syzbot


INFO: rcu detected stall in security_file_open

Status: upstream: reported on 2024/07/20 06:20
Reported-by: syzbot+180f17e6835d145da8c8@syzkaller.appspotmail.com
First crash: 49d, last: 49d
Similar bugs (8)
Kernel Title Repro Cause bisect Fix bisect Count Last Reported Patched Status
upstream INFO: rcu detected stall in security_file_open (5) tomoyo 4 1018d 1128d 0/27 closed as invalid on 2022/02/08 09:50
upstream INFO: rcu detected stall in security_file_open (3) afs C done done 2 1439d 1438d 15/27 fixed on 2020/11/16 12:12
upstream INFO: rcu detected stall in security_file_open kernel 5 1739d 1740d 0/27 closed as invalid on 2019/12/04 14:04
upstream INFO: rcu detected stall in security_file_open (2) kernel 2 1704d 1704d 0/27 closed as invalid on 2020/01/08 05:23
linux-6.1 INFO: rcu detected stall in security_file_open 1 354d 354d 0/3 auto-obsoleted due to no activity on 2023/12/28 22:15
upstream INFO: rcu detected stall in security_file_open (4) tomoyo 1 1237d 1237d 0/27 auto-closed as invalid on 2021/06/18 10:54
linux-6.1 INFO: rcu detected stall in security_file_open (2) 1 10d 10d 0/3 upstream: reported on 2024/08/28 07:18
upstream INFO: rcu detected stall in security_file_open (6) tomoyo C error 34 13d 438d 0/27 closed as dup on 2023/06/27 10:07

Sample crash report:
rcu: INFO: rcu_preempt detected stalls on CPUs/tasks:
rcu: 	Tasks blocked on level-0 rcu_node (CPUs 0-1): P2962/1:b..l
	(detected by 0, t=10502 jiffies, g=22769, q=20)
task:udevd           state:R  running task     stack:22168 pid: 2962 ppid:     1 flags:0x00004002
Call Trace:
 <TASK>
 context_switch kernel/sched/core.c:5030 [inline]
 __schedule+0x12c4/0x45b0 kernel/sched/core.c:6376
 preempt_schedule_irq+0xf7/0x1c0 kernel/sched/core.c:6780
 irqentry_exit+0x53/0x80 kernel/entry/common.c:432
 asm_sysvec_apic_timer_interrupt+0x16/0x20 arch/x86/include/asm/idtentry.h:638
RIP: 0010:lock_acquire+0x252/0x4f0 kernel/locking/lockdep.c:5627
Code: 2b 00 74 08 4c 89 f7 e8 5c 82 67 00 f6 44 24 61 02 0f 85 84 01 00 00 41 f7 c7 00 02 00 00 74 01 fb 48 c7 44 24 40 0e 36 e0 45 <4b> c7 44 25 00 00 00 00 00 43 c7 44 25 09 00 00 00 00 43 c7 44 25
RSP: 0018:ffffc900012def40 EFLAGS: 00000206
RAX: 0000000000000001 RBX: 1ffff9200025bdf4 RCX: 1ffff9200025bd94
RDX: dffffc0000000000 RSI: ffffffff8a8b3ca0 RDI: ffffffff8ad8f700
RBP: ffffc900012df0a0 R08: dffffc0000000000 R09: fffffbfff1f7f419
R10: 0000000000000000 R11: dffffc0000000001 R12: 1ffff9200025bdf0
R13: dffffc0000000000 R14: ffffc900012defa0 R15: 0000000000000246
 rcu_lock_acquire+0x2a/0x30 include/linux/rcupdate.h:312
 rcu_read_lock include/linux/rcupdate.h:739 [inline]
 is_bpf_text_address+0x1d/0x260 kernel/bpf/core.c:721
 kernel_text_address kernel/extable.c:151 [inline]
 __kernel_text_address+0x94/0x100 kernel/extable.c:105
 unwind_get_return_address+0x49/0x80 arch/x86/kernel/unwind_orc.c:323
 arch_stack_walk+0xf3/0x140 arch/x86/kernel/stacktrace.c:26
 stack_trace_save+0x113/0x1c0 kernel/stacktrace.c:122
 kasan_save_stack mm/kasan/common.c:38 [inline]
 kasan_set_track+0x4b/0x80 mm/kasan/common.c:46
 kasan_set_free_info+0x1f/0x40 mm/kasan/generic.c:360
 ____kasan_slab_free+0xd8/0x120 mm/kasan/common.c:366
 kasan_slab_free include/linux/kasan.h:230 [inline]
 slab_free_hook mm/slub.c:1705 [inline]
 slab_free_freelist_hook+0xdd/0x160 mm/slub.c:1731
 slab_free mm/slub.c:3499 [inline]
 kfree+0xf1/0x270 mm/slub.c:4559
 tomoyo_check_open_permission+0x373/0x490 security/tomoyo/file.c:786
 security_file_open+0x5f/0xa0 security/security.c:1668
 do_dentry_open+0x315/0xfb0 fs/open.c:813
 do_open fs/namei.c:3608 [inline]
 path_openat+0x2705/0x2f20 fs/namei.c:3742
 do_filp_open+0x21c/0x460 fs/namei.c:3769
 do_sys_openat2+0x13b/0x4f0 fs/open.c:1253
 do_sys_open fs/open.c:1269 [inline]
 __do_sys_openat fs/open.c:1285 [inline]
 __se_sys_openat fs/open.c:1280 [inline]
 __x64_sys_openat+0x243/0x290 fs/open.c:1280
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x3b/0xb0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x66/0xd0
RIP: 0033:0x7f46cd7da477
RSP: 002b:00007ffd27cfa1b8 EFLAGS: 00000287 ORIG_RAX: 0000000000000101
RAX: ffffffffffffffda RBX: 000055d549ebba40 RCX: 00007f46cd7da477
RDX: 0000000000090800 RSI: 000055d549eb2650 RDI: 00000000ffffff9c
RBP: 000055d549f02040 R08: 0000000000090800 R09: 000055d549eb2650
R10: 0000000000000000 R11: 0000000000000287 R12: 000055d549eb2650
R13: 00000000000000ff R14: 000055d5481091c4 R15: 0000000000000000
 </TASK>
rcu: rcu_preempt kthread starved for 10523 jiffies! g22769 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=1
rcu: 	Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior.
rcu: RCU grace-period kthread stack dump:
task:rcu_preempt     state:I stack:27256 pid:   15 ppid:     2 flags:0x00004000
Call Trace:
 <TASK>
 context_switch kernel/sched/core.c:5030 [inline]
 __schedule+0x12c4/0x45b0 kernel/sched/core.c:6376
 schedule+0x11b/0x1f0 kernel/sched/core.c:6459
 schedule_timeout+0x1b9/0x300 kernel/time/timer.c:1914
 rcu_gp_fqs_loop+0x2bf/0x1080 kernel/rcu/tree.c:1972
 rcu_gp_kthread+0xa4/0x360 kernel/rcu/tree.c:2145
 kthread+0x3f6/0x4f0 kernel/kthread.c:334
 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:287
 </TASK>
rcu: Stack dump where RCU GP kthread last ran:
Sending NMI from CPU 0 to CPUs 1:
NMI backtrace for cpu 1
CPU: 1 PID: 3847 Comm: kworker/u4:11 Not tainted 5.15.163-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024
Workqueue: writeback wb_workfn (flush-8:0)
RIP: 0010:csd_lock_wait kernel/smp.c:440 [inline]
RIP: 0010:smp_call_function_many_cond+0xa9d/0xd90 kernel/smp.c:969
Code: 45 8b 7d 00 44 89 fe 83 e6 01 31 ff e8 5c cf 0b 00 41 83 e7 01 75 07 e8 f1 cb 0b 00 eb 41 f3 90 48 b8 00 00 00 00 00 fc ff df <0f> b6 04 03 84 c0 75 11 41 f7 45 00 01 00 00 00 74 1e e8 cc cb 0b
RSP: 0018:ffffc90003106500 EFLAGS: 00000293
RAX: dffffc0000000000 RBX: 1ffff11017348509 RCX: ffff88801ff85940
RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000
RBP: ffffc90003106640 R08: ffffffff81749214 R09: ffffed101736767b
R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000000
R13: ffff8880b9a42848 R14: ffff8880b9b3b3c0 R15: 0000000000000001
FS:  0000000000000000(0000) GS:ffff8880b9b00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fba7c507ffc CR3: 000000007e87c000 CR4: 00000000003506e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 <NMI>
 </NMI>
 <TASK>
 on_each_cpu_cond_mask+0x3b/0x80 kernel/smp.c:1135
 __flush_tlb_multi arch/x86/include/asm/paravirt.h:87 [inline]
 flush_tlb_multi arch/x86/mm/tlb.c:900 [inline]
 flush_tlb_mm_range+0x2a5/0x4a0 arch/x86/mm/tlb.c:986
 flush_tlb_page arch/x86/include/asm/tlbflush.h:239 [inline]
 ptep_clear_flush+0x112/0x150 mm/pgtable-generic.c:97
 page_mkclean_one+0x428/0x7b0 mm/rmap.c:938
 rmap_walk_file+0x3f8/0x600 mm/rmap.c:2378
 rmap_walk mm/rmap.c:2396 [inline]
 page_mkclean+0x330/0x490 mm/rmap.c:1006
 clear_page_dirty_for_io+0x3ce/0xa60 mm/page-writeback.c:2749
 mpage_submit_page+0x90/0x230 fs/ext4/inode.c:2081
 mpage_process_page_bufs+0x6c8/0x8b0 fs/ext4/inode.c:2215
 mpage_prepare_extent_to_map+0xc9d/0x1150 fs/ext4/inode.c:2643
 ext4_writepages+0xcd0/0x3d10 fs/ext4/inode.c:2771
 do_writepages+0x481/0x730 mm/page-writeback.c:2386
 __writeback_single_inode+0x15b/0xe30 fs/fs-writeback.c:1647
 writeback_sb_inodes+0xbce/0x1a40 fs/fs-writeback.c:1930
 __writeback_inodes_wb+0x114/0x400 fs/fs-writeback.c:2001
 wb_writeback+0x465/0xc50 fs/fs-writeback.c:2106
 wb_check_old_data_flush fs/fs-writeback.c:2206 [inline]
 wb_do_writeback fs/fs-writeback.c:2259 [inline]
 wb_workfn+0xc55/0x1130 fs/fs-writeback.c:2288
 process_one_work+0x8a1/0x10c0 kernel/workqueue.c:2310
 worker_thread+0xaca/0x1280 kernel/workqueue.c:2457
 kthread+0x3f6/0x4f0 kernel/kthread.c:334
 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:287
 </TASK>

Crashes (1):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2024/07/20 06:19 linux-5.15.y 7c6d66f0266f 890ce4f3 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-5-15-kasan INFO: rcu detected stall in security_file_open
* Struck through repros no longer work on HEAD.