Received: by 2002:a05:6358:3188:b0:123:57c1:9b43 with SMTP id q8csp2860438rwd; Fri, 9 Jun 2023 19:16:21 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ5oo/eP2Ys0frV9QxdgjavhNhe8DzLFqia5Q128kZvvgWqtLP1Vn2eggZcDAVla55qUCIJg X-Received: by 2002:a05:6a21:99a5:b0:10c:62b3:7dc4 with SMTP id ve37-20020a056a2199a500b0010c62b37dc4mr2865833pzb.55.1686363380665; Fri, 09 Jun 2023 19:16:20 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1686363380; cv=none; d=google.com; s=arc-20160816; b=bVFA1Gai6Q2SWJmvTgP/Dv+uJZy3AA6JraP65GQhbFiqOEyEwdDarOXvoked+RDeMu VoKlcRZUyaJsjBz3nayLsHqTy/9s3iEE+pGrv7Aez7hBA77yU0OmKzVcwZNasK8VOeBX mcTRHW38L7Hi0/fewu6qs5ThC2ifA8QAVIqsvA1vBcDNyQKRHAcnRmjWuEE9VuedyMlQ s7r5iIPHsINj4kItWe4bkLCwBVeOBzje3vhAEmowg7ub8nwXa/qZqzGdXIXHHg23OvNL cYWI3+Z1/RBOrBMTxknx+xtBakpXkUKAG/CtN9vTOuaZ8VYKtBLiqv3l5E8I3G1o1LiW SHlQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:to:from:subject:message-id:date:mime-version; bh=f5mNW1xz4ir4K+TXk9/cw5gWevzhG4ajUOaVhJJcyOA=; b=rzkubkl8DUTsP2p49nzn67oYWDxWgTKVUPzTj1noK3aGQKOE2ZLdAgBtuz3cIK4bxF Xp0AanOmgMmfpUFDZSDq0s99TgRACV2xXEEZGRFma12Ys2GTkRKW6dxFgFFTAzlVrF3n x0SZGuMCb6UwLkOYMyKZxngNZzNXbrO9B740+xr0o0Udu13asOVvS2X3T8Wl3DxicfRJ X2ugj7f1PaMvrI/rMbsp5DbN216AHpDGGbeR5Fj7Lu6Fb7+2CI6q5YDBO9AvJiM5/Pfy f6cbw2YC3BLjwD4qEilbOkzp4Ki/9SDTRM/HH14Fcwe1JBRPQTlMZJIcSHsfZ3+wvpZ6 bvqg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=appspotmail.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id v135-20020a63618d000000b0054b77777c88si374654pgb.459.2023.06.09.19.16.07; Fri, 09 Jun 2023 19:16:20 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=appspotmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230168AbjFJBfC (ORCPT + 99 others); Fri, 9 Jun 2023 21:35:02 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:36192 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229522AbjFJBfA (ORCPT ); Fri, 9 Jun 2023 21:35:00 -0400 Received: from mail-io1-f80.google.com (mail-io1-f80.google.com [209.85.166.80]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 3772A35B8 for ; Fri, 9 Jun 2023 18:34:59 -0700 (PDT) Received: by mail-io1-f80.google.com with SMTP id ca18e2360f4ac-7776b76cc59so288387239f.2 for ; Fri, 09 Jun 2023 18:34:59 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1686360898; x=1688952898; h=to:from:subject:message-id:date:mime-version:x-gm-message-state :from:to:cc:subject:date:message-id:reply-to; bh=f5mNW1xz4ir4K+TXk9/cw5gWevzhG4ajUOaVhJJcyOA=; b=IwBU0Nl01orFQCbQYkUdRGHEvfQOwhiSAhV8XIUz5Sl4QTsokyr7Vf9NDU27v7uf2C HVzg4FhYKWIgaTEsElRcWNc73sVigocFiXzvkZCH5sSbqHCXGFLYNeM77JjnGMQJZLZB 7liknpqTsHxAtvzM77gBRZqpjwvD2TDOqS+CA1wdhw8NcnnpgMU8rlN39ehaBXLeDVzg vS6Twv/jZLCxFQyHHCgvj4uo7bNFCREbKntL0u2qcHgUkdYxLu8ikHon0wDeqOjD5Gzd 75fn42jnKBmVPc+fO/u6H3SmMC/0c3FFyqz8wA59k9WqrzuYsi4D0OzgpDK6MPXKdAvc GtUw== X-Gm-Message-State: AC+VfDwolF9SukJvi05Z3Xursp7uGhr8b2XMZXrMsZivIfJZ20n8m1pd Tua5Z8IBgeyHdOnAcYH1qf9rUsXGHd02On9zQ/ACcrxpqrSS MIME-Version: 1.0 X-Received: by 2002:a02:b187:0:b0:41f:2aa6:8b17 with SMTP id t7-20020a02b187000000b0041f2aa68b17mr1307116jah.2.1686360898474; Fri, 09 Jun 2023 18:34:58 -0700 (PDT) Date: Fri, 09 Jun 2023 18:34:58 -0700 X-Google-Appengine-App-Id: s~syzkaller X-Google-Appengine-App-Id-Alias: syzkaller Message-ID: <00000000000051197705fdbc7e54@google.com> Subject: [syzbot] [net?] unregister_netdevice: waiting for DEV to become free (8) From: syzbot To: arnd@arndb.de, bridge@lists.linux-foundation.org, davem@davemloft.net, edumazet@google.com, kuba@kernel.org, linux-kernel@vger.kernel.org, netdev@vger.kernel.org, nikolay@nvidia.com, pabeni@redhat.com, roopa@nvidia.com, syzkaller-bugs@googlegroups.com Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=0.8 required=5.0 tests=BAYES_00,FROM_LOCAL_HEX, HEADER_FROM_DIFFERENT_DOMAINS,RCVD_IN_DNSWL_NONE,RCVD_IN_MSPIKE_H2, SORTED_RECIPS,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE, URIBL_BLOCKED autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hello, syzbot found the following issue on: HEAD commit: 67faabbde36b selftests/bpf: Add missing prototypes for sev.. git tree: bpf-next console+strace: https://syzkaller.appspot.com/x/log.txt?x=1381363b280000 kernel config: https://syzkaller.appspot.com/x/.config?x=5335204dcdecfda dashboard link: https://syzkaller.appspot.com/bug?extid=881d65229ca4f9ae8c84 compiler: gcc (Debian 10.2.1-6) 10.2.1 20210110, GNU ld (GNU Binutils for Debian) 2.35.2 syz repro: https://syzkaller.appspot.com/x/repro.syz?x=132faf93280000 C reproducer: https://syzkaller.appspot.com/x/repro.c?x=10532add280000 Downloadable assets: disk image: https://storage.googleapis.com/syzbot-assets/751a0490d875/disk-67faabbd.raw.xz vmlinux: https://storage.googleapis.com/syzbot-assets/2c5106cd9f1f/vmlinux-67faabbd.xz kernel image: https://storage.googleapis.com/syzbot-assets/62c1154294e4/bzImage-67faabbd.xz The issue was bisected to: commit ad2f99aedf8fa77f3ae647153284fa63c43d3055 Author: Arnd Bergmann Date: Tue Jul 27 13:45:16 2021 +0000 net: bridge: move bridge ioctls out of .ndo_do_ioctl bisection log: https://syzkaller.appspot.com/x/bisect.txt?x=146de6f1280000 final oops: https://syzkaller.appspot.com/x/report.txt?x=166de6f1280000 console output: https://syzkaller.appspot.com/x/log.txt?x=126de6f1280000 IMPORTANT: if you fix the issue, please add the following tag to the commit: Reported-by: syzbot+881d65229ca4f9ae8c84@syzkaller.appspotmail.com Fixes: ad2f99aedf8f ("net: bridge: move bridge ioctls out of .ndo_do_ioctl") unregister_netdevice: waiting for bridge0 to become free. Usage count = 2 leaked reference. __netdev_tracker_alloc include/linux/netdevice.h:4070 [inline] netdev_hold include/linux/netdevice.h:4099 [inline] dev_ifsioc+0xbc0/0xeb0 net/core/dev_ioctl.c:408 dev_ioctl+0x250/0x1090 net/core/dev_ioctl.c:605 sock_do_ioctl+0x15a/0x230 net/socket.c:1215 sock_ioctl+0x1f8/0x680 net/socket.c:1318 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:870 [inline] __se_sys_ioctl fs/ioctl.c:856 [inline] __x64_sys_ioctl+0x197/0x210 fs/ioctl.c:856 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x39/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcd --- This report is generated by a bot. It may contain errors. See https://goo.gl/tpsmEJ for more information about syzbot. syzbot engineers can be reached at syzkaller@googlegroups.com. syzbot will keep track of this issue. See: https://goo.gl/tpsmEJ#status for how to communicate with syzbot. For information about bisection process see: https://goo.gl/tpsmEJ#bisection If the bug is already fixed, let syzbot know by replying with: #syz fix: exact-commit-title If you want syzbot to run the reproducer, reply with: #syz test: git://repo/address.git branch-or-commit-hash If you attach or paste a git patch, syzbot will apply it before testing. If you want to change bug's subsystems, reply with: #syz set subsystems: new-subsystem (See the list of subsystem names on the web dashboard) If the bug is a duplicate of another bug, reply with: #syz dup: exact-subject-of-another-report If you want to undo deduplication, reply with: #syz undup