syzbot


BUG: soft lockup in mod_timer

Status: auto-closed as invalid on 2021/03/28 13:44
Reported-by: syzbot+f9953c84ac970d182626@syzkaller.appspotmail.com
First crash: 1238d, last: 1238d
Similar bugs (2)
Kernel Title Repro Cause bisect Fix bisect Count Last Reported Patched Status
linux-4.19 BUG: soft lockup in mod_timer 1 1253d 1253d 0/1 auto-closed as invalid on 2021/03/13 00:51
linux-4.19 BUG: soft lockup in mod_timer (2) syz error 33 522d 1086d 0/1 upstream: reported syz repro on 2021/04/28 22:26

Sample crash report:
netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'.
netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'.
netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'.
watchdog: BUG: soft lockup - CPU#0 stuck for 134s! [syz-executor.4:11433]
Modules linked in:
irq event stamp: 46886437
hardirqs last  enabled at (46886436): [<ffffffff87400976>] restore_regs_and_return_to_kernel+0x0/0x2a
hardirqs last disabled at (46886437): [<ffffffff874018ae>] apic_timer_interrupt+0x8e/0xa0 arch/x86/entry/entry_64.S:793
softirqs last  enabled at (46674678): [<ffffffff876006ab>] __do_softirq+0x6ab/0xa1d kernel/softirq.c:314
softirqs last disabled at (46674681): [<ffffffff813303c3>] invoke_softirq kernel/softirq.c:368 [inline]
softirqs last disabled at (46674681): [<ffffffff813303c3>] irq_exit+0x193/0x240 kernel/softirq.c:409
CPU: 0 PID: 11433 Comm: syz-executor.4 Not tainted 4.14.209-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
task: ffff8881f85d05c0 task.stack: ffff8881f85d8000
RIP: 0010:arch_local_irq_restore arch/x86/include/asm/paravirt.h:779 [inline]
RIP: 0010:__raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline]
RIP: 0010:_raw_spin_unlock_irqrestore+0xa3/0xe0 kernel/locking/spinlock.c:192
RSP: 0018:ffff8880ba407c78 EFLAGS: 00000286 ORIG_RAX: ffffffffffffff10
RAX: 1ffffffff11e1251 RBX: 0000000000000286 RCX: 1ffff1103f0ba1d2
RDX: dffffc0000000000 RSI: ffff8881f85d0e70 RDI: 0000000000000286
RBP: ffff8880ba422ac0 R08: ffffffff8c029448 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
R13: 1ffff11017480f9a R14: 0000000000000000 R15: ffff8880ba422ac0
FS:  00007fb576e9d700(0000) GS:ffff8880ba400000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000055c048d57d10 CR3: 0000000008e6a000 CR4: 00000000001426f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 <IRQ>
 __mod_timer kernel/time/timer.c:1027 [inline]
 mod_timer+0x4e7/0xf70 kernel/time/timer.c:1070
 call_timer_fn+0x14a/0x650 kernel/time/timer.c:1280
 expire_timers+0x232/0x4d0 kernel/time/timer.c:1319
 __run_timers kernel/time/timer.c:1637 [inline]
 run_timer_softirq+0x1d5/0x5a0 kernel/time/timer.c:1650
 __do_softirq+0x254/0xa1d kernel/softirq.c:288
 invoke_softirq kernel/softirq.c:368 [inline]
 irq_exit+0x193/0x240 kernel/softirq.c:409
 exiting_irq arch/x86/include/asm/apic.h:648 [inline]
 smp_apic_timer_interrupt+0x141/0x5e0 arch/x86/kernel/apic/apic.c:1102
 apic_timer_interrupt+0x93/0xa0 arch/x86/entry/entry_64.S:793
 </IRQ>
RIP: 0010:__sanitizer_cov_trace_pc+0x9/0x50 kernel/kcov.c:65
RSP: 0018:ffff8881f85df7f0 EFLAGS: 00000202 ORIG_RAX: ffffffffffffff10
RAX: ffff8881f85d05c0 RBX: dffffc0000000000 RCX: 1ffff1103f0ba1ce
RDX: 0000000000000000 RSI: ffffea0001c60980 RDI: ffff8880577c100c
RBP: ffff888201c68b78 R08: 0000000000000000 R09: 0000000000000001
R10: 0000000000000000 R11: ffff8881f85d05c0 R12: 8000000071827027
R13: 8000000000000027 R14: 00007fb579370000 R15: 0000000000000000
 zap_pte_range mm/memory.c:1327 [inline]
 zap_pmd_range mm/memory.c:1456 [inline]
 zap_pud_range mm/memory.c:1485 [inline]
 zap_p4d_range mm/memory.c:1506 [inline]
 unmap_page_range+0xcd7/0x1ce0 mm/memory.c:1527
 unmap_single_vma+0x147/0x2b0 mm/memory.c:1572
 unmap_vmas+0x9d/0x160 mm/memory.c:1602
 exit_mmap+0x270/0x4d0 mm/mmap.c:3058
 __mmput kernel/fork.c:930 [inline]
 mmput kernel/fork.c:951 [inline]
 mmput+0xfa/0x420 kernel/fork.c:946
 exit_mm kernel/exit.c:548 [inline]
 do_exit+0x984/0x2850 kernel/exit.c:855
 do_group_exit+0x100/0x2e0 kernel/exit.c:965
 get_signal+0x38d/0x1ca0 kernel/signal.c:2423
 do_signal+0x7c/0x1550 arch/x86/kernel/signal.c:814
 exit_to_usermode_loop+0x160/0x200 arch/x86/entry/common.c:160
 prepare_exit_to_usermode+0x1af/0x210 arch/x86/entry/common.c:199
 retint_user+0x8/0x18
RIP: 0033:0x405e90
RSP: 002b:00007fb576e9ccf8 EFLAGS: 00000202 ORIG_RAX: ffffffffffffff10
RAX: 0000000000000001 RBX: 000000000118bf28 RCX: 000000000045deb9
RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 000000000118bf20
RBP: 000000000118bf20 R08: 000000000000000e R09: 0000000000000000
R10: 0000000020ffc000 R11: 0000000000000246 R12: 000000000118bf2c
R13: 00007ffcf38f297f R14: 00007fb576e9d9c0 R15: 000000000118bf2c
Code: fa 48 c7 c0 88 92 f0 88 48 ba 00 00 00 00 00 fc ff df 48 c1 e8 03 80 3c 10 00 75 2f 48 83 3d 9c 09 d0 01 00 74 15 48 89 df 57 9d <0f> 1f 44 00 00 eb b2 e8 4c 98 df f9 eb c0 0f 0b 0f 0b 48 c7 c7 
Sending NMI from CPU 0 to CPUs 1:
NMI backtrace for cpu 1
CPU: 1 PID: 25 Comm: kworker/u4:2 Not tainted 4.14.209-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Workqueue: bat_events batadv_nc_worker
task: ffff8880b567c680 task.stack: ffff8880b5680000
RIP: 0010:mark_lock+0x2f/0x1050 kernel/locking/lockdep.c:3161
RSP: 0018:ffff8880b5687bc8 EFLAGS: 00000002
RAX: dffffc0000000000 RBX: 0000000000000000 RCX: 0000000000000002
RDX: 1ffff11016acf9e5 RSI: ffff8880b567cf08 RDI: ffff8880b567c680
RBP: 0000000000000003 R08: 0000000000000001 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000004
R13: ffff8880b567c680 R14: ffff8880b567cf28 R15: 0000000000000002
FS:  0000000000000000(0000) GS:ffff8880ba500000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000009e5064 CR3: 0000000096a09000 CR4: 00000000001426e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 mark_held_locks+0xa6/0xf0 kernel/locking/lockdep.c:2854
 __trace_hardirqs_on_caller kernel/locking/lockdep.c:2875 [inline]
 trace_hardirqs_on_caller+0x288/0x580 kernel/locking/lockdep.c:2930
 __local_bh_enable_ip+0xc1/0x170 kernel/softirq.c:190
 spin_unlock_bh include/linux/spinlock.h:362 [inline]
 batadv_nc_purge_paths+0x20c/0x300 net/batman-adv/network-coding.c:479
 batadv_nc_worker+0x628/0xc50 net/batman-adv/network-coding.c:727
 process_one_work+0x793/0x14a0 kernel/workqueue.c:2116
 worker_thread+0x5cc/0xff0 kernel/workqueue.c:2250
 kthread+0x30d/0x420 kernel/kthread.c:232
 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:404
Code: 00 00 00 fc ff df 41 57 89 d1 41 89 d7 41 56 4c 8d 76 20 4c 89 f2 41 55 49 89 fd 41 54 48 c1 ea 03 41 bc 01 00 00 00 55 41 d3 e4 <48> 89 f5 53 48 83 ec 18 0f b6 04 02 84 c0 74 08 3c 01 0f 8e d6 

Crashes (1):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2020/11/28 13:43 linux-4.14.y 87335852c5d9 3c7136c0 .config console log report info ci2-linux-4-14
* Struck through repros no longer work on HEAD.