syzbot


kernel panic: stack is corrupted in preempt_schedule_irq (2)

Status: moderation: reported on 2025/04/11 00:33
Subsystems: kernel
[Documentation on labels]
Reported-by: syzbot+6b332f88c84f5b74e6d0@syzkaller.appspotmail.com
First crash: 8d08h, last: 8d08h
Similar bugs (2)
Kernel Title Repro Cause bisect Fix bisect Count Last Reported Patched Status
linux-6.1 kernel panic: stack is corrupted in preempt_schedule_irq 4 73d 108d 0/3 upstream: reported on 2024/12/27 13:18
upstream kernel panic: stack is corrupted in preempt_schedule_irq kernel 2 300d 304d 0/28 auto-obsoleted due to no activity on 2024/09/17 03:21

Sample crash report:
Kernel panic - not syncing: stack-protector: Kernel stack is corrupted in: preempt_schedule_irq+0x1b8/0x1c0 kernel/sched/core.c:-1
CPU: 1 UID: 0 PID: 6157 Comm: syz.0.52 Not tainted 6.14.0-next-20250404-syzkaller #0 PREEMPT(full) 
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025
Call Trace:
 <TASK>
 __dump_stack lib/dump_stack.c:94 [inline]
 dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120
 panic+0x349/0x880 kernel/panic.c:354
 __stack_chk_fail+0x26/0x30 kernel/panic.c:841
 preempt_schedule_irq+0x1b8/0x1c0 kernel/sched/core.c:-1
 irqentry_exit+0x5e/0x90 kernel/entry/common.c:354
 asm_sysvec_reschedule_ipi+0x1a/0x20 arch/x86/include/asm/idtentry.h:707
RIP: 0010:lock_release+0x244/0x3e0 arch/x86/include/asm/irqflags.h:-1
Code: 48 c7 44 24 20 00 00 00 00 9c 8f 44 24 20 f7 44 24 20 00 02 00 00 0f 85 c3 00 00 00 41 f7 c6 00 02 00 00 74 01 fb 65 48 8b 03 <48> 3b 44 24 28 0f 85 82 01 00 00 48 83 c4 30 5b 41 5c 41 5d 41 5e
RSP: 0018:ffffc90004e5e460 EFLAGS: 00000206
RAX: 60701361257ddc00 RBX: ffffffff93691020 RCX: 0000000000000002
RDX: ffffc9000d95f000 RSI: ffffffff8e50585c RDI: ffffffff8ca1e060
RBP: ffff88802c950b40 R08: ffffffff81fdaaa0 R09: 1ffffd40003c598e
R10: dffffc0000000000 R11: fffff940003c598f R12: 0000000000000002
R13: ffff88802c950000 R14: 0000000000000206 R15: ffffffff8ed3e440
 rcu_lock_release include/linux/rcupdate.h:341 [inline]
 rcu_read_unlock include/linux/rcupdate.h:871 [inline]
 page_ref_add_unless include/linux/page_ref.h:239 [inline]
 folio_ref_add_unless include/linux/page_ref.h:248 [inline]
 folio_try_get+0x1e9/0x350 include/linux/page_ref.h:264
 filemap_get_read_batch+0x331/0x960 mm/filemap.c:2368
 filemap_get_pages+0x60c/0x1fc0 mm/filemap.c:2593
 filemap_read+0x466/0x1260 mm/filemap.c:2701
 __kernel_read+0x532/0xa10 fs/read_write.c:528
 integrity_kernel_read+0xb2/0x100 security/integrity/iint.c:28
 ima_calc_file_hash_tfm security/integrity/ima/ima_crypto.c:480 [inline]
 ima_calc_file_shash security/integrity/ima/ima_crypto.c:511 [inline]
 ima_calc_file_hash+0xb22/0x1c10 security/integrity/ima/ima_crypto.c:568
 ima_collect_measurement+0x52b/0xb20 security/integrity/ima/ima_api.c:293
 process_measurement+0x13a3/0x1fe0 security/integrity/ima/ima_main.c:383
 ima_file_check+0xdb/0x130 security/integrity/ima/ima_main.c:611
 security_file_post_open+0xb9/0x280 security/security.c:3130
 do_open fs/namei.c:3847 [inline]
 path_openat+0x2cf7/0x35d0 fs/namei.c:4004
 do_filp_open+0x284/0x4e0 fs/namei.c:4031
 do_sys_openat2+0x12b/0x1d0 fs/open.c:1429
 do_sys_open fs/open.c:1444 [inline]
 __do_sys_openat fs/open.c:1460 [inline]
 __se_sys_openat fs/open.c:1455 [inline]
 __x64_sys_openat+0x249/0x2a0 fs/open.c:1455
 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
 do_syscall_64+0xf3/0x230 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f72b0f8d169
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f72b1e26038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101
RAX: ffffffffffffffda RBX: 00007f72b11a6080 RCX: 00007f72b0f8d169
RDX: 0000000000000042 RSI: 0000200000000040 RDI: ffffffffffffff9c
RBP: 00007f72b100e2a0 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 0000000000000000 R14: 00007f72b11a6080 R15: 00007ffef3313868
 </TASK>
Kernel Offset: disabled
Rebooting in 86400 seconds..
----------------
Code disassembly (best guess):
   0:	48 c7 44 24 20 00 00 	movq   $0x0,0x20(%rsp)
   7:	00 00
   9:	9c                   	pushf
   a:	8f 44 24 20          	pop    0x20(%rsp)
   e:	f7 44 24 20 00 02 00 	testl  $0x200,0x20(%rsp)
  15:	00
  16:	0f 85 c3 00 00 00    	jne    0xdf
  1c:	41 f7 c6 00 02 00 00 	test   $0x200,%r14d
  23:	74 01                	je     0x26
  25:	fb                   	sti
  26:	65 48 8b 03          	mov    %gs:(%rbx),%rax
* 2a:	48 3b 44 24 28       	cmp    0x28(%rsp),%rax <-- trapping instruction
  2f:	0f 85 82 01 00 00    	jne    0x1b7
  35:	48 83 c4 30          	add    $0x30,%rsp
  39:	5b                   	pop    %rbx
  3a:	41 5c                	pop    %r12
  3c:	41 5d                	pop    %r13
  3e:	41 5e                	pop    %r14

Crashes (1):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2025/04/07 00:29 linux-next a4cda136f021 1c65791e .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root kernel panic: stack is corrupted in preempt_schedule_irq
* Struck through repros no longer work on HEAD.