fe60626c0(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000000 CR3: 00000001e34a4000 CR4: 00000000003406b0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600
Call Trace:
 <NMI>
 </NMI>
 <IRQ>
 apic_write arch/x86/include/asm/apic.h:395 [inline]
 lapic_next_event+0x5b/0x70 arch/x86/kernel/apic/apic.c:466
 clockevents_program_event+0x199/0x2c0 kernel/time/clockevents.c:334
 hrtimer_interrupt+0x4b3/0x890 kernel/time/hrtimer.c:1718
 local_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1122 [inline]
 smp_apic_timer_interrupt+0x110/0x460 arch/x86/kernel/apic/apic.c:1147
 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:834
 </IRQ>

Crashes (1):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2024/04/16 21:18 android12-5.4 2d5d8240a7cb 18f6e127 .config console log report info [disk image] [vmlinux] [kernel image] ci2-android-5-4-perf-kasan BUG: soft lockup in sys_getsockopt
* Struck through repros no longer work on HEAD.