Hello,
syzbot found the following crash on:
HEAD commit: d183c8e2 Linux 4.19.98
git tree: linux-4.19.y
console output:
https://syzkaller.appspot.com/x/log.txt?x=17aaf721e00000
kernel config:
https://syzkaller.appspot.com/x/.config?x=270360e13b071d92
dashboard link:
https://syzkaller.appspot.com/bug?extid=682c26abf634d26f2467
compiler: gcc (GCC) 9.0.0 20181231 (experimental)
Unfortunately, I don't have any reproducer for this crash yet.
IMPORTANT: if you fix the bug, please add the following tag to the commit:
Reported-by:
syzbot+682c26...@syzkaller.appspotmail.com
netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'.
rcu: INFO: rcu_preempt self-detected stall on CPU
rcu: 1-...!: (10507 ticks this GP) idle=fb6/1/0x4000000000000004 softirq=150277/150278 fqs=0
rcu: (t=10501 jiffies g=214349 q=39)
rcu: rcu_preempt kthread starved for 10502 jiffies! g214349 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=0
rcu: RCU grace-period kthread stack dump:
rcu_preempt I29424 10 2 0x80000000
Call Trace:
context_switch kernel/sched/core.c:2826 [inline]
__schedule+0x866/0x1dc0 kernel/sched/core.c:3515
schedule+0x92/0x1c0 kernel/sched/core.c:3559
schedule_timeout+0x4db/0xfc0 kernel/time/timer.c:1806
rcu_gp_kthread+0xd5c/0x2190 kernel/rcu/tree.c:2202
kthread+0x354/0x420 kernel/kthread.c:246
ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415
NMI backtrace for cpu 1
CPU: 1 PID: 11855 Comm: syz-executor.5 Not tainted 4.19.98-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
<IRQ>
__dump_stack lib/dump_stack.c:77 [inline]
dump_stack+0x197/0x210 lib/dump_stack.c:118
nmi_cpu_backtrace.cold+0x63/0xa4 lib/nmi_backtrace.c:101
nmi_trigger_cpumask_backtrace+0x1b0/0x1f8 lib/nmi_backtrace.c:62
arch_trigger_cpumask_backtrace+0x14/0x20 arch/x86/kernel/apic/hw_nmi.c:38
trigger_single_cpu_backtrace include/linux/nmi.h:164 [inline]
rcu_dump_cpu_stacks+0x189/0x1d5 kernel/rcu/tree.c:1340
print_cpu_stall kernel/rcu/tree.c:1478 [inline]
check_cpu_stall kernel/rcu/tree.c:1550 [inline]
__rcu_pending kernel/rcu/tree.c:3293 [inline]
rcu_pending kernel/rcu/tree.c:3336 [inline]
rcu_check_callbacks.cold+0x5e3/0xd90 kernel/rcu/tree.c:2682
update_process_times+0x32/0x80 kernel/time/timer.c:1638
tick_sched_handle+0xa2/0x190 kernel/time/tick-sched.c:168
tick_sched_timer+0x47/0x130 kernel/time/tick-sched.c:1278
__run_hrtimer kernel/time/hrtimer.c:1401 [inline]
__hrtimer_run_queues+0x33b/0xdc0 kernel/time/hrtimer.c:1463
hrtimer_interrupt+0x314/0x770 kernel/time/hrtimer.c:1521
local_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1067 [inline]
smp_apic_timer_interrupt+0x111/0x550 arch/x86/kernel/apic/apic.c:1092
apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:893
RIP: 0010:mrp_periodic_timer_arm+0x0/0x70 net/802/mrp.c:603
Code: 48 01 c6 e8 12 b9 81 fb 48 83 c4 08 5b 41 5c 5d c3 48 c7 c7 00 90 e0 88 48 89 45 e8 e8 09 bd c8 fb 48 8b 45 e8 eb ce 0f 1f 00 <55> 48 89 e5 53 48 89 fb 48 83 ec 08 e8 cf 22 91 fb 8b 3d 9d 8d f4
RSP: 0018:ffff8880ae907cf0 EFLAGS: 00000206 ORIG_RAX: ffffffffffffff13
RAX: 0000000000000100 RBX: ffff8880a815ca58 RCX: 0000000000000000
RDX: 0000000000000004 RSI: 0000000000000004 RDI: ffff8880a815ca00
RBP: ffff8880ae907d08 R08: 1ffff1101502b954 R09: ffffed101502b955
R10: ffffed101502b954 R11: ffff8880a815caa3 R12: ffff8880a815caa0
R13: ffff8880a815ca00 R14: 1ffff11015d20fa6 R15: 0000000000000000
call_timer_fn+0x18d/0x720 kernel/time/timer.c:1326
expire_timers kernel/time/timer.c:1363 [inline]
__run_timers kernel/time/timer.c:1684 [inline]
__run_timers kernel/time/timer.c:1652 [inline]
run_timer_softirq+0x64f/0x16a0 kernel/time/timer.c:1697
__do_softirq+0x25c/0x921 kernel/softirq.c:292
invoke_softirq kernel/softirq.c:372 [inline]
irq_exit+0x180/0x1d0 kernel/softirq.c:412
exiting_irq arch/x86/include/asm/apic.h:536 [inline]
smp_apic_timer_interrupt+0x13b/0x550 arch/x86/kernel/apic/apic.c:1094
apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:893
</IRQ>
RIP: 0010:arch_local_irq_restore arch/x86/include/asm/paravirt.h:789 [inline]
RIP: 0010:qlink_free mm/kasan/quarantine.c:150 [inline]
RIP: 0010:qlist_free_all+0x10c/0x150 mm/kasan/quarantine.c:166
Code: 50 08 48 8d 4a ff 83 e2 01 48 0f 45 c1 4c 8b 78 18 e9 37 ff ff ff e8 63 8d cd ff 48 83 3d 43 98 4f 07 00 74 39 48 89 df 57 9d <0f> 1f 44 00 00 4d 85 ed 75 96 49 c7 46 08 00 00 00 00 49 c7 06 00
RSP: 0018:ffff888027b1f5b0 EFLAGS: 00000286 ORIG_RAX: ffffffffffffff13
RAX: 0000000000000007 RBX: 0000000000000286 RCX: 1ffff11008b4dd40
RDX: 0000000000000000 RSI: ffff888045a6ea08 RDI: 0000000000000286
RBP: ffff888027b1f5e0 R08: ffff888045a6e0c0 R09: ffff888045a6ea00
R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
R13: ffff88802910e700 R14: ffff888027b1f5f0 R15: ffff8880aa44b380
quarantine_reduce+0x169/0x1a0 mm/kasan/quarantine.c:259
kasan_kmalloc+0xa0/0xf0 mm/kasan/kasan.c:538
kasan_slab_alloc+0xf/0x20 mm/kasan/kasan.c:490
slab_post_alloc_hook mm/slab.h:445 [inline]
slab_alloc mm/slab.c:3397 [inline]
__do_kmalloc mm/slab.c:3725 [inline]
__kmalloc+0x146/0x750 mm/slab.c:3736
kmalloc_array include/linux/slab.h:637 [inline]
kcalloc include/linux/slab.h:648 [inline]
ext4_find_extent+0x76e/0x9d0 fs/ext4/extents.c:892
? 0xffffffff81000000
get_ext_path fs/ext4/move_extent.c:31 [inline]
mext_check_coverage.constprop.0+0x247/0x430 fs/ext4/move_extent.c:98
move_extent_per_page fs/ext4/move_extent.c:323 [inline]
ext4_move_extents+0x182a/0x3ea0 fs/ext4/move_extent.c:674
ext4_ioctl+0x2f26/0x3ef0 fs/ext4/ioctl.c:924
vfs_ioctl fs/ioctl.c:46 [inline]
file_ioctl fs/ioctl.c:501 [inline]
do_vfs_ioctl+0xd5f/0x1380 fs/ioctl.c:688
ksys_ioctl+0xab/0xd0 fs/ioctl.c:705
__do_sys_ioctl fs/ioctl.c:712 [inline]
__se_sys_ioctl fs/ioctl.c:710 [inline]
__x64_sys_ioctl+0x73/0xb0 fs/ioctl.c:710
do_syscall_64+0xfd/0x620 arch/x86/entry/common.c:293
entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x45b349
Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
RSP: 002b:00007ff68c608c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: ffffffffffffffda RBX: 00007ff68c6096d4 RCX: 000000000045b349
RDX: 0000000020000040 RSI: 00000000c028660f RDI: 0000000000000004
RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff
R13: 00000000000002c1 R14: 00000000004c3ccf R15: 000000000075bf2c
device vlan1042 entered promiscuous mode
---
This bug is generated by a bot. It may contain errors.
See
https://goo.gl/tpsmEJ for more information about syzbot.
syzbot engineers can be reached at
syzk...@googlegroups.com.
syzbot will keep track of this bug report. See:
https://goo.gl/tpsmEJ#status for how to communicate with syzbot.