syzbot


INFO: rcu detected stall in syscall_trace_enter (2)

Status: closed as invalid on 2019/12/04 14:04
Subsystems: kernel
[Documentation on labels]
First crash: 1616d, last: 1616d
Similar bugs (1)
Kernel Title Repro Cause bisect Fix bisect Count Last Reported Patched Status
upstream INFO: rcu detected stall in syscall_trace_enter kernel 5 2037d 2061d 0/26 auto-closed as invalid on 2019/04/06 08:39

Sample crash report:
rcu: INFO: rcu_preempt self-detected stall on CPU
rcu: 	0-...!: (1 GPs behind) idle=f76/1/0x4000000000000002 softirq=13230/13236 fqs=32 
	(t=10500 jiffies g=7325 q=588)
rcu: rcu_preempt kthread starved for 10434 jiffies! g7325 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=1
rcu: RCU grace-period kthread stack dump:
rcu_preempt     R  running task    29104    10      2 0x80004000
Call Trace:
 context_switch kernel/sched/core.c:3385 [inline]
 __schedule+0x9a0/0xcc0 kernel/sched/core.c:4081
 schedule+0x181/0x210 kernel/sched/core.c:4155
 schedule_timeout+0x14f/0x240 kernel/time/timer.c:1895
 rcu_gp_fqs_loop kernel/rcu/tree.c:1661 [inline]
 rcu_gp_kthread+0xed8/0x1770 kernel/rcu/tree.c:1821
 kthread+0x332/0x350 kernel/kthread.c:255
 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:352
NMI backtrace for cpu 0
CPU: 0 PID: 8499 Comm: syz-executor.0 Not tainted 5.4.0-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 <IRQ>
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0x1fb/0x318 lib/dump_stack.c:118
 nmi_cpu_backtrace+0xaf/0x1a0 lib/nmi_backtrace.c:101
 nmi_trigger_cpumask_backtrace+0x174/0x290 lib/nmi_backtrace.c:62
 arch_trigger_cpumask_backtrace+0x10/0x20 arch/x86/kernel/apic/hw_nmi.c:38
 trigger_single_cpu_backtrace include/linux/nmi.h:164 [inline]
 rcu_dump_cpu_stacks+0x15a/0x220 kernel/rcu/tree_stall.h:254
 print_cpu_stall kernel/rcu/tree_stall.h:455 [inline]
 check_cpu_stall kernel/rcu/tree_stall.h:529 [inline]
 rcu_pending kernel/rcu/tree.c:2827 [inline]
 rcu_sched_clock_irq+0xe25/0x1ad0 kernel/rcu/tree.c:2271
 update_process_times+0x12d/0x180 kernel/time/timer.c:1726
 tick_sched_handle kernel/time/tick-sched.c:167 [inline]
 tick_sched_timer+0x263/0x420 kernel/time/tick-sched.c:1310
 __run_hrtimer kernel/time/hrtimer.c:1514 [inline]
 __hrtimer_run_queues+0x403/0x840 kernel/time/hrtimer.c:1576
 hrtimer_interrupt+0x38c/0xda0 kernel/time/hrtimer.c:1638
 local_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1110 [inline]
 smp_apic_timer_interrupt+0x109/0x280 arch/x86/kernel/apic/apic.c:1135
 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:829
 </IRQ>
RIP: 0010:__sanitizer_cov_trace_pc+0x31/0x50 kernel/kcov.c:107
Code: 0c 25 c0 1d 02 00 65 8b 15 b8 81 8b 7e f7 c2 00 01 1f 00 75 2c 8b 91 80 13 00 00 83 fa 02 75 21 48 8b 91 88 13 00 00 48 8b 32 <48> 8d 7e 01 8b 89 84 13 00 00 48 39 cf 73 08 48 89 44 f2 08 48 89
RSP: 0018:ffffc900029c7ad0 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13
RAX: ffffffff81486ea4 RBX: ffffea0002356740 RCX: ffff8880905c8040
RDX: ffffc90001e39000 RSI: 000000000003ffff RDI: 0000000000040000
RBP: ffffc900029c7b10 R08: 000000000003a768 R09: ffffed10150e872f
R10: ffffed10150e872f R11: 0000000000000000 R12: ffff88808c80b0a0
R13: dffffc0000000000 R14: 1ffff11011901614 R15: ffff8880a8743968
 release_task_stack kernel/fork.c:440 [inline]
 put_task_stack+0xa3/0x130 kernel/fork.c:451
 finish_task_switch+0x3f1/0x550 kernel/sched/core.c:3256
 context_switch kernel/sched/core.c:3388 [inline]
 __schedule+0x9a8/0xcc0 kernel/sched/core.c:4081
 preempt_schedule_common kernel/sched/core.c:4236 [inline]
 preempt_schedule+0xdb/0x120 kernel/sched/core.c:4261
 ___preempt_schedule+0x16/0x18 arch/x86/entry/thunk_64.S:50
 __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:161 [inline]
 _raw_spin_unlock_irqrestore+0xcc/0xe0 kernel/locking/spinlock.c:191
 spin_unlock_irqrestore include/linux/spinlock.h:393 [inline]
 __wake_up_common_lock kernel/sched/wait.c:125 [inline]
 __wake_up+0xe1/0x150 kernel/sched/wait.c:142
 audit_log_end+0x199/0x230 kernel/audit.c:2319
 audit_seccomp+0x1aa/0x1e0 kernel/auditsc.c:2618
 seccomp_log+0x21a/0x230 kernel/seccomp.c:675
 __secure_computing_strict kernel/seccomp.c:703 [inline]
 __secure_computing+0x280/0x330 kernel/seccomp.c:945
 syscall_trace_enter+0x524/0x8f0 arch/x86/entry/common.c:118
 do_syscall_64+0xa2/0x1c0 arch/x86/entry/common.c:290
 entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x45d4ba
Code: 25 18 00 00 00 00 74 01 f0 48 0f b1 3d 8f b4 61 00 48 39 c2 75 da f3 c3 0f 1f 84 00 00 00 00 00 48 63 ff b8 e4 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 06 f3 c3 0f 1f 40 00 48 c7 c2 d4 ff ff ff f7
RSP: 002b:00007f26e3a20c58 EFLAGS: 00000246 ORIG_RAX: 00000000000000e4
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045d4ba
RDX: 0000000000000042 RSI: 00007f26e3a20c60 RDI: 0000000000000001
RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00000000004c88ab R14: 00000000004dfe00 R15: 00000000ffffffff

Crashes (1):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2019/12/03 20:45 upstream 76bb8b05960c ae13a849 .config console log report ci-upstream-kasan-gce-smack-root
* Struck through repros no longer work on HEAD.