Hello,
syzbot found the following issue on:
HEAD commit: b172b44fcb17 Linux 4.19.206
git tree: linux-4.19.y
console output:
https://syzkaller.appspot.com/x/log.txt?x=131d7a73300000
kernel config:
https://syzkaller.appspot.com/x/.config?x=b9ba3521ce0be3cd
dashboard link:
https://syzkaller.appspot.com/bug?extid=b5a6b390a714cba0eea6
compiler: gcc version 10.2.1 20210110 (Debian 10.2.1-6)
Unfortunately, I don't have any reproducer for this issue yet.
IMPORTANT: if you fix the issue, please add the following tag to the commit:
Reported-by:
syzbot+b5a6b3...@syzkaller.appspotmail.com
Invalid UDP bearer configuration
Enabling of bearer <udp:syz2> rejected, failed to enable media
Invalid UDP bearer configuration
Enabling of bearer <udp:syz2> rejected, failed to enable media
watchdog: BUG: soft lockup - CPU#1 stuck for 21s! [syz-executor.1:1372]
Modules linked in:
irq event stamp: 5947317
hardirqs last enabled at (5947316): [<ffffffff81003ce4>] trace_hardirqs_on_thunk+0x1a/0x1c
hardirqs last disabled at (5947317): [<ffffffff81003d00>] trace_hardirqs_off_thunk+0x1a/0x1c
softirqs last enabled at (5912424): [<ffffffff88400678>] __do_softirq+0x678/0x980 kernel/softirq.c:318
softirqs last disabled at (5912427): [<ffffffff81393705>] invoke_softirq kernel/softirq.c:372 [inline]
softirqs last disabled at (5912427): [<ffffffff81393705>] irq_exit+0x215/0x260 kernel/softirq.c:412
CPU: 1 PID: 1372 Comm: syz-executor.1 Not tainted 4.19.206-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:unwind_next_frame+0x40c/0x1400 arch/x86/kernel/unwind_orc.c:427
Code: f9 48 c1 e9 03 0f b6 14 11 84 d2 0f 85 ad 01 00 00 8b 90 60 02 00 00 4c 89 f9 4c 89 c7 e8 3c f2 ff ff 48 85 c0 49 89 c7 74 6a <4d> 8d 47 04 48 b8 00 00 00 00 00 fc ff df 4c 89 c2 48 c1 ea 03 0f
RSP: 0018:ffff8880ba107768 EFLAGS: 00000282 ORIG_RAX: ffffffffffffff13
RAX: ffffffff8bf5799e RBX: 1ffff11017420ef6 RCX: ffffffff86708680
RDX: 0000000000000000 RSI: ffffffff8bf57968 RDI: ffffffff8b7612d4
RBP: 0000000000000002 R08: 0000000000000000 R09: ffffffff8bf57968
R10: ffff8880ba1078f7 R11: 0000000000074071 R12: ffff8880ba1078e0
R13: ffff8880ba1078cd R14: ffff8880ba107898 R15: ffffffff8bf5799e
FS: 00007f92c19c5700(0000) GS:ffff8880ba100000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000541198 CR3: 0000000057b85000 CR4: 00000000001406e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
<IRQ>
__save_stack_trace+0x9f/0x190 arch/x86/kernel/stacktrace.c:44
save_stack mm/kasan/kasan.c:448 [inline]
set_track mm/kasan/kasan.c:460 [inline]
kasan_kmalloc+0xeb/0x160 mm/kasan/kasan.c:553
kmem_cache_alloc_node+0x146/0x3b0 mm/slab.c:3649
__alloc_skb+0x71/0x560 net/core/skbuff.c:193
alloc_skb include/linux/skbuff.h:995 [inline]
tcp_xmit_probe_skb+0x63/0x390 net/ipv4/tcp_output.c:3670
tcp_write_wakeup+0x1bd/0x610 net/ipv4/tcp_output.c:3736
tcp_send_probe0+0x46/0x400 net/ipv4/tcp_output.c:3751
tcp_probe_timer net/ipv4/tcp_timer.c:385 [inline]
tcp_write_timer_handler+0x8c2/0xa60 net/ipv4/tcp_timer.c:602
tcp_write_timer+0x103/0x1b0 net/ipv4/tcp_timer.c:618
call_timer_fn+0x177/0x700 kernel/time/timer.c:1338
expire_timers+0x243/0x4e0 kernel/time/timer.c:1375
__run_timers kernel/time/timer.c:1696 [inline]
run_timer_softirq+0x21c/0x670 kernel/time/timer.c:1709
__do_softirq+0x265/0x980 kernel/softirq.c:292
invoke_softirq kernel/softirq.c:372 [inline]
irq_exit+0x215/0x260 kernel/softirq.c:412
exiting_irq arch/x86/include/asm/apic.h:536 [inline]
smp_apic_timer_interrupt+0x136/0x550 arch/x86/kernel/apic/apic.c:1098
apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:894
</IRQ>
RIP: 0010:arch_local_irq_restore arch/x86/include/asm/paravirt.h:789 [inline]
RIP: 0010:lock_acquire+0x1ec/0x3c0 kernel/locking/lockdep.c:3911
Code: 08 00 00 00 00 00 00 48 c1 e8 03 80 3c 10 00 0f 85 b7 01 00 00 48 83 3d e9 1f a6 08 00 0f 84 2a 01 00 00 48 8b 7c 24 08 57 9d <0f> 1f 44 00 00 48 83 c4 18 5b 5d 41 5c 41 5d 41 5e 41 5f c3 65 8b
RSP: 0018:ffff888051d7f668 EFLAGS: 00000286 ORIG_RAX: ffffffffffffff13
RAX: 1ffffffff13e3059 RBX: ffff8880b4376500 RCX: f571382d69872f36
RDX: dffffc0000000000 RSI: 00000000580e209d RDI: 0000000000000286
RBP: ffffffff89f85fe0 R08: 000000005eaf3dab R09: 0000000000000001
R10: ffff8880b4376db0 R11: 0000000000000000 R12: 0000000000000000
R13: 0000000000000000 R14: 0000000000000002 R15: 0000000000000000
rcu_lock_acquire include/linux/rcupdate.h:242 [inline]
rcu_read_lock include/linux/rcupdate.h:627 [inline]
lock_page_memcg+0x36/0x220 mm/memcontrol.c:1908
page_remove_file_rmap+0x36/0xa30 mm/rmap.c:1212
page_remove_rmap+0xe5/0x120 mm/rmap.c:1297
zap_pte_range mm/memory.c:1350 [inline]
zap_pmd_range mm/memory.c:1463 [inline]
zap_pud_range mm/memory.c:1492 [inline]
zap_p4d_range mm/memory.c:1513 [inline]
unmap_page_range+0x147d/0x2c50 mm/memory.c:1534
unmap_single_vma+0x198/0x300 mm/memory.c:1579
unmap_vmas+0xa9/0x180 mm/memory.c:1609
exit_mmap+0x2b9/0x530 mm/mmap.c:3093
__mmput kernel/fork.c:1015 [inline]
mmput+0x14e/0x4a0 kernel/fork.c:1036
exit_mm kernel/exit.c:549 [inline]
do_exit+0xaec/0x2be0 kernel/exit.c:857
do_group_exit+0x125/0x310 kernel/exit.c:967
get_signal+0x3f2/0x1f70 kernel/signal.c:2589
do_signal+0x8f/0x1670 arch/x86/kernel/signal.c:799
exit_to_usermode_loop+0x204/0x2a0 arch/x86/entry/common.c:163
prepare_exit_to_usermode arch/x86/entry/common.c:198 [inline]
syscall_return_slowpath arch/x86/entry/common.c:271 [inline]
do_syscall_64+0x538/0x620 arch/x86/entry/common.c:296
entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x4665f9
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f92c19c5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
RAX: ffffffffffffffea RBX: 000000000056bf80 RCX: 00000000004665f9
RDX: 0000000000000048 RSI: 0000000020000200 RDI: 0000000000000005
RBP: 00000000004bfcc4 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf80
R13: 00007fffb1fc91ff R14: 00007f92c19c5300 R15: 0000000000022000
Sending NMI from CPU 1 to CPUs 0:
NMI backtrace for cpu 0
CPU: 0 PID: 9537 Comm: kworker/u4:6 Not tainted 4.19.206-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Workqueue: bat_events batadv_nc_worker
RIP: 0010:rcu_read_unlock include/linux/rcupdate.h:677 [inline]
RIP: 0010:batadv_nc_process_nc_paths.part.0+0x22d/0x3d0 net/batman-adv/network-coding.c:710
Code: c1 e8 03 42 80 3c 20 00 0f 85 67 01 00 00 48 8b 6d 00 31 ff 48 89 ee e8 f1 fd 89 f9 48 85 ed 0f 85 29 ff ff ff e8 53 fc 89 f9 <e8> de 15 78 f9 31 ff 89 c3 89 c6 e8 b3 fd 89 f9 85 db 74 1d e8 3a
RSP: 0018:ffff88804c5efc40 EFLAGS: 00000293
RAX: ffff88804c5e65c0 RBX: ffff8880a9e341d8 RCX: ffffffff87d89583
RDX: 0000000000000000 RSI: ffffffff87d8966d RDI: 0000000000000007
RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000007 R11: 0000000000000000 R12: dffffc0000000000
R13: ffff888050cc97a8 R14: ffff888050cc8d80 R15: 000000000000003b
FS: 0000000000000000(0000) GS:ffff8880ba000000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000000c008ced100 CR3: 00000000a8cea000 CR4: 00000000001406f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
batadv_nc_process_nc_paths net/batman-adv/network-coding.c:690 [inline]
batadv_nc_worker+0x9bb/0xd50 net/batman-adv/network-coding.c:739
process_one_work+0x864/0x1570 kernel/workqueue.c:2153
worker_thread+0x64c/0x1130 kernel/workqueue.c:2296
kthread+0x33f/0x460 kernel/kthread.c:259
ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415
----------------
Code disassembly (best guess):
0: f9 stc
1: 48 c1 e9 03 shr $0x3,%rcx
5: 0f b6 14 11 movzbl (%rcx,%rdx,1),%edx
9: 84 d2 test %dl,%dl
b: 0f 85 ad 01 00 00 jne 0x1be
11: 8b 90 60 02 00 00 mov 0x260(%rax),%edx
17: 4c 89 f9 mov %r15,%rcx
1a: 4c 89 c7 mov %r8,%rdi
1d: e8 3c f2 ff ff callq 0xfffff25e
22: 48 85 c0 test %rax,%rax
25: 49 89 c7 mov %rax,%r15
28: 74 6a je 0x94
* 2a: 4d 8d 47 04 lea 0x4(%r15),%r8 <-- trapping instruction
2e: 48 b8 00 00 00 00 00 movabs $0xdffffc0000000000,%rax
35: fc ff df
38: 4c 89 c2 mov %r8,%rdx
3b: 48 c1 ea 03 shr $0x3,%rdx
3f: 0f .byte 0xf
---
This report is generated by a bot. It may contain errors.
See
https://goo.gl/tpsmEJ for more information about syzbot.
syzbot engineers can be reached at
syzk...@googlegroups.com.
syzbot will keep track of this issue. See:
https://goo.gl/tpsmEJ#status for how to communicate with syzbot.