syzbot


BUG: sleeping function called from invalid context in __put_anon_vma

Status: upstream: reported C repro on 2024/02/16 03:12
Bug presence: origin:lts-only
[Documentation on labels]
Reported-by: syzbot+22045f0da050e2d0a4c1@syzkaller.appspotmail.com
First crash: 279d, last: 279d
Bug presence (2)
Date Name Commit Repro Result
2024/02/16 linux-6.1.y (ToT) f1bb70486c9c C [report] INFO: rcu detected stall in corrupted
2024/02/16 upstream (ToT) 4f5e5092fdbf C Didn't crash
Similar bugs (1)
Kernel Title Repro Cause bisect Fix bisect Count Last Reported Patched Status
linux-5.15 BUG: sleeping function called from invalid context in __put_anon_vma C unreliable 2 276d 283d 0/3 auto-obsoleted due to no activity on 2024/10/29 01:55
Fix bisection attempts (1)
Created Duration User Patch Repo Result
2024/02/17 15:38 7h04m fix candidate upstream OK (1) job log

Sample crash report:
BUG: sleeping function called from invalid context at mm/rmap.c:130
in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 5591, name: syz-executor130
preempt_count: 1, expected: 0
RCU nest depth: 0, expected: 0
1 lock held by syz-executor130/5591:
 #0: ffff888078576a58 (&mm->mmap_lock){++++}-{3:3}, at: mmap_write_lock include/linux/mmap_lock.h:71 [inline]
 #0: ffff888078576a58 (&mm->mmap_lock){++++}-{3:3}, at: exit_mmap+0x29a/0x9f0 mm/mmap.c:3235
Preemption disabled at:
[<ffffffff817677fa>] is_module_text_address+0x1a/0x160 kernel/module/main.c:3097
CPU: 0 PID: 5591 Comm: syz-executor130 Not tainted 6.1.77-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024
Call Trace:
 <TASK>
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0x1e3/0x2cb lib/dump_stack.c:106
 __might_resched+0x5cb/0x780 kernel/sched/core.c:9942
 anon_vma_free mm/rmap.c:130 [inline]
 __put_anon_vma+0x80/0x2d0 mm/rmap.c:2375
 put_anon_vma include/linux/rmap.h:116 [inline]
 unlink_anon_vmas+0x48c/0x5e0 mm/rmap.c:443
 free_pgtables+0x344/0x4f0 mm/memory.c:430
 exit_mmap+0x3bb/0x9f0 mm/mmap.c:3237
 __mmput+0x115/0x3c0 kernel/fork.c:1199
 exit_mm+0x226/0x300 kernel/exit.c:563
 do_exit+0x9f6/0x26a0 kernel/exit.c:856
 do_group_exit+0x202/0x2b0 kernel/exit.c:1019
 __do_sys_exit_group kernel/exit.c:1030 [inline]
 __se_sys_exit_group kernel/exit.c:1028 [inline]
 __x64_sys_exit_group+0x3b/0x40 kernel/exit.c:1028
 do_syscall_x64 arch/x86/entry/common.c:51 [inline]
 do_syscall_64+0x3d/0xb0 arch/x86/entry/common.c:81
 entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x7f7217d2b039
Code: Unable to access opcode bytes at 0x7f7217d2b00f.
RSP: 002b:00007ffedddf17d8 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f7217d2b039
RDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000000
RBP: 00007f7217da72b0 R08: ffffffffffffffb8 R09: 00000000000000a0
R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7217da72b0
R13: 0000000000000000 R14: 00007f7217da7d20 R15: 00007f7217cfc1d0
 </TASK>
BUG: scheduling while atomic: syz-executor130/5591/0x00000002
no locks held by syz-executor130/5591.
Modules linked in:
Preemption disabled at:
[<ffffffff817677fa>] is_module_text_address+0x1a/0x160 kernel/module/main.c:3097

Crashes (1):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2024/02/16 03:11 linux-6.1.y f1bb70486c9c fd39cf6f .config console log report syz C [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan-perf BUG: sleeping function called from invalid context in __put_anon_vma
* Struck through repros no longer work on HEAD.