[moderation] [net?] BUG: workqueue leaked atomic, lock or RCU: udevd[NUM]

2 views
Skip to first unread message

syzbot

unread,
Jan 28, 2025, 11:16:29 AM1/28/25
to syzkaller-upst...@googlegroups.com
Hello,

syzbot found the following issue on:

HEAD commit: 113691ce9f32 Merge tag 'x86_tdx_for_6.14-rc1' of git://git..
git tree: upstream
console output: https://syzkaller.appspot.com/x/log.txt?x=162019f8580000
kernel config: https://syzkaller.appspot.com/x/.config?x=faaefa8d73d72fff
dashboard link: https://syzkaller.appspot.com/bug?extid=1e54cfe30f4f6d519572
compiler: gcc (Debian 12.2.0-14) 12.2.0, GNU ld (GNU Binutils for Debian) 2.40
CC: [da...@davemloft.net edum...@google.com ho...@kernel.org ku...@kernel.org linux-...@vger.kernel.org net...@vger.kernel.org pab...@redhat.com]

Unfortunately, I don't have any reproducer for this issue yet.

Downloadable assets:
disk image: https://storage.googleapis.com/syzbot-assets/9f5c9b8f9360/disk-113691ce.raw.xz
vmlinux: https://storage.googleapis.com/syzbot-assets/13ffa9c2bcd5/vmlinux-113691ce.xz
kernel image: https://storage.googleapis.com/syzbot-assets/4dd7a4773b61/bzImage-113691ce.xz

IMPORTANT: if you fix the issue, please add the following tag to the commit:
Reported-by: syzbot+1e54cf...@syzkaller.appspotmail.com

BUG: workqueue leaked atomic, lock or RCU: udevd[5190]
preempt=0x00000101 lock=1->0 RCU=1->1 workfn=usb_giveback_urb_bh
INFO: lockdep is turned off.
CPU: 0 UID: 0 PID: 5190 Comm: udevd Not tainted 6.13.0-syzkaller-05474-g113691ce9f32 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024
Call Trace:
<IRQ>
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120
process_one_work+0x11e6/0x1ba0 kernel/workqueue.c:3257
process_scheduled_works kernel/workqueue.c:3317 [inline]
bh_worker+0x5a4/0x8a0 kernel/workqueue.c:3577
workqueue_softirq_action+0x12c/0x190 kernel/workqueue.c:3604
tasklet_hi_action+0x17/0x70 kernel/softirq.c:842
handle_softirqs+0x213/0x8f0 kernel/softirq.c:561
__do_softirq kernel/softirq.c:595 [inline]
invoke_softirq kernel/softirq.c:435 [inline]
__irq_exit_rcu+0x109/0x170 kernel/softirq.c:662
irq_exit_rcu+0x9/0x30 kernel/softirq.c:678
instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1049 [inline]
sysvec_apic_timer_interrupt+0xa4/0xc0 arch/x86/kernel/apic/apic.c:1049
</IRQ>
<TASK>
asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702
RIP: 0010:__raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:152 [inline]
RIP: 0010:_raw_spin_unlock_irqrestore+0x31/0x80 kernel/locking/spinlock.c:194
Code: f5 53 48 8b 74 24 10 48 89 fb 48 83 c7 18 e8 e6 6d 3e f6 48 89 df e8 3e ed 3e f6 f7 c5 00 02 00 00 75 23 9c 58 f6 c4 02 75 37 <bf> 01 00 00 00 e8 85 c3 2f f6 65 8b 05 96 82 ab 74 85 c0 74 16 5b
RSP: 0018:ffffc90003b3f908 EFLAGS: 00000246
RAX: 0000000000000006 RBX: ffff88807d891e40 RCX: 1ffffffff20c4191
RDX: 0000000000000000 RSI: ffffffff8b6cd840 RDI: ffffffff8bd2ec20
RBP: 0000000000000282 R08: 0000000000000001 R09: 0000000000000001
R10: ffffffff90624fd7 R11: 0000000000000006 R12: ffff88802735e180
R13: ffff88807d891e40 R14: ffff88802735e550 R15: ffff888024be8dc0
sock_def_readable+0x15f/0x610 net/core/sock.c:3476
__netlink_sendskb net/netlink/af_netlink.c:1268 [inline]
netlink_sendskb net/netlink/af_netlink.c:1274 [inline]
netlink_unicast+0x6f1/0x7f0 net/netlink/af_netlink.c:1363
netlink_sendmsg+0x8b8/0xd70 net/netlink/af_netlink.c:1892
sock_sendmsg_nosec net/socket.c:713 [inline]
__sock_sendmsg net/socket.c:728 [inline]
____sys_sendmsg+0xaaf/0xc90 net/socket.c:2568
___sys_sendmsg+0x135/0x1e0 net/socket.c:2622
__sys_sendmsg+0x16e/0x220 net/socket.c:2654
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f4313724a4b
Code: ff 89 ef 48 89 04 24 e8 22 56 f9 ff 48 8b 04 24 48 83 c4 20 5d c3 c3 64 8b 04 25 18 00 00 00 85 c0 75 20 b8 2e 00 00 00 0f 05 <48> 3d 00 f0 ff ff 76 6d 48 8b 15 ae c3 0c 00 f7 d8 64 89 02 48 83
RSP: 002b:00007ffd792cae28 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
RAX: ffffffffffffffda RBX: 000055a450bd2d90 RCX: 00007f4313724a4b
RDX: 0000000000000000 RSI: 00007ffd792cae38 RDI: 0000000000000004
RBP: 000055a450c00200 R08: 0000000000000001 R09: fa1e497890b7bd95
R10: 000000000000010f R11: 0000000000000246 R12: 0000000000000000
R13: 0000000000000090 R14: 0000000000000000 R15: 0000000000000000
</TASK>
----------------
Code disassembly (best guess):
0: f5 cmc
1: 53 push %rbx
2: 48 8b 74 24 10 mov 0x10(%rsp),%rsi
7: 48 89 fb mov %rdi,%rbx
a: 48 83 c7 18 add $0x18,%rdi
e: e8 e6 6d 3e f6 call 0xf63e6df9
13: 48 89 df mov %rbx,%rdi
16: e8 3e ed 3e f6 call 0xf63eed59
1b: f7 c5 00 02 00 00 test $0x200,%ebp
21: 75 23 jne 0x46
23: 9c pushf
24: 58 pop %rax
25: f6 c4 02 test $0x2,%ah
28: 75 37 jne 0x61
* 2a: bf 01 00 00 00 mov $0x1,%edi <-- trapping instruction
2f: e8 85 c3 2f f6 call 0xf62fc3b9
34: 65 8b 05 96 82 ab 74 mov %gs:0x74ab8296(%rip),%eax # 0x74ab82d1
3b: 85 c0 test %eax,%eax
3d: 74 16 je 0x55
3f: 5b pop %rbx


---
This report is generated by a bot. It may contain errors.
See https://goo.gl/tpsmEJ for more information about syzbot.
syzbot engineers can be reached at syzk...@googlegroups.com.

syzbot will keep track of this issue. See:
https://goo.gl/tpsmEJ#status for how to communicate with syzbot.

If the report is already addressed, let syzbot know by replying with:
#syz fix: exact-commit-title

If you want to overwrite report's subsystems, reply with:
#syz set subsystems: new-subsystem
(See the list of subsystem names on the web dashboard)

If the report is a duplicate of another one, reply with:
#syz dup: exact-subject-of-another-report

If you want to undo deduplication, reply with:
#syz undup

syzbot

unread,
Apr 24, 2025, 12:12:16 PM4/24/25
to syzkaller-upst...@googlegroups.com
Auto-closing this bug as obsolete.
Crashes did not happen for a while, no reproducer and no activity.
Reply all
Reply to author
Forward
0 new messages