syzbot


BUG: soft lockup in cleanup_net

Status: auto-obsoleted due to no activity on 2022/10/30 18:15
Reported-by: syzbot+2c44a797f2711fa03276@syzkaller.appspotmail.com
First crash: 1099d, last: 886d
Similar bugs (7)
Kernel Title Repro Cause bisect Fix bisect Count Last Reported Patched Status
linux-4.19 INFO: rcu detected stall in cleanup_net (2) 4 1257d 1388d 0/1 auto-closed as invalid on 2021/10/25 03:43
linux-4.19 BUG: soft lockup in cleanup_net (2) C 3 640d 752d 0/1 upstream: reported C repro on 2022/11/13 07:04
android-5-15 BUG: soft lockup in cleanup_net origin:lts syz 6 86d 213d 0/2 premoderation: reported syz repro on 2024/05/05 13:03
upstream INFO: rcu detected stall in cleanup_net (6) net 63 454d 697d 0/28 closed as invalid on 2023/10/27 14:39
upstream INFO: rcu detected stall in cleanup_net (5) net 24 1035d 1295d 0/28 closed as invalid on 2022/02/08 10:00
linux-6.1 INFO: rcu detected stall in cleanup_net origin:lts-only syz inconclusive 140 25d 511d 0/3 upstream: reported syz repro on 2023/07/12 14:45
linux-5.15 INFO: rcu detected stall in cleanup_net 72 21d 513d 0/3 upstream: reported on 2023/07/11 05:04

Sample crash report:
netlink: 'syz-executor.0': attribute type 1 has an invalid length.
IPVS: ftp: loaded support on port[0] = 21
watchdog: BUG: soft lockup - CPU#0 stuck for 23s! [kworker/u4:6:9402]
Modules linked in:
irq event stamp: 53097959
hardirqs last  enabled at (53097958): [<ffffffff81003ce4>] trace_hardirqs_on_thunk+0x1a/0x1c
hardirqs last disabled at (53097959): [<ffffffff81003d00>] trace_hardirqs_off_thunk+0x1a/0x1c
softirqs last  enabled at (53092992): [<ffffffff87b996b1>] tipc_shutdown+0x121/0x310 net/tipc/socket.c:2603
softirqs last disabled at (53092994): [<ffffffff87bb4683>] spin_lock_bh include/linux/spinlock.h:334 [inline]
softirqs last disabled at (53092994): [<ffffffff87bb4683>] tipc_topsrv_stop net/tipc/topsrv.c:702 [inline]
softirqs last disabled at (53092994): [<ffffffff87bb4683>] tipc_topsrv_exit_net+0x283/0x5c0 net/tipc/topsrv.c:722
CPU: 0 PID: 9402 Comm: kworker/u4:6 Not tainted 4.19.211-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
Workqueue: netns cleanup_net
RIP: 0010:__radix_tree_lookup+0x2/0x370 lib/radix-tree.c:1032
Code: 6f a9 f9 e9 6f ff ff ff 41 89 ec e9 9f fb ff ff e8 e3 6d a9 f9 e9 c8 fd ff ff e8 d9 6d a9 f9 e9 0a fe ff ff 0f 1f 40 00 41 57 <48> 8d 47 40 41 56 49 be 00 00 00 00 00 fc ff df 41 55 41 54 55 53
RSP: 0018:ffff888054e77bd0 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13
RAX: ffff888095eb8300 RBX: 00000000291fdee5 RCX: 0000000000000000
RDX: 0000000000000000 RSI: 00000000291fdee5 RDI: ffff88809c6e9840
RBP: ffff88809c6e9840 R08: 0000000000000001 R09: 0000000000000000
R10: 0000000000000005 R11: 0000000000000000 R12: ffff88809c6e9890
R13: ffffed10138dd319 R14: ffff88808e51a580 R15: 0000000000000087
FS:  0000000000000000(0000) GS:ffff8880ba000000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000001b2e72b000 CR3: 000000009ad7d000 CR4: 00000000003406f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 tipc_topsrv_stop net/tipc/topsrv.c:698 [inline]
 tipc_topsrv_exit_net+0x25e/0x5c0 net/tipc/topsrv.c:722
 ops_exit_list+0xa5/0x150 net/core/net_namespace.c:153
 cleanup_net+0x3b4/0x8b0 net/core/net_namespace.c:554
 process_one_work+0x864/0x1570 kernel/workqueue.c:2153
 worker_thread+0x64c/0x1130 kernel/workqueue.c:2296
 kthread+0x33f/0x460 kernel/kthread.c:259
 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415
Sending NMI from CPU 0 to CPUs 1:
NMI backtrace for cpu 1 skipped: idling at native_safe_halt+0xe/0x10 arch/x86/include/asm/irqflags.h:60
----------------
Code disassembly (best guess), 2 bytes skipped:
   0:	f9                   	stc
   1:	e9 6f ff ff ff       	jmpq   0xffffff75
   6:	41 89 ec             	mov    %ebp,%r12d
   9:	e9 9f fb ff ff       	jmpq   0xfffffbad
   e:	e8 e3 6d a9 f9       	callq  0xf9a96df6
  13:	e9 c8 fd ff ff       	jmpq   0xfffffde0
  18:	e8 d9 6d a9 f9       	callq  0xf9a96df6
  1d:	e9 0a fe ff ff       	jmpq   0xfffffe2c
  22:	0f 1f 40 00          	nopl   0x0(%rax)
  26:	41 57                	push   %r15
* 28:	48 8d 47 40          	lea    0x40(%rdi),%rax <-- trapping instruction
  2c:	41 56                	push   %r14
  2e:	49 be 00 00 00 00 00 	movabs $0xdffffc0000000000,%r14
  35:	fc ff df
  38:	41 55                	push   %r13
  3a:	41 54                	push   %r12
  3c:	55                   	push   %rbp
  3d:	53                   	push   %rbx

Crashes (4):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2022/07/02 18:15 linux-4.19.y 3f8a27f9e27b 1434eec0 .config console log report info ci2-linux-4-19 BUG: soft lockup in cleanup_net
2022/05/04 22:27 linux-4.19.y 3f8a27f9e27b dc9e5259 .config console log report info ci2-linux-4-19 BUG: soft lockup in cleanup_net
2022/03/04 23:27 linux-4.19.y 3f8a27f9e27b 45a13a73 .config console log report info ci2-linux-4-19 BUG: soft lockup in cleanup_net
2021/12/01 13:35 linux-4.19.y 3f8a27f9e27b 5fa3eacc .config console log report info ci2-linux-4-19 BUG: soft lockup in cleanup_net
* Struck through repros no longer work on HEAD.