syzbot


INFO: rcu detected stall in chaoskey_read

Status: auto-obsoleted due to no activity on 2024/12/22 18:37
Subsystems: bpf
[Documentation on labels]
First crash: 119d, last: 119d

Sample crash report:
rcu: INFO: rcu_preempt detected stalls on CPUs/tasks:
rcu: 	Tasks blocked on level-0 rcu_node (CPUs 0-1): P9041/2:b..l P9028/1:b..l P2956/2:b..l
rcu: 	(detected by 1, t=10503 jiffies, g=51937, q=1178864 ncpus=2)
task:kworker/u8:9    state:R  running task     stack:20120 pid:2956  tgid:2956  ppid:2      flags:0x00004000
Workqueue: ipv6_addrconf addrconf_dad_work
Call Trace:
 <TASK>
 context_switch kernel/sched/core.c:5315 [inline]
 __schedule+0x1895/0x4b30 kernel/sched/core.c:6674
 preempt_schedule_common+0x84/0xd0 kernel/sched/core.c:6853
 preempt_schedule+0xe1/0xf0 kernel/sched/core.c:6877
 preempt_schedule_thunk+0x1a/0x30 arch/x86/entry/thunk.S:12
 __local_bh_enable_ip+0x179/0x200 kernel/softirq.c:389
 local_bh_enable include/linux/bottom_half.h:33 [inline]
 ip6t_do_table+0x1687/0x18a0 net/ipv6/netfilter/ip6_tables.c:375
 ip6t_mangle_out net/ipv6/netfilter/ip6table_mangle.c:49 [inline]
 ip6table_mangle_hook+0x215/0x7a0 net/ipv6/netfilter/ip6table_mangle.c:72
 nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline]
 nf_hook_slow+0xc3/0x220 net/netfilter/core.c:626
 nf_hook include/linux/netfilter.h:269 [inline]
 NF_HOOK include/linux/netfilter.h:312 [inline]
 ndisc_send_skb+0x122f/0x1380 net/ipv6/ndisc.c:511
 ndisc_send_ns+0xcc/0x160 net/ipv6/ndisc.c:669
 addrconf_dad_work+0xb45/0x16f0 net/ipv6/addrconf.c:4284
 process_one_work kernel/workqueue.c:3229 [inline]
 process_scheduled_works+0xa63/0x1850 kernel/workqueue.c:3310
 worker_thread+0x870/0xd30 kernel/workqueue.c:3391
 kthread+0x2f0/0x390 kernel/kthread.c:389
 ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
 </TASK>
task:syz.0.714       state:R  running task     stack:26096 pid:9028  tgid:9011  ppid:8417   flags:0x00004002
Call Trace:
 <TASK>
 context_switch kernel/sched/core.c:5315 [inline]
 __schedule+0x1895/0x4b30 kernel/sched/core.c:6674
 preempt_schedule_irq+0xfb/0x1c0 kernel/sched/core.c:6996
 irqentry_exit+0x5e/0x90 kernel/entry/common.c:354
 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702
RIP: 0010:lock_acquire+0x264/0x550 kernel/locking/lockdep.c:5826
Code: 2b 00 74 08 4c 89 f7 e8 3a 50 8e 00 f6 44 24 61 02 0f 85 85 01 00 00 41 f7 c7 00 02 00 00 74 01 fb 48 c7 44 24 40 0e 36 e0 45 <4b> c7 44 25 00 00 00 00 00 43 c7 44 25 09 00 00 00 00 43 c7 44 25
RSP: 0018:ffffc90004547280 EFLAGS: 00000206
RAX: 0000000000000001 RBX: 1ffff920008a8e5c RCX: 347454c799810b00
RDX: dffffc0000000000 RSI: ffffffff8c0adbc0 RDI: ffffffff8c60ddc0
RBP: ffffc900045473d0 R08: ffffffff942597c7 R09: 1ffffffff284b2f8
R10: dffffc0000000000 R11: fffffbfff284b2f9 R12: 1ffff920008a8e58
R13: dffffc0000000000 R14: ffffc900045472e0 R15: 0000000000000246
 rcu_lock_acquire include/linux/rcupdate.h:337 [inline]
 rcu_read_lock include/linux/rcupdate.h:849 [inline]
 is_bpf_text_address+0x46/0x2a0 kernel/bpf/core.c:767
 kernel_text_address+0xa7/0xe0 kernel/extable.c:125
 __kernel_text_address+0xd/0x40 kernel/extable.c:79
 unwind_get_return_address+0x4d/0x90 arch/x86/kernel/unwind_orc.c:369
 arch_stack_walk+0xfd/0x150 arch/x86/kernel/stacktrace.c:26
 stack_trace_save+0x118/0x1d0 kernel/stacktrace.c:122
 kasan_save_stack mm/kasan/common.c:47 [inline]
 kasan_save_track+0x3f/0x80 mm/kasan/common.c:68
 poison_kmalloc_redzone mm/kasan/common.c:377 [inline]
 __kasan_kmalloc+0x98/0xb0 mm/kasan/common.c:394
 kasan_kmalloc include/linux/kasan.h:257 [inline]
 __kmalloc_cache_noprof+0x19c/0x2c0 mm/slub.c:4296
 kmalloc_noprof include/linux/slab.h:878 [inline]
 dummy_urb_enqueue+0x7d/0x760 drivers/usb/gadget/udc/dummy_hcd.c:1271
 usb_hcd_submit_urb+0x36c/0x1e80 drivers/usb/core/hcd.c:1533
 _chaoskey_fill+0x2c5/0x9b0 drivers/usb/misc/chaoskey.c:367
 chaoskey_read+0x188/0x590 drivers/usb/misc/chaoskey.c:438
 vfs_read+0x201/0xbc0 fs/read_write.c:567
 ksys_read+0x1a0/0x2c0 fs/read_write.c:712
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f24cc57def9
RSP: 002b:00007f24cd437038 EFLAGS: 00000246 ORIG_RAX: 0000000000000000
RAX: ffffffffffffffda RBX: 00007f24cc736058 RCX: 00007f24cc57def9
RDX: 0000000000000080 RSI: 0000000020000200 RDI: 0000000000000005
RBP: 00007f24cc5f0b76 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 0000000000000000 R14: 00007f24cc736058 R15: 00007f24cc85fa28
 </TASK>
task:modprobe        state:R  running task     stack:23072 pid:9041  tgid:9041  ppid:35     flags:0x00000000
Call Trace:
 <TASK>
 context_switch kernel/sched/core.c:5315 [inline]
 __schedule+0x1895/0x4b30 kernel/sched/core.c:6674
 preempt_schedule_irq+0xfb/0x1c0 kernel/sched/core.c:6996
 irqentry_exit+0x5e/0x90 kernel/entry/common.c:354
 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702
RIP: 0010:cap_capable+0xf0/0x250
Code: 4c 39 f5 74 36 e8 90 23 2b fd 49 89 ed eb a9 89 e9 80 e1 07 80 c1 03 38 c1 7c b4 48 89 ef e8 47 d7 94 fd eb aa e8 70 23 2b fd <eb> 69 e8 69 23 2b fd bd ff ff ff ff e9 b5 00 00 00 49 81 c5 cc 00
RSP: 0018:ffffc900024ef218 EFLAGS: 00000293
RAX: ffffffff84699640 RBX: ffff8880247a6b90 RCX: ffff8880299fda00
RDX: 0000000000000000 RSI: ffffffff8e7de060 RDI: ffff8880247a6b00
RBP: 0000000000000007 R08: ffffffff8158a11f R09: 1ffffffff284b2f8
R10: dffffc0000000000 R11: fffffbfff284b2f9 R12: ffff8880247a6b00
R13: ffffffff8e7de060 R14: ffffffff8e7de060 R15: dffffc0000000000
 security_capable+0xa4/0x2d0 security/security.c:1142
 has_ns_capability_noaudit+0x132/0x240 kernel/capability.c:327
 ima_match_rules security/integrity/ima/ima_policy.c:609 [inline]
 ima_match_policy+0xaa4/0x22f0 security/integrity/ima/ima_policy.c:759
 ima_get_action+0x75/0xb0 security/integrity/ima/ima_api.c:199
 process_measurement+0x362/0x1fb0 security/integrity/ima/ima_main.c:235
 ima_file_check+0xf2/0x170 security/integrity/ima/ima_main.c:572
 security_file_post_open+0xb9/0x280 security/security.c:3127
 do_open fs/namei.c:3776 [inline]
 path_openat+0x2ccd/0x3590 fs/namei.c:3933
 do_filp_open+0x235/0x490 fs/namei.c:3960
 do_sys_openat2+0x13e/0x1d0 fs/open.c:1415
 do_sys_open fs/open.c:1430 [inline]
 __do_sys_openat fs/open.c:1446 [inline]
 __se_sys_openat fs/open.c:1441 [inline]
 __x64_sys_openat+0x247/0x2a0 fs/open.c:1441
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f09a5d51a46
RSP: 002b:00007fff6ce732d8 EFLAGS: 00000287 ORIG_RAX: 0000000000000101
RAX: ffffffffffffffda RBX: 00007fff6ce73538 RCX: 00007f09a5d51a46
RDX: 0000000000080000 RSI: 00007fff6ce73350 RDI: 00000000ffffff9c
RBP: 00007fff6ce73340 R08: 0000000000080000 R09: 00007fff6ce73350
R10: 0000000000000000 R11: 0000000000000287 R12: 00007fff6ce73350
R13: 0000000000000009 R14: 00007fff6ce7351f R15: 00000000ffffffff
 </TASK>
rcu: rcu_preempt kthread starved for 10592 jiffies! g51937 f0x2 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=0
rcu: 	Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior.
rcu: RCU grace-period kthread stack dump:
task:rcu_preempt     state:R  running task     stack:25888 pid:17    tgid:17    ppid:2      flags:0x00004000
Call Trace:
 <TASK>
 context_switch kernel/sched/core.c:5315 [inline]
 __schedule+0x1895/0x4b30 kernel/sched/core.c:6674
 __schedule_loop kernel/sched/core.c:6751 [inline]
 schedule+0x14b/0x320 kernel/sched/core.c:6766
 schedule_timeout+0x1be/0x310 kernel/time/timer.c:2615
 rcu_gp_fqs_loop+0x2df/0x1330 kernel/rcu/tree.c:2045
 rcu_gp_kthread+0xa7/0x3b0 kernel/rcu/tree.c:2247
 kthread+0x2f0/0x390 kernel/kthread.c:389
 ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
 </TASK>
rcu: Stack dump where RCU GP kthread last ran:
Sending NMI from CPU 1 to CPUs 0:
NMI backtrace for cpu 0
CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Not tainted 6.11.0-syzkaller-08833-gde5cb0dcb74c #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024
RIP: 0010:__local_bh_disable_ip+0x14c/0x220 kernel/softirq.c:323
Code: e7 49 bc 00 00 00 00 00 fc ff df 48 c7 44 24 40 00 00 00 00 9c 8f 44 24 40 42 80 3c 23 00 74 05 e8 a9 1b a7 00 f6 44 24 41 02 <0f> 85 ac 00 00 00 41 f7 c6 00 02 00 00 74 01 fb 65 8b 05 a5 85 ac
RSP: 0000:ffffc90000006ae0 EFLAGS: 00000046
RAX: 0000000080000101 RBX: 1ffff92000000d64 RCX: ffffffff8e694640
RDX: 0000000000000100 RSI: 0000000000000200 RDI: ffffc90000006b20
RBP: ffffc90000006bb0 R08: ffffffff8a498fad R09: 0000000000000000
R10: ffffc90000006d20 R11: fffff52000000da8 R12: dffffc0000000000
R13: 1ffff92000000d60 R14: 0000000000000246 R15: 0000000000000200
FS:  0000000000000000(0000) GS:ffff8880b8600000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000020052000 CR3: 000000002d278000 CR4: 00000000003526f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 <NMI>
 </NMI>
 <IRQ>
 local_bh_disable include/linux/bottom_half.h:20 [inline]
 ipt_do_table+0x324/0x1860 net/ipv4/netfilter/ip_tables.c:258
 nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline]
 nf_hook_slow+0xc3/0x220 net/netfilter/core.c:626
 nf_hook+0x2c4/0x450 include/linux/netfilter.h:269
 __ip_local_out+0x3d9/0x4e0 net/ipv4/ip_output.c:119
 ip_local_out+0x26/0x70 net/ipv4/ip_output.c:128
 synproxy_send_client_synack+0x8b8/0xf30 net/netfilter/nf_synproxy_core.c:484
 nft_synproxy_eval_v4+0x3ca/0x610 net/netfilter/nft_synproxy.c:59
 nft_synproxy_do_eval+0x362/0xa60 net/netfilter/nft_synproxy.c:141
 expr_call_ops_eval net/netfilter/nf_tables_core.c:240 [inline]
 nft_do_chain+0x4ad/0x1da0 net/netfilter/nf_tables_core.c:288
 nft_do_chain_inet+0x418/0x6b0 net/netfilter/nft_chain_filter.c:161
 nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline]
 nf_hook_slow+0xc3/0x220 net/netfilter/core.c:626
 nf_hook include/linux/netfilter.h:269 [inline]
 NF_HOOK+0x29e/0x450 include/linux/netfilter.h:312
 NF_HOOK+0x3a4/0x450 include/linux/netfilter.h:314
 __netif_receive_skb_one_core net/core/dev.c:5662 [inline]
 __netif_receive_skb+0x2bf/0x650 net/core/dev.c:5775
 process_backlog+0x662/0x15b0 net/core/dev.c:6107
 __napi_poll+0xcb/0x490 net/core/dev.c:6771
 napi_poll net/core/dev.c:6840 [inline]
 net_rx_action+0x89b/0x1240 net/core/dev.c:6962
 handle_softirqs+0x2c5/0x980 kernel/softirq.c:554
 __do_softirq kernel/softirq.c:588 [inline]
 invoke_softirq kernel/softirq.c:428 [inline]
 __irq_exit_rcu+0xf4/0x1c0 kernel/softirq.c:637
 irq_exit_rcu+0x9/0x30 kernel/softirq.c:649
 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1037 [inline]
 sysvec_apic_timer_interrupt+0xa6/0xc0 arch/x86/kernel/apic/apic.c:1037
 </IRQ>
 <TASK>
 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702
RIP: 0010:native_irq_disable arch/x86/include/asm/irqflags.h:37 [inline]
RIP: 0010:arch_local_irq_disable arch/x86/include/asm/irqflags.h:92 [inline]
RIP: 0010:acpi_safe_halt+0x21/0x30 drivers/acpi/processor_idle.c:112
Code: 90 90 90 90 90 90 90 90 90 65 48 8b 04 25 c0 d7 03 00 48 f7 00 08 00 00 00 75 10 66 90 0f 00 2d 55 32 a8 00 f3 0f 1e fa fb f4 <fa> c3 cc cc cc cc 66 0f 1f 84 00 00 00 00 00 90 90 90 90 90 90 90
RSP: 0000:ffffffff8e607ca8 EFLAGS: 00000246
RAX: ffffffff8e694640 RBX: ffff88814169f064 RCX: 000000000016d251
RDX: 0000000000000001 RSI: ffff88814169f000 RDI: ffff88814169f064
RBP: 000000000003a9b8 R08: ffff8880b8637e9b R09: 1ffff110170c6fd3
R10: dffffc0000000000 R11: ffffffff8bc26680 R12: ffff8881442db000
R13: 0000000000000001 R14: 0000000000000001 R15: ffffffff8f126960
 acpi_idle_enter+0xe4/0x140 drivers/acpi/processor_idle.c:702
 cpuidle_enter_state+0x109/0x470 drivers/cpuidle/cpuidle.c:264
 cpuidle_enter+0x5d/0xa0 drivers/cpuidle/cpuidle.c:385
 call_cpuidle kernel/sched/idle.c:155 [inline]
 cpuidle_idle_call kernel/sched/idle.c:230 [inline]
 do_idle+0x375/0x5d0 kernel/sched/idle.c:326
 cpu_startup_entry+0x42/0x60 kernel/sched/idle.c:424
 rest_init+0x2dc/0x300 init/main.c:747
 start_kernel+0x47f/0x500 init/main.c:1105
 x86_64_start_reservations+0x2a/0x30 arch/x86/kernel/head64.c:507
 x86_64_start_kernel+0x9f/0xa0 arch/x86/kernel/head64.c:488
 common_startup_64+0x13e/0x147
 </TASK>

Crashes (1):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2024/09/23 18:27 upstream de5cb0dcb74c 89298aad .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce INFO: rcu detected stall in chaoskey_read
* Struck through repros no longer work on HEAD.