syzbot


INFO: rcu detected stall in syscall_enter_from_user_mode (2)

Status: upstream: reported on 2024/08/05 07:03
Reported-by: syzbot+3e8d98d6d46ed86fad79@syzkaller.appspotmail.com
First crash: 54d, last: 54d
Similar bugs (6)
Kernel Title Repro Cause bisect Fix bisect Count Last Reported Patched Status
linux-6.1 INFO: rcu detected stall in syscall_enter_from_user_mode 1 451d 451d 0/3 auto-obsoleted due to no activity on 2023/10/13 06:46
upstream INFO: rcu detected stall in syscall_enter_from_user_mode (2) kernel 11 626d 916d 0/28 auto-obsoleted due to no activity on 2023/04/22 11:15
upstream INFO: rcu detected stall in syscall_enter_from_user_mode (3) kernel 5 290d 456d 0/28 auto-obsoleted due to no activity on 2024/03/11 14:48
linux-5.15 INFO: rcu detected stall in syscall_enter_from_user_mode origin:upstream C 41 9h41m 290d 0/3 upstream: reported C repro on 2023/12/13 03:22
upstream INFO: rcu detected stall in syscall_enter_from_user_mode kernel 2 973d 987d 0/28 closed as invalid on 2022/02/08 10:10
android-5-15 BUG: soft lockup in syscall_enter_from_user_mode 1 134d 134d 0/2 auto-obsoleted due to no activity on 2024/08/14 14:14

Sample crash report:
rcu: INFO: rcu_preempt detected expedited stalls on CPUs/tasks: { 0-.... } 2661 jiffies s: 1437 root: 0x1/.
rcu: blocking rcu_node structures (internal RCU debug):
Sending NMI from CPU 1 to CPUs 0:
NMI backtrace for cpu 0
CPU: 0 PID: 3764 Comm: syz.3.14 Not tainted 6.1.103-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024
RIP: 0010:check_preemption_disabled+0x2e/0x110
Code: 41 54 53 48 83 ec 10 65 48 8b 04 25 28 00 00 00 48 89 44 24 08 65 8b 1d d0 e5 5c 75 65 8b 05 71 3b 5d 75 a9 ff ff ff 7f 74 22 <65> 48 8b 04 25 28 00 00 00 48 3b 44 24 08 0f 85 c7 00 00 00 89 d8
RSP: 0018:ffffc90000006b28 EFLAGS: 00000006
RAX: 0000000000000103 RBX: 0000000000000000 RCX: ffffffff816a72bb
RDX: 0000000000000000 RSI: ffffffff8b5d5dc0 RDI: ffffffff8b5d5d80
RBP: ffffc90000006ce0 R08: dffffc0000000000 R09: fffffbfff1d33896
R10: 0000000000000000 R11: dffffc0000000001 R12: 1ffff92000000d78
R13: dffffc0000000000 R14: 0000000000000000 R15: ffff88813fff92e0
FS:  00007fd23f75c6c0(0000) GS:ffff8880b9800000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000000110c2b3581 CR3: 000000007a341000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 <NMI>
 </NMI>
 <IRQ>
 rcu_dynticks_curr_cpu_in_eqs include/linux/context_tracking.h:122 [inline]
 rcu_is_watching+0x11/0xb0 kernel/rcu/tree.c:721
 trace_lock_acquire include/trace/events/lock.h:24 [inline]
 lock_acquire+0xfa/0x5a0 kernel/locking/lockdep.c:5633
 rcu_lock_acquire include/linux/rcupdate.h:350 [inline]
 rcu_read_lock_sched include/linux/rcupdate.h:883 [inline]
 pfn_valid include/linux/mmzone.h:1857 [inline]
 __virt_addr_valid+0x19c/0x530 arch/x86/mm/physaddr.c:65
 kasan_addr_to_slab+0x9/0x20 mm/kasan/common.c:35
 __kasan_record_aux_stack+0x11/0xc0 mm/kasan/generic.c:471
 irq_work_queue_on+0x12f/0x290 kernel/irq_work.c:140
 rcu_read_unlock_special+0x3c6/0x540 kernel/rcu/tree_plugin.h:675
 __rcu_read_unlock+0x92/0x100 kernel/rcu/tree_plugin.h:426
 rcu_read_unlock include/linux/rcupdate.h:823 [inline]
 __perf_event_output kernel/events/core.c:7707 [inline]
 perf_event_output_forward+0x2af/0x330 kernel/events/core.c:7716
 __perf_event_overflow+0x45e/0x640 kernel/events/core.c:9462
 perf_tp_event+0x35a/0xc80 kernel/events/core.c:9995
 perf_trace_run_bpf_submit+0xf7/0x1d0 kernel/events/core.c:9968
 perf_trace_preemptirq_template+0x2d1/0x3d0 include/trace/events/preemptirq.h:14
 trace_irq_enable_rcuidle+0xd5/0x140 include/trace/events/preemptirq.h:40
 trace_hardirqs_on+0x24/0x40 kernel/trace/trace_preemptirq.c:44
 asm_sysvec_irq_work+0x16/0x20 arch/x86/include/asm/idtentry.h:679
RIP: 0010:rcu_read_unlock_special+0x84/0x540 kernel/rcu/tree_plugin.h:682
Code: f1 f1 f1 00 f2 f2 f2 49 89 04 17 66 41 c7 44 17 09 f3 f3 41 c6 44 17 0b f3 65 44 8b 25 0d 48 8e 7e 41 f7 c4 00 00 f0 00 74 45 <48> c7 44 24 20 0e 36 e0 45 4a c7 04 3a 00 00 00 00 66 42 c7 44 3a
RSP: 0018:ffffc90000007540 EFLAGS: 00000206
RAX: 518fe66eaa4a5000 RBX: 1ffff92000000eb0 RCX: ffffffff91f31103
RDX: dffffc0000000000 RSI: ffffffff8b0c0260 RDI: ffffffff8b5d5de0
RBP: ffffc90000007620 R08: ffffffff81b644fc R09: ffffed1017306ad6
R10: 0000000000000000 R11: dffffc0000000001 R12: ffffffff8d32fe00
R13: ffff88807d120458 R14: ffffc90000007580 R15: 1ffff92000000eac
 __rcu_read_unlock+0x92/0x100 kernel/rcu/tree_plugin.h:426
 rcu_read_unlock include/linux/rcupdate.h:823 [inline]
 is_bpf_text_address+0x27a/0x2a0 kernel/bpf/core.c:733
 kernel_text_address+0x9f/0xd0 kernel/extable.c:125
 __kernel_text_address+0x9/0x40 kernel/extable.c:79
 unwind_get_return_address+0x49/0x80 arch/x86/kernel/unwind_orc.c:323
 arch_stack_walk+0xf3/0x140 arch/x86/kernel/stacktrace.c:26
 stack_trace_save+0x113/0x1c0 kernel/stacktrace.c:122
 kasan_save_stack mm/kasan/common.c:45 [inline]
 kasan_set_track+0x4b/0x70 mm/kasan/common.c:52
 kasan_save_free_info+0x27/0x40 mm/kasan/generic.c:516
 ____kasan_slab_free+0xd6/0x120 mm/kasan/common.c:236
 kasan_slab_free include/linux/kasan.h:177 [inline]
 slab_free_hook mm/slub.c:1724 [inline]
 slab_free_freelist_hook mm/slub.c:1750 [inline]
 slab_free mm/slub.c:3661 [inline]
 kmem_cache_free+0x292/0x510 mm/slub.c:3683
 dst_destroy+0x29e/0x390 net/core/dst.c:123
 rcu_do_batch kernel/rcu/tree.c:2296 [inline]
 rcu_core+0xad5/0x1810 kernel/rcu/tree.c:2556
 handle_softirqs+0x2ee/0xa40 kernel/softirq.c:571
 __do_softirq kernel/softirq.c:605 [inline]
 invoke_softirq kernel/softirq.c:445 [inline]
 __irq_exit_rcu+0x157/0x240 kernel/softirq.c:654
 irq_exit_rcu+0x5/0x20 kernel/softirq.c:666
 sysvec_apic_timer_interrupt+0x91/0xb0 arch/x86/kernel/apic/apic.c:1106
 </IRQ>
 <TASK>
 asm_sysvec_apic_timer_interrupt+0x16/0x20 arch/x86/include/asm/idtentry.h:653
RIP: 0010:__syscall_enter_from_user_work kernel/entry/common.c:97 [inline]
RIP: 0010:syscall_enter_from_user_mode+0x37/0x230 kernel/entry/common.c:118
Code: 49 89 fe 48 8b 7c 24 30 e8 f6 fa ff ff 0f 1f 44 00 00 0f 1f 44 00 00 e8 47 43 ec f6 e8 c2 41 ec f6 fb 65 4c 8b 3d 69 4d 5d 75 <49> 8b 5f 08 f6 c3 3f 0f 84 ad 00 00 00 f6 c3 20 74 17 4c 89 f7 e8
RSP: 0018:ffffc90004727ef8 EFLAGS: 00000282
RAX: 518fe66eaa4a5000 RBX: ffffc90004727f30 RCX: ffffffff91f31103
RDX: dffffc0000000000 RSI: ffffffff8b0c0260 RDI: ffffffff8b5d5de0
RBP: ffffc90004727f48 R08: ffffffff81b644fc R09: ffffed1017306ad6
R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000000
R13: 00000000000000ca R14: ffffc90004727f58 R15: ffff88807d120000
 do_syscall_64+0x1e/0xb0 arch/x86/entry/common.c:77
 entry_SYSCALL_64_after_hwframe+0x68/0xd2
RIP: 0033:0x7fd23e9779f9
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007fd23f75c0f8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca
RAX: ffffffffffffffda RBX: 00007fd23eb05f88 RCX: 00007fd23e9779f9
RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007fd23eb05f8c
RBP: 00007fd23eb05f80 R08: 0000000000000010 R09: 00007fd23f75c6c0
R10: 0000000000000009 R11: 0000000000000246 R12: 00007fd23eb05f8c
R13: 000000000000000b R14: 00007ffe73ad2b40 R15: 00007ffe73ad2c28
 </TASK>

Crashes (1):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2024/08/05 07:02 linux-6.1.y 48d525b0e463 1786a2a8 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan-perf INFO: rcu detected stall in syscall_enter_from_user_mode
* Struck through repros no longer work on HEAD.