syzbot


INFO: rcu detected stall in newlstat

Status: closed as invalid on 2022/02/08 10:00
Reported-by: syzbot+@syzkaller.appspotmail.com
First crash: 425d, last: 362d
similar bugs (2):
Kernel Title Repro Cause bisect Fix bisect Count Last Reported Patched Status
upstream INFO: rcu detected stall in newlstat (3) 1 142d 142d 0/24 auto-closed as invalid on 2022/10/05 01:09
upstream INFO: rcu detected stall in newlstat (2) 1 270d 270d 0/24 auto-closed as invalid on 2022/04/30 11:07

Sample crash report:
rcu: INFO: rcu_preempt detected stalls on CPUs/tasks:
rcu: 	0-...0: (1 GPs behind) idle=c85/1/0x4000000000000000 softirq=50601/50602 fqs=5249 
	(detected by 1, t=10502 jiffies, g=79769, q=439)
Sending NMI from CPU 1 to CPUs 0:
NMI backtrace for cpu 0
CPU: 0 PID: 2969 Comm: systemd-udevd Not tainted 5.16.0-rc3-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:check_region_inline mm/kasan/generic.c:170 [inline]
RIP: 0010:kasan_check_range+0x12c/0x180 mm/kasan/generic.c:189
Code: 00 74 ef 49 8d 04 2c 48 85 d2 75 0b 48 89 da 48 29 c2 e9 55 ff ff ff 49 39 d2 75 17 49 0f be 02 41 83 e1 07 49 39 c1 7d 0a 5b <b8> 01 00 00 00 5d 41 5c c3 44 89 c2 e8 53 ef ff ff 5b 83 f0 01 5d
RSP: 0018:ffffc90000007d08 EFLAGS: 00000046
RAX: fffffbfff20d2e0a RBX: 0000000000000016 RCX: ffffffff815d24e0
RDX: fffffbfff20d2e0a RSI: 0000000000000004 RDI: ffffffff90697048
RBP: fffffbfff20d2e09 R08: 0000000000000000 R09: ffffffff9069704b
R10: fffffbfff20d2e09 R11: 0000000000000000 R12: dffffc0000000000
R13: ffffffff89ae0500 R14: 1ffff92000000fad R15: ffff88807daca340
FS:  00007f117edab8c0(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f31f76c7000 CR3: 000000007f9c0000 CR4: 0000000000350ef0
DR0: 0080ffff00000000 DR1: 0080ffff00000000 DR2: 0080ffff00000000
DR3: 0080ffff00000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
Call Trace:
 <IRQ>
 instrument_atomic_read include/linux/instrumented.h:71 [inline]
 atomic_read include/linux/atomic/atomic-instrumented.h:27 [inline]
 queued_spin_is_locked include/asm-generic/qspinlock.h:28 [inline]
 debug_spin_unlock kernel/locking/spinlock_debug.c:100 [inline]
 do_raw_spin_unlock+0x50/0x230 kernel/locking/spinlock_debug.c:140
 __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:150 [inline]
 _raw_spin_unlock_irqrestore+0x1e/0x70 kernel/locking/spinlock.c:194
 debug_object_deactivate lib/debugobjects.c:757 [inline]
 debug_object_deactivate+0x264/0x300 lib/debugobjects.c:723
 debug_hrtimer_deactivate kernel/time/hrtimer.c:425 [inline]
 debug_deactivate kernel/time/hrtimer.c:481 [inline]
 __run_hrtimer kernel/time/hrtimer.c:1653 [inline]
 __hrtimer_run_queues+0x3f8/0xe50 kernel/time/hrtimer.c:1749
 hrtimer_interrupt+0x31c/0x790 kernel/time/hrtimer.c:1811
 local_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1086 [inline]
 __sysvec_apic_timer_interrupt+0x146/0x530 arch/x86/kernel/apic/apic.c:1103
 sysvec_apic_timer_interrupt+0x8e/0xc0 arch/x86/kernel/apic/apic.c:1097
 </IRQ>
 <TASK>
 asm_sysvec_apic_timer_interrupt+0x12/0x20 arch/x86/include/asm/idtentry.h:638
RIP: 0010:check_kcov_mode kernel/kcov.c:166 [inline]
RIP: 0010:__sanitizer_cov_trace_pc+0xd/0x60 kernel/kcov.c:200
Code: 00 00 e9 56 1b 63 02 66 0f 1f 44 00 00 48 8b be b0 01 00 00 e8 b4 ff ff ff 31 c0 c3 90 65 8b 05 39 d5 8a 7e 89 c1 48 8b 34 24 <81> e1 00 01 00 00 65 48 8b 14 25 40 70 02 00 a9 00 01 ff 00 74 0e
RSP: 0018:ffffc90001a5f860 EFLAGS: 00000246
RAX: 0000000080000000 RBX: 0000000000000003 RCX: 0000000080000000
RDX: 0000000000000000 RSI: ffffffff83a3126a RDI: 0000000000000003
RBP: ffff88801dd03d80 R08: 0000000000000000 R09: 0000000000000003
R10: ffffffff83a31257 R11: 0000000000000010 R12: 0000000000000026
R13: 0000000000000267 R14: dffffc0000000000 R15: 0000000000000000
 tomoyo_domain_quota_is_ok+0x31a/0x550 security/tomoyo/util.c:1092
 tomoyo_supervisor+0x2f2/0xf00 security/tomoyo/common.c:2089
 tomoyo_audit_path_log security/tomoyo/file.c:168 [inline]
 tomoyo_path_permission security/tomoyo/file.c:587 [inline]
 tomoyo_path_permission+0x270/0x3a0 security/tomoyo/file.c:573
 tomoyo_path_perm+0x2f0/0x400 security/tomoyo/file.c:838
 security_inode_getattr+0xcf/0x140 security/security.c:1334
 vfs_getattr fs/stat.c:157 [inline]
 vfs_statx+0x164/0x390 fs/stat.c:225
 vfs_fstatat fs/stat.c:243 [inline]
 vfs_lstat include/linux/fs.h:3357 [inline]
 __do_sys_newlstat+0x91/0x110 fs/stat.c:398
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7f117dc1d335
Code: 69 db 2b 00 64 c7 00 16 00 00 00 b8 ff ff ff ff c3 0f 1f 40 00 83 ff 01 48 89 f0 77 30 48 89 c7 48 89 d6 b8 06 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 03 f3 c3 90 48 8b 15 31 db 2b 00 f7 d8 64 89
RSP: 002b:00007fff6f818f38 EFLAGS: 00000246 ORIG_RAX: 0000000000000006
RAX: ffffffffffffffda RBX: 00005631d6a46d00 RCX: 00007f117dc1d335
RDX: 00007fff6f818f70 RSI: 00007fff6f818f70 RDI: 00005631d6a45d00
RBP: 00007fff6f819030 R08: 00007f117dedc1d8 R09: 0000000000001010
R10: 0000000000000020 R11: 0000000000000246 R12: 00005631d6a45d00
R13: 00005631d6a45d1a R14: 00005631d666c445 R15: 00005631d666c44a
 </TASK>
----------------
Code disassembly (best guess):
   0:	00 74 ef 49          	add    %dh,0x49(%rdi,%rbp,8)
   4:	8d 04 2c             	lea    (%rsp,%rbp,1),%eax
   7:	48 85 d2             	test   %rdx,%rdx
   a:	75 0b                	jne    0x17
   c:	48 89 da             	mov    %rbx,%rdx
   f:	48 29 c2             	sub    %rax,%rdx
  12:	e9 55 ff ff ff       	jmpq   0xffffff6c
  17:	49 39 d2             	cmp    %rdx,%r10
  1a:	75 17                	jne    0x33
  1c:	49 0f be 02          	movsbq (%r10),%rax
  20:	41 83 e1 07          	and    $0x7,%r9d
  24:	49 39 c1             	cmp    %rax,%r9
  27:	7d 0a                	jge    0x33
  29:	5b                   	pop    %rbx
* 2a:	b8 01 00 00 00       	mov    $0x1,%eax <-- trapping instruction
  2f:	5d                   	pop    %rbp
  30:	41 5c                	pop    %r12
  32:	c3                   	retq
  33:	44 89 c2             	mov    %r8d,%edx
  36:	e8 53 ef ff ff       	callq  0xffffef8e
  3b:	5b                   	pop    %rbx
  3c:	83 f0 01             	xor    $0x1,%eax
  3f:	5d                   	pop    %rbp

Crashes (7):
Manager Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Title
ci-upstream-kasan-gce-root 2021/11/29 13:27 upstream d58071a8a76d 63eeac02 .config log report info INFO: rcu detected stall in newlstat
ci-upstream-kasan-gce-root 2021/11/22 11:49 upstream 136057256686 4eb20a4e .config log report info INFO: rcu detected stall in newlstat
ci-upstream-kasan-gce-root 2021/11/09 20:20 upstream d2f38a3c6507 59bcaf9a .config log report info INFO: rcu detected stall in newlstat
ci-upstream-kasan-gce-selinux-root 2021/10/28 11:43 upstream 1fc596a56b33 be531bb4 .config log report info INFO: rcu detected stall in newlstat
ci-upstream-kasan-gce-selinux-root 2021/10/21 04:48 upstream 8e37395c3a5d f111d03b .config log report info INFO: rcu detected stall in newlstat
ci-upstream-kasan-gce-386 2021/09/27 06:13 upstream 996148ee05d0 78494d16 .config log report info INFO: rcu detected stall in newlstat
ci-upstream-net-this-kasan-gce 2021/09/27 22:24 net 763716a55cb1 78494d16 .config log report info INFO: rcu detected stall in newlstat
* Struck through repros no longer work on HEAD.