syzbot


kernel panic: corrupted stack end in kernel_init (2)

Status: upstream: reported syz repro on 2024/09/15 05:50
Subsystems: mm
[Documentation on labels]
Reported-by: syzbot+ec17b78de14721dd3bdc@syzkaller.appspotmail.com
First crash: 75d, last: 52d
Discussions (1)
Title Replies (including bot) Last reply
[syzbot] [block?] [virt?] kernel panic: corrupted stack end in kernel_init (2) 0 (2) 2024/09/24 10:00
Similar bugs (1)
Kernel Title Repro Cause bisect Fix bisect Count Last Reported Patched Status
upstream kernel panic: corrupted stack end in kernel_init integrity lsm 20 148d 173d 0/28 auto-obsoleted due to no activity on 2024/09/03 16:55
Last patch testing requests (1)
Created Duration User Patch Repo Result
2024/10/14 02:30 23m retest repro git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci OK log

Sample crash report:
Registered RDS/tcp transport
NET: Registered PF_SMC protocol family
9pnet: Installing 9P2000 support
Key type dns_resolver registered
Key type ceph registered
libceph: loaded (mon/osd proto 15/24)
NET: Registered PF_VSOCK protocol family
registered taskstats version 1
Loading compiled-in X.509 certificates
Loaded X.509 cert 'Build time autogenerated kernel key: 9462edf6f0f4fb32d8129e0f807f68da525785f6'
zswap: loaded using pool 842/z3fold
Demotion targets for Node 0: null
debug_vm_pgtable: [debug_vm_pgtable         ]: Validating architecture page table helpers
Key type .fscrypt registered
Key type fscrypt-provisioning registered
Key type big_key registered
Key type encrypted registered
AppArmor: AppArmor sha256 policy hashing enabled
ima: No TPM chip found, activating TPM-bypass!
Loading compiled-in module X.509 certificates
Loaded X.509 cert 'Build time autogenerated kernel key: 9462edf6f0f4fb32d8129e0f807f68da525785f6'
ima: Allocated hash algorithm: sha256
ima: No architecture policies found
evm: Initialising EVM extended attributes:
evm: security.selinux (disabled)
evm: security.SMACK64 (disabled)
evm: security.SMACK64EXEC (disabled)
evm: security.SMACK64TRANSMUTE (disabled)
evm: security.SMACK64MMAP (disabled)
evm: security.apparmor
evm: security.ima
evm: security.capability
evm: HMAC attrs: 0x1
printk: legacy console [netcon0] enabled
netconsole: network logging started
gtp: GTP module loaded (pdp ctx size 128 bytes)
rdma_rxe: loaded
clk: Disabling unused clocks
PM: genpd: Disabling unused power domains
ALSA device list:
  #0: Dummy 1
  #1: Loopback 1
  #2: Virtual MIDI Card 1
md: Skipping autodetection of RAID arrays. (raid=autodetect will force)
EXT4-fs (vda): mounted filesystem 34b94c48-234b-4869-b990-1f782e29954a ro with ordered data mode. Quota mode: none.
VFS: Mounted root (ext4 filesystem) readonly on device 253:0.
devtmpfs: mounted
Freeing unused kernel image (initmem) memory: 2532K
Failed to set sysctl parameter 'max_rcu_stall_to_panic=1': parameter not found
Run /sbin/init as init process
Kernel panic - not syncing: corrupted stack end detected inside scheduler
CPU: 1 UID: 0 PID: 1 Comm: init Not tainted 6.11.0-rc2-syzkaller-g7c1e5b9690b0 #0
Hardware name: riscv-virtio,qemu (DT)
Call Trace:
[<ffffffff80010216>] dump_backtrace+0x2e/0x3c arch/riscv/kernel/stacktrace.c:130
[<ffffffff85edbd86>] show_stack+0x34/0x40 arch/riscv/kernel/stacktrace.c:136
[<ffffffff85f3735e>] __dump_stack lib/dump_stack.c:93 [inline]
[<ffffffff85f3735e>] dump_stack_lvl+0x108/0x196 lib/dump_stack.c:119
[<ffffffff85f37408>] dump_stack+0x1c/0x24 lib/dump_stack.c:128
[<ffffffff85edc94a>] panic+0x388/0x806 kernel/panic.c:348
[<ffffffff85f4554a>] schedule_debug kernel/sched/core.c:5745 [inline]
[<ffffffff85f4554a>] __schedule+0x3230/0x3288 kernel/sched/core.c:6411
[<ffffffff85f45a6c>] preempt_schedule_common kernel/sched/core.c:6708 [inline]
[<ffffffff85f45a6c>] preempt_schedule+0xd2/0x1e2 kernel/sched/core.c:6732
[<ffffffff85f5a84a>] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:152 [inline]
[<ffffffff85f5a84a>] _raw_spin_unlock_irqrestore+0xb4/0xd6 kernel/locking/spinlock.c:194
[<ffffffff8285d330>] spin_unlock_irqrestore include/linux/spinlock.h:406 [inline]
[<ffffffff8285d330>] virtio_queue_rq+0x260/0x572 drivers/block/virtio_blk.c:459
[<ffffffff8126e1e6>] blk_mq_dispatch_rq_list+0x3f0/0x1ab6 block/blk-mq.c:2032
[<ffffffff81282dde>] __blk_mq_do_dispatch_sched block/blk-mq-sched.c:170 [inline]
[<ffffffff81282dde>] blk_mq_do_dispatch_sched block/blk-mq-sched.c:184 [inline]
[<ffffffff81282dde>] __blk_mq_sched_dispatch_requests+0xada/0x135a block/blk-mq-sched.c:309
[<ffffffff81283740>] blk_mq_sched_dispatch_requests+0xae/0x12c block/blk-mq-sched.c:331
[<ffffffff81264fa8>] blk_mq_run_hw_queue+0x65c/0xa10 block/blk-mq.c:2245
[<ffffffff8126a6a6>] blk_mq_dispatch_plug_list block/blk-mq.c:2746 [inline]
[<ffffffff8126a6a6>] blk_mq_flush_plug_list.part.0+0x64e/0x21c2 block/blk-mq.c:2794
[<ffffffff8126f916>] blk_mq_flush_plug_list+0x6a/0x8a block/blk-mq.c:2764
[<ffffffff8122cdb4>] __blk_flush_plug+0x260/0x442 block/blk-core.c:1198
[<ffffffff8122d858>] blk_finish_plug block/blk-core.c:1225 [inline]
[<ffffffff8122d858>] blk_finish_plug+0x68/0xa6 block/blk-core.c:1222
[<ffffffff806f9cea>] read_pages+0x61a/0xc9e mm/readahead.c:183
[<ffffffff806fa5be>] page_cache_ra_unbounded+0x250/0x4e6 mm/readahead.c:273
[<ffffffff806fa944>] do_page_cache_ra+0xf0/0x134 mm/readahead.c:303
[<ffffffff806fb43a>] page_cache_ra_order+0xe8/0x17a mm/readahead.c:488
[<ffffffff806fc3c8>] page_cache_async_ra+0x51c/0x7c2 mm/readahead.c:638
[<ffffffff806cbac4>] filemap_readahead mm/filemap.c:2504 [inline]
[<ffffffff806cbac4>] filemap_get_pages+0x310/0x1628 mm/filemap.c:2545
[<ffffffff806cd12a>] filemap_read+0x34e/0xc30 mm/filemap.c:2625
[<ffffffff806cdca2>] generic_file_read_iter+0x296/0x38a mm/filemap.c:2806
[<ffffffff80d324e2>] ext4_file_read_iter fs/ext4/file.c:147 [inline]
[<ffffffff80d324e2>] ext4_file_read_iter+0x15e/0x400 fs/ext4/file.c:130
[<ffffffff809df704>] __kernel_read+0x302/0x886 fs/read_write.c:434
[<ffffffff810b730a>] integrity_kernel_read+0x92/0xc4 security/integrity/iint.c:28
[<ffffffff810c1360>] ima_calc_file_hash_tfm+0x2da/0x3ec security/integrity/ima/ima_crypto.c:480
[<ffffffff810c2ccc>] ima_calc_file_shash security/integrity/ima/ima_crypto.c:511 [inline]
[<ffffffff810c2ccc>] ima_calc_file_hash+0x19e/0x456 security/integrity/ima/ima_crypto.c:568
[<ffffffff810c4dd4>] ima_collect_measurement+0x7b4/0x918 security/integrity/ima/ima_api.c:293
[<ffffffff810bd7a0>] process_measurement+0x10e4/0x2026 security/integrity/ima/ima_main.c:372
[<ffffffff810bec80>] ima_file_mmap+0x1be/0x1de security/integrity/ima/ima_main.c:462
[<ffffffff80fef096>] security_mmap_file+0x102/0x184 security/security.c:2860
[<ffffffff8076b3c8>] vm_mmap_pgoff+0xd2/0x310 mm/util.c:584
[<ffffffff8076b68a>] vm_mmap+0x84/0xac mm/util.c:607
[<ffffffff80b840c6>] elf_map fs/binfmt_elf.c:381 [inline]
[<ffffffff80b840c6>] elf_load+0x186/0x716 fs/binfmt_elf.c:408
[<ffffffff80b87a18>] load_elf_interp fs/binfmt_elf.c:675 [inline]
[<ffffffff80b87a18>] load_elf_binary+0x33c2/0x4c1e fs/binfmt_elf.c:1235
[<ffffffff809fa7ec>] search_binary_handler fs/exec.c:1821 [inline]
[<ffffffff809fa7ec>] exec_binprm fs/exec.c:1863 [inline]
[<ffffffff809fa7ec>] bprm_execve fs/exec.c:1914 [inline]
[<ffffffff809fa7ec>] bprm_execve+0x744/0x18a4 fs/exec.c:1890
[<ffffffff809fe31e>] kernel_execve+0x2c8/0x378 fs/exec.c:2081
[<ffffffff85edae1c>] run_init_process+0x194/0x1a8 init/main.c:1388
[<ffffffff85edae4e>] try_to_run_init_process+0x1e/0x66 init/main.c:1395
[<ffffffff85f3d170>] kernel_init+0x180/0x224 init/main.c:1523
[<ffffffff85f5bb82>] ret_from_fork+0xe/0x1c arch/riscv/kernel/entry.S:239
SMP: stopping secondary CPUs
Rebooting in 86400 seconds..

Crashes (12):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2024/09/30 01:46 git://git.kernel.org/pub/scm/linux/kernel/git/riscv/linux.git fixes 7c1e5b9690b0 ba29ff75 .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-riscv64 kernel panic: corrupted stack end in kernel_init
2024/09/26 12:35 git://git.kernel.org/pub/scm/linux/kernel/git/riscv/linux.git fixes 7c1e5b9690b0 9314348a .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-riscv64 kernel panic: corrupted stack end in kernel_init
2024/09/24 21:17 git://git.kernel.org/pub/scm/linux/kernel/git/riscv/linux.git fixes 7c1e5b9690b0 5643e0e9 .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-riscv64 kernel panic: corrupted stack end in kernel_init
2024/09/16 05:32 git://git.kernel.org/pub/scm/linux/kernel/git/riscv/linux.git fixes 1ff95eb2bebd 08d8a733 .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-riscv64 kernel panic: corrupted stack end in kernel_init
2024/09/15 19:55 git://git.kernel.org/pub/scm/linux/kernel/git/riscv/linux.git fixes 1ff95eb2bebd 08d8a733 .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-riscv64 kernel panic: corrupted stack end in kernel_init
2024/09/15 19:48 git://git.kernel.org/pub/scm/linux/kernel/git/riscv/linux.git fixes 1ff95eb2bebd 08d8a733 .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-riscv64 kernel panic: corrupted stack end in kernel_init
2024/09/15 05:49 git://git.kernel.org/pub/scm/linux/kernel/git/riscv/linux.git fixes 1ff95eb2bebd 08d8a733 .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-riscv64 kernel panic: corrupted stack end in kernel_init
2024/09/13 14:37 git://git.kernel.org/pub/scm/linux/kernel/git/riscv/linux.git fixes 1ff95eb2bebd b58f933c .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-riscv64 kernel panic: corrupted stack end in kernel_init
2024/09/13 09:03 git://git.kernel.org/pub/scm/linux/kernel/git/riscv/linux.git fixes 1ff95eb2bebd 60e1a995 .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-riscv64 kernel panic: corrupted stack end in kernel_init
2024/09/09 04:34 git://git.kernel.org/pub/scm/linux/kernel/git/riscv/linux.git fixes 1ff95eb2bebd 9750182a .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-riscv64 kernel panic: corrupted stack end in kernel_init
2024/09/06 21:54 git://git.kernel.org/pub/scm/linux/kernel/git/riscv/linux.git fixes 1ff95eb2bebd ce70880a .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-riscv64 kernel panic: corrupted stack end in kernel_init
2024/09/24 09:59 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci 5f5673607153 89298aad .config console log report syz / log [disk image] [vmlinux] [kernel image] [mounted in repro] ci-upstream-gce-arm64 kernel stack overflow in kernel_init
* Struck through repros no longer work on HEAD.