syzbot


WARNING: suspicious RCU usage in sel_write_load

Status: auto-closed as invalid on 2020/03/11 00:03
Reported-by: syzbot+72228a18450104c918f6@syzkaller.appspotmail.com
First crash: 1679d, last: 1676d
Similar bugs (1)
Kernel Title Repro Cause bisect Fix bisect Count Last Reported Patched Status
linux-4.14 WARNING: suspicious RCU usage in sel_write_load 6 1693d 1786d 0/1 auto-closed as invalid on 2020/02/22 18:16

Sample crash report:
netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'.
syz-executor.4: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null)
=============================
WARNING: suspicious RCU usage
4.14.153+ #0 Not tainted
-----------------------------
include/linux/radix-tree.h:238 suspicious rcu_dereference_check() usage!
CPU: 0 PID: 18835 Comm: syz-executor.4 Not tainted 4.14.153+ #0

other info that might help us debug this:


rcu_scheduler_active = 2, debug_locks = 1
Call Trace:
2 locks held by syz-executor.2/18836:
 #0: 
 __dump_stack lib/dump_stack.c:17 [inline]
 dump_stack+0xca/0x134 lib/dump_stack.c:53
 (
 warn_alloc.cold+0x91/0x1ab mm/page_alloc.c:3319
&sb->s_type->i_mutex_key
#10){+.+.}
, at: [<00000000602c5ea3>] inode_lock include/linux/fs.h:724 [inline]
, at: [<00000000602c5ea3>] shmem_add_seals+0x12b/0xf80 mm/shmem.c:2831
 #1: 
 (
 __vmalloc_node_range mm/vmalloc.c:1796 [inline]
 __vmalloc_node_range+0x3b5/0x6d0 mm/vmalloc.c:1756
&(&mapping->tree_lock)->rlock
){-.-.}
, at: [<00000000ccd247a7>] spin_lock_irq include/linux/spinlock.h:342 [inline]
, at: [<00000000ccd247a7>] shmem_tag_pins mm/shmem.c:2685 [inline]
, at: [<00000000ccd247a7>] shmem_wait_for_pins mm/shmem.c:2726 [inline]
, at: [<00000000ccd247a7>] shmem_add_seals+0x2e1/0xf80 mm/shmem.c:2843

stack backtrace:
 __vmalloc_node mm/vmalloc.c:1825 [inline]
 __vmalloc_node_flags mm/vmalloc.c:1839 [inline]
 vmalloc+0x60/0x80 mm/vmalloc.c:1861
 sel_write_load+0x199/0xfb0 security/selinux/selinuxfs.c:495
 __vfs_write+0xf9/0x5a0 fs/read_write.c:482
 vfs_write+0x17f/0x4d0 fs/read_write.c:546
 SYSC_write fs/read_write.c:594 [inline]
 SyS_write+0x102/0x250 fs/read_write.c:586
 do_syscall_64+0x19b/0x520 arch/x86/entry/common.c:292
 entry_SYSCALL_64_after_hwframe+0x42/0xb7
RIP: 0033:0x45a219
RSP: 002b:00007f3003e0ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a219
RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000000000006
RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3003e0f6d4
R13: 00000000004cac50 R14: 00000000004e3180 R15: 00000000ffffffff
CPU: 1 PID: 18836 Comm: syz-executor.2 Not tainted 4.14.153+ #0
Call Trace:
 __dump_stack lib/dump_stack.c:17 [inline]
 dump_stack+0xca/0x134 lib/dump_stack.c:53
 radix_tree_deref_slot include/linux/radix-tree.h:238 [inline]
 shmem_tag_pins mm/shmem.c:2687 [inline]
 shmem_wait_for_pins mm/shmem.c:2726 [inline]
 shmem_add_seals+0x9d2/0xf80 mm/shmem.c:2843
SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=18839 comm=syz-executor.0
SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=18839 comm=syz-executor.0
 shmem_fcntl+0xea/0x120 mm/shmem.c:2878
 do_fcntl+0x5c8/0xd20 fs/fcntl.c:421
SELinux: unrecognized netlink message: protocol=0 nlmsg_type=115 sclass=netlink_route_socket pig=18839 comm=syz-executor.0
SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=18839 comm=syz-executor.0
 SYSC_fcntl fs/fcntl.c:463 [inline]
 SyS_fcntl+0xc6/0x100 fs/fcntl.c:448
SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=18839 comm=syz-executor.0
 do_syscall_64+0x19b/0x520 arch/x86/entry/common.c:292
 entry_SYSCALL_64_after_hwframe+0x42/0xb7
RIP: 0033:0x45a219
SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=18839 comm=syz-executor.0
RSP: 002b:00007f48f9320c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000048
RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a219
RDX: 0000000000000009 RSI: 0000000000000409 RDI: 0000000000000006
RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 00007f48f93216d4
R13: 00000000004c0c3d R14: 00000000004d3820 R15: 00000000ffffffff
SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=18839 comm=syz-executor.0
syz-executor.4: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null)
SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=18839 comm=syz-executor.0
CPU: 0 PID: 18861 Comm: syz-executor.4 Not tainted 4.14.153+ #0
Call Trace:
 __dump_stack lib/dump_stack.c:17 [inline]
 dump_stack+0xca/0x134 lib/dump_stack.c:53
 warn_alloc.cold+0x91/0x1ab mm/page_alloc.c:3319
 __vmalloc_node_range mm/vmalloc.c:1796 [inline]
 __vmalloc_node_range+0x3b5/0x6d0 mm/vmalloc.c:1756
 __vmalloc_node mm/vmalloc.c:1825 [inline]
 __vmalloc_node_flags mm/vmalloc.c:1839 [inline]
 vmalloc+0x60/0x80 mm/vmalloc.c:1861
 sel_write_load+0x199/0xfb0 security/selinux/selinuxfs.c:495
 __vfs_write+0xf9/0x5a0 fs/read_write.c:482
 vfs_write+0x17f/0x4d0 fs/read_write.c:546
 SYSC_write fs/read_write.c:594 [inline]
 SyS_write+0x102/0x250 fs/read_write.c:586
 do_syscall_64+0x19b/0x520 arch/x86/entry/common.c:292
 entry_SYSCALL_64_after_hwframe+0x42/0xb7
RIP: 0033:0x45a219
RSP: 002b:00007f3003dedc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'.
RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a219
RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000000000006
RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3003dee6d4
R13: 00000000004cac50 R14: 00000000004e3180 R15: 00000000ffffffff
SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=18839 comm=syz-executor.0
SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=18876 comm=syz-executor.0
warn_alloc_show_mem: 1 callbacks suppressed
Mem-Info:
active_anon:194718 inactive_anon:25040 isolated_anon:0
 active_file:29593 inactive_file:15539 isolated_file:0
 unevictable:0 dirty:251 writeback:0 unstable:0
 slab_reclaimable:10073 slab_unreclaimable:63859
 mapped:59624 shmem:589 pagetables:12654 bounce:0
 free:1218250 free_pcp:435 free_cma:0
Node 0 active_anon:778916kB inactive_anon:100132kB active_file:118376kB inactive_file:62100kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:238396kB dirty:1032kB writeback:64kB shmem:2340kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no
DMA32 free:3073968kB min:4792kB low:7868kB high:10944kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:3079672kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:724kB local_pcp:724kB free_cma:0kB
lowmem_reserve[]: 0 3437 3437
Normal free:1799228kB min:5480kB low:9000kB high:12520kB active_anon:778680kB inactive_anon:100152kB active_file:118412kB inactive_file:62076kB unevictable:0kB writepending:1068kB present:4718592kB managed:3521556kB mlocked:0kB kernel_stack:18944kB pagetables:50556kB bounce:0kB free_pcp:1132kB local_pcp:392kB free_cma:0kB
lowmem_reserve[]: 0 0 0
DMA32: 2*4kB (UM) 1*8kB (U) 2*16kB (UM) 2*32kB (U) 3*64kB (UM) 3*128kB (UM) 3*256kB (UM) 1*512kB (M) 4*1024kB (UM) 2*2048kB (UM) 748*4096kB (UM) = 3073968kB
Normal: 300*4kB (UME) 405*8kB (UME) 895*16kB (UE) 116*32kB (UE) 51*64kB (UE) 67*128kB (UME) 129*256kB (UME) 187*512kB (UME) 146*1024kB (UM) 74*2048kB (UM) 326*4096kB (UM) = 1799432kB
45638 total pagecache pages
0 pages in swap cache
Swap cache stats: add 0, delete 0, find 0/0
Free swap  = 0kB
Total swap = 0kB
1965979 pages RAM
0 pages HighMem/MovableOnly
315672 pages reserved
SELinux: failed to load policy
SELinux: failed to load policy
SELinux: failed to load policy
SELinux: failed to load policy
SELinux: failed to load policy
: renamed from ip_vti0
SELinux: failed to load policy
EXT4-fs warning (device sda1): ext4_group_add:1615: No reserved GDT blocks, can't resize
SELinux: failed to load policy
SELinux: failed to load policy
SELinux: failed to load policy
SELinux: failed to load policy
sel_write_load: 5 callbacks suppressed
SELinux: failed to load policy
SELinux: failed to load policy
SELinux: failed to load policy
SELinux: failed to load policy
SELinux: failed to load policy
SELinux: failed to load policy
SELinux: failed to load policy

Crashes (2):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2019/11/12 00:02 android-4.14 10e570bfc15a 048f2d49 .config console log report ci-android-414-kasan-gce-root
2019/11/08 21:45 android-4.14 f40abacc8ac0 1e35461e .config console log report ci-android-414-kasan-gce-root
* Struck through repros no longer work on HEAD.