INFO: task hung in get_info

5 views
Skip to first unread message

syzbot

unread,
Feb 3, 2020, 5:12:13 PM2/3/20
to syzkaller...@googlegroups.com
Hello,

syzbot found the following crash on:

HEAD commit: 9fa690a2 Linux 4.14.169
git tree: linux-4.14.y
console output: https://syzkaller.appspot.com/x/log.txt?x=138c4c5ee00000
kernel config: https://syzkaller.appspot.com/x/.config?x=eb55b601e76e3476
dashboard link: https://syzkaller.appspot.com/bug?extid=82bf2360f43a492298df
compiler: gcc (GCC) 9.0.0 20181231 (experimental)

Unfortunately, I don't have any reproducer for this crash yet.

IMPORTANT: if you fix the bug, please add the following tag to the commit:
Reported-by: syzbot+82bf23...@syzkaller.appspotmail.com

NOHZ: local_softirq_pending 08
NOHZ: local_softirq_pending 08
NOHZ: local_softirq_pending 08
NOHZ: local_softirq_pending 08
NOHZ: local_softirq_pending 08
INFO: task syz-executor.1:7320 blocked for more than 140 seconds.
Not tainted 4.14.169-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
syz-executor.1 D24576 7320 1 0x00000004
Call Trace:
context_switch kernel/sched/core.c:2808 [inline]
__schedule+0x7b8/0x1cd0 kernel/sched/core.c:3384
schedule+0x92/0x1c0 kernel/sched/core.c:3428
schedule_preempt_disabled+0x13/0x20 kernel/sched/core.c:3486
__mutex_lock_common kernel/locking/mutex.c:833 [inline]
__mutex_lock+0x73c/0x1470 kernel/locking/mutex.c:893
mutex_lock_nested+0x16/0x20 kernel/locking/mutex.c:908
xt_find_table_lock+0x3c/0x3d0 net/netfilter/x_tables.c:1092
get_info+0x116/0x560 net/ipv6/netfilter/ip6_tables.c:983
do_ipt_get_ctl+0x148/0x7e0 net/ipv4/netfilter/ip_tables.c:1698
nf_sockopt net/netfilter/nf_sockopt.c:104 [inline]
nf_getsockopt+0x6a/0xc0 net/netfilter/nf_sockopt.c:122
ip_getsockopt net/ipv4/ip_sockglue.c:1566 [inline]
ip_getsockopt+0x10d/0x150 net/ipv4/ip_sockglue.c:1551
tcp_getsockopt net/ipv4/tcp.c:3249 [inline]
tcp_getsockopt+0x84/0xd0 net/ipv4/tcp.c:3243
sock_common_getsockopt+0x94/0xd0 net/core/sock.c:2927
SYSC_getsockopt net/socket.c:1896 [inline]
SyS_getsockopt+0x126/0x1e0 net/socket.c:1878
do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292
entry_SYSCALL_64_after_hwframe+0x42/0xb7
RIP: 0033:0x45deaa
RSP: 002b:00007ffc0178cd08 EFLAGS: 00000246 ORIG_RAX: 0000000000000037
RAX: ffffffffffffffda RBX: 00007ffc0178cd30 RCX: 000000000045deaa
RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000003
RBP: 000000000071de80 R08: 00007ffc0178cd2c R09: 0000000000004000
R10: 00007ffc0178cd30 R11: 0000000000000246 R12: 0000000000000003
R13: 0000000000000000 R14: 0000000000000000 R15: 000000000071bcc0
INFO: task syz-executor.2:7321 blocked for more than 140 seconds.
Not tainted 4.14.169-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
syz-executor.2 D24992 7321 1 0x00000004
Call Trace:
context_switch kernel/sched/core.c:2808 [inline]
__schedule+0x7b8/0x1cd0 kernel/sched/core.c:3384
schedule+0x92/0x1c0 kernel/sched/core.c:3428
schedule_preempt_disabled+0x13/0x20 kernel/sched/core.c:3486
__mutex_lock_common kernel/locking/mutex.c:833 [inline]
__mutex_lock+0x73c/0x1470 kernel/locking/mutex.c:893
mutex_lock_nested+0x16/0x20 kernel/locking/mutex.c:908
xt_find_table_lock+0x3c/0x3d0 net/netfilter/x_tables.c:1092
get_info+0x116/0x560 net/ipv6/netfilter/ip6_tables.c:983
do_ipt_get_ctl+0x148/0x7e0 net/ipv4/netfilter/ip_tables.c:1698
nf_sockopt net/netfilter/nf_sockopt.c:104 [inline]
nf_getsockopt+0x6a/0xc0 net/netfilter/nf_sockopt.c:122
ip_getsockopt net/ipv4/ip_sockglue.c:1566 [inline]
ip_getsockopt+0x10d/0x150 net/ipv4/ip_sockglue.c:1551
tcp_getsockopt net/ipv4/tcp.c:3249 [inline]
tcp_getsockopt+0x84/0xd0 net/ipv4/tcp.c:3243
sock_common_getsockopt+0x94/0xd0 net/core/sock.c:2927
SYSC_getsockopt net/socket.c:1896 [inline]
SyS_getsockopt+0x126/0x1e0 net/socket.c:1878
do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292
entry_SYSCALL_64_after_hwframe+0x42/0xb7
RIP: 0033:0x45deaa
RSP: 002b:00007ffd8b72cc28 EFLAGS: 00000246 ORIG_RAX: 0000000000000037
RAX: ffffffffffffffda RBX: 00007ffd8b72cc50 RCX: 000000000045deaa
RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000003
RBP: 000000000071de80 R08: 00007ffd8b72cc4c R09: 0000000000004000
R10: 00007ffd8b72cc50 R11: 0000000000000246 R12: 0000000000000003
R13: 0000000000000000 R14: 0000000000000000 R15: 000000000071bcc0
INFO: task syz-executor.4:7323 blocked for more than 140 seconds.
Not tainted 4.14.169-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
syz-executor.4 D25168 7323 1 0x00000004
Call Trace:
context_switch kernel/sched/core.c:2808 [inline]
__schedule+0x7b8/0x1cd0 kernel/sched/core.c:3384
schedule+0x92/0x1c0 kernel/sched/core.c:3428
schedule_preempt_disabled+0x13/0x20 kernel/sched/core.c:3486
__mutex_lock_common kernel/locking/mutex.c:833 [inline]
__mutex_lock+0x73c/0x1470 kernel/locking/mutex.c:893
mutex_lock_nested+0x16/0x20 kernel/locking/mutex.c:908
htable_put+0x21/0x210 net/netfilter/xt_hashlimit.c:440
hashlimit_mt_destroy_v1+0x50/0x70 net/netfilter/xt_hashlimit.c:971
cleanup_match+0xc2/0x140 net/ipv6/netfilter/ip6_tables.c:491
cleanup_entry+0xbf/0x230 net/ipv4/netfilter/ip_tables.c:658
__do_replace+0x3c5/0x5b0 net/ipv4/netfilter/ip_tables.c:1086
do_replace net/ipv4/netfilter/ip_tables.c:1142 [inline]
do_ipt_set_ctl+0x296/0x3ee net/ipv4/netfilter/ip_tables.c:1674
nf_sockopt net/netfilter/nf_sockopt.c:106 [inline]
nf_setsockopt+0x67/0xc0 net/netfilter/nf_sockopt.c:115
ip_setsockopt net/ipv4/ip_sockglue.c:1255 [inline]
ip_setsockopt+0x9b/0xb0 net/ipv4/ip_sockglue.c:1240
tcp_setsockopt net/ipv4/tcp.c:2820 [inline]
tcp_setsockopt+0x84/0xd0 net/ipv4/tcp.c:2814
sock_common_setsockopt+0x94/0xd0 net/core/sock.c:2968
SYSC_setsockopt net/socket.c:1865 [inline]
SyS_setsockopt+0x13c/0x210 net/socket.c:1844
do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292
entry_SYSCALL_64_after_hwframe+0x42/0xb7
RIP: 0033:0x45deca
RSP: 002b:00007ffccf2cd7c8 EFLAGS: 00000202 ORIG_RAX: 0000000000000036
RAX: ffffffffffffffda RBX: 00007ffccf2cd7f0 RCX: 000000000045deca
RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000003
RBP: 000000000071de80 R08: 0000000000000240 R09: 0000000000004000
R10: 000000000071d160 R11: 0000000000000202 R12: 0000000000000003
R13: 0000000000000000 R14: 0000000000000000 R15: 000000000071d100
INFO: task syz-executor.5:7324 blocked for more than 140 seconds.
Not tainted 4.14.169-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
syz-executor.5 D25168 7324 1 0x00000004
Call Trace:
context_switch kernel/sched/core.c:2808 [inline]
__schedule+0x7b8/0x1cd0 kernel/sched/core.c:3384
schedule+0x92/0x1c0 kernel/sched/core.c:3428
schedule_preempt_disabled+0x13/0x20 kernel/sched/core.c:3486
__mutex_lock_common kernel/locking/mutex.c:833 [inline]
__mutex_lock+0x73c/0x1470 kernel/locking/mutex.c:893
mutex_lock_nested+0x16/0x20 kernel/locking/mutex.c:908
xt_find_table_lock+0x3c/0x3d0 net/netfilter/x_tables.c:1092
get_info+0x116/0x560 net/ipv6/netfilter/ip6_tables.c:983
do_ipt_get_ctl+0x148/0x7e0 net/ipv4/netfilter/ip_tables.c:1698
nf_sockopt net/netfilter/nf_sockopt.c:104 [inline]
nf_getsockopt+0x6a/0xc0 net/netfilter/nf_sockopt.c:122
ip_getsockopt net/ipv4/ip_sockglue.c:1566 [inline]
ip_getsockopt+0x10d/0x150 net/ipv4/ip_sockglue.c:1551
tcp_getsockopt net/ipv4/tcp.c:3249 [inline]
tcp_getsockopt+0x84/0xd0 net/ipv4/tcp.c:3243
sock_common_getsockopt+0x94/0xd0 net/core/sock.c:2927
SYSC_getsockopt net/socket.c:1896 [inline]
SyS_getsockopt+0x126/0x1e0 net/socket.c:1878
do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292
entry_SYSCALL_64_after_hwframe+0x42/0xb7
RIP: 0033:0x45deaa
RSP: 002b:00007ffe4a3dd618 EFLAGS: 00000246 ORIG_RAX: 0000000000000037
RAX: ffffffffffffffda RBX: 00007ffe4a3dd640 RCX: 000000000045deaa
RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000003
RBP: 000000000071de80 R08: 00007ffe4a3dd63c R09: 0000000000004000
R10: 00007ffe4a3dd640 R11: 0000000000000246 R12: 0000000000000003
R13: 0000000000000000 R14: 0000000000000000 R15: 000000000071bcc0
INFO: task syz-executor.3:17344 blocked for more than 140 seconds.
Not tainted 4.14.169-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
syz-executor.3 D28968 17344 7325 0x00000004
Call Trace:
context_switch kernel/sched/core.c:2808 [inline]
__schedule+0x7b8/0x1cd0 kernel/sched/core.c:3384
schedule+0x92/0x1c0 kernel/sched/core.c:3428
schedule_preempt_disabled+0x13/0x20 kernel/sched/core.c:3486
__mutex_lock_common kernel/locking/mutex.c:833 [inline]
__mutex_lock+0x73c/0x1470 kernel/locking/mutex.c:893
mutex_lock_nested+0x16/0x20 kernel/locking/mutex.c:908
xt_find_match+0x3e/0x1e0 net/netfilter/x_tables.c:186
xt_request_find_match net/netfilter/x_tables.c:216 [inline]
xt_request_find_match+0x74/0xe0 net/netfilter/x_tables.c:209
find_check_match net/ipv4/netfilter/ip_tables.c:495 [inline]
find_check_entry.isra.0+0x22b/0x920 net/ipv4/netfilter/ip_tables.c:551
translate_table+0xb3f/0x15a0 net/ipv4/netfilter/ip_tables.c:737
do_replace net/ipv4/netfilter/ip_tables.c:1138 [inline]
do_ipt_set_ctl+0x268/0x3ee net/ipv4/netfilter/ip_tables.c:1674
nf_sockopt net/netfilter/nf_sockopt.c:106 [inline]
nf_setsockopt+0x67/0xc0 net/netfilter/nf_sockopt.c:115
ip_setsockopt net/ipv4/ip_sockglue.c:1255 [inline]
ip_setsockopt+0x9b/0xb0 net/ipv4/ip_sockglue.c:1240
udp_setsockopt+0x4e/0x90 net/ipv4/udp.c:2451
ipv6_setsockopt+0x9e/0x130 net/ipv6/ipv6_sockglue.c:920
tcp_setsockopt net/ipv4/tcp.c:2820 [inline]
tcp_setsockopt+0x84/0xd0 net/ipv4/tcp.c:2814
sock_common_setsockopt+0x94/0xd0 net/core/sock.c:2968
SYSC_setsockopt net/socket.c:1865 [inline]
SyS_setsockopt+0x13c/0x210 net/socket.c:1844
do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292
entry_SYSCALL_64_after_hwframe+0x42/0xb7
RIP: 0033:0x45b399
RSP: 002b:00007f22d146cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036
RAX: ffffffffffffffda RBX: 00007f22d146d6d4 RCX: 000000000045b399
RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000003
RBP: 000000000075bf20 R08: 0000000000000001 R09: 0000000000000000
R10: 0000000020000100 R11: 0000000000000246 R12: 00000000ffffffff
R13: 0000000000000a05 R14: 00000000004cb675 R15: 000000000075bf2c
INFO: task syz-executor.3:17361 blocked for more than 140 seconds.
Not tainted 4.14.169-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
syz-executor.3 D28752 17361 7325 0x00000004
Call Trace:
context_switch kernel/sched/core.c:2808 [inline]
__schedule+0x7b8/0x1cd0 kernel/sched/core.c:3384
schedule+0x92/0x1c0 kernel/sched/core.c:3428
schedule_preempt_disabled+0x13/0x20 kernel/sched/core.c:3486
__mutex_lock_common kernel/locking/mutex.c:833 [inline]
__mutex_lock+0x73c/0x1470 kernel/locking/mutex.c:893
mutex_lock_nested+0x16/0x20 kernel/locking/mutex.c:908
xt_find_match+0x3e/0x1e0 net/netfilter/x_tables.c:186
xt_request_find_match net/netfilter/x_tables.c:216 [inline]
xt_request_find_match+0x74/0xe0 net/netfilter/x_tables.c:209
find_check_match net/ipv4/netfilter/ip_tables.c:495 [inline]
find_check_entry.isra.0+0x22b/0x920 net/ipv4/netfilter/ip_tables.c:551
translate_table+0xb3f/0x15a0 net/ipv4/netfilter/ip_tables.c:737
do_replace net/ipv4/netfilter/ip_tables.c:1138 [inline]
do_ipt_set_ctl+0x268/0x3ee net/ipv4/netfilter/ip_tables.c:1674
nf_sockopt net/netfilter/nf_sockopt.c:106 [inline]
nf_setsockopt+0x67/0xc0 net/netfilter/nf_sockopt.c:115
ip_setsockopt net/ipv4/ip_sockglue.c:1255 [inline]
ip_setsockopt+0x9b/0xb0 net/ipv4/ip_sockglue.c:1240
udp_setsockopt+0x4e/0x90 net/ipv4/udp.c:2451
ipv6_setsockopt+0x9e/0x130 net/ipv6/ipv6_sockglue.c:920
tcp_setsockopt net/ipv4/tcp.c:2820 [inline]
tcp_setsockopt+0x84/0xd0 net/ipv4/tcp.c:2814
sock_common_setsockopt+0x94/0xd0 net/core/sock.c:2968
SYSC_setsockopt net/socket.c:1865 [inline]
SyS_setsockopt+0x13c/0x210 net/socket.c:1844
do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292
entry_SYSCALL_64_after_hwframe+0x42/0xb7
RIP: 0033:0x45b399
RSP: 002b:00007f22d142ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036
RAX: ffffffffffffffda RBX: 00007f22d142b6d4 RCX: 000000000045b399
RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000003
RBP: 000000000075c070 R08: 0000000000000001 R09: 0000000000000000
R10: 0000000020000100 R11: 0000000000000246 R12: 00000000ffffffff
R13: 0000000000000a05 R14: 00000000004cb675 R15: 000000000075c07c

Showing all locks held in the system:
1 lock held by khungtaskd/1057:
#0: (tasklist_lock){.+.+}, at: [<ffffffff81488cf8>] debug_show_all_locks+0x7f/0x21f kernel/locking/lockdep.c:4544
2 locks held by getty/7274:
#0: (&tty->ldisc_sem){++++}, at: [<ffffffff86692003>] ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:376
#1: (&ldata->atomic_read_lock){+.+.}, at: [<ffffffff834c3816>] n_tty_read+0x1e6/0x17d0 drivers/tty/n_tty.c:2156
2 locks held by getty/7275:
#0: (&tty->ldisc_sem){++++}, at: [<ffffffff86692003>] ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:376
#1: (&ldata->atomic_read_lock){+.+.}, at: [<ffffffff834c3816>] n_tty_read+0x1e6/0x17d0 drivers/tty/n_tty.c:2156
2 locks held by getty/7276:
#0: (&tty->ldisc_sem){++++}, at: [<ffffffff86692003>] ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:376
#1: (&ldata->atomic_read_lock){+.+.}, at: [<ffffffff834c3816>] n_tty_read+0x1e6/0x17d0 drivers/tty/n_tty.c:2156
2 locks held by getty/7277:
#0: (&tty->ldisc_sem){++++}, at: [<ffffffff86692003>] ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:376
#1: (&ldata->atomic_read_lock){+.+.}, at: [<ffffffff834c3816>] n_tty_read+0x1e6/0x17d0 drivers/tty/n_tty.c:2156
2 locks held by getty/7278:
#0: (&tty->ldisc_sem){++++}, at: [<ffffffff86692003>] ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:376
#1: (&ldata->atomic_read_lock){+.+.}, at: [<ffffffff834c3816>] n_tty_read+0x1e6/0x17d0 drivers/tty/n_tty.c:2156
2 locks held by getty/7279:
#0: (&tty->ldisc_sem){++++}, at: [<ffffffff86692003>] ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:376
#1: (&ldata->atomic_read_lock){+.+.}, at: [<ffffffff834c3816>] n_tty_read+0x1e6/0x17d0 drivers/tty/n_tty.c:2156
2 locks held by getty/7280:
#0: (&tty->ldisc_sem){++++}, at: [<ffffffff86692003>] ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:376
#1: (&ldata->atomic_read_lock){+.+.}, at: [<ffffffff834c3816>] n_tty_read+0x1e6/0x17d0 drivers/tty/n_tty.c:2156
1 lock held by syz-executor.1/7320:
#0: (&xt[i].mutex){+.+.}, at: [<ffffffff854cf6ac>] xt_find_table_lock+0x3c/0x3d0 net/netfilter/x_tables.c:1092
1 lock held by syz-executor.2/7321:
#0: (&xt[i].mutex){+.+.}, at: [<ffffffff854cf6ac>] xt_find_table_lock+0x3c/0x3d0 net/netfilter/x_tables.c:1092
2 locks held by syz-executor.4/7323:
#0: (&xt[i].mutex){+.+.}, at: [<ffffffff854cf6ac>] xt_find_table_lock+0x3c/0x3d0 net/netfilter/x_tables.c:1092
#1: (hashlimit_mutex){+.+.}, at: [<ffffffff854fea61>] htable_put+0x21/0x210 net/netfilter/xt_hashlimit.c:440
1 lock held by syz-executor.5/7324:
#0: (&xt[i].mutex){+.+.}, at: [<ffffffff854cf6ac>] xt_find_table_lock+0x3c/0x3d0 net/netfilter/x_tables.c:1092
1 lock held by syz-executor.3/17344:
#0: (&xt[i].mutex){+.+.}, at: [<ffffffff854ce3fe>] xt_find_match+0x3e/0x1e0 net/netfilter/x_tables.c:186
1 lock held by syz-executor.3/17361:
#0: (&xt[i].mutex){+.+.}, at: [<ffffffff854ce3fe>] xt_find_match+0x3e/0x1e0 net/netfilter/x_tables.c:186

=============================================

NMI backtrace for cpu 1
CPU: 1 PID: 1057 Comm: khungtaskd Not tainted 4.14.169-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:17 [inline]
dump_stack+0x142/0x197 lib/dump_stack.c:58
nmi_cpu_backtrace.cold+0x57/0x94 lib/nmi_backtrace.c:101
nmi_trigger_cpumask_backtrace+0x141/0x189 lib/nmi_backtrace.c:62
arch_trigger_cpumask_backtrace+0x14/0x20 arch/x86/kernel/apic/hw_nmi.c:38
trigger_all_cpu_backtrace include/linux/nmi.h:140 [inline]
check_hung_uninterruptible_tasks kernel/hung_task.c:195 [inline]
watchdog+0x5e7/0xb90 kernel/hung_task.c:274
kthread+0x319/0x430 kernel/kthread.c:232
ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:404
Sending NMI from CPU 1 to CPUs 0:
NMI backtrace for cpu 0
CPU: 0 PID: 7150 Comm: rs:main Q:Reg Not tainted 4.14.169-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
task: ffff8880a95bc300 task.stack: ffff8880a85a8000
RIP: 0010:get_current arch/x86/include/asm/current.h:15 [inline]
RIP: 0010:__sanitizer_cov_trace_pc+0x0/0x60 kernel/kcov.c:60
RSP: 0018:ffff8880a85af0a0 EFLAGS: 00000297
RAX: ffff8880a95bc300 RBX: ffff888080171e70 RCX: ffff8880a95bcb80
RDX: 0000000000000000 RSI: ffffffff87f84e60 RDI: ffff888080171e70
RBP: ffff8880a85af0c8 R08: ffff888080171e70 R09: 0000000000000004
R10: 0000000000000000 R11: ffff8880a95bc300 R12: 0000000000000000
R13: 0000000000000000 R14: 0000000000000000 R15: ffff8880801758f0
FS: 00007fc5e0d5d700(0000) GS:ffff8880aec00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000d27100 CR3: 000000009e9f4000 CR4: 00000000001406f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
__ext4_handle_dirty_metadata+0x293/0x470 fs/ext4/ext4_jbd2.c:298
ext4_do_update_inode fs/ext4/inode.c:5194 [inline]
ext4_mark_iloc_dirty+0x14fb/0x2900 fs/ext4/inode.c:5734
ext4_mark_inode_dirty+0x1f0/0x860 fs/ext4/inode.c:5928
ext4_dirty_inode+0x73/0xa0 fs/ext4/inode.c:5959
__mark_inode_dirty+0x54c/0x1040 fs/fs-writeback.c:2144
mark_inode_dirty_sync include/linux/fs.h:2024 [inline]
dquot_claim_block include/linux/quotaops.h:362 [inline]
ext4_da_update_reserve_space+0x47d/0x760 fs/ext4/inode.c:386
ext4_ext_map_blocks+0x2e40/0x4fa0 fs/ext4/extents.c:4610
ext4_map_blocks+0x881/0x17c0 fs/ext4/inode.c:644
mpage_map_one_extent fs/ext4/inode.c:2464 [inline]
mpage_map_and_submit_extent fs/ext4/inode.c:2517 [inline]
ext4_writepages+0x1afb/0x2fd0 fs/ext4/inode.c:2898
do_writepages+0xd0/0x250 mm/page-writeback.c:2361
__filemap_fdatawrite_range+0x24e/0x320 mm/filemap.c:346
file_write_and_wait_range+0x8d/0xe0 mm/filemap.c:678
__generic_file_fsync+0x79/0x1a0 fs/libfs.c:981
ext4_sync_file+0x755/0x12d0 fs/ext4/fsync.c:120
vfs_fsync_range+0x10e/0x260 fs/sync.c:196
generic_write_sync include/linux/fs.h:2677 [inline]
ext4_file_write_iter+0x68a/0xe90 fs/ext4/file.c:279
call_write_iter include/linux/fs.h:1777 [inline]
new_sync_write fs/read_write.c:469 [inline]
__vfs_write+0x4a7/0x6b0 fs/read_write.c:482
vfs_write+0x198/0x500 fs/read_write.c:544
SYSC_write fs/read_write.c:590 [inline]
SyS_write+0xfd/0x230 fs/read_write.c:582
do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292
entry_SYSCALL_64_after_hwframe+0x42/0xb7
RIP: 0033:0x7fc5e27bb19d
RSP: 002b:00007fc5e0d5bf90 EFLAGS: 00000293 ORIG_RAX: 0000000000000001
RAX: ffffffffffffffda RBX: 0000000000000400 RCX: 00007fc5e27bb19d
RDX: 0000000000000400 RSI: 0000000000cfc340 RDI: 0000000000000006
RBP: 0000000000cfc340 R08: 656c6c616b7a7973 R09: 6c656e72656b2072
R10: 33373520205b203a R11: 0000000000000293 R12: 0000000000000000
R13: 00007fc5e0d5c410 R14: 0000000000d23820 R15: 0000000000cfc140
Code: 00 00 48 c7 c7 40 93 cd 86 4c 89 35 bb 21 4b 08 41 be f4 ff ff ff e8 f3 32 ee ff 48 c7 05 a5 21 4b 08 00 00 00 00 e9 14 ec ff ff <65> 48 8b 04 25 40 ee 01 00 48 85 c0 74 1a 65 8b 15 1b d9 a4 7e


---
This bug is generated by a bot. It may contain errors.
See https://goo.gl/tpsmEJ for more information about syzbot.
syzbot engineers can be reached at syzk...@googlegroups.com.

syzbot will keep track of this bug report. See:
https://goo.gl/tpsmEJ#status for how to communicate with syzbot.

syzbot

unread,
Jun 6, 2020, 4:06:12 AM6/6/20
to syzkaller...@googlegroups.com
Auto-closing this bug as obsolete.
Crashes did not happen for a while, no reproducer and no activity.
Reply all
Reply to author
Forward
0 new messages