syzbot


BUG: soft lockup in lock_is_held_type (2)

Status: upstream: reported on 2022/12/31 04:23
Reported-by: syzbot+25739a416a5666d5ac8f@syzkaller.appspotmail.com
First crash: 475d, last: 475d
Similar bugs (4)
Kernel Title Repro Cause bisect Fix bisect Count Last Reported Patched Status
linux-4.19 BUG: soft lockup in lock_is_held_type 3 601d 696d 0/1 auto-obsoleted due to no activity on 2022/12/25 06:00
linux-4.14 BUG: soft lockup in lock_is_held_type 1 753d 753d 0/1 auto-closed as invalid on 2022/07/26 21:52
upstream INFO: rcu detected stall in lock_is_held_type (4) mm 1 403d 403d 0/26 auto-obsoleted due to no activity on 2023/06/11 21:13
upstream INFO: rcu detected stall in lock_is_held_type (3) wireless 1 993d 993d 0/26 auto-closed as invalid on 2021/10/29 13:54

Sample crash report:
bridge19: port 1(vlan9) entered blocking state
bridge19: port 1(vlan9) entered disabled state
watchdog: BUG: soft lockup - CPU#0 stuck for 22s! [syz-executor.4:1542]
Modules linked in:
irq event stamp: 4338305
hardirqs last  enabled at (4338304): [<ffffffff81003ce4>] trace_hardirqs_on_thunk+0x1a/0x1c
hardirqs last disabled at (4338305): [<ffffffff81003d00>] trace_hardirqs_off_thunk+0x1a/0x1c
softirqs last  enabled at (4299630): [<ffffffff88400678>] __do_softirq+0x678/0x980 kernel/softirq.c:318
softirqs last disabled at (4299633): [<ffffffff813927d5>] invoke_softirq kernel/softirq.c:372 [inline]
softirqs last disabled at (4299633): [<ffffffff813927d5>] irq_exit+0x215/0x260 kernel/softirq.c:412
CPU: 0 PID: 1542 Comm: syz-executor.4 Not tainted 4.19.211-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
ieee802154 phy0 wpan0: encryption failed: -22
RIP: 0010:lock_is_held_type+0x25/0x210 kernel/locking/lockdep.c:3939
Code: 00 00 00 00 90 48 b8 00 00 00 00 00 fc ff df 41 54 55 48 89 fd 53 65 48 8b 1c 25 c0 df 01 00 48 8d bb 84 08 00 00 48 83 ec 08 <48> 89 fa 48 c1 ea 03 0f b6 14 02 48 89 f8 83 e0 07 83 c0 03 38 d0
RSP: 0018:ffff8880ba007ce8 EFLAGS: 00000296 ORIG_RAX: ffffffffffffff13
RAX: dffffc0000000000 RBX: ffff88809fd00400 RCX: 0000000000000000
RDX: 1ffffffff148be2c RSI: 00000000ffffffff RDI: ffff88809fd00c84
RBP: ffffffff89f85f20 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000005 R11: 0000000000000000 R12: ffff8880ba007d58
R13: 1ffff11017400fa7 R14: 0000000000000000 R15: 0000000000000000
ieee802154 phy1 wpan1: encryption failed: -22
FS:  00007f86bdf4d700(0000) GS:ffff8880ba000000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f86b5bb5000 CR3: 00000000a11a9000 CR4: 00000000003406f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600
Call Trace:
device vlan9 entered promiscuous mode
 <IRQ>
 lock_is_held include/linux/lockdep.h:344 [inline]
 rcu_read_lock_sched_held+0x16c/0x1d0 kernel/rcu/update.c:118
 trace_timer_expire_exit include/trace/events/timer.h:121 [inline]
 call_timer_fn+0x617/0x700 kernel/time/timer.c:1339
 expire_timers+0x243/0x4e0 kernel/time/timer.c:1375
 __run_timers kernel/time/timer.c:1696 [inline]
 run_timer_softirq+0x21c/0x670 kernel/time/timer.c:1709
 __do_softirq+0x265/0x980 kernel/softirq.c:292
 invoke_softirq kernel/softirq.c:372 [inline]
 irq_exit+0x215/0x260 kernel/softirq.c:412
 exiting_irq arch/x86/include/asm/apic.h:536 [inline]
 smp_apic_timer_interrupt+0x136/0x550 arch/x86/kernel/apic/apic.c:1098
 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:894
 </IRQ>
RIP: 0010:arch_local_irq_restore arch/x86/include/asm/paravirt.h:789 [inline]
RIP: 0010:lock_acquire+0x1ec/0x3c0 kernel/locking/lockdep.c:3911
Code: 08 00 00 00 00 00 00 48 c1 e8 03 80 3c 10 00 0f 85 b7 01 00 00 48 83 3d 09 2e a6 08 00 0f 84 2a 01 00 00 48 8b 7c 24 08 57 9d <0f> 1f 44 00 00 48 83 c4 18 5b 5d 41 5c 41 5d 41 5e 41 5f c3 65 8b
RSP: 0018:ffff88802206f670 EFLAGS: 00000286 ORIG_RAX: ffffffffffffff13
RAX: 1ffffffff13e3051 RBX: ffff88809fd00400 RCX: 101c7ce80a9a1d98
RDX: dffffc0000000000 RSI: 00000000015b370c RDI: 0000000000000286
RBP: ffffffff89f85fa0 R08: 00000000c985a8da R09: 0000000000000001
R10: ffff88809fd00cb0 R11: 0000000000000000 R12: 0000000000000000
R13: 0000000000000000 R14: 0000000000000002 R15: 0000000000000000
 rcu_lock_acquire include/linux/rcupdate.h:242 [inline]
 rcu_read_lock include/linux/rcupdate.h:627 [inline]
 lock_page_memcg+0x36/0x220 mm/memcontrol.c:1908
 page_remove_file_rmap+0x36/0xa30 mm/rmap.c:1212
 page_remove_rmap+0xe5/0x120 mm/rmap.c:1297
 zap_pte_range mm/memory.c:1350 [inline]
 zap_pmd_range mm/memory.c:1463 [inline]
 zap_pud_range mm/memory.c:1492 [inline]
 zap_p4d_range mm/memory.c:1513 [inline]
 unmap_page_range+0x147d/0x2c50 mm/memory.c:1534
 unmap_single_vma+0x198/0x300 mm/memory.c:1579
 unmap_vmas+0xa9/0x180 mm/memory.c:1609
 exit_mmap+0x2b9/0x530 mm/mmap.c:3093
 __mmput kernel/fork.c:1016 [inline]
 mmput+0x14e/0x4a0 kernel/fork.c:1037
 exit_mm kernel/exit.c:549 [inline]
 do_exit+0xaec/0x2be0 kernel/exit.c:857
 do_group_exit+0x125/0x310 kernel/exit.c:967
 get_signal+0x3f2/0x1f70 kernel/signal.c:2589
 do_signal+0x8f/0x1670 arch/x86/kernel/signal.c:799
 exit_to_usermode_loop+0x204/0x2a0 arch/x86/entry/common.c:163
 prepare_exit_to_usermode+0x277/0x2d0 arch/x86/entry/common.c:198
 retint_user+0x8/0x18
RIP: 0033:0x7f86bf9781a9
Code: Bad RIP value.
RSP: 002b:00007f86bdf4c600 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13
RAX: 000000000008850f RBX: 00007f86bdf4c660 RCX: 0000000000000001
RDX: 000000000000007b RSI: 00007f86b5b2d000 RDI: 00007f86bdf4c700
RBP: 0000000000000102 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 00007f86bdf4c670 R12: 00007f86bdf4c670
R13: 00007f86bdf4c700 R14: 0000000000000001 R15: 0000000000000000
Sending NMI from CPU 0 to CPUs 1:
NMI backtrace for cpu 1
CPU: 1 PID: 9710 Comm: syz-fuzzer Not tainted 4.19.211-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
RIP: 0033:0x413c40
Code: 48 8b 14 d6 48 85 d2 74 1a 48 89 c6 48 c1 e8 0d 48 25 ff 1f 00 00 48 8b 94 c2 00 00 20 00 48 89 f0 eb 02 31 d2 48 89 54 24 20 <48> 85 d2 0f 84 8e 00 00 00 40 8a 72 63 40 80 fe 01 75 13 4c 8b 42
RSP: 002b:000000c00347fe48 EFLAGS: 00000202
RAX: 000000c00987ba40 RBX: 000000c00987ba70 RCX: 0000000000000020
RDX: 00007f9aa52711b8 RSI: 000000c00987ba40 RDI: 0000000000c0d738
RBP: 000000c00347fe70 R08: 0000000000000002 R09: 00007f9aa50eadd4
R10: ffffffffffffffd0 R11: 00007f9aa5226fff R12: 000000c00987ba70
R13: 000000c00987ba40 R14: 000000c00aaa4000 R15: 0000000001151fc0
FS:  000000c031d7f890 GS:  0000000000000000

Crashes (1):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2022/12/31 04:23 linux-4.19.y 3f8a27f9e27b ab32d508 .config console log report info [disk image] [vmlinux] ci2-linux-4-19 BUG: soft lockup in lock_is_held_type
* Struck through repros no longer work on HEAD.