syzbot


INFO: rcu detected stall in security_file_open

Status: upstream: reported on 2024/07/20 06:20
Reported-by: syzbot+180f17e6835d145da8c8@syzkaller.appspotmail.com
First crash: 124d, last: 38d
Similar bugs (8)
Kernel Title Repro Cause bisect Fix bisect Count Last Reported Patched Status
upstream INFO: rcu detected stall in security_file_open (5) tomoyo 4 1093d 1203d 0/28 closed as invalid on 2022/02/08 09:50
upstream INFO: rcu detected stall in security_file_open (3) afs C done done 2 1514d 1513d 15/28 fixed on 2020/11/16 12:12
upstream INFO: rcu detected stall in security_file_open kernel 5 1814d 1815d 0/28 closed as invalid on 2019/12/04 14:04
upstream INFO: rcu detected stall in security_file_open (2) kernel 2 1779d 1779d 0/28 closed as invalid on 2020/01/08 05:23
linux-6.1 INFO: rcu detected stall in security_file_open 1 428d 428d 0/3 auto-obsoleted due to no activity on 2023/12/28 22:15
upstream INFO: rcu detected stall in security_file_open (4) tomoyo 1 1312d 1312d 0/28 auto-closed as invalid on 2021/06/18 10:54
linux-6.1 INFO: rcu detected stall in security_file_open (2) 1 85d 85d 0/3 upstream: reported on 2024/08/28 07:18
upstream INFO: rcu detected stall in security_file_open (6) tomoyo C error 113 6h15m 513d 0/28 closed as dup on 2023/06/27 10:07

Sample crash report:
rcu: INFO: rcu_preempt detected stalls on CPUs/tasks:
rcu: 	Tasks blocked on level-0 rcu_node (CPUs 0-1): P3026/2:b..l
	(detected by 0, t=10502 jiffies, g=19601, q=94)
task:udevd           state:R  running task     stack:24440 pid: 3026 ppid:     1 flags:0x00004002
Call Trace:
 <TASK>
 context_switch kernel/sched/core.c:5027 [inline]
 __schedule+0x12c4/0x45b0 kernel/sched/core.c:6373
 preempt_schedule_irq+0xf7/0x1c0 kernel/sched/core.c:6777
 irqentry_exit+0x53/0x80 kernel/entry/common.c:432
 asm_sysvec_apic_timer_interrupt+0x16/0x20 arch/x86/include/asm/idtentry.h:638
RIP: 0010:__sanitizer_cov_trace_const_cmp8+0x0/0x80 kernel/kcov.c:301
Code: 39 d0 77 22 89 f8 89 f6 48 c7 44 0a 08 05 00 00 00 48 89 44 0a 10 48 89 74 0a 18 4c 89 44 0a 20 49 ff c1 4c 89 09 c3 0f 1f 00 <4c> 8b 04 24 65 48 8b 0d 64 11 82 7e 65 8b 05 65 11 82 7e 25 00 01
RSP: 0018:ffffc90002da7380 EFLAGS: 00000293
RAX: ffffffff81aa8c13 RBX: 0000000000000ff1 RCX: ffff88807cc03b80
RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000003
RBP: ffff88801bdb1b00 R08: ffffffff81aa8bac R09: fffffbfff1bd2c16
R10: 0000000000000000 R11: dffffc0000000001 R12: ffff888075840070
R13: 0000000000000005 R14: ffff88807cc05308 R15: ffff888079658ff1
 copy_from_kernel_nofault+0xeb/0x2d0 mm/maccess.c:39
 prepend_copy fs/d_path.c:49 [inline]
 prepend fs/d_path.c:75 [inline]
 prepend_name fs/d_path.c:101 [inline]
 __prepend_path fs/d_path.c:133 [inline]
 prepend_path+0x4d4/0xb70 fs/d_path.c:173
 d_absolute_path+0x175/0x300 fs/d_path.c:235
 tomoyo_get_absolute_path security/tomoyo/realpath.c:101 [inline]
 tomoyo_realpath_from_path+0x2fd/0x5e0 security/tomoyo/realpath.c:276
 tomoyo_get_realpath security/tomoyo/file.c:151 [inline]
 tomoyo_check_open_permission+0x22c/0x490 security/tomoyo/file.c:771
 security_file_open+0x5f/0xa0 security/security.c:1668
 do_dentry_open+0x315/0xfb0 fs/open.c:813
 do_open fs/namei.c:3608 [inline]
 path_openat+0x2705/0x2f20 fs/namei.c:3742
 do_filp_open+0x21c/0x460 fs/namei.c:3769
 do_sys_openat2+0x13b/0x4f0 fs/open.c:1253
 do_sys_open fs/open.c:1269 [inline]
 __do_sys_openat fs/open.c:1285 [inline]
 __se_sys_openat fs/open.c:1280 [inline]
 __x64_sys_openat+0x243/0x290 fs/open.c:1280
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x3b/0xb0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x66/0xd0
RIP: 0033:0x7efccab7c9a4
RSP: 002b:00007ffd07ecdcf0 EFLAGS: 00000246 ORIG_RAX: 0000000000000101
RAX: ffffffffffffffda RBX: 0000000000000008 RCX: 00007efccab7c9a4
RDX: 0000000000080000 RSI: 00007ffd07ecde28 RDI: 00000000ffffff9c
RBP: 00007ffd07ecde28 R08: 0000000000000008 R09: 0000000000000001
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000080000
R13: 000055921677ab42 R14: 0000000000000001 R15: 0000000000000000
 </TASK>
rcu: rcu_preempt kthread timer wakeup didn't happen for 10519 jiffies! g19601 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x402
rcu: 	Possible timer handling issue on cpu=0 timer-softirq=11451
rcu: rcu_preempt kthread starved for 10520 jiffies! g19601 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x402 ->cpu=0
rcu: 	Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior.
rcu: RCU grace-period kthread stack dump:
task:rcu_preempt     state:I stack:26240 pid:   15 ppid:     2 flags:0x00004000
Call Trace:
 <TASK>
 context_switch kernel/sched/core.c:5027 [inline]
 __schedule+0x12c4/0x45b0 kernel/sched/core.c:6373
 schedule+0x11b/0x1f0 kernel/sched/core.c:6456
 schedule_timeout+0x1b9/0x300 kernel/time/timer.c:1914
 rcu_gp_fqs_loop+0x2bf/0x1080 kernel/rcu/tree.c:1972
 rcu_gp_kthread+0xa4/0x360 kernel/rcu/tree.c:2145
 kthread+0x3f6/0x4f0 kernel/kthread.c:334
 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:287
 </TASK>
rcu: Stack dump where RCU GP kthread last ran:
NMI backtrace for cpu 0
CPU: 0 PID: 0 Comm: swapper/0 Not tainted 5.15.167-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
Call Trace:
 <IRQ>
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0x1e3/0x2d0 lib/dump_stack.c:106
 nmi_cpu_backtrace+0x46a/0x4a0 lib/nmi_backtrace.c:111
 nmi_trigger_cpumask_backtrace+0x181/0x2a0 lib/nmi_backtrace.c:62
 trigger_single_cpu_backtrace include/linux/nmi.h:166 [inline]
 rcu_check_gp_kthread_starvation+0x1d2/0x240 kernel/rcu/tree_stall.h:487
 print_other_cpu_stall+0x137a/0x14d0 kernel/rcu/tree_stall.h:592
 check_cpu_stall kernel/rcu/tree_stall.h:745 [inline]
 rcu_pending kernel/rcu/tree.c:3932 [inline]
 rcu_sched_clock_irq+0xa38/0x1150 kernel/rcu/tree.c:2619
 update_process_times+0x196/0x200 kernel/time/timer.c:1818
 tick_sched_handle kernel/time/tick-sched.c:254 [inline]
 tick_sched_timer+0x386/0x550 kernel/time/tick-sched.c:1473
 __run_hrtimer kernel/time/hrtimer.c:1688 [inline]
 __hrtimer_run_queues+0x55b/0xcf0 kernel/time/hrtimer.c:1752
 hrtimer_interrupt+0x392/0x980 kernel/time/hrtimer.c:1814
 local_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1085 [inline]
 __sysvec_apic_timer_interrupt+0x139/0x470 arch/x86/kernel/apic/apic.c:1102
 sysvec_apic_timer_interrupt+0x8c/0xb0 arch/x86/kernel/apic/apic.c:1096
 </IRQ>
 <TASK>
 asm_sysvec_apic_timer_interrupt+0x16/0x20 arch/x86/include/asm/idtentry.h:638
RIP: 0010:native_save_fl arch/x86/include/asm/irqflags.h:22 [inline]
RIP: 0010:arch_local_save_flags arch/x86/include/asm/irqflags.h:70 [inline]
RIP: 0010:arch_irqs_disabled arch/x86/include/asm/irqflags.h:132 [inline]
RIP: 0010:acpi_safe_halt drivers/acpi/processor_idle.c:109 [inline]
RIP: 0010:acpi_idle_do_entry+0x10f/0x340 drivers/acpi/processor_idle.c:562
Code: 82 42 f7 48 83 e3 08 0f 85 0a 01 00 00 4c 8d 74 24 20 e8 c4 fe 48 f7 0f 1f 44 00 00 e8 0a 7e 42 f7 0f 00 2d 73 5c a5 00 fb f4 <4c> 89 f3 48 c1 eb 03 42 80 3c 3b 00 74 08 4c 89 f7 e8 8b 48 8c f7
RSP: 0018:ffffffff8c607b80 EFLAGS: 000002d3
RAX: ffffffff8a3ddc66 RBX: 0000000000000000 RCX: ffffffff8c6bd5c0
RDX: 0000000000000000 RSI: ffffffff8a8b2b00 RDI: ffffffff8ad904c0
RBP: ffffffff8c607c10 R08: ffffffff8186db50 R09: fffffbfff18d7ab9
R10: 0000000000000000 R11: dffffc0000000001 R12: 1ffffffff18c0f70
R13: ffff888146377004 R14: ffffffff8c607ba0 R15: dffffc0000000000
 acpi_idle_enter+0x352/0x4f0 drivers/acpi/processor_idle.c:697
 cpuidle_enter_state+0x521/0xef0 drivers/cpuidle/cpuidle.c:237
 cpuidle_enter+0x59/0x90 drivers/cpuidle/cpuidle.c:351
 call_cpuidle kernel/sched/idle.c:158 [inline]
 cpuidle_idle_call kernel/sched/idle.c:239 [inline]
 do_idle+0x3e4/0x670 kernel/sched/idle.c:306
 cpu_startup_entry+0x14/0x20 kernel/sched/idle.c:403
 start_kernel+0x48c/0x540 init/main.c:1140
 secondary_startup_64_no_verify+0xb1/0xbb
 </TASK>

Crashes (3):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2024/10/14 08:06 linux-5.15.y 3a5928702e71 084d8178 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-5-15-kasan INFO: rcu detected stall in security_file_open
2024/10/10 12:59 linux-5.15.y 3a5928702e71 0278d004 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-5-15-kasan INFO: rcu detected stall in security_file_open
2024/07/20 06:19 linux-5.15.y 7c6d66f0266f 890ce4f3 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-5-15-kasan INFO: rcu detected stall in security_file_open
* Struck through repros no longer work on HEAD.