BUG: soft lockup in hsr_announce

8 views
Skip to first unread message

syzbot

unread,
Jan 2, 2020, 10:56:10 PM1/2/20
to syzkaller...@googlegroups.com
Hello,

syzbot found the following crash on:

HEAD commit: 4c5bf01e Linux 4.14.161
git tree: linux-4.14.y
console output: https://syzkaller.appspot.com/x/log.txt?x=1435d885e00000
kernel config: https://syzkaller.appspot.com/x/.config?x=2f880a3dbba6d2e2
dashboard link: https://syzkaller.appspot.com/bug?extid=914b674e10ff67e0741a
compiler: gcc (GCC) 9.0.0 20181231 (experimental)
syz repro: https://syzkaller.appspot.com/x/repro.syz?x=16a8d49ee00000
C reproducer: https://syzkaller.appspot.com/x/repro.c?x=128ac751e00000

IMPORTANT: if you fix the bug, please add the following tag to the commit:
Reported-by: syzbot+914b67...@syzkaller.appspotmail.com

IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
bridge0: port 1(bridge_slave_0) entered blocking state
bridge0: port 1(bridge_slave_0) entered forwarding state
IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
watchdog: BUG: soft lockup - CPU#0 stuck for 111s! [syz-executor324:7167]
Modules linked in:
irq event stamp: 21110909
hardirqs last enabled at (21110908): [<ffffffff86800979>]
restore_regs_and_return_to_kernel+0x0/0x27
hardirqs last disabled at (21110909): [<ffffffff86801b01>]
apic_timer_interrupt+0x91/0xa0 arch/x86/entry/entry_64.S:792
softirqs last enabled at (212234): [<ffffffff86a00645>]
__do_softirq+0x645/0x9a0 kernel/softirq.c:314
softirqs last disabled at (217039): [<ffffffff81392c40>] invoke_softirq
kernel/softirq.c:368 [inline]
softirqs last disabled at (217039): [<ffffffff81392c40>]
irq_exit+0x160/0x1b0 kernel/softirq.c:409
CPU: 0 PID: 7167 Comm: syz-executor324 Not tainted 4.14.161-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS
Google 01/01/2011
task: ffff88809c3f85c0 task.stack: ffff88807f700000
RIP: 0010:eth_hdr include/linux/if_ether.h:28 [inline]
RIP: 0010:hsr_addr_subst_dest+0x82/0x3d0 net/hsr/hsr_framereg.c:308
RSP: 0018:ffff8880aec07ba0 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff10
RAX: dffffc0000000000 RBX: ffff88809c9e5200 RCX: 1ffff1101393ca82
RDX: 1ffff1101393ca5a RSI: ffff88809c9e5200 RDI: ffff88809c9e52d0
RBP: ffff8880aec07be0 R08: ffff88809c9e5418 R09: ffffed101393ca59
R10: ffffed101393ca58 R11: ffff88809c9e52c7 R12: 0000000000000042
R13: ffff8880a099c400 R14: ffff88808a538480 R15: dffffc0000000000
FS: 0000000000e53940(0000) GS:ffff8880aec00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007ffcf7fb9c70 CR3: 0000000089d57000 CR4: 00000000001406f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
<IRQ>
hsr_xmit net/hsr/hsr_forward.c:230 [inline]
hsr_forward_do net/hsr/hsr_forward.c:295 [inline]
hsr_forward_skb+0x1025/0x1940 net/hsr/hsr_forward.c:373
send_hsr_supervision_frame+0x892/0xec0 net/hsr/hsr_device.c:319
hsr_announce+0xf5/0x340 net/hsr/hsr_device.c:348
call_timer_fn+0x161/0x670 kernel/time/timer.c:1279
expire_timers kernel/time/timer.c:1318 [inline]
__run_timers kernel/time/timer.c:1636 [inline]
__run_timers kernel/time/timer.c:1604 [inline]
run_timer_softirq+0x5b7/0x1520 kernel/time/timer.c:1649
__do_softirq+0x244/0x9a0 kernel/softirq.c:288
invoke_softirq kernel/softirq.c:368 [inline]
irq_exit+0x160/0x1b0 kernel/softirq.c:409
exiting_irq arch/x86/include/asm/apic.h:648 [inline]
smp_apic_timer_interrupt+0x146/0x5e0 arch/x86/kernel/apic/apic.c:1102
apic_timer_interrupt+0x96/0xa0 arch/x86/entry/entry_64.S:792
</IRQ>
RIP: 0010:arch_local_irq_restore arch/x86/include/asm/paravirt.h:779
[inline]
RIP: 0010:lock_acquire+0x1ea/0x430 kernel/locking/lockdep.c:3997
RSP: 0018:ffff88807f707850 EFLAGS: 00000282 ORIG_RAX: ffffffffffffff10
RAX: 1ffffffff0fe2d29 RBX: ffff88809c3f85c0 RCX: 000000005f421e46
RDX: dffffc0000000000 RSI: ffff88809c3f8e90 RDI: 0000000000000282
RBP: ffff88807f707898 R08: 0000000000005bf0 R09: ffffffff8958d9c0
R10: ffff88809c3f8e90 R11: ffff88809c3f85c0 R12: ffffffff8802c478
R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
__raw_spin_lock include/linux/spinlock_api_smp.h:142 [inline]
_raw_spin_lock+0x2f/0x40 kernel/locking/spinlock.c:152
spin_lock include/linux/spinlock.h:317 [inline]
get_anon_bdev+0x81/0x1c0 fs/super.c:961
set_anon_super fs/super.c:998 [inline]
ns_set_super+0x40/0x50 fs/super.c:1029
sget_userns+0x7cd/0xc30 fs/super.c:522
mount_ns+0x6d/0x190 fs/super.c:1044
proc_mount+0x6a/0xa0 fs/proc/root.c:101
mount_fs+0x97/0x2a1 fs/super.c:1237
vfs_kern_mount.part.0+0x5e/0x3d0 fs/namespace.c:1046
vfs_kern_mount fs/namespace.c:1036 [inline]
kern_mount_data+0x56/0xc0 fs/namespace.c:3329
pid_ns_prepare_proc+0x1e/0x90 fs/proc/root.c:222
alloc_pid+0x9f0/0xc70 kernel/pid.c:324
copy_process.part.0+0x272f/0x6a70 kernel/fork.c:1785
copy_process kernel/fork.c:1586 [inline]
_do_fork+0x19e/0xce0 kernel/fork.c:2070
SYSC_clone kernel/fork.c:2180 [inline]
SyS_clone+0x37/0x50 kernel/fork.c:2174
do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292
entry_SYSCALL_64_after_hwframe+0x42/0xb7
RIP: 0033:0x4440b9
RSP: 002b:00007ffe26dd7f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004440b9
RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000020002100
RBP: 0000000000000000 R08: ffffffffffffffff R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
R13: 0000000000404df0 R14: 0000000000000000 R15: 0000000000000000
Code: 41 83 fc ff 0f 84 c0 02 00 00 e8 ca 0b 01 fb 48 8d bb d0 00 00 00 48
b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 80 3c 02 00 <0f> 85 01 03
00 00 4c 03 a3 d0 00 00 00 48 b8 00 00 00 00 00 fc
Sending NMI from CPU 0 to CPUs 1:
NMI backtrace for cpu 1
CPU: 1 PID: 7172 Comm: syz-executor324 Not tainted 4.14.161-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS
Google 01/01/2011
task: ffff88809bc6a1c0 task.stack: ffff8880a41a0000
RIP: 0010:arch_static_branch arch/x86/include/asm/jump_label.h:36 [inline]
RIP: 0010:static_key_false include/linux/jump_label.h:142 [inline]
RIP: 0010:native_write_msr+0x6/0x30 arch/x86/include/asm/msr.h:150
RSP: 0018:ffff8880aed07e70 EFLAGS: 00000046
RAX: 000000000000014f RBX: 0000000000000838 RCX: 0000000000000838
RDX: 0000000000000000 RSI: 000000000000014f RDI: 0000000000000838
RBP: ffff8880aed07e88 R08: 000000da14eb3c6e R09: ffff88821fff7048
R10: ffff88821fff7050 R11: 0000000000000001 R12: ffff8880aed1f140
R13: 000000000000014f R14: 0000000000000003 R15: 000000d8cc8fb6e0
FS: 0000000000e53940(0000) GS:ffff8880aed00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007ffdd71e7ff8 CR3: 000000009065a000 CR4: 00000000001406e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
<IRQ>
apic_write arch/x86/include/asm/apic.h:395 [inline]
lapic_next_event+0x57/0x90 arch/x86/kernel/apic/apic.c:469
clockevents_program_event+0x21a/0x2f0 kernel/time/clockevents.c:339
tick_program_event+0x83/0xe0 kernel/time/tick-oneshot.c:47
hrtimer_interrupt+0x329/0x5d0 kernel/time/hrtimer.c:1331
local_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1075 [inline]
smp_apic_timer_interrupt+0x11c/0x5e0 arch/x86/kernel/apic/apic.c:1100
apic_timer_interrupt+0x96/0xa0 arch/x86/entry/entry_64.S:792
</IRQ>
RIP: 0010:pv_wait_head_or_lock kernel/locking/qspinlock_paravirt.h:411
[inline]
RIP: 0010:__pv_queued_spin_lock_slowpath+0x26d/0x950
kernel/locking/qspinlock.c:465
RSP: 0018:ffff8880a41a7890 EFLAGS: 00000206 ORIG_RAX: ffffffffffffff10
RAX: 0000000000000003 RBX: dffffc0000000000 RCX: fffffbfff10058a0
RDX: 000000000000435b RSI: 0000000000000001 RDI: 0000000000000282
RBP: ffff8880a41a78f8 R08: 0000000000000000 R09: ffff88809bc6aa60
R10: 0000000000000001 R11: 0000000000000000 R12: 0000000000000000
R13: ffff8880aed2c0c0 R14: ffffed1015da5820 R15: ffffffff8802c500
pv_queued_spin_lock_slowpath arch/x86/include/asm/paravirt.h:669 [inline]
queued_spin_lock_slowpath arch/x86/include/asm/qspinlock.h:52 [inline]
queued_spin_lock include/asm-generic/qspinlock.h:90 [inline]
do_raw_spin_lock+0x190/0x230 kernel/locking/spinlock_debug.c:113
__raw_spin_lock include/linux/spinlock_api_smp.h:143 [inline]
_raw_spin_lock+0x37/0x40 kernel/locking/spinlock.c:152
spin_lock include/linux/spinlock.h:317 [inline]
sget_userns+0xa8/0xc30 fs/super.c:491
mount_ns+0x6d/0x190 fs/super.c:1044
proc_mount+0x6a/0xa0 fs/proc/root.c:101
mount_fs+0x97/0x2a1 fs/super.c:1237
vfs_kern_mount.part.0+0x5e/0x3d0 fs/namespace.c:1046
vfs_kern_mount fs/namespace.c:1036 [inline]
kern_mount_data+0x56/0xc0 fs/namespace.c:3329
pid_ns_prepare_proc+0x1e/0x90 fs/proc/root.c:222
alloc_pid+0x9f0/0xc70 kernel/pid.c:324
copy_process.part.0+0x272f/0x6a70 kernel/fork.c:1785
copy_process kernel/fork.c:1586 [inline]
_do_fork+0x19e/0xce0 kernel/fork.c:2070
SYSC_clone kernel/fork.c:2180 [inline]
SyS_clone+0x37/0x50 kernel/fork.c:2174
do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292
entry_SYSCALL_64_after_hwframe+0x42/0xb7
RIP: 0033:0x4440b9
RSP: 002b:00007ffe26dd7f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004440b9
RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000020002100
RBP: 0000000000000000 R08: ffffffffffffffff R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
R13: 0000000000404df0 R14: 0000000000000000 R15: 0000000000000000
Code: e1 c7 86 0f 21 f8 c3 0f 21 c0 c3 0f 21 c8 c3 0f 21 d0 c3 0f 21 d8 c3
0f 21 f0 c3 0f 0b 0f 1f 84 00 00 00 00 00 89 f9 89 f0 0f 30 <0f> 1f 44 00
00 c3 55 48 c1 e2 20 89 f6 48 89 e5 48 09 d6 31 d2


---
This bug is generated by a bot. It may contain errors.
See https://goo.gl/tpsmEJ for more information about syzbot.
syzbot engineers can be reached at syzk...@googlegroups.com.

syzbot will keep track of this bug report. See:
https://goo.gl/tpsmEJ#status for how to communicate with syzbot.
syzbot can test patches for this bug, for details see:
https://goo.gl/tpsmEJ#testing-patches
Reply all
Reply to author
Forward
0 new messages