syzbot


KMSAN: uninit-value in __schedule (5)

Status: upstream: reported on 2024/04/10 09:12
Subsystems: net
[Documentation on labels]
Reported-by: syzbot+28bdcfc1dab2ffa279a5@syzkaller.appspotmail.com
First crash: 183d, last: 8d00h
Discussions (1)
Title Replies (including bot) Last reply
[syzbot] [kernel?] KMSAN: uninit-value in __schedule (5) 0 (1) 2024/04/10 09:12
Similar bugs (7)
Kernel Title Repro Cause bisect Fix bisect Count Last Reported Patched Status
upstream KMSAN: uninit-value in __schedule (4) reiserfs sctp C error 4 400d 396d 0/28 auto-obsoleted due to no activity on 2023/12/10 17:35
upstream KMSAN: uninit-value in __schedule (3) net trace 2 598d 601d 0/28 auto-obsoleted due to no activity on 2023/05/17 02:32
upstream KMSAN: uninit-value in __schedule (2) kernel 1 771d 771d 0/28 auto-obsoleted due to no activity on 2022/11/24 18:35
linux-4.19 KASAN: use-after-free Read in __schedule 1 1314d 1314d 0/1 auto-closed as invalid on 2021/06/29 13:25
linux-4.19 KASAN: use-after-free Read in __schedule (2) 1 991d 991d 0/1 auto-closed as invalid on 2022/05/18 22:28
android-54 BUG: unable to handle kernel paging request in __schedule C 12 1319d 1475d 0/2 auto-obsoleted due to no activity on 2023/04/17 21:57
upstream BUG: unable to handle kernel paging request in __schedule kernel 2 2497d 2492d 3/28 fixed on 2018/01/03 02:35

Sample crash report:
Dead loop on virtual device ipvlan1, fix it urgently!
=====================================================
BUG: KMSAN: uninit-value in schedule_debug kernel/sched/core.c:5874 [inline]
BUG: KMSAN: uninit-value in __schedule+0x709/0x69c0 kernel/sched/core.c:6550
 schedule_debug kernel/sched/core.c:5874 [inline]
 __schedule+0x709/0x69c0 kernel/sched/core.c:6550
 __schedule_loop kernel/sched/core.c:6751 [inline]
 schedule+0x13d/0x380 kernel/sched/core.c:6766
 exit_to_user_mode_loop kernel/entry/common.c:102 [inline]
 exit_to_user_mode_prepare include/linux/entry-common.h:328 [inline]
 __syscall_exit_to_user_mode_work kernel/entry/common.c:207 [inline]
 syscall_exit_to_user_mode+0xaf/0x170 kernel/entry/common.c:218
 do_syscall_64+0xda/0x1e0 arch/x86/entry/common.c:89
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

Local variable acpar created at:
 ip6t_do_table+0x70/0x23b0 net/ipv6/netfilter/ip6_tables.c:261
 ip6table_mangle_hook+0x779/0x9c0 net/ipv6/netfilter/ip6table_mangle.c:73

CPU: 1 UID: 0 PID: 6981 Comm: syz.4.577 Not tainted 6.11.0-syzkaller-09959-gabf2050f51fd #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024
=====================================================
Kernel panic - not syncing: kmsan.panic set ...
CPU: 1 UID: 0 PID: 6981 Comm: syz.4.577 Tainted: G    B              6.11.0-syzkaller-09959-gabf2050f51fd #0
Tainted: [B]=BAD_PAGE
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024
Call Trace:
 <TASK>
 __dump_stack lib/dump_stack.c:94 [inline]
 dump_stack_lvl+0x216/0x2d0 lib/dump_stack.c:120
 dump_stack+0x1e/0x30 lib/dump_stack.c:129
 panic+0x4e2/0xcf0 kernel/panic.c:354
 kmsan_report+0x2c7/0x2d0 mm/kmsan/report.c:218
 __msan_warning+0x95/0x120 mm/kmsan/instrumentation.c:318
 schedule_debug kernel/sched/core.c:5874 [inline]
 __schedule+0x709/0x69c0 kernel/sched/core.c:6550
 __schedule_loop kernel/sched/core.c:6751 [inline]
 schedule+0x13d/0x380 kernel/sched/core.c:6766
 exit_to_user_mode_loop kernel/entry/common.c:102 [inline]
 exit_to_user_mode_prepare include/linux/entry-common.h:328 [inline]
 __syscall_exit_to_user_mode_work kernel/entry/common.c:207 [inline]
 syscall_exit_to_user_mode+0xaf/0x170 kernel/entry/common.c:218
 do_syscall_64+0xda/0x1e0 arch/x86/entry/common.c:89
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7feb8b37c9df
Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 c9 8d 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 1c 8e 02 00 48
RSP: 002b:00007feb8c202000 EFLAGS: 00000293 ORIG_RAX: 0000000000000001
RAX: 000000000000004a RBX: 00007feb8b535f80 RCX: 00007feb8b37c9df
RDX: 000000000000004a RSI: 0000000020000200 RDI: 00000000000000c8
RBP: 00007feb8b3f0b76 R08: 0000000000000000 R09: 0000000000000000
R10: 000000000000004a R11: 0000000000000293 R12: 0000000000000000
R13: 0000000000000000 R14: 00007feb8b535f80 R15: 00007ffe0e84c7d8
 </TASK>
Kernel Offset: disabled
Rebooting in 86400 seconds..

Crashes (102):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2024/09/24 14:33 upstream abf2050f51fd 5643e0e9 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kmsan-gce-root KMSAN: uninit-value in __schedule
2024/09/11 09:43 upstream 8d8d276ba2fb 9326a104 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kmsan-gce-root KMSAN: uninit-value in __schedule
2024/04/06 09:02 upstream e8b0ccb2a787 ca620dd8 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kmsan-gce-root KMSAN: uninit-value in __schedule
2024/09/28 10:16 upstream ad46e8f95e93 440b26ec .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root KASAN: wild-memory-access Read in __schedule
2024/09/28 08:18 upstream ad46e8f95e93 440b26ec .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root BUG: unable to handle kernel paging request in __schedule
2024/09/28 08:06 upstream ad46e8f95e93 440b26ec .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root KASAN: wild-memory-access Read in __schedule
2024/09/25 00:18 upstream 97d8894b6f4c 5643e0e9 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root BUG: unable to handle kernel paging request in __schedule
2024/09/23 16:01 upstream de5cb0dcb74c 89298aad .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root KASAN: wild-memory-access Read in __schedule
2024/09/23 08:59 upstream af9c191ac2a0 6f888b75 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root KASAN: wild-memory-access Read in __schedule
2024/09/22 23:35 upstream af9c191ac2a0 6f888b75 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root KASAN: wild-memory-access Read in __schedule
2024/09/21 13:30 upstream 1868f9d0260e 6f888b75 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root BUG: unable to handle kernel paging request in __schedule
2024/09/21 01:52 upstream baeb9a7d8b60 6f888b75 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root BUG: unable to handle kernel paging request in __schedule
2024/09/20 21:34 upstream baeb9a7d8b60 6f888b75 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root BUG: unable to handle kernel paging request in __schedule
2024/09/20 12:47 upstream 2004cef11ea0 6f888b75 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root BUG: unable to handle kernel paging request in __schedule
2024/09/20 09:47 upstream 2004cef11ea0 6f888b75 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root KASAN: wild-memory-access Read in __schedule
2024/09/20 08:03 upstream 2004cef11ea0 6f888b75 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root BUG: unable to handle kernel paging request in __schedule
2024/09/19 17:00 upstream 2a17bb8c204f 6f888b75 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root KASAN: wild-memory-access Read in __schedule
2024/09/18 04:35 upstream fc1dc0d50780 c673ca06 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root BUG: unable to handle kernel paging request in __schedule
2024/09/17 18:39 upstream fc1dc0d50780 c673ca06 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root KASAN: wild-memory-access Read in __schedule
2024/09/16 21:35 upstream adfc3ded5c33 49cf0773 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root BUG: unable to handle kernel paging request in __schedule
2024/09/16 08:43 upstream 98f7e32f20d2 08d8a733 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root KASAN: wild-memory-access Read in __schedule
2024/09/15 10:09 upstream 0babf683783d 08d8a733 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root KASAN: wild-memory-access Read in __schedule
2024/09/15 00:05 upstream 0babf683783d ff60e2ca .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root KASAN: wild-memory-access Read in __schedule
2024/09/14 13:11 upstream b7718454f937 ff60e2ca .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root KASAN: wild-memory-access Read in __schedule
2024/09/14 00:14 upstream e936e7d4a83b 158f4851 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root KASAN: wild-memory-access Read in __schedule
2024/09/12 17:43 upstream 77f587896757 60e1a995 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root KASAN: wild-memory-access Read in __schedule
2024/09/12 02:33 upstream 7c6a3a65ace7 d94c83d8 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root KASAN: wild-memory-access Read in __schedule
2024/09/10 15:56 upstream bc83b4d1f086 784df80e .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root KASAN: wild-memory-access Read in __schedule
2024/09/10 04:33 upstream bc83b4d1f086 dd9c7e97 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root KASAN: wild-memory-access Read in __schedule
2024/09/09 14:52 upstream da3ea35007d0 9750182a .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root KASAN: wild-memory-access Read in __schedule
2024/09/09 00:41 upstream 5dadc1be8fc5 9750182a .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root KASAN: wild-memory-access Read in __schedule
2024/09/07 12:38 upstream b31c44928842 9750182a .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root KASAN: wild-memory-access Read in __schedule
2024/09/07 10:05 upstream b31c44928842 9750182a .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root KASAN: wild-memory-access Read in __schedule
2024/09/04 04:01 upstream 88fac17500f4 9d47f20a .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root KASAN: wild-memory-access Read in __schedule
2024/09/03 12:14 upstream 67784a74e258 512328ba .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root KASAN: wild-memory-access Read in __schedule
2024/09/03 04:49 upstream 67784a74e258 abeaa9b9 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root KASAN: wild-memory-access Read in __schedule
2024/09/03 01:24 upstream 67784a74e258 abeaa9b9 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root KASAN: wild-memory-access Read in __schedule
2024/09/02 21:19 upstream 67784a74e258 abeaa9b9 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root KASAN: wild-memory-access Read in __schedule
2024/09/02 07:34 upstream c9f016e72b5c 1eda0d14 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root KASAN: wild-memory-access Read in __schedule
2024/09/01 21:03 upstream 431c1646e1f8 1eda0d14 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root KASAN: wild-memory-access Read in __schedule
2024/09/01 06:51 upstream e8784b0aef62 1eda0d14 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root KASAN: wild-memory-access Read in __schedule
2024/08/31 21:17 upstream 1934261d8974 1eda0d14 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root KASAN: wild-memory-access Read in __schedule
2024/08/31 14:29 upstream 1934261d8974 1eda0d14 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root KASAN: wild-memory-access Read in __schedule
2024/08/27 14:08 upstream 3e9bff3bbe13 9aee4e0b .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root KASAN: wild-memory-access Read in __schedule
2024/08/26 21:47 upstream 5be63fc19fca 9aee4e0b .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root BUG: unable to handle kernel paging request in __schedule
2024/08/26 18:01 upstream 5be63fc19fca 9aee4e0b .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root BUG: unable to handle kernel paging request in __schedule
2024/08/25 01:35 upstream d2bafcf224f3 d7d32352 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root BUG: unable to handle kernel paging request in __schedule
2024/06/01 01:26 upstream d8ec19857b09 3113787f .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root BUG: unable to handle kernel paging request in __schedule
2024/05/14 05:56 upstream cd97950cbcab fdb4c10c .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root KASAN: wild-memory-access Read in __schedule
2024/05/14 02:53 upstream cd97950cbcab fdb4c10c .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root KASAN: wild-memory-access Read in __schedule
2024/08/28 04:39 linux-next 6f923748057a 6c853ff9 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root KASAN: slab-use-after-free Read in __schedule
2024/08/23 12:13 linux-next c79c85875f1a ce8a9099 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root KASAN: slab-use-after-free Read in __schedule
* Struck through repros no longer work on HEAD.