BUG: soft lockup in ip_rcv

11 views
Skip to first unread message

syzbot

unread,
Oct 17, 2020, 1:25:19 AM10/17/20
to syzkaller...@googlegroups.com
Hello,

syzbot found the following issue on:

HEAD commit: cbfa1702 Linux 4.14.198
git tree: linux-4.14.y
console output: https://syzkaller.appspot.com/x/log.txt?x=11129cd8500000
kernel config: https://syzkaller.appspot.com/x/.config?x=3990958d85b55e59
dashboard link: https://syzkaller.appspot.com/bug?extid=1225ca27e8189a8a0789
compiler: gcc (GCC) 10.1.0-syz 20200507

Unfortunately, I don't have any reproducer for this issue yet.

IMPORTANT: if you fix the issue, please add the following tag to the commit:
Reported-by: syzbot+1225ca...@syzkaller.appspotmail.com

xt_policy: output policy not valid in PREROUTING and INPUT
watchdog: BUG: soft lockup - CPU#0 stuck for 123s! [syz-executor.4:29427]
Modules linked in:
irq event stamp: 17450547
hardirqs last enabled at (17450546): [<ffffffff81376f61>] __local_bh_enable_ip+0xc1/0x170 kernel/softirq.c:190
hardirqs last disabled at (17450547): [<ffffffff86601ade>] apic_timer_interrupt+0x8e/0xa0 arch/x86/entry/entry_64.S:793
softirqs last enabled at (17444440): [<ffffffff868006ab>] __do_softirq+0x6ab/0xa1d kernel/softirq.c:314
softirqs last disabled at (17444443): [<ffffffff81377433>] invoke_softirq kernel/softirq.c:368 [inline]
softirqs last disabled at (17444443): [<ffffffff81377433>] irq_exit+0x193/0x240 kernel/softirq.c:409
CPU: 0 PID: 29427 Comm: syz-executor.4 Not tainted 4.14.198-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
task: ffff888051182240 task.stack: ffff888050918000
RIP: 0010:__sanitizer_cov_trace_pc+0x15/0x50 kernel/kcov.c:65
RSP: 0018:ffff8880aea07948 EFLAGS: 00000282 ORIG_RAX: ffffffffffffff10
RAX: ffff888051182240 RBX: 0000000000000000 RCX: ffff888020581644
RDX: 0000000000000302 RSI: ffffffff8740b520 RDI: ffff88804c20d38c
RBP: ffff888047b62e00 R08: ffffffff8a08ac00 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000000 R12: ffff88804c20d388
R13: dffffc0000000000 R14: 0000000000000000 R15: ffff88802058204e
FS: 00007ff1b7628700(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000001b32129000 CR3: 000000008d29a000 CR4: 00000000001406f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
<IRQ>
ifname_compare_aligned include/linux/netfilter/x_tables.h:408 [inline]
ip_packet_match net/ipv4/netfilter/ip_tables.c:61 [inline]
ipt_do_table+0x57b/0x16f0 net/ipv4/netfilter/ip_tables.c:291
iptable_raw_hook+0x172/0x1e0 net/ipv4/netfilter/iptable_raw.c:35
nf_hook_entry_hookfn include/linux/netfilter.h:108 [inline]
nf_hook_slow+0xb0/0x1a0 net/netfilter/core.c:467
nf_hook include/linux/netfilter.h:205 [inline]
NF_HOOK include/linux/netfilter.h:248 [inline]
ip_rcv+0xa8c/0xf01 net/ipv4/ip_input.c:493
__netif_receive_skb_core+0x15ee/0x2a30 net/core/dev.c:4474
__netif_receive_skb+0x27/0x1a0 net/core/dev.c:4512
process_backlog+0x210/0x6f0 net/core/dev.c:5194
napi_poll net/core/dev.c:5596 [inline]
net_rx_action+0x466/0xfd0 net/core/dev.c:5662
__do_softirq+0x254/0xa1d kernel/softirq.c:288
invoke_softirq kernel/softirq.c:368 [inline]
irq_exit+0x193/0x240 kernel/softirq.c:409
exiting_irq arch/x86/include/asm/apic.h:648 [inline]
smp_apic_timer_interrupt+0x141/0x5e0 arch/x86/kernel/apic/apic.c:1102
apic_timer_interrupt+0x93/0xa0 arch/x86/entry/entry_64.S:793
</IRQ>
RIP: 0010:chroot_fs_refs+0xf1/0x560 fs/fs_struct.c:66
RSP: 0018:ffff88805091fcf0 EFLAGS: 00000282 ORIG_RAX: ffffffffffffff10
RAX: ffff88804c59ece8 RBX: ffff88809328a860 RCX: 0000000000001e32
RDX: 1ffff110098b3db4 RSI: 0000000000000001 RDI: ffff88804c59ece8
RBP: ffff88805091fd70 R08: ffffffff8a08bb10 R09: 0000000000040091
R10: ffff888051182b40 R11: ffff888051182240 R12: ffff88804c59ed90
R13: dffffc0000000000 R14: ffff88804c59e600 R15: ffff8880a834f548
SYSC_pivot_root fs/namespace.c:3236 [inline]
SyS_pivot_root+0xbd3/0x11b0 fs/namespace.c:3156
do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292
entry_SYSCALL_64_after_hwframe+0x46/0xbb
RIP: 0033:0x45de59
RSP: 002b:00007ff1b7627c78 EFLAGS: 00000246 ORIG_RAX: 000000000000009b
RAX: ffffffffffffffda RBX: 0000000000024f00 RCX: 000000000045de59
RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000020000080
RBP: 000000000118bf58 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bf2c
R13: 00007fff00a6960f R14: 00007ff1b76289c0 R15: 000000000118bf2c
Code: e8 72 9f ee ff 48 c7 05 f6 70 ff 08 00 00 00 00 e9 c6 ed ff ff 90 65 48 8b 04 25 40 ee 01 00 48 85 c0 74 1a 65 8b 15 ab 56 a6 7e <81> e2 00 01 1f 00 75 0b 8b 90 58 13 00 00 83 fa 01 74 01 c3 48
Sending NMI from CPU 0 to CPUs 1:
NMI backtrace for cpu 1
CPU: 1 PID: 29432 Comm: syz-executor.3 Not tainted 4.14.198-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
task: ffff88805561a080 task.stack: ffff888097698000
RIP: 0010:__read_once_size include/linux/compiler.h:183 [inline]
RIP: 0010:atomic_read arch/x86/include/asm/atomic.h:27 [inline]
RIP: 0010:queued_write_lock_slowpath+0xcb/0x1d0 kernel/locking/qrwlock.c:139
RSP: 0018:ffff88809769fbd0 EFLAGS: 00000006
RAX: 0000000000000101 RBX: ffffffff87c09080 RCX: 0000000000005c48
RDX: 0000000000000000 RSI: 0000000000000001 RDI: ffffffff87c09080
RBP: ffffffff87c09084 R08: ffffffff8a0aabc0 R09: 00000000000c008f
R10: ffff88805561a930 R11: ffff88805561a080 R12: 0000000000000003
R13: fffffbfff0f81210 R14: 00000000000000ff R15: 00000000003d0f00
FS: 0000000001b2a940(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fbc78e81db8 CR3: 00000000a0b3a000 CR4: 00000000001406e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
queued_write_lock include/asm-generic/qrwlock.h:134 [inline]
do_raw_write_lock+0xc2/0x1d0 kernel/locking/spinlock_debug.c:203
copy_process.part.0+0x2de8/0x6f00 kernel/fork.c:1863
copy_process kernel/fork.c:1586 [inline]
_do_fork+0x184/0xc80 kernel/fork.c:2070
do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292
entry_SYSCALL_64_after_hwframe+0x46/0xbb
RIP: 0033:0x460829
RSP: 002b:00007ffdb8775aa8 EFLAGS: 00000202 ORIG_RAX: 0000000000000038
RAX: ffffffffffffffda RBX: 00007fbc78e82700 RCX: 0000000000460829
RDX: 00007fbc78e829d0 RSI: 00007fbc78e81db0 RDI: 00000000003d0f00
RBP: 00007ffdb8775cc0 R08: 00007fbc78e82700 R09: 00007fbc78e82700
R10: 00007fbc78e829d0 R11: 0000000000000202 R12: 0000000000000000
R13: 00007ffdb8775b5f R14: 00007fbc78e829c0 R15: 000000000118bf2c
Code: 75 dc 49 89 dd 49 89 dc 41 be ff 00 00 00 49 c1 ed 03 41 83 e4 07 48 b8 00 00 00 00 00 fc ff df 49 01 c5 41 83 c4 03 eb 02 f3 90 <41> 0f b6 45 00 41 38 c4 7c 08 84 c0 0f 85 9e 00 00 00 8b 03 83


---
This report is generated by a bot. It may contain errors.
See https://goo.gl/tpsmEJ for more information about syzbot.
syzbot engineers can be reached at syzk...@googlegroups.com.

syzbot will keep track of this issue. See:
https://goo.gl/tpsmEJ#status for how to communicate with syzbot.

syzbot

unread,
Feb 14, 2021, 12:25:14 AM2/14/21
to syzkaller...@googlegroups.com
Auto-closing this bug as obsolete.
Crashes did not happen for a while, no reproducer and no activity.
Reply all
Reply to author
Forward
0 new messages