syzbot


INFO: rcu detected stall in unix_dgram_sendmsg

Status: auto-closed as invalid on 2022/09/18 14:12
Subsystems: net
[Documentation on labels]
First crash: 673d, last: 673d
Similar bugs (2)
Kernel Title Repro Cause bisect Fix bisect Count Last Reported Patched Status
upstream INFO: rcu detected stall in unix_dgram_sendmsg (2) kernel 2 487d 536d 0/26 auto-obsoleted due to no activity on 2023/04/10 02:12
upstream INFO: rcu detected stall in unix_dgram_sendmsg (3) net 4 206d 341d 0/26 auto-obsoleted due to no activity on 2023/12/29 14:50

Sample crash report:
rcu: INFO: rcu_preempt detected stalls on CPUs/tasks:
rcu: 	1-...!: (1 GPs behind) idle=e55/1/0x4000000000000000 softirq=195796/195797 fqs=86 
	(detected by 0, t=10502 jiffies, g=279545, q=495 ncpus=2)
Sending NMI from CPU 0 to CPUs 1:
NMI backtrace for cpu 1
CPU: 1 PID: 2966 Comm: klogd Not tainted 5.19.0-rc3-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:__kasan_check_read+0x4/0x10 mm/kasan/shadow.c:31
Code: 0f 0b 48 83 c4 60 5b 5d 41 5c c3 48 05 00 80 00 00 48 89 fb 48 39 c7 0f 82 2b 0b 6d 07 eb e1 cc cc cc cc cc cc cc 48 8b 0c 24 <89> f6 31 d2 e9 b3 fa ff ff 0f 1f 00 48 8b 0c 24 89 f6 ba 01 00 00
RSP: 0018:ffffc900001f0b78 EFLAGS: 00000057
RAX: 0000000000000000 RBX: 0000000000000028 RCX: ffffffff815e013c
RDX: 0000000000000004 RSI: 0000000000000008 RDI: ffffffff9067e900
RBP: 0000000000000002 R08: 0000000000000000 R09: ffffffff9067e907
R10: 0000000000000000 R11: 0000000000000001 R12: ffff88807d932808
R13: ffff88807d931d80 R14: 0000000000000001 R15: 0000000000000040
FS:  00007faec0559800(0000) GS:ffff8880b9b00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f0a696d5400 CR3: 0000000022627000 CR4: 0000000000350ee0
Call Trace:
 <IRQ>
 instrument_atomic_read include/linux/instrumented.h:71 [inline]
 test_bit include/asm-generic/bitops/instrumented-non-atomic.h:134 [inline]
 __lock_acquire+0x102c/0x5660 kernel/locking/lockdep.c:5023
 lock_acquire kernel/locking/lockdep.c:5665 [inline]
 lock_acquire+0x1ab/0x570 kernel/locking/lockdep.c:5630
 rcu_lock_acquire include/linux/rcupdate.h:269 [inline]
 rcu_read_lock include/linux/rcupdate.h:695 [inline]
 advance_sched+0x4a5/0x9a0 net/sched/sch_taprio.c:768
 __run_hrtimer kernel/time/hrtimer.c:1685 [inline]
 __hrtimer_run_queues+0x609/0xe50 kernel/time/hrtimer.c:1749
 hrtimer_interrupt+0x31c/0x790 kernel/time/hrtimer.c:1811
 local_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1095 [inline]
 __sysvec_apic_timer_interrupt+0x146/0x530 arch/x86/kernel/apic/apic.c:1112
 sysvec_apic_timer_interrupt+0x8e/0xc0 arch/x86/kernel/apic/apic.c:1106
 </IRQ>
 <TASK>
 asm_sysvec_apic_timer_interrupt+0x1b/0x20 arch/x86/include/asm/idtentry.h:649
RIP: 0010:do_slab_free mm/slub.c:3448 [inline]
RIP: 0010:___cache_free+0xc4/0x400 mm/slub.c:3514
Code: 00 49 89 ef 48 89 ef e8 ea 53 ff ff 48 8b 00 f6 c4 02 74 12 4d 85 ff 74 0d 4c 8b 7d 38 4d 85 ff 0f 85 c4 00 00 00 49 8b 45 00 <65> 48 03 05 ac 13 3b 7e 48 8b 50 08 4c 39 60 10 0f 85 d9 02 00 00
RSP: 0018:ffffc90002d6f838 EFLAGS: 00000246
RAX: 0000000000040f50 RBX: ffff888048dc9100 RCX: 0000000000000000
RDX: 0000000000000000 RSI: ffffffff81364ca4 RDI: ffffea0001237200
RBP: ffffea0001237200 R08: 0000000000000007 R09: 0000000000000000
R10: 0000000000000000 R11: 1ffffd40002a5800 R12: ffffea0001237200
R13: ffff888140007500 R14: ffff888048dc9100 R15: 0000000000000000
 qlink_free mm/kasan/quarantine.c:168 [inline]
 qlist_free_all+0x6a/0x170 mm/kasan/quarantine.c:187
 kasan_quarantine_reduce+0x180/0x200 mm/kasan/quarantine.c:294
 __kasan_slab_alloc+0xa2/0xc0 mm/kasan/common.c:446
 kasan_slab_alloc include/linux/kasan.h:224 [inline]
 slab_post_alloc_hook mm/slab.h:750 [inline]
 slab_alloc_node mm/slub.c:3214 [inline]
 __kmalloc_node_track_caller+0x238/0x360 mm/slub.c:4950
 kmalloc_reserve net/core/skbuff.c:354 [inline]
 __alloc_skb+0xde/0x340 net/core/skbuff.c:426
 alloc_skb include/linux/skbuff.h:1426 [inline]
 alloc_skb_with_frags+0x93/0x730 net/core/skbuff.c:5992
 sock_alloc_send_pskb+0x793/0x920 net/core/sock.c:2662
 unix_dgram_sendmsg+0x425/0x1ad0 net/unix/af_unix.c:1895
 sock_sendmsg_nosec net/socket.c:714 [inline]
 sock_sendmsg+0xcf/0x120 net/socket.c:734
 __sys_sendto+0x21a/0x320 net/socket.c:2119
 __do_sys_sendto net/socket.c:2131 [inline]
 __se_sys_sendto net/socket.c:2127 [inline]
 __x64_sys_sendto+0xdd/0x1b0 net/socket.c:2127
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x46/0xb0
RIP: 0033:0x7faec06f50ac
Code: 89 02 48 c7 c0 ff ff ff ff eb b8 0f 1f 00 41 89 ca 64 8b 04 25 18 00 00 00 85 c0 75 19 45 31 c9 45 31 c0 b8 2c 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 64 c3 0f 1f 00 55 48 83 ec 20 48 89 54 24 10
RSP: 002b:00007ffd5b74b4c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002c
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007faec06f50ac
RDX: 000000000000004a RSI: 00005574a6c2c5c0 RDI: 0000000000000003
RBP: 00005574a6c22910 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000004000 R11: 0000000000000246 R12: 0000000000000014
R13: 0000000000000001 R14: 00007faec087077d R15: 00007ffd5b74b5d8
 </TASK>
rcu: rcu_preempt kthread starved for 10329 jiffies! g279545 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=0
rcu: 	Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior.
rcu: RCU grace-period kthread stack dump:
task:rcu_preempt     state:R  running task     stack:28456 pid:   17 ppid:     2 flags:0x00004000
Call Trace:
 <TASK>
 context_switch kernel/sched/core.c:5146 [inline]
 __schedule+0xa00/0x4b50 kernel/sched/core.c:6458
 schedule+0xd2/0x1f0 kernel/sched/core.c:6530
 schedule_timeout+0x14a/0x2a0 kernel/time/timer.c:1935
 rcu_gp_fqs_loop+0x186/0x810 kernel/rcu/tree.c:1999
 rcu_gp_kthread+0x1de/0x320 kernel/rcu/tree.c:2187
 kthread+0x2e9/0x3a0 kernel/kthread.c:376
 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:302
 </TASK>
rcu: Stack dump where RCU GP kthread last ran:
NMI backtrace for cpu 0
CPU: 0 PID: 25834 Comm: syz-executor.1 Not tainted 5.19.0-rc3-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 <IRQ>
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106
 nmi_cpu_backtrace.cold+0x47/0x144 lib/nmi_backtrace.c:111
 nmi_trigger_cpumask_backtrace+0x1e6/0x230 lib/nmi_backtrace.c:62
 trigger_single_cpu_backtrace include/linux/nmi.h:164 [inline]
 rcu_check_gp_kthread_starvation.cold+0x1fb/0x200 kernel/rcu/tree_stall.h:518
 print_other_cpu_stall kernel/rcu/tree_stall.h:623 [inline]
 check_cpu_stall kernel/rcu/tree_stall.h:771 [inline]
 rcu_pending kernel/rcu/tree.c:3977 [inline]
 rcu_sched_clock_irq+0x2316/0x2370 kernel/rcu/tree.c:2675
 update_process_times+0x11a/0x1a0 kernel/time/timer.c:1839
 tick_sched_handle+0x9b/0x180 kernel/time/tick-sched.c:243
 tick_sched_timer+0xee/0x120 kernel/time/tick-sched.c:1481
 __run_hrtimer kernel/time/hrtimer.c:1685 [inline]
 __hrtimer_run_queues+0x1c0/0xe50 kernel/time/hrtimer.c:1749
 hrtimer_interrupt+0x31c/0x790 kernel/time/hrtimer.c:1811
 local_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1095 [inline]
 __sysvec_apic_timer_interrupt+0x146/0x530 arch/x86/kernel/apic/apic.c:1112
 sysvec_apic_timer_interrupt+0x8e/0xc0 arch/x86/kernel/apic/apic.c:1106
 </IRQ>
 <TASK>
 asm_sysvec_apic_timer_interrupt+0x1b/0x20 arch/x86/include/asm/idtentry.h:649
RIP: 0010:csd_lock_wait kernel/smp.c:414 [inline]
RIP: 0010:smp_call_function_many_cond+0x499/0x1110 kernel/smp.c:988
Code: 01 89 ee e8 19 94 0a 00 85 ed 74 47 48 8b 04 24 49 89 c4 83 e0 07 49 c1 ec 03 48 89 c5 4d 01 fc 83 c5 03 e8 b9 97 0a 00 f3 90 <41> 0f b6 04 24 40 38 c5 7c 08 84 c0 0f 85 21 0a 00 00 8b 43 08 31
RSP: 0018:ffffc900069d7948 EFLAGS: 00000293
RAX: 0000000000000000 RBX: ffff8880b9b401e0 RCX: 0000000000000000
RDX: ffff888020808000 RSI: ffffffff816fddc7 RDI: 0000000000000005
RBP: 0000000000000003 R08: 0000000000000005 R09: 0000000000000000
R10: 0000000000000001 R11: 0000000000000001 R12: ffffed101736803d
R13: 0000000000000001 R14: 0000000000000001 R15: dffffc0000000000
 on_each_cpu_cond_mask+0x56/0xa0 kernel/smp.c:1154
 on_each_cpu include/linux/smp.h:71 [inline]
 text_poke_sync arch/x86/kernel/alternative.c:1231 [inline]
 text_poke_bp_batch+0x233/0x6c0 arch/x86/kernel/alternative.c:1419
 text_poke_bp+0xad/0x110 arch/x86/kernel/alternative.c:1635
 arch_static_call_transform+0x4d/0x90 arch/x86/kernel/static_call.c:107
 __static_call_update+0xcf/0x620 kernel/static_call_inline.c:136
 tracepoint_update_call kernel/tracepoint.c:317 [inline]
 tracepoint_remove_func kernel/tracepoint.c:441 [inline]
 tracepoint_probe_unregister+0x9d0/0xc30 kernel/tracepoint.c:551
 bpf_raw_tp_link_release+0x51/0xa0 kernel/bpf/syscall.c:3110
 bpf_link_free+0xe6/0x1b0 kernel/bpf/syscall.c:2693
 bpf_link_put+0x161/0x1b0 kernel/bpf/syscall.c:2719
 bpf_link_release+0x33/0x40 kernel/bpf/syscall.c:2728
 __fput+0x277/0x9d0 fs/file_table.c:317
 task_work_run+0xdd/0x1a0 kernel/task_work.c:177
 resume_user_mode_work include/linux/resume_user_mode.h:49 [inline]
 exit_to_user_mode_loop kernel/entry/common.c:169 [inline]
 exit_to_user_mode_prepare+0x23c/0x250 kernel/entry/common.c:201
 __syscall_exit_to_user_mode_work kernel/entry/common.c:283 [inline]
 syscall_exit_to_user_mode+0x19/0x50 kernel/entry/common.c:294
 do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86
 entry_SYSCALL_64_after_hwframe+0x46/0xb0
RIP: 0033:0x7f340c03bd4b

================================
WARNING: inconsistent lock state
5.19.0-rc3-syzkaller #0 Not tainted
--------------------------------
inconsistent {HARDIRQ-ON-W} -> {IN-HARDIRQ-W} usage.
syz-executor.1/25834 [HC1[1]:SC0[0]:HE0:SE1] takes:
ffffffff8beb88d8 (vmap_area_lock){?.+.}-{2:2}, at: spin_lock include/linux/spinlock.h:349 [inline]
ffffffff8beb88d8 (vmap_area_lock){?.+.}-{2:2}, at: find_vmap_area+0x1c/0x130 mm/vmalloc.c:1805
{HARDIRQ-ON-W} state was registered at:
  lock_acquire kernel/locking/lockdep.c:5665 [inline]
  lock_acquire+0x1ab/0x570 kernel/locking/lockdep.c:5630
  __raw_spin_lock include/linux/spinlock_api_smp.h:133 [inline]
  _raw_spin_lock+0x2a/0x40 kernel/locking/spinlock.c:154
  spin_lock include/linux/spinlock.h:349 [inline]
  alloc_vmap_area+0xa49/0x1f00 mm/vmalloc.c:1586
  __get_vm_area_node+0x142/0x3f0 mm/vmalloc.c:2453
  get_vm_area_caller+0x43/0x50 mm/vmalloc.c:2506
  __ioremap_caller.constprop.0+0x292/0x600 arch/x86/mm/ioremap.c:280
  acpi_os_ioremap include/acpi/acpi_io.h:13 [inline]
  acpi_map drivers/acpi/osl.c:296 [inline]
  acpi_os_map_iomem+0x463/0x550 drivers/acpi/osl.c:355
  acpi_tb_acquire_table+0xd8/0x209 drivers/acpi/acpica/tbdata.c:142
  acpi_tb_validate_table drivers/acpi/acpica/tbdata.c:317 [inline]
  acpi_tb_validate_table+0x50/0x8c drivers/acpi/acpica/tbdata.c:308
  acpi_tb_verify_temp_table+0x84/0x674 drivers/acpi/acpica/tbdata.c:504
  acpi_reallocate_root_table+0x374/0x3e0 drivers/acpi/acpica/tbxface.c:180
  acpi_early_init+0x13a/0x438 drivers/acpi/bus.c:1200
  start_kernel+0x3cf/0x48f init/main.c:1098
  secondary_startup_64_no_verify+0xce/0xdb
irq event stamp: 26172
hardirqs last  enabled at (26171): [<ffffffff89800c8b>] asm_sysvec_apic_timer_interrupt+0x1b/0x20 arch/x86/include/asm/idtentry.h:649
hardirqs last disabled at (26172): [<ffffffff8976f26b>] sysvec_apic_timer_interrupt+0xb/0xc0 arch/x86/kernel/apic/apic.c:1106
softirqs last  enabled at (5506): [<ffffffff81484a93>] invoke_softirq kernel/softirq.c:445 [inline]
softirqs last  enabled at (5506): [<ffffffff81484a93>] __irq_exit_rcu+0x123/0x180 kernel/softirq.c:650
softirqs last disabled at (5459): [<ffffffff81484a93>] invoke_softirq kernel/softirq.c:445 [inline]
softirqs last disabled at (5459): [<ffffffff81484a93>] __irq_exit_rcu+0x123/0x180 kernel/softirq.c:650

other info that might help us debug this:
 Possible unsafe locking scenario:

       CPU0
       ----
  lock(vmap_area_lock);
  <Interrupt>
    lock(vmap_area_lock);

 *** DEADLOCK ***

4 locks held by syz-executor.1/25834:
 #0: ffffffff8bdeefa8 (tracepoints_mutex){+.+.}-{3:3}, at: tracepoint_probe_unregister+0x2d/0xc30 kernel/tracepoint.c:548
 #1: ffffffff8bc34170 (cpu_hotplug_lock){++++}-{0:0}, at: __static_call_update+0x87/0x620 kernel/static_call_inline.c:128
 #2: ffffffff8be5cd88 (static_call_mutex){+.+.}-{3:3}, at: static_call_lock kernel/static_call_inline.c:25 [inline]
 #2: ffffffff8be5cd88 (static_call_mutex){+.+.}-{3:3}, at: __static_call_update+0x95/0x620 kernel/static_call_inline.c:129
 #3: ffffffff8bc4f388 (text_mutex){+.+.}-{3:3}, at: arch_static_call_transform+0x1f/0x90 arch/x86/kernel/static_call.c:103

stack backtrace:
CPU: 0 PID: 25834 Comm: syz-executor.1 Not tainted 5.19.0-rc3-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 <IRQ>
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106
 print_usage_bug kernel/locking/lockdep.c:3961 [inline]
 valid_state kernel/locking/lockdep.c:3973 [inline]
 mark_lock_irq kernel/locking/lockdep.c:4176 [inline]
 mark_lock.part.0.cold+0x18/0xd8 kernel/locking/lockdep.c:4632
 mark_lock kernel/locking/lockdep.c:4596 [inline]
 mark_usage kernel/locking/lockdep.c:4524 [inline]
 __lock_acquire+0x14ad/0x5660 kernel/locking/lockdep.c:5007
 lock_acquire kernel/locking/lockdep.c:5665 [inline]
 lock_acquire+0x1ab/0x570 kernel/locking/lockdep.c:5630
 __raw_spin_lock include/linux/spinlock_api_smp.h:133 [inline]
 _raw_spin_lock+0x2a/0x40 kernel/locking/spinlock.c:154
 spin_lock include/linux/spinlock.h:349 [inline]
 find_vmap_area+0x1c/0x130 mm/vmalloc.c:1805
 check_heap_object mm/usercopy.c:176 [inline]
 __check_object_size mm/usercopy.c:250 [inline]
 __check_object_size+0x1f8/0x700 mm/usercopy.c:212
 check_object_size include/linux/thread_info.h:199 [inline]
 __copy_from_user_inatomic include/linux/uaccess.h:62 [inline]
 copy_from_user_nmi arch/x86/lib/usercopy.c:47 [inline]
 copy_from_user_nmi+0xcb/0x130 arch/x86/lib/usercopy.c:31
 copy_code arch/x86/kernel/dumpstack.c:91 [inline]
 show_opcodes+0x59/0xb0 arch/x86/kernel/dumpstack.c:121
 show_iret_regs+0xd/0x33 arch/x86/kernel/dumpstack.c:149
 __show_regs+0x1e/0x60 arch/x86/kernel/process_64.c:74
 show_trace_log_lvl+0x25b/0x2ba arch/x86/kernel/dumpstack.c:292
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106
 nmi_cpu_backtrace.cold+0x47/0x144 lib/nmi_backtrace.c:111
 nmi_trigger_cpumask_backtrace+0x1e6/0x230 lib/nmi_backtrace.c:62
 trigger_single_cpu_backtrace include/linux/nmi.h:164 [inline]
 rcu_check_gp_kthread_starvation.cold+0x1fb/0x200 kernel/rcu/tree_stall.h:518
 print_other_cpu_stall kernel/rcu/tree_stall.h:623 [inline]
 check_cpu_stall kernel/rcu/tree_stall.h:771 [inline]
 rcu_pending kernel/rcu/tree.c:3977 [inline]
 rcu_sched_clock_irq+0x2316/0x2370 kernel/rcu/tree.c:2675
 update_process_times+0x11a/0x1a0 kernel/time/timer.c:1839
 tick_sched_handle+0x9b/0x180 kernel/time/tick-sched.c:243
 tick_sched_timer+0xee/0x120 kernel/time/tick-sched.c:1481
 __run_hrtimer kernel/time/hrtimer.c:1685 [inline]
 __hrtimer_run_queues+0x1c0/0xe50 kernel/time/hrtimer.c:1749
 hrtimer_interrupt+0x31c/0x790 kernel/time/hrtimer.c:1811
 local_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1095 [inline]
 __sysvec_apic_timer_interrupt+0x146/0x530 arch/x86/kernel/apic/apic.c:1112
 sysvec_apic_timer_interrupt+0x8e/0xc0 arch/x86/kernel/apic/apic.c:1106
 </IRQ>
 <TASK>
 asm_sysvec_apic_timer_interrupt+0x1b/0x20 arch/x86/include/asm/idtentry.h:649
RIP: 0010:csd_lock_wait kernel/smp.c:414 [inline]
RIP: 0010:smp_call_function_many_cond+0x499/0x1110 kernel/smp.c:988
Code: 01 89 ee e8 19 94 0a 00 85 ed 74 47 48 8b 04 24 49 89 c4 83 e0 07 49 c1 ec 03 48 89 c5 4d 01 fc 83 c5 03 e8 b9 97 0a 00 f3 90 <41> 0f b6 04 24 40 38 c5 7c 08 84 c0 0f 85 21 0a 00 00 8b 43 08 31
RSP: 0018:ffffc900069d7948 EFLAGS: 00000293
RAX: 0000000000000000 RBX: ffff8880b9b401e0 RCX: 0000000000000000
RDX: ffff888020808000 RSI: ffffffff816fddc7 RDI: 0000000000000005
RBP: 0000000000000003 R08: 0000000000000005 R09: 0000000000000000
R10: 0000000000000001 R11: 0000000000000001 R12: ffffed101736803d
R13: 0000000000000001 R14: 0000000000000001 R15: dffffc0000000000
 on_each_cpu_cond_mask+0x56/0xa0 kernel/smp.c:1154
 on_each_cpu include/linux/smp.h:71 [inline]
 text_poke_sync arch/x86/kernel/alternative.c:1231 [inline]
 text_poke_bp_batch+0x233/0x6c0 arch/x86/kernel/alternative.c:1419
 text_poke_bp+0xad/0x110 arch/x86/kernel/alternative.c:1635
 arch_static_call_transform+0x4d/0x90 arch/x86/kernel/static_call.c:107
 __static_call_update+0xcf/0x620 kernel/static_call_inline.c:136
 tracepoint_update_call kernel/tracepoint.c:317 [inline]
 tracepoint_remove_func kernel/tracepoint.c:441 [inline]
 tracepoint_probe_unregister+0x9d0/0xc30 kernel/tracepoint.c:551
 bpf_raw_tp_link_release+0x51/0xa0 kernel/bpf/syscall.c:3110
 bpf_link_free+0xe6/0x1b0 kernel/bpf/syscall.c:2693
 bpf_link_put+0x161/0x1b0 kernel/bpf/syscall.c:2719
 bpf_link_release+0x33/0x40 kernel/bpf/syscall.c:2728
 __fput+0x277/0x9d0 fs/file_table.c:317
 task_work_run+0xdd/0x1a0 kernel/task_work.c:177
 resume_user_mode_work include/linux/resume_user_mode.h:49 [inline]
 exit_to_user_mode_loop kernel/entry/common.c:169 [inline]
 exit_to_user_mode_prepare+0x23c/0x250 kernel/entry/common.c:201
 __syscall_exit_to_user_mode_work kernel/entry/common.c:283 [inline]
 syscall_exit_to_user_mode+0x19/0x50 kernel/entry/common.c:294
 do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86
 entry_SYSCALL_64_after_hwframe+0x46/0xb0
RIP: 0033:0x7f340c03bd4b
Code: 0f 05 48 3d 00 f0 ff ff 77 45 c3 0f 1f 40 00 48 83 ec 18 89 7c 24 0c e8 63 fc ff ff 8b 7c 24 0c 41 89 c0 b8 03 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 35 44 89 c7 89 44 24 0c e8 a1 fc ff ff 8b 44
RSP: 002b:00007ffe5f7eb9d0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003
RAX: 0000000000000000 RBX: 0000000000000005 RCX: 00007f340c03bd4b
RDX: 0000001b33820000 RSI: 00007f340be01058 RDI: 0000000000000004
RBP: 00007f340c19d960 R08: 0000000000000000 R09: 00000000d1add44d
R10: 00007ffe5f7f0090 R11: 0000000000000293 R12: 0000000000272f67
R13: 00007ffe5f7ebad0 R14: 00007f340c19c100 R15: 0000000000000032
 </TASK>
Code: 0f 05 48 3d 00 f0 ff ff 77 45 c3 0f 1f 40 00 48 83 ec 18 89 7c 24 0c e8 63 fc ff ff 8b 7c 24 0c 41 89 c0 b8 03 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 35 44 89 c7 89 44 24 0c e8 a1 fc ff ff 8b 44
RSP: 002b:00007ffe5f7eb9d0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003
RAX: 0000000000000000 RBX: 0000000000000005 RCX: 00007f340c03bd4b
RDX: 0000001b33820000 RSI: 00007f340be01058 RDI: 0000000000000004
RBP: 00007f340c19d960 R08: 0000000000000000 R09: 00000000d1add44d
R10: 00007ffe5f7f0090 R11: 0000000000000293 R12: 0000000000272f67
R13: 00007ffe5f7ebad0 R14: 00007f340c19c100 R15: 0000000000000032
 </TASK>
watchdog: BUG: soft lockup - CPU#0 stuck for 246s! [syz-executor.1:25834]
Modules linked in:
irq event stamp: 26172
hardirqs last  enabled at (26171): [<ffffffff89800c8b>] asm_sysvec_apic_timer_interrupt+0x1b/0x20 arch/x86/include/asm/idtentry.h:649
hardirqs last disabled at (26172): [<ffffffff8976f26b>] sysvec_apic_timer_interrupt+0xb/0xc0 arch/x86/kernel/apic/apic.c:1106
softirqs last  enabled at (5506): [<ffffffff81484a93>] invoke_softirq kernel/softirq.c:445 [inline]
softirqs last  enabled at (5506): [<ffffffff81484a93>] __irq_exit_rcu+0x123/0x180 kernel/softirq.c:650
softirqs last disabled at (5459): [<ffffffff81484a93>] invoke_softirq kernel/softirq.c:445 [inline]
softirqs last disabled at (5459): [<ffffffff81484a93>] __irq_exit_rcu+0x123/0x180 kernel/softirq.c:650
CPU: 0 PID: 25834 Comm: syz-executor.1 Not tainted 5.19.0-rc3-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:csd_lock_wait kernel/smp.c:414 [inline]
RIP: 0010:smp_call_function_many_cond+0x499/0x1110 kernel/smp.c:988
Code: 01 89 ee e8 19 94 0a 00 85 ed 74 47 48 8b 04 24 49 89 c4 83 e0 07 49 c1 ec 03 48 89 c5 4d 01 fc 83 c5 03 e8 b9 97 0a 00 f3 90 <41> 0f b6 04 24 40 38 c5 7c 08 84 c0 0f 85 21 0a 00 00 8b 43 08 31
RSP: 0018:ffffc900069d7948 EFLAGS: 00000293
RAX: 0000000000000000 RBX: ffff8880b9b401e0 RCX: 0000000000000000
RDX: ffff888020808000 RSI: ffffffff816fddc7 RDI: 0000000000000005
RBP: 0000000000000003 R08: 0000000000000005 R09: 0000000000000000
R10: 0000000000000001 R11: 0000000000000001 R12: ffffed101736803d
R13: 0000000000000001 R14: 0000000000000001 R15: dffffc0000000000
FS:  000055555660c400(0000) GS:ffff8880b9a00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f18f5b6c058 CR3: 0000000055336000 CR4: 0000000000350ef0
Call Trace:
 <TASK>
 on_each_cpu_cond_mask+0x56/0xa0 kernel/smp.c:1154
 on_each_cpu include/linux/smp.h:71 [inline]
 text_poke_sync arch/x86/kernel/alternative.c:1231 [inline]
 text_poke_bp_batch+0x233/0x6c0 arch/x86/kernel/alternative.c:1419
 text_poke_bp+0xad/0x110 arch/x86/kernel/alternative.c:1635
 arch_static_call_transform+0x4d/0x90 arch/x86/kernel/static_call.c:107
 __static_call_update+0xcf/0x620 kernel/static_call_inline.c:136
 tracepoint_update_call kernel/tracepoint.c:317 [inline]
 tracepoint_remove_func kernel/tracepoint.c:441 [inline]
 tracepoint_probe_unregister+0x9d0/0xc30 kernel/tracepoint.c:551
 bpf_raw_tp_link_release+0x51/0xa0 kernel/bpf/syscall.c:3110
 bpf_link_free+0xe6/0x1b0 kernel/bpf/syscall.c:2693
 bpf_link_put+0x161/0x1b0 kernel/bpf/syscall.c:2719
 bpf_link_release+0x33/0x40 kernel/bpf/syscall.c:2728
 __fput+0x277/0x9d0 fs/file_table.c:317
 task_work_run+0xdd/0x1a0 kernel/task_work.c:177
 resume_user_mode_work include/linux/resume_user_mode.h:49 [inline]
 exit_to_user_mode_loop kernel/entry/common.c:169 [inline]
 exit_to_user_mode_prepare+0x23c/0x250 kernel/entry/common.c:201
 __syscall_exit_to_user_mode_work kernel/entry/common.c:283 [inline]
 syscall_exit_to_user_mode+0x19/0x50 kernel/entry/common.c:294
 do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86
 entry_SYSCALL_64_after_hwframe+0x46/0xb0
RIP: 0033:0x7f340c03bd4b
Code: 0f 05 48 3d 00 f0 ff ff 77 45 c3 0f 1f 40 00 48 83 ec 18 89 7c 24 0c e8 63 fc ff ff 8b 7c 24 0c 41 89 c0 b8 03 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 35 44 89 c7 89 44 24 0c e8 a1 fc ff ff 8b 44
RSP: 002b:00007ffe5f7eb9d0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003
RAX: 0000000000000000 RBX: 0000000000000005 RCX: 00007f340c03bd4b
RDX: 0000001b33820000 RSI: 00007f340be01058 RDI: 0000000000000004
RBP: 00007f340c19d960 R08: 0000000000000000 R09: 00000000d1add44d
R10: 00007ffe5f7f0090 R11: 0000000000000293 R12: 0000000000272f67
R13: 00007ffe5f7ebad0 R14: 00007f340c19c100 R15: 0000000000000032
 </TASK>
Sending NMI from CPU 0 to CPUs 1:
NMI backtrace for cpu 1
CPU: 1 PID: 2966 Comm: klogd Not tainted 5.19.0-rc3-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:__sanitizer_cov_trace_const_cmp1+0x4/0x20 kernel/kcov.c:283
Code: 00 00 00 0f 1f 00 48 8b 0c 24 48 89 f2 48 89 fe bf 06 00 00 00 e9 fc fe ff ff 66 66 2e 0f 1f 84 00 00 00 00 00 90 48 8b 0c 24 <40> 0f b6 d6 40 0f b6 f7 bf 01 00 00 00 e9 da fe ff ff 66 2e 0f 1f
RSP: 0018:ffffc900001f0e38 EFLAGS: 00000046
RAX: 0000000000000001 RBX: ffff88807a4a9b40 RCX: ffffffff816ab65d
RDX: fffffbfff1b770a3 RSI: 0000000000000001 RDI: 0000000000000000
RBP: 0000000000000001 R08: 0000000000000000 R09: ffffffff8dbb8517
R10: fffffbfff1b770a2 R11: 0000000000000001 R12: 0000000000000001
R13: ffff8880b9b2a600 R14: ffff8880b9b2a500 R15: 0000000000000001
FS:  00007faec0559800(0000) GS:ffff8880b9b00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f0a696d5400 CR3: 0000000022627000 CR4: 0000000000350ee0
Call Trace:
 <IRQ>
 trace_hrtimer_expire_exit include/trace/events/timer.h:282 [inline]
 __run_hrtimer kernel/time/hrtimer.c:1688 [inline]
 __hrtimer_run_queues+0x22d/0xe50 kernel/time/hrtimer.c:1749
 hrtimer_interrupt+0x31c/0x790 kernel/time/hrtimer.c:1811
 local_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1095 [inline]
 __sysvec_apic_timer_interrupt+0x146/0x530 arch/x86/kernel/apic/apic.c:1112
 sysvec_apic_timer_interrupt+0x8e/0xc0 arch/x86/kernel/apic/apic.c:1106
 </IRQ>
 <TASK>
 asm_sysvec_apic_timer_interrupt+0x1b/0x20 arch/x86/include/asm/idtentry.h:649
RIP: 0010:do_slab_free mm/slub.c:3448 [inline]
RIP: 0010:___cache_free+0xc4/0x400 mm/slub.c:3514
Code: 00 49 89 ef 48 89 ef e8 ea 53 ff ff 48 8b 00 f6 c4 02 74 12 4d 85 ff 74 0d 4c 8b 7d 38 4d 85 ff 0f 85 c4 00 00 00 49 8b 45 00 <65> 48 03 05 ac 13 3b 7e 48 8b 50 08 4c 39 60 10 0f 85 d9 02 00 00
RSP: 0018:ffffc90002d6f838 EFLAGS: 00000246
RAX: 0000000000040f50 RBX: ffff888048dc9100 RCX: 0000000000000000
RDX: 0000000000000000 RSI: ffffffff81364ca4 RDI: ffffea0001237200
RBP: ffffea0001237200 R08: 0000000000000007 R09: 0000000000000000
R10: 0000000000000000 R11: 1ffffd40002a5800 R12: ffffea0001237200
R13: ffff888140007500 R14: ffff888048dc9100 R15: 0000000000000000
 qlink_free mm/kasan/quarantine.c:168 [inline]
 qlist_free_all+0x6a/0x170 mm/kasan/quarantine.c:187
 kasan_quarantine_reduce+0x180/0x200 mm/kasan/quarantine.c:294
 __kasan_slab_alloc+0xa2/0xc0 mm/kasan/common.c:446
 kasan_slab_alloc include/linux/kasan.h:224 [inline]
 slab_post_alloc_hook mm/slab.h:750 [inline]
 slab_alloc_node mm/slub.c:3214 [inline]
 __kmalloc_node_track_caller+0x238/0x360 mm/slub.c:4950
 kmalloc_reserve net/core/skbuff.c:354 [inline]
 __alloc_skb+0xde/0x340 net/core/skbuff.c:426
 alloc_skb include/linux/skbuff.h:1426 [inline]
 alloc_skb_with_frags+0x93/0x730 net/core/skbuff.c:5992
 sock_alloc_send_pskb+0x793/0x920 net/core/sock.c:2662
 unix_dgram_sendmsg+0x425/0x1ad0 net/unix/af_unix.c:1895
 sock_sendmsg_nosec net/socket.c:714 [inline]
 sock_sendmsg+0xcf/0x120 net/socket.c:734
 __sys_sendto+0x21a/0x320 net/socket.c:2119
 __do_sys_sendto net/socket.c:2131 [inline]
 __se_sys_sendto net/socket.c:2127 [inline]
 __x64_sys_sendto+0xdd/0x1b0 net/socket.c:2127
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x46/0xb0
RIP: 0033:0x7faec06f50ac
Code: 89 02 48 c7 c0 ff ff ff ff eb b8 0f 1f 00 41 89 ca 64 8b 04 25 18 00 00 00 85 c0 75 19 45 31 c9 45 31 c0 b8 2c 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 64 c3 0f 1f 00 55 48 83 ec 20 48 89 54 24 10
RSP: 002b:00007ffd5b74b4c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002c
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007faec06f50ac
RDX: 000000000000004a RSI: 00005574a6c2c5c0 RDI: 0000000000000003
RBP: 00005574a6c22910 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000004000 R11: 0000000000000246 R12: 0000000000000014
R13: 0000000000000001 R14: 00007faec087077d R15: 00007ffd5b74b5d8
 </TASK>
----------------
Code disassembly (best guess):
   0:	0f 0b                	ud2
   2:	48 83 c4 60          	add    $0x60,%rsp
   6:	5b                   	pop    %rbx
   7:	5d                   	pop    %rbp
   8:	41 5c                	pop    %r12
   a:	c3                   	retq
   b:	48 05 00 80 00 00    	add    $0x8000,%rax
  11:	48 89 fb             	mov    %rdi,%rbx
  14:	48 39 c7             	cmp    %rax,%rdi
  17:	0f 82 2b 0b 6d 07    	jb     0x76d0b48
  1d:	eb e1                	jmp    0x0
  1f:	cc                   	int3
  20:	cc                   	int3
  21:	cc                   	int3
  22:	cc                   	int3
  23:	cc                   	int3
  24:	cc                   	int3
  25:	cc                   	int3
  26:	48 8b 0c 24          	mov    (%rsp),%rcx
* 2a:	89 f6                	mov    %esi,%esi <-- trapping instruction
  2c:	31 d2                	xor    %edx,%edx
  2e:	e9 b3 fa ff ff       	jmpq   0xfffffae6
  33:	0f 1f 00             	nopl   (%rax)
  36:	48 8b 0c 24          	mov    (%rsp),%rcx
  3a:	89 f6                	mov    %esi,%esi
  3c:	ba                   	.byte 0xba
  3d:	01 00                	add    %eax,(%rax)

Crashes (1):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2022/06/20 14:05 upstream a111daf0c53a 8f633d84 .config console log report info ci-upstream-kasan-gce-root INFO: rcu detected stall in unix_dgram_sendmsg
* Struck through repros no longer work on HEAD.