syzbot


BUG: soft lockup in neigh_timer_handler (2)

Status: closed as invalid on 2025/02/28 15:46
Subsystems: net
[Documentation on labels]
First crash: 113d, last: 83d
Similar bugs (17)
Kernel Title Repro Cause bisect Fix bisect Count Last Reported Patched Status
android-5-10 BUG: soft lockup in neigh_timer_handler 2 601d 609d 0/2 auto-obsoleted due to no activity on 2023/11/22 05:43
linux-4.19 BUG: soft lockup in neigh_timer_handler 4 886d 1144d 0/1 auto-obsoleted due to no activity on 2023/03/12 06:57
linux-4.14 BUG: soft lockup in neigh_timer_handler 3 1154d 1198d 0/1 auto-closed as invalid on 2022/06/16 21:59
android-6-1 BUG: soft lockup in neigh_timer_handler 2 515d 537d 0/2 auto-obsoleted due to no activity on 2024/02/16 02:11
android-54 BUG: soft lockup in neigh_timer_handler 3 300d 311d 0/2 auto-obsoleted due to no activity on 2024/09/18 13:19
upstream BUG: soft lockup in neigh_timer_handler net 1 633d 608d 0/28 auto-obsoleted due to no activity on 2023/10/20 21:15
upstream INFO: rcu detected stall in neigh_timer_handler (8) net C done done 72 248d 307d 28/28 fixed on 2024/10/21 12:45
upstream INFO: rcu detected stall in neigh_timer_handler (7) net 1 1464d 1464d 0/28 auto-closed as invalid on 2021/07/11 19:14
linux-6.1 INFO: rcu detected stall in neigh_timer_handler (2) 1 72d 72d 0/3 upstream: reported on 2025/02/03 07:23
linux-6.1 INFO: rcu detected stall in neigh_timer_handler 4 203d 313d 0/3 auto-obsoleted due to no activity on 2025/01/03 05:12
upstream INFO: rcu detected stall in neigh_timer_handler (6) netfilter 1 1589d 1589d 0/28 auto-closed as invalid on 2021/03/09 03:20
upstream INFO: rcu detected stall in neigh_timer_handler net 1 2335d 2335d 0/28 auto-closed as invalid on 2019/05/23 06:47
upstream INFO: rcu detected stall in neigh_timer_handler (2) net 2 2044d 2046d 13/28 fixed on 2019/10/09 10:54
upstream INFO: rcu detected stall in neigh_timer_handler (4) net 1 1960d 1960d 0/28 closed as invalid on 2019/12/04 14:04
upstream INFO: rcu detected stall in neigh_timer_handler (5) net 1 1692d 1692d 0/28 auto-closed as invalid on 2020/11/26 10:25
upstream INFO: rcu detected stall in neigh_timer_handler (3) net 2 1965d 1965d 0/28 closed as invalid on 2019/11/29 14:24
linux-4.14 INFO: rcu detected stall in neigh_timer_handler 5 1809d 1929d 0/1 auto-closed as invalid on 2020/08/30 16:21

Sample crash report:
watchdog: BUG: soft lockup - CPU#1 stuck for 22s! [kworker/u8:8:731]
Modules linked in:
irq event stamp: 31961905
hardirqs last  enabled at (31961904): [<ffff8000841062ac>] get_random_u16+0x318/0x618 drivers/char/random.c:552
hardirqs last disabled at (31961905): [<ffff80008b69c92c>] __el1_irq arch/arm64/kernel/entry-common.c:557 [inline]
hardirqs last disabled at (31961905): [<ffff80008b69c92c>] el1_interrupt+0x24/0x68 arch/arm64/kernel/entry-common.c:575
softirqs last  enabled at (1526360): [<ffff8000898025b0>] local_bh_enable+0x10/0x34 include/linux/bottom_half.h:32
softirqs last disabled at (1526443): [<ffff800080020db4>] __do_softirq+0x14/0x20 kernel/softirq.c:595
CPU: 1 UID: 0 PID: 731 Comm: kworker/u8:8 Not tainted 6.13.0-rc3-syzkaller-g573067a5a685 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
Workqueue: bat_events batadv_nc_worker
pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : get_random_u16+0x33c/0x618
lr : get_random_u16+0x338/0x618 drivers/char/random.c:552
sp : ffff800080016be0
x29: ffff800080016d20 x28: 0000000000000003 x27: dfff800000000000
x26: ffff700010002d80 x25: 1ffff00010002d9c x24: 000000000000d089
x23: 0000000000000003 x22: ffff80008f8fcd60 x21: ffff80008f9a1170
x20: 00000000000000c0 x19: 0000000000000000 x18: dfff800000000000
x17: 0000000061e27882 x16: ffff800080463930 x15: 0000000000000008
x14: 1ffff00011f340ca x13: ffff800080018000 x12: 0000000000000003
x11: 0000000000000502 x10: 0000000000ff0100 x9 : 0000000000000000
x8 : ffff0000c78e0000 x7 : ffff800084105c64 x6 : 0000000000000000
x5 : 0000000000000001 x4 : 0000000000000001 x3 : 0000000000000000
x2 : 0000000000000002 x1 : 0000000000000080 x0 : 0000000000000000
Call trace:
 __daif_local_irq_restore arch/arm64/include/asm/irqflags.h:175 [inline] (P)
 arch_local_irq_restore arch/arm64/include/asm/irqflags.h:195 [inline] (P)
 get_random_u16+0x33c/0x618 drivers/char/random.c:552 (P)
 cake_dequeue+0x2184/0x3ad0 net/sched/sch_cake.c:2086
 dequeue_skb net/sched/sch_generic.c:293 [inline]
 qdisc_restart net/sched/sch_generic.c:398 [inline]
 __qdisc_run+0x1e0/0x2378 net/sched/sch_generic.c:416
 __dev_xmit_skb net/core/dev.c:3896 [inline]
 __dev_queue_xmit+0xd58/0x35b4 net/core/dev.c:4400
 dev_queue_xmit include/linux/netdevice.h:3168 [inline]
 neigh_hh_output include/net/neighbour.h:523 [inline]
 neigh_output include/net/neighbour.h:537 [inline]
 ip6_finish_output2+0x1688/0x214c net/ipv6/ip6_output.c:141
 ip6_finish_output+0x428/0x7c4 net/ipv6/ip6_output.c:226
 NF_HOOK_COND include/linux/netfilter.h:303 [inline]
 ip6_output+0x274/0x598 net/ipv6/ip6_output.c:247
 dst_output include/net/dst.h:450 [inline]
 ip6_local_out+0x120/0x160 net/ipv6/output_core.c:155
 ip6_send_skb+0x1a8/0x584 net/ipv6/ip6_output.c:1976
 ip6_push_pending_frames+0xd0/0x118 net/ipv6/ip6_output.c:1997
 icmpv6_push_pending_frames+0x288/0x3f4 net/ipv6/icmp.c:311
 icmp6_send+0x1150/0x1a9c net/ipv6/icmp.c:630
 __icmpv6_send include/linux/icmpv6.h:28 [inline]
 icmpv6_send include/linux/icmpv6.h:49 [inline]
 ip6_link_failure+0x44/0x4a8 net/ipv6/route.c:2799
 dst_link_failure include/net/dst.h:429 [inline]
 ndisc_error_report+0x11c/0x170 net/ipv6/ndisc.c:731
 neigh_invalidate+0x2c0/0x518 net/core/neighbour.c:1010
 neigh_timer_handler+0x630/0xe08 net/core/neighbour.c:1097
 call_timer_fn+0x1b4/0x8b8 kernel/time/timer.c:1793
 expire_timers kernel/time/timer.c:1844 [inline]
 __run_timers kernel/time/timer.c:2418 [inline]
 __run_timer_base+0x56c/0x7b4 kernel/time/timer.c:2430
 run_timer_base kernel/time/timer.c:2439 [inline]
 run_timer_softirq+0xcc/0x194 kernel/time/timer.c:2449
 handle_softirqs+0x320/0xd34 kernel/softirq.c:561
 __do_softirq+0x14/0x20 kernel/softirq.c:595
 ____do_softirq+0x14/0x20 arch/arm64/kernel/irq.c:81
 call_on_irq_stack+0x24/0x4c arch/arm64/kernel/entry.S:891
 do_softirq_own_stack+0x20/0x2c arch/arm64/kernel/irq.c:86
 invoke_softirq kernel/softirq.c:442 [inline]
 __irq_exit_rcu+0x1d8/0x544 kernel/softirq.c:662
 irq_exit_rcu+0x14/0x84 kernel/softirq.c:678
 __el1_irq arch/arm64/kernel/entry-common.c:561 [inline]
 el1_interrupt+0x38/0x68 arch/arm64/kernel/entry-common.c:575
 el1h_64_irq_handler+0x18/0x24 arch/arm64/kernel/entry-common.c:580
 el1h_64_irq+0x6c/0x70 arch/arm64/kernel/entry.S:596
 rcu_is_watching+0x0/0x18c (P)
 process_one_work+0x7a8/0x15cc kernel/workqueue.c:3229
 process_scheduled_works kernel/workqueue.c:3310 [inline]
 worker_thread+0x97c/0xeec kernel/workqueue.c:3391
 kthread+0x288/0x310 kernel/kthread.c:389
 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:862
Sending NMI from CPU 1 to CPUs 0:
NMI backtrace for cpu 0
CPU: 0 UID: 0 PID: 6023 Comm: klogd Not tainted 6.13.0-rc3-syzkaller-g573067a5a685 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
pstate: 00400005 (nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : __sanitizer_cov_trace_pc+0x0/0x84 kernel/kcov.c:210
lr : sock_def_readable+0x28/0x5fc net/core/sock.c:3445
sp : ffff8000a3ee78e0
x29: ffff8000a3ee78e0 x28: ffff7000147dcf44 x27: ffff0000d875afc8
x26: 1fffe0001b0eb534 x25: ffff0000ce93a3c0 x24: dfff800000000000
x23: dfff800000000000 x22: 000000000000004b x21: ffff0000d875a9a0
x20: ffff0000d875a940 x19: ffff0000d875a940 x18: ffff8000a3ee7860
x17: 0000000000000000 x16: ffff80008069d39c x15: 0000000000000001
x14: 1fffe0001b0eb5fc x13: 0000000000000000 x12: 0000000000000000
x11: 0000000000000001 x10: 0000000000000000 x9 : 1fffe0001b2bf791
x8 : ffff800089783658 x7 : ffff8000897a6580 x6 : 0000000000000000
x5 : 0000000000000001 x4 : 0000000000000001 x3 : ffff80008047d328
x2 : 0000000000000001 x1 : 0000000000000001 x0 : ffff0000d875a940
Call trace:
 __sanitizer_cov_trace_pc+0x0/0x84 kernel/audit_tree.c:174 (P)
 unix_dgram_sendmsg+0xfe4/0x1888 net/unix/af_unix.c:2167
 sock_sendmsg_nosec net/socket.c:711 [inline]
 __sock_sendmsg net/socket.c:726 [inline]
 __sys_sendto+0x360/0x4d8 net/socket.c:2197
 __do_sys_sendto net/socket.c:2204 [inline]
 __se_sys_sendto net/socket.c:2200 [inline]
 __arm64_sys_sendto+0xd8/0xf8 net/socket.c:2200
 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline]
 invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49
 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132
 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151
 el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:744
 el0t_64_sync_handler+0x84/0x108 arch/arm64/kernel/entry-common.c:762
 el0t_64_sync+0x198/0x19c arch/arm64/kernel/entry.S:600

Crashes (2):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2024/12/24 05:19 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci 573067a5a685 444551c4 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 BUG: soft lockup in neigh_timer_handler
2025/01/23 06:11 upstream 7004a2e46d16 9d4f14f8 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root INFO: rcu detected stall in neigh_timer_handler
* Struck through repros no longer work on HEAD.