* [PATCH net] net: bridge: fix soft lockup in br_multicast_query_expired()
@ 2025-08-06 9:49 Wang Liang
2025-08-06 10:08 ` Nikolay Aleksandrov
0 siblings, 1 reply; 4+ messages in thread
From: Wang Liang @ 2025-08-06 9:49 UTC (permalink / raw)
To: razor, idosch, davem, edumazet, kuba, pabeni, horms
Cc: bridge, netdev, linux-kernel, yuehaibing, zhangchangzhong,
wangliang74
When set multicast_query_interval to a large value, the local variable
'time' in br_multicast_send_query() may overflow. If the time is smaller
than jiffies, the timer will expire immediately, and then call mod_timer()
again, which creates a loop and may trigger the following soft lockup
issue:
watchdog: BUG: soft lockup - CPU#1 stuck for 221s! [rb_consumer:66]
CPU: 1 UID: 0 PID: 66 Comm: rb_consumer Not tainted 6.16.0+ #259 PREEMPT(none)
Call Trace:
<IRQ>
__netdev_alloc_skb+0x2e/0x3a0
br_ip6_multicast_alloc_query+0x212/0x1b70
__br_multicast_send_query+0x376/0xac0
br_multicast_send_query+0x299/0x510
br_multicast_query_expired.constprop.0+0x16d/0x1b0
call_timer_fn+0x3b/0x2a0
__run_timers+0x619/0x950
run_timer_softirq+0x11c/0x220
handle_softirqs+0x18e/0x560
__irq_exit_rcu+0x158/0x1a0
sysvec_apic_timer_interrupt+0x76/0x90
</IRQ>
This issue can be reproduced with:
ip link add br0 type bridge
echo 1 > /sys/class/net/br0/bridge/multicast_querier
echo 0xffffffffffffffff >
/sys/class/net/br0/bridge/multicast_query_interval
ip link set dev br0 up
Fix this by comparing expire time with jiffies, to avoid the timer loop.
Fixes: 7e4df51eb35d ("bridge: netlink: add support for igmp's intervals")
Signed-off-by: Wang Liang <wangliang74@huawei.com>
---
net/bridge/br_multicast.c | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff --git a/net/bridge/br_multicast.c b/net/bridge/br_multicast.c
index 1377f31b719c..631ae3b4c45d 100644
--- a/net/bridge/br_multicast.c
+++ b/net/bridge/br_multicast.c
@@ -1892,7 +1892,8 @@ static void br_multicast_send_query(struct net_bridge_mcast *brmctx,
time += own_query->startup_sent < brmctx->multicast_startup_query_count ?
brmctx->multicast_startup_query_interval :
brmctx->multicast_query_interval;
- mod_timer(&own_query->timer, time);
+ if (time_is_after_jiffies(time))
+ mod_timer(&own_query->timer, time);
}
static void
--
2.34.1
^ permalink raw reply related [flat|nested] 4+ messages in thread
* Re: [PATCH net] net: bridge: fix soft lockup in br_multicast_query_expired()
2025-08-06 9:49 [PATCH net] net: bridge: fix soft lockup in br_multicast_query_expired() Wang Liang
@ 2025-08-06 10:08 ` Nikolay Aleksandrov
2025-08-07 10:36 ` Wang Liang
0 siblings, 1 reply; 4+ messages in thread
From: Nikolay Aleksandrov @ 2025-08-06 10:08 UTC (permalink / raw)
To: Wang Liang, idosch, davem, edumazet, kuba, pabeni, horms
Cc: bridge, netdev, linux-kernel, yuehaibing, zhangchangzhong
On 8/6/25 12:49, Wang Liang wrote:
> When set multicast_query_interval to a large value, the local variable
> 'time' in br_multicast_send_query() may overflow. If the time is smaller
> than jiffies, the timer will expire immediately, and then call mod_timer()
> again, which creates a loop and may trigger the following soft lockup
> issue:
>
> watchdog: BUG: soft lockup - CPU#1 stuck for 221s! [rb_consumer:66]
> CPU: 1 UID: 0 PID: 66 Comm: rb_consumer Not tainted 6.16.0+ #259 PREEMPT(none)
> Call Trace:
> <IRQ>
> __netdev_alloc_skb+0x2e/0x3a0
> br_ip6_multicast_alloc_query+0x212/0x1b70
> __br_multicast_send_query+0x376/0xac0
> br_multicast_send_query+0x299/0x510
> br_multicast_query_expired.constprop.0+0x16d/0x1b0
> call_timer_fn+0x3b/0x2a0
> __run_timers+0x619/0x950
> run_timer_softirq+0x11c/0x220
> handle_softirqs+0x18e/0x560
> __irq_exit_rcu+0x158/0x1a0
> sysvec_apic_timer_interrupt+0x76/0x90
> </IRQ>
>
> This issue can be reproduced with:
> ip link add br0 type bridge
> echo 1 > /sys/class/net/br0/bridge/multicast_querier
> echo 0xffffffffffffffff >
> /sys/class/net/br0/bridge/multicast_query_interval
> ip link set dev br0 up
>
> Fix this by comparing expire time with jiffies, to avoid the timer loop.
>
> Fixes: 7e4df51eb35d ("bridge: netlink: add support for igmp's intervals")
> Signed-off-by: Wang Liang <wangliang74@huawei.com>
> ---
> net/bridge/br_multicast.c | 3 ++-
> 1 file changed, 2 insertions(+), 1 deletion(-)
>
> diff --git a/net/bridge/br_multicast.c b/net/bridge/br_multicast.c
> index 1377f31b719c..631ae3b4c45d 100644
> --- a/net/bridge/br_multicast.c
> +++ b/net/bridge/br_multicast.c
> @@ -1892,7 +1892,8 @@ static void br_multicast_send_query(struct net_bridge_mcast *brmctx,
> time += own_query->startup_sent < brmctx->multicast_startup_query_count ?
> brmctx->multicast_startup_query_interval :
> brmctx->multicast_query_interval;
> - mod_timer(&own_query->timer, time);
> + if (time_is_after_jiffies(time))
> + mod_timer(&own_query->timer, time);
> }
>
> static void
This is the wrong way to fix it, it is a configuration issue, so we could either
cap the value at something that noone uses, e.g. 24 hours, or we could make sure time
is at least 1s (that is BR_MULTICAST_QUERY_INTVL_MIN).
The simple fix would be to do a min(time, BR_MULTICAST_QUERY_INTVL_MIN), but I'd go
for something similar to:
commit 99b40610956a
Author: Nikolay Aleksandrov <razor@blackwall.org>
Date: Mon Dec 27 19:21:15 2021 +0200
net: bridge: mcast: add and enforce query interval minimum
for the maximum to avoid the overflow altogether. By the way multicast_startup_query_interval
would also cause the same issue, so you'd have to cap it.
Cheers,
Nik
^ permalink raw reply [flat|nested] 4+ messages in thread
* Re: [PATCH net] net: bridge: fix soft lockup in br_multicast_query_expired()
2025-08-06 10:08 ` Nikolay Aleksandrov
@ 2025-08-07 10:36 ` Wang Liang
2025-08-10 10:02 ` Nikolay Aleksandrov
0 siblings, 1 reply; 4+ messages in thread
From: Wang Liang @ 2025-08-07 10:36 UTC (permalink / raw)
To: Nikolay Aleksandrov, idosch, davem, edumazet, kuba, pabeni, horms
Cc: bridge, netdev, linux-kernel, yuehaibing, zhangchangzhong
在 2025/8/6 18:08, Nikolay Aleksandrov 写道:
> On 8/6/25 12:49, Wang Liang wrote:
>> When set multicast_query_interval to a large value, the local variable
>> 'time' in br_multicast_send_query() may overflow. If the time is smaller
>> than jiffies, the timer will expire immediately, and then call mod_timer()
>> again, which creates a loop and may trigger the following soft lockup
>> issue:
>>
>> watchdog: BUG: soft lockup - CPU#1 stuck for 221s! [rb_consumer:66]
>> CPU: 1 UID: 0 PID: 66 Comm: rb_consumer Not tainted 6.16.0+ #259 PREEMPT(none)
>> Call Trace:
>> <IRQ>
>> __netdev_alloc_skb+0x2e/0x3a0
>> br_ip6_multicast_alloc_query+0x212/0x1b70
>> __br_multicast_send_query+0x376/0xac0
>> br_multicast_send_query+0x299/0x510
>> br_multicast_query_expired.constprop.0+0x16d/0x1b0
>> call_timer_fn+0x3b/0x2a0
>> __run_timers+0x619/0x950
>> run_timer_softirq+0x11c/0x220
>> handle_softirqs+0x18e/0x560
>> __irq_exit_rcu+0x158/0x1a0
>> sysvec_apic_timer_interrupt+0x76/0x90
>> </IRQ>
>>
>> This issue can be reproduced with:
>> ip link add br0 type bridge
>> echo 1 > /sys/class/net/br0/bridge/multicast_querier
>> echo 0xffffffffffffffff >
>> /sys/class/net/br0/bridge/multicast_query_interval
>> ip link set dev br0 up
>>
>> Fix this by comparing expire time with jiffies, to avoid the timer loop.
>>
>> Fixes: 7e4df51eb35d ("bridge: netlink: add support for igmp's intervals")
>> Signed-off-by: Wang Liang <wangliang74@huawei.com>
>> ---
>> net/bridge/br_multicast.c | 3 ++-
>> 1 file changed, 2 insertions(+), 1 deletion(-)
>>
>> diff --git a/net/bridge/br_multicast.c b/net/bridge/br_multicast.c
>> index 1377f31b719c..631ae3b4c45d 100644
>> --- a/net/bridge/br_multicast.c
>> +++ b/net/bridge/br_multicast.c
>> @@ -1892,7 +1892,8 @@ static void br_multicast_send_query(struct net_bridge_mcast *brmctx,
>> time += own_query->startup_sent < brmctx->multicast_startup_query_count ?
>> brmctx->multicast_startup_query_interval :
>> brmctx->multicast_query_interval;
>> - mod_timer(&own_query->timer, time);
>> + if (time_is_after_jiffies(time))
>> + mod_timer(&own_query->timer, time);
>> }
>>
>> static void
> This is the wrong way to fix it, it is a configuration issue, so we could either
> cap the value at something that noone uses, e.g. 24 hours, or we could make sure time
> is at least 1s (that is BR_MULTICAST_QUERY_INTVL_MIN).
>
> The simple fix would be to do a min(time, BR_MULTICAST_QUERY_INTVL_MIN), but I'd go
> for something similar to:
> commit 99b40610956a
> Author: Nikolay Aleksandrov <razor@blackwall.org>
> Date: Mon Dec 27 19:21:15 2021 +0200
>
> net: bridge: mcast: add and enforce query interval minimum
>
> for the maximum to avoid the overflow altogether. By the way multicast_startup_query_interval
> would also cause the same issue, so you'd have to cap it.
>
> Cheers,
> Nik
Thanks very much for your suggestions!
Similar to the commit 99b40610956a("net: bridge: mcast: add and enforce
query interval minimum"), it is indeed a better choice to add query
interval maximum:
diff --git a/net/bridge/br_multicast.c b/net/bridge/br_multicast.c
index 1377f31b719c..8ce145938b02 100644
--- a/net/bridge/br_multicast.c
+++ b/net/bridge/br_multicast.c
@@ -4818,6 +4818,14 @@ void br_multicast_set_query_intvl(struct
net_bridge_mcast *brmctx,
intvl_jiffies = BR_MULTICAST_QUERY_INTVL_MIN;
}
+ if (intvl_jiffies > BR_MULTICAST_QUERY_INTVL_MAX) {
+ br_info(brmctx->br,
+ "trying to set multicast query interval above
maximum, setting to %lu (%ums)\n",
+ jiffies_to_clock_t(BR_MULTICAST_QUERY_INTVL_MAX),
+ jiffies_to_msecs(BR_MULTICAST_QUERY_INTVL_MAX));
+ intvl_jiffies = BR_MULTICAST_QUERY_INTVL_MAX;
+ }
+
brmctx->multicast_query_interval = intvl_jiffies;
}
@@ -4834,6 +4842,14 @@ void br_multicast_set_startup_query_intvl(struct
net_bridge_mcast *brmctx,
intvl_jiffies = BR_MULTICAST_STARTUP_QUERY_INTVL_MIN;
}
+ if (intvl_jiffies > BR_MULTICAST_STARTUP_QUERY_INTVL_MAX) {
+ br_info(brmctx->br,
+ "trying to set multicast startup query interval
above maximum, setting to %lu (%ums)\n",
+ jiffies_to_clock_t(BR_MULTICAST_STARTUP_QUERY_INTVL_MAX),
+ jiffies_to_msecs(BR_MULTICAST_STARTUP_QUERY_INTVL_MAX));
+ intvl_jiffies = BR_MULTICAST_STARTUP_QUERY_INTVL_MAX;
+ }
+
brmctx->multicast_startup_query_interval = intvl_jiffies;
}
diff --git a/net/bridge/br_private.h b/net/bridge/br_private.h
index b159aae594c0..8de0904b9627 100644
--- a/net/bridge/br_private.h
+++ b/net/bridge/br_private.h
@@ -31,6 +31,8 @@
#define BR_MULTICAST_DEFAULT_HASH_MAX 4096
#define BR_MULTICAST_QUERY_INTVL_MIN msecs_to_jiffies(1000)
#define BR_MULTICAST_STARTUP_QUERY_INTVL_MIN BR_MULTICAST_QUERY_INTVL_MIN
+#define BR_MULTICAST_QUERY_INTVL_MAX msecs_to_jiffies(86400000) /* 24
hours */
+#define BR_MULTICAST_STARTUP_QUERY_INTVL_MAX BR_MULTICAST_QUERY_INTVL_MAX
#define BR_HWDOM_MAX BITS_PER_LONG
Set the interval maximum to 24 hours, it is big enough.
Please check it. If the above code is ok, I will send a v2 patch then.
------
Best regards
Wang Liang
>
>
^ permalink raw reply related [flat|nested] 4+ messages in thread
* Re: [PATCH net] net: bridge: fix soft lockup in br_multicast_query_expired()
2025-08-07 10:36 ` Wang Liang
@ 2025-08-10 10:02 ` Nikolay Aleksandrov
0 siblings, 0 replies; 4+ messages in thread
From: Nikolay Aleksandrov @ 2025-08-10 10:02 UTC (permalink / raw)
To: Wang Liang, idosch, davem, edumazet, kuba, pabeni, horms
Cc: bridge, netdev, linux-kernel, yuehaibing, zhangchangzhong
On 8/7/25 13:36, Wang Liang wrote:
>
> 在 2025/8/6 18:08, Nikolay Aleksandrov 写道:
>> On 8/6/25 12:49, Wang Liang wrote:
>>> When set multicast_query_interval to a large value, the local variable
>>> 'time' in br_multicast_send_query() may overflow. If the time is smaller
>>> than jiffies, the timer will expire immediately, and then call mod_timer()
>>> again, which creates a loop and may trigger the following soft lockup
>>> issue:
>>>
>>> watchdog: BUG: soft lockup - CPU#1 stuck for 221s! [rb_consumer:66]
>>> CPU: 1 UID: 0 PID: 66 Comm: rb_consumer Not tainted 6.16.0+ #259 PREEMPT(none)
>>> Call Trace:
>>> <IRQ>
>>> __netdev_alloc_skb+0x2e/0x3a0
>>> br_ip6_multicast_alloc_query+0x212/0x1b70
>>> __br_multicast_send_query+0x376/0xac0
>>> br_multicast_send_query+0x299/0x510
>>> br_multicast_query_expired.constprop.0+0x16d/0x1b0
>>> call_timer_fn+0x3b/0x2a0
>>> __run_timers+0x619/0x950
>>> run_timer_softirq+0x11c/0x220
>>> handle_softirqs+0x18e/0x560
>>> __irq_exit_rcu+0x158/0x1a0
>>> sysvec_apic_timer_interrupt+0x76/0x90
>>> </IRQ>
>>>
>>> This issue can be reproduced with:
>>> ip link add br0 type bridge
>>> echo 1 > /sys/class/net/br0/bridge/multicast_querier
>>> echo 0xffffffffffffffff >
>>> /sys/class/net/br0/bridge/multicast_query_interval
>>> ip link set dev br0 up
>>>
>>> Fix this by comparing expire time with jiffies, to avoid the timer loop.
>>>
>>> Fixes: 7e4df51eb35d ("bridge: netlink: add support for igmp's intervals")
>>> Signed-off-by: Wang Liang <wangliang74@huawei.com>
>>> ---
>>> net/bridge/br_multicast.c | 3 ++-
>>> 1 file changed, 2 insertions(+), 1 deletion(-)
>>>
>>> diff --git a/net/bridge/br_multicast.c b/net/bridge/br_multicast.c
>>> index 1377f31b719c..631ae3b4c45d 100644
>>> --- a/net/bridge/br_multicast.c
>>> +++ b/net/bridge/br_multicast.c
>>> @@ -1892,7 +1892,8 @@ static void br_multicast_send_query(struct net_bridge_mcast *brmctx,
>>> time += own_query->startup_sent < brmctx->multicast_startup_query_count ?
>>> brmctx->multicast_startup_query_interval :
>>> brmctx->multicast_query_interval;
>>> - mod_timer(&own_query->timer, time);
>>> + if (time_is_after_jiffies(time))
>>> + mod_timer(&own_query->timer, time);
>>> }
>>> static void
>> This is the wrong way to fix it, it is a configuration issue, so we could either
>> cap the value at something that noone uses, e.g. 24 hours, or we could make sure time
>> is at least 1s (that is BR_MULTICAST_QUERY_INTVL_MIN).
>>
>> The simple fix would be to do a min(time, BR_MULTICAST_QUERY_INTVL_MIN), but I'd go
>> for something similar to:
>> commit 99b40610956a
>> Author: Nikolay Aleksandrov <razor@blackwall.org>
>> Date: Mon Dec 27 19:21:15 2021 +0200
>>
>> net: bridge: mcast: add and enforce query interval minimum
>>
>> for the maximum to avoid the overflow altogether. By the way multicast_startup_query_interval
>> would also cause the same issue, so you'd have to cap it.
>>
>> Cheers,
>> Nik
>
>
> Thanks very much for your suggestions!
>
> Similar to the commit 99b40610956a("net: bridge: mcast: add and enforce
> query interval minimum"), it is indeed a better choice to add query
> interval maximum:
>
> diff --git a/net/bridge/br_multicast.c b/net/bridge/br_multicast.c
> index 1377f31b719c..8ce145938b02 100644
> --- a/net/bridge/br_multicast.c
> +++ b/net/bridge/br_multicast.c
> @@ -4818,6 +4818,14 @@ void br_multicast_set_query_intvl(struct net_bridge_mcast *brmctx,
> intvl_jiffies = BR_MULTICAST_QUERY_INTVL_MIN;
> }
>
> + if (intvl_jiffies > BR_MULTICAST_QUERY_INTVL_MAX) {
> + br_info(brmctx->br,
> + "trying to set multicast query interval above maximum, setting to %lu (%ums)\n",
> + jiffies_to_clock_t(BR_MULTICAST_QUERY_INTVL_MAX),
> + jiffies_to_msecs(BR_MULTICAST_QUERY_INTVL_MAX));
> + intvl_jiffies = BR_MULTICAST_QUERY_INTVL_MAX;
> + }
> +
> brmctx->multicast_query_interval = intvl_jiffies;
> }
>
> @@ -4834,6 +4842,14 @@ void br_multicast_set_startup_query_intvl(struct net_bridge_mcast *brmctx,
> intvl_jiffies = BR_MULTICAST_STARTUP_QUERY_INTVL_MIN;
> }
>
> + if (intvl_jiffies > BR_MULTICAST_STARTUP_QUERY_INTVL_MAX) {
> + br_info(brmctx->br,
> + "trying to set multicast startup query interval above maximum, setting to %lu (%ums)\n",
> + jiffies_to_clock_t(BR_MULTICAST_STARTUP_QUERY_INTVL_MAX),
> + jiffies_to_msecs(BR_MULTICAST_STARTUP_QUERY_INTVL_MAX));
> + intvl_jiffies = BR_MULTICAST_STARTUP_QUERY_INTVL_MAX;
> + }
> +
> brmctx->multicast_startup_query_interval = intvl_jiffies;
> }
>
> diff --git a/net/bridge/br_private.h b/net/bridge/br_private.h
> index b159aae594c0..8de0904b9627 100644
> --- a/net/bridge/br_private.h
> +++ b/net/bridge/br_private.h
> @@ -31,6 +31,8 @@
> #define BR_MULTICAST_DEFAULT_HASH_MAX 4096
> #define BR_MULTICAST_QUERY_INTVL_MIN msecs_to_jiffies(1000)
> #define BR_MULTICAST_STARTUP_QUERY_INTVL_MIN BR_MULTICAST_QUERY_INTVL_MIN
> +#define BR_MULTICAST_QUERY_INTVL_MAX msecs_to_jiffies(86400000) /* 24 hours */
> +#define BR_MULTICAST_STARTUP_QUERY_INTVL_MAX BR_MULTICAST_QUERY_INTVL_MAX
>
> #define BR_HWDOM_MAX BITS_PER_LONG
>
> Set the interval maximum to 24 hours, it is big enough.
> Please check it. If the above code is ok, I will send a v2 patch then.
>
> ------
> Best regards
> Wang Liang
>
yeah, that is what I suggested, looks good to me
Cheers,
Nik
^ permalink raw reply [flat|nested] 4+ messages in thread
end of thread, other threads:[~2025-08-10 10:02 UTC | newest]
Thread overview: 4+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2025-08-06 9:49 [PATCH net] net: bridge: fix soft lockup in br_multicast_query_expired() Wang Liang
2025-08-06 10:08 ` Nikolay Aleksandrov
2025-08-07 10:36 ` Wang Liang
2025-08-10 10:02 ` Nikolay Aleksandrov
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).