INFO: task hung in mon_bin_read

4 views
Skip to first unread message

syzbot

unread,
Apr 23, 2019, 5:26:06 AM4/23/19
to syzkaller...@googlegroups.com
Hello,

syzbot found the following crash on:

HEAD commit: c98875d9 Linux 4.19.36
git tree: linux-4.19.y
console output: https://syzkaller.appspot.com/x/log.txt?x=17869a3d200000
kernel config: https://syzkaller.appspot.com/x/.config?x=5e40ac5fbcc6366d
dashboard link: https://syzkaller.appspot.com/bug?extid=52a62a3276141046456f
compiler: gcc (GCC) 9.0.0 20181231 (experimental)

Unfortunately, I don't have any reproducer for this crash yet.

IMPORTANT: if you fix the bug, please add the following tag to the commit:
Reported-by: syzbot+52a62a...@syzkaller.appspotmail.com

INFO: task syz-executor.1:20771 blocked for more than 140 seconds.
Not tainted 4.19.36 #4
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
syz-executor.1 D29256 20771 20770 0x00000000
Call Trace:
context_switch kernel/sched/core.c:2826 [inline]
__schedule+0x813/0x1d00 kernel/sched/core.c:3474
schedule+0x92/0x1c0 kernel/sched/core.c:3518
schedule_preempt_disabled+0x13/0x20 kernel/sched/core.c:3576
__mutex_lock_common kernel/locking/mutex.c:1002 [inline]
__mutex_lock+0x726/0x1300 kernel/locking/mutex.c:1072
mutex_lock_nested+0x16/0x20 kernel/locking/mutex.c:1087
mon_bin_read+0x60/0x640 drivers/usb/mon/mon_bin.c:813
__vfs_read+0x116/0x800 fs/read_write.c:416
vfs_read+0x194/0x3d0 fs/read_write.c:452
ksys_read+0xea/0x1f0 fs/read_write.c:578
__do_sys_read fs/read_write.c:588 [inline]
__se_sys_read fs/read_write.c:586 [inline]
__x64_sys_read+0x73/0xb0 fs/read_write.c:586
do_syscall_64+0x103/0x610 arch/x86/entry/common.c:290
entry_SYSCALL_64_after_hwframe+0x49/0xbe
kobject: 'loop4' (00000000cc085c6e): kobject_uevent_env
RIP: 0033:0x458c29
kobject: 'loop4' (00000000cc085c6e): fill_kobj_path: path
= '/devices/virtual/block/loop4'
Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7
48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff
ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
kobject: 'loop3' (000000005517ffff): kobject_uevent_env
kobject: 'loop3' (000000005517ffff): fill_kobj_path: path
= '/devices/virtual/block/loop3'
RSP: 002b:00007f3458016c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000
kobject: 'loop0' (00000000c325af3d): kobject_uevent_env
RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458c29
kobject: 'loop0' (00000000c325af3d): fill_kobj_path: path
= '/devices/virtual/block/loop0'
RDX: 00000000000000c7 RSI: 0000000020000240 RDI: 0000000000000003
kobject: 'loop2' (0000000099cce54c): kobject_uevent_env
kobject: 'loop2' (0000000099cce54c): fill_kobj_path: path
= '/devices/virtual/block/loop2'
RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000
kobject: 'loop1' (000000008631c814): kobject_uevent_env
R10: 0000000000000000 R11: 0000000000000246 R12: 00007f34580176d4
kobject: 'loop1' (000000008631c814): fill_kobj_path: path
= '/devices/virtual/block/loop1'
R13: 00000000004c4935 R14: 00000000004d9f08 R15: 00000000ffffffff
kobject: 'loop5' (0000000076158b65): kobject_uevent_env

Showing all locks held in the system:
kobject: 'loop5' (0000000076158b65): fill_kobj_path: path
= '/devices/virtual/block/loop5'
1 lock held by khungtaskd/1035:
#0: 00000000a21c0ead (rcu_read_lock){....}, at:
debug_show_all_locks+0x5f/0x27e kernel/locking/lockdep.c:4438
kobject: 'loop2' (0000000099cce54c): kobject_uevent_env
3 locks held by udevd/3598:
kobject: 'loop2' (0000000099cce54c): fill_kobj_path: path
= '/devices/virtual/block/loop2'
1 lock held by rsyslogd/7699:
kobject: 'loop1' (000000008631c814): kobject_uevent_env
2 locks held by getty/7821:
kobject: 'loop1' (000000008631c814): fill_kobj_path: path
= '/devices/virtual/block/loop1'
#0:
kobject: 'loop3' (000000005517ffff): kobject_uevent_env
00000000b877007a (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40
drivers/tty/tty_ldsem.c:363
kobject: 'loop3' (000000005517ffff): fill_kobj_path: path
= '/devices/virtual/block/loop3'
#1: 00000000d5e2fff0 (&ldata->atomic_read_lock){+.+.}, at:
n_tty_read+0x232/0x1b30 drivers/tty/n_tty.c:2154
2 locks held by getty/7822:
#0: 0000000093708e2a (&tty->ldisc_sem){++++}, at:
ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:363
kobject: 'loop5' (0000000076158b65): kobject_uevent_env
#1: 00000000c1c1a84f (&ldata->atomic_read_lock){+.+.}, at:
n_tty_read+0x232/0x1b30 drivers/tty/n_tty.c:2154
2 locks held by getty/7823:
#0: 00000000b9c09ec5 (&tty->ldisc_sem){++++}, at:
ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:363
kobject: 'loop5' (0000000076158b65): fill_kobj_path: path
= '/devices/virtual/block/loop5'
#1: 0000000035cf0550 (&ldata->atomic_read_lock){+.+.}, at:
n_tty_read+0x232/0x1b30 drivers/tty/n_tty.c:2154
2 locks held by getty/7824:
#0: 00000000651ed398 (&tty->ldisc_sem){++++}, at:
ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:363
#1: 00000000d6234b7f (&ldata->atomic_read_lock){+.+.}, at:
n_tty_read+0x232/0x1b30 drivers/tty/n_tty.c:2154
2 locks held by getty/7825:
#0: 00000000858bb29f (&tty->ldisc_sem){++++}, at:
ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:363
#1: 0000000078cd6a04 (&ldata->atomic_read_lock){+.+.}, at:
n_tty_read+0x232/0x1b30 drivers/tty/n_tty.c:2154
2 locks held by getty/7826:
#0: 00000000b4541dce (&tty->ldisc_sem){++++}, at:
ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:363
#1: 00000000a87a1f8a (&ldata->atomic_read_lock){+.+.}, at:
n_tty_read+0x232/0x1b30 drivers/tty/n_tty.c:2154
2 locks held by getty/7827:
#0: 000000003b4b3d09 (&tty->ldisc_sem){++++}, at:
ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:363
#1: 0000000060f2a667 (&ldata->atomic_read_lock){+.+.}, at:
n_tty_read+0x232/0x1b30 drivers/tty/n_tty.c:2154
1 lock held by syz-executor.5/23184:
#0: 000000003e98bda4 (&rp->fetch_lock){+.+.}, at: mon_bin_read+0x60/0x640
drivers/usb/mon/mon_bin.c:813
1 lock held by syz-executor.5/23197:
#0: 00000000a422ab7b (&rp->fetch_lock){+.+.}, at: mon_bin_read+0x60/0x640
drivers/usb/mon/mon_bin.c:813
1 lock held by syz-executor.5/23214:
#0: 00000000368c3a3a (&rp->fetch_lock){+.+.}, at: mon_bin_read+0x60/0x640
drivers/usb/mon/mon_bin.c:813
1 lock held by syz-executor.5/23424:
#0: 000000005e4cbf23 (&rp->fetch_lock){+.+.}, at: mon_bin_read+0x60/0x640
drivers/usb/mon/mon_bin.c:813
1 lock held by syz-executor.5/23536:
#0: 00000000340ca938 (&rp->fetch_lock){+.+.}, at: mon_bin_read+0x60/0x640
drivers/usb/mon/mon_bin.c:813
1 lock held by syz-executor.5/23732:
#0: 00000000e9eb3c00 (&rp->fetch_lock){+.+.}, at: mon_bin_read+0x60/0x640
drivers/usb/mon/mon_bin.c:813
1 lock held by syz-executor.5/23750:
#0: 0000000068a8d559 (&rp->fetch_lock){+.+.}, at: mon_bin_read+0x60/0x640
drivers/usb/mon/mon_bin.c:813
1 lock held by syz-executor.5/23768:
#0: 000000008e05265f (&rp->fetch_lock){+.+.}, at: mon_bin_read+0x60/0x640
drivers/usb/mon/mon_bin.c:813
1 lock held by syz-executor.1/12839:
#0: 000000003faf9ecd (&rp->fetch_lock){+.+.}, at: mon_bin_read+0x60/0x640
drivers/usb/mon/mon_bin.c:813
1 lock held by syz-executor.1/13929:
#0: 00000000d684e7ab (&rp->fetch_lock){+.+.}, at: mon_bin_read+0x60/0x640
drivers/usb/mon/mon_bin.c:813
1 lock held by syz-executor.1/15720:
#0: 00000000a6ad8137 (&rp->fetch_lock){+.+.}, at: mon_bin_read+0x60/0x640
drivers/usb/mon/mon_bin.c:813
1 lock held by syz-executor.1/16092:
#0: 00000000a10c6ff4 (&rp->fetch_lock){+.+.}, at: mon_bin_read+0x60/0x640
drivers/usb/mon/mon_bin.c:813
1 lock held by syz-executor.1/16610:
#0: 0000000092842e73 (&rp->fetch_lock){+.+.}, at: mon_bin_read+0x60/0x640
drivers/usb/mon/mon_bin.c:813
1 lock held by syz-executor.1/18016:
#0: 00000000f96e8950 (&rp->fetch_lock){+.+.}, at: mon_bin_read+0x60/0x640
drivers/usb/mon/mon_bin.c:813
1 lock held by syz-executor.1/18261:
#0: 00000000c7a9ab96 (&rp->fetch_lock){+.+.}, at: mon_bin_read+0x60/0x640
drivers/usb/mon/mon_bin.c:813
1 lock held by syz-executor.1/18492:
#0: 0000000077b74392 (&rp->fetch_lock){+.+.}, at: mon_bin_read+0x60/0x640
drivers/usb/mon/mon_bin.c:813
1 lock held by syz-executor.0/18545:
#0: 0000000077f9ebd3 (&rp->fetch_lock){+.+.}, at: mon_bin_read+0x60/0x640
drivers/usb/mon/mon_bin.c:813
1 lock held by syz-executor.1/18909:
#0: 000000004a79f736 (&rp->fetch_lock){+.+.}, at: mon_bin_read+0x60/0x640
drivers/usb/mon/mon_bin.c:813
1 lock held by syz-executor.1/18920:
#0: 00000000a4453e41 (&rp->fetch_lock){+.+.}, at: mon_bin_read+0x60/0x640
drivers/usb/mon/mon_bin.c:813
1 lock held by syz-executor.1/19581:
#0: 00000000d10e65e9 (&rp->fetch_lock){+.+.}, at: mon_bin_read+0x60/0x640
drivers/usb/mon/mon_bin.c:813
kobject: 'loop4' (00000000cc085c6e): kobject_uevent_env
kobject: 'loop4' (00000000cc085c6e): fill_kobj_path: path
= '/devices/virtual/block/loop4'
1 lock held by syz-executor.1/19896:
kobject: 'loop2' (0000000099cce54c): kobject_uevent_env
kobject: 'loop2' (0000000099cce54c): fill_kobj_path: path
= '/devices/virtual/block/loop2'
#0: 00000000c5fa1cae (&rp->fetch_lock){+.+.}, at: mon_bin_read+0x60/0x640
drivers/usb/mon/mon_bin.c:813
1 lock held by syz-executor.1/19920:
kobject: 'loop3' (000000005517ffff): kobject_uevent_env
kobject: 'loop3' (000000005517ffff): fill_kobj_path: path
= '/devices/virtual/block/loop3'
#0: 000000004f1cda7f (&rp->fetch_lock){+.+.}, at: mon_bin_read+0x60/0x640
drivers/usb/mon/mon_bin.c:813
1 lock held by syz-executor.1/20081:
kobject: 'loop0' (00000000c325af3d): kobject_uevent_env
#0: 00000000281304d7 (&rp->fetch_lock){+.+.}, at: mon_bin_read+0x60/0x640
drivers/usb/mon/mon_bin.c:813
kobject: 'loop0' (00000000c325af3d): fill_kobj_path: path
= '/devices/virtual/block/loop0'
1 lock held by syz-executor.1/20425:
#0: 000000007134a7a0 (&rp->fetch_lock){+.+.}, at: mon_bin_read+0x60/0x640
drivers/usb/mon/mon_bin.c:813
kobject: 'loop1' (000000008631c814): kobject_uevent_env
kobject: 'loop1' (000000008631c814): fill_kobj_path: path
= '/devices/virtual/block/loop1'
1 lock held by syz-executor.1/20770:
#0: 00000000e1c4e534 (&rp->fetch_lock){+.+.}, at: mon_bin_read+0x60/0x640
drivers/usb/mon/mon_bin.c:813
kobject: 'loop5' (0000000076158b65): kobject_uevent_env
1 lock held by syz-executor.1/20771:
#0: 00000000e1c4e534 (&rp->fetch_lock){+.+.}, at: mon_bin_read+0x60/0x640
drivers/usb/mon/mon_bin.c:813
kobject: 'loop5' (0000000076158b65): fill_kobj_path: path
= '/devices/virtual/block/loop5'
1 lock held by syz-executor.1/20984:
kobject: 'loop2' (0000000099cce54c): kobject_uevent_env
#0: 0000000088166c71 (&rp->fetch_lock){+.+.}, at: mon_bin_read+0x60/0x640
drivers/usb/mon/mon_bin.c:813
kobject: 'loop2' (0000000099cce54c): fill_kobj_path: path
= '/devices/virtual/block/loop2'
1 lock held by syz-executor.1/20991:
#0: 000000006d56598a (&rp->fetch_lock){+.+.}, at: mon_bin_read+0x60/0x640
drivers/usb/mon/mon_bin.c:813
kobject: 'loop0' (00000000c325af3d): kobject_uevent_env
1 lock held by syz-executor.1/21231:
#0: 0000000093fa9089 (&rp->fetch_lock){+.+.}, at: mon_bin_read+0x60/0x640
drivers/usb/mon/mon_bin.c:813
kobject: 'loop0' (00000000c325af3d): fill_kobj_path: path
= '/devices/virtual/block/loop0'
1 lock held by syz-executor.1/21309:
#0: 00000000b03b15d7 (&rp->fetch_lock){+.+.}, at: mon_bin_read+0x60/0x640
drivers/usb/mon/mon_bin.c:813
kobject: 'loop1' (000000008631c814): kobject_uevent_env
kobject: 'loop1' (000000008631c814): fill_kobj_path: path
= '/devices/virtual/block/loop1'
1 lock held by syz-executor.1/21734:
kobject: 'loop3' (000000005517ffff): kobject_uevent_env
kobject: 'loop3' (000000005517ffff): fill_kobj_path: path
= '/devices/virtual/block/loop3'
#0: 00000000d67f737a (&rp->fetch_lock){+.+.}, at: mon_bin_read+0x60/0x640
drivers/usb/mon/mon_bin.c:813
2 locks held by syz-executor.4/3516:
#0: 00000000740f1be8 (&tty->ldisc_sem){++++}, at:
ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:363
#1: 00000000fe6c85bf (&tty->atomic_write_lock){+.+.}, at:
tty_write_lock+0x23/0x90 drivers/tty/tty_io.c:886

=============================================

kobject: 'loop5' (0000000076158b65): kobject_uevent_env
NMI backtrace for cpu 0
CPU: 0 PID: 1035 Comm: khungtaskd Not tainted 4.19.36 #4
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS
Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:77 [inline]
dump_stack+0x172/0x1f0 lib/dump_stack.c:113
nmi_cpu_backtrace.cold+0x63/0xa4 lib/nmi_backtrace.c:101
nmi_trigger_cpumask_backtrace+0x1b0/0x1f8 lib/nmi_backtrace.c:62
kobject: 'loop5' (0000000076158b65): fill_kobj_path: path
= '/devices/virtual/block/loop5'
arch_trigger_cpumask_backtrace+0x14/0x20 arch/x86/kernel/apic/hw_nmi.c:38
trigger_all_cpu_backtrace include/linux/nmi.h:146 [inline]
check_hung_uninterruptible_tasks kernel/hung_task.c:203 [inline]
watchdog+0x9df/0xee0 kernel/hung_task.c:287
kthread+0x357/0x430 kernel/kthread.c:246
ret_from_fork+0x3a/0x50 arch/x86/entry/entry_64.S:413
Sending NMI from CPU 0 to CPUs 1:
INFO: NMI handler (nmi_cpu_backtrace_handler) took too long to run: 1.077
msecs
NMI backtrace for cpu 1
CPU: 1 PID: 3598 Comm: udevd Not tainted 4.19.36 #4
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS
Google 01/01/2011
RIP: 0010:__lock_is_held+0xa0/0x140 kernel/locking/lockdep.c:3721
Code: c0 7f 23 e9 88 00 00 00 41 0f b6 45 00 41 83 c6 01 84 c0 74 08 3c 03
0f 8e 92 00 00 00 44 39 b3 78 08 00 00 7e 6a 48 8b 4d d0 <49> 63 c6 4c 89
e6 48 8d 04 80 4c 8d 3c c1 4c 89 ff e8 1a f9 ff ff
RSP: 0018:ffff8880ae907928 EFLAGS: 00000006
RAX: 0000000000000000 RBX: ffff88809657a0c0 RCX: ffff88809657a940
RDX: 0000000000000000 RSI: ffffffff8879d360 RDI: ffff88809657a962
RBP: ffff8880ae907968 R08: ffff88809657a0c0 R09: ffffed1015d24733
R10: ffffed1015d24732 R11: ffff8880ae923993 R12: ffffffff8879d360
R13: ffffed1012caf527 R14: 0000000000000001 R15: ffff88809657a940
FS: 00007f6babe477a0(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000000000070d158 CR3: 0000000096b79000 CR4: 00000000001406e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600
Call Trace:
<IRQ>
lock_is_held_type+0x110/0x210 kernel/locking/lockdep.c:3941
lock_is_held include/linux/lockdep.h:344 [inline]
rcu_read_lock_sched_held+0x110/0x130 kernel/rcu/update.c:118
trace_sched_stat_runtime include/trace/events/sched.h:423 [inline]
update_curr+0x73f/0x8a0 kernel/sched/fair.c:828
enqueue_entity+0x31b/0x1810 kernel/sched/fair.c:3868
enqueue_task_fair+0x156/0x690 kernel/sched/fair.c:5103
enqueue_task kernel/sched/core.c:728 [inline]
activate_task+0x10d/0x2f0 kernel/sched/core.c:747
ttwu_activate kernel/sched/core.c:1639 [inline]
ttwu_do_activate+0xd4/0x1f0 kernel/sched/core.c:1698
ttwu_queue kernel/sched/core.c:1843 [inline]
try_to_wake_up+0x82e/0xf60 kernel/sched/core.c:2052
wake_up_process+0x10/0x20 kernel/sched/core.c:2124
wake_up_worker kernel/workqueue.c:838 [inline]
insert_work+0x2ab/0x3a0 kernel/workqueue.c:1311
__queue_work+0x4c6/0x10e0 kernel/workqueue.c:1461
queue_work_on+0x192/0x200 kernel/workqueue.c:1486
queue_work include/linux/workqueue.h:512 [inline]
schedule_work include/linux/workqueue.h:570 [inline]
__debug_check_no_obj_freed lib/debugobjects.c:811 [inline]
debug_check_no_obj_freed+0x276/0x464 lib/debugobjects.c:817
kmem_cache_free+0x192/0x260 mm/slab.c:3764
proc_i_callback+0x20/0x30 fs/proc/inode.c:81
__rcu_reclaim kernel/rcu/rcu.h:236 [inline]
rcu_do_batch kernel/rcu/tree.c:2584 [inline]
invoke_rcu_callbacks kernel/rcu/tree.c:2897 [inline]
__rcu_process_callbacks kernel/rcu/tree.c:2864 [inline]
rcu_process_callbacks+0xba9/0x1a40 kernel/rcu/tree.c:2881
__do_softirq+0x266/0x92f kernel/softirq.c:292
invoke_softirq kernel/softirq.c:372 [inline]
irq_exit+0x180/0x1d0 kernel/softirq.c:412
exiting_irq arch/x86/include/asm/apic.h:536 [inline]
smp_apic_timer_interrupt+0x14a/0x570 arch/x86/kernel/apic/apic.c:1056
apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:867
</IRQ>
RIP: 0010:arch_local_irq_restore arch/x86/include/asm/paravirt.h:788
[inline]
RIP: 0010:console_trylock_spinning kernel/printk/printk.c:1689 [inline]
RIP: 0010:vprintk_emit+0x5b8/0x690 kernel/printk/printk.c:1926
Code: 48 b8 00 00 00 00 00 fc ff df 41 80 7c 05 00 00 0f 85 a2 00 00 00 48
83 3d 6c 77 1c 07 00 74 29 e8 6d 89 15 00 48 89 df 57 9d <0f> 1f 44 00 00
e9 79 fe ff ff e8 59 89 15 00 0f 0b e8 52 89 15 00
RSP: 0018:ffff888096587890 EFLAGS: 00000293 ORIG_RAX: ffffffffffffff13
RAX: ffff88809657a0c0 RBX: 0000000000000293 RCX: 1ffff11012caf536
RDX: 0000000000000000 RSI: ffffffff8155bba3 RDI: 0000000000000293
RBP: ffff8880965878d8 R08: ffff88809657a0c0 R09: ffff88809657a9b0
R10: 0000000000000000 R11: 0000000000000000 R12: 000000000000005a
R13: 1ffffffff10e4661 R14: 0000000000000200 R15: ffff8880a8204540
vprintk_default+0x28/0x30 kernel/printk/printk.c:1968
vprintk_func+0x7e/0x189 kernel/printk/printk_safe.c:398
printk+0xba/0xed kernel/printk/printk.c:2001
fill_kobj_path lib/kobject.c:151 [inline]
kobject_get_path.cold+0x38/0x47 lib/kobject.c:174
kobject_uevent_env+0x31f/0x1030 lib/kobject_uevent.c:519
kobject_synth_uevent.cold+0xa0/0x10d lib/kobject_uevent.c:208
uevent_store+0x26/0x80 drivers/base/core.c:1072
dev_attr_store+0x5c/0x90 drivers/base/core.c:781
sysfs_kf_write+0x118/0x170 fs/sysfs/file.c:139
kernfs_fop_write+0x2ba/0x480 fs/kernfs/file.c:316
__vfs_write+0x116/0x820 fs/read_write.c:485
vfs_write+0x20c/0x560 fs/read_write.c:549
ksys_write+0xea/0x1f0 fs/read_write.c:598
__do_sys_write fs/read_write.c:610 [inline]
__se_sys_write fs/read_write.c:607 [inline]
__x64_sys_write+0x73/0xb0 fs/read_write.c:607
do_syscall_64+0x103/0x610 arch/x86/entry/common.c:290
entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x7f6bab54f370
Code: 73 01 c3 48 8b 0d c8 4a 2b 00 31 d2 48 29 c2 64 89 11 48 83 c8 ff eb
ea 90 90 83 3d 85 a2 2b 00 00 75 10 b8 01 00 00 00 0f 05 <48> 3d 01 f0 ff
ff 73 31 c3 48 83 ec 08 e8 0e 8a 01 00 48 89 04 24
RSP: 002b:00007fff72428d18 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
RAX: ffffffffffffffda RBX: 000000000239f750 RCX: 00007f6bab54f370
RDX: 0000000000000006 RSI: 000000000041f4f9 RDI: 000000000000000b
RBP: 000000000239f080 R08: 000000000041f4f1 R09: 00007f6bab5a57d0
R10: 7269762f73656369 R11: 0000000000000246 R12: 000000000000000b
R13: 0000000000000000 R14: 000000000239f750 R15: 000000000236b030


---
This bug is generated by a bot. It may contain errors.
See https://goo.gl/tpsmEJ for more information about syzbot.
syzbot engineers can be reached at syzk...@googlegroups.com.

syzbot will keep track of this bug report. See:
https://goo.gl/tpsmEJ#status for how to communicate with syzbot.

syzbot

unread,
Oct 20, 2019, 4:27:05 AM10/20/19
to syzkaller...@googlegroups.com
Auto-closing this bug as obsolete.
Crashes did not happen for a while, no reproducer and no activity.
Reply all
Reply to author
Forward
0 new messages