syzbot


INFO: rcu detected stall in security_file_ioctl (9)

Status: upstream: reported on 2024/11/22 01:19
Subsystems: mm
[Documentation on labels]
Reported-by: syzbot+b6f8640465bdf47ca708@syzkaller.appspotmail.com
First crash: 280d, last: 8d17h
Discussions (1)
Title Replies (including bot) Last reply
[syzbot] [bpf?] INFO: rcu detected stall in security_file_ioctl (9) 0 (1) 2024/11/22 01:19
Similar bugs (10)
Kernel Title Repro Cause bisect Fix bisect Count Last Reported Patched Status
upstream INFO: rcu detected stall in security_file_ioctl kernel 7 1993d 1994d 0/28 closed as invalid on 2019/12/04 14:04
upstream INFO: rcu detected stall in security_file_ioctl (2) kernel 6 1958d 1958d 0/28 closed as invalid on 2020/01/08 05:23
upstream INFO: rcu detected stall in security_file_ioctl (7) mm 1 547d 547d 0/28 auto-obsoleted due to no activity on 2024/02/17 10:34
upstream INFO: rcu detected stall in security_file_ioctl (4) tomoyo 1 1769d 1769d 0/28 auto-closed as invalid on 2020/10/13 12:41
linux-5.15 INFO: rcu detected stall in security_file_ioctl origin:upstream missing-backport syz done 2 264d 328d 0/3 upstream: reported syz repro on 2024/06/25 09:44
upstream INFO: rcu detected stall in security_file_ioctl (8) tomoyo C error done 8 321d 361d 26/28 fixed on 2024/08/06 16:46
upstream INFO: rcu detected stall in security_file_ioctl (6) kernel 1 1119d 1119d 0/28 auto-closed as invalid on 2022/06/24 22:52
linux-6.1 INFO: rcu detected stall in security_file_ioctl origin:upstream C 1 26d 454d 0/3 upstream: reported C repro on 2024/02/20 18:28
upstream INFO: rcu detected stall in security_file_ioctl (3) kernel 4 1958d 1958d 0/28 closed as invalid on 2020/01/09 08:13
upstream INFO: rcu detected stall in security_file_ioctl (5) tomoyo 9 1215d 1454d 0/28 closed as invalid on 2022/02/08 10:00

Sample crash report:
GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog
GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog
GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog
GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog
rcu: INFO: rcu_preempt detected stalls on CPUs/tasks:
rcu: 	1-...!: (8 ticks this GP) idle=6cb4/1/0x4000000000000000 softirq=178718/178718 fqs=4
rcu: 	(detected by 0, t=10505 jiffies, g=175749, q=455 ncpus=2)
Sending NMI from CPU 0 to CPUs 1:
NMI backtrace for cpu 1
CPU: 1 UID: 0 PID: 23657 Comm: syz.8.4636 Not tainted 6.15.0-rc5-syzkaller-00275-gbec6f00f120e #0 PREEMPT(full) 
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
RIP: 0010:arch_irqs_disabled_flags arch/x86/include/asm/irqflags.h:146 [inline]
RIP: 0010:arch_irqs_disabled arch/x86/include/asm/irqflags.h:153 [inline]
RIP: 0010:__raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:151 [inline]
RIP: 0010:_raw_spin_unlock_irqrestore+0x93/0x110 kernel/locking/spinlock.c:194
Code: 75 08 e8 c0 93 45 f6 4c 89 f7 e8 e8 2a 46 f6 f7 c3 00 02 00 00 74 05 e8 ab b2 6e f6 48 c7 44 24 20 00 00 00 00 9c 8f 44 24 20 <f6> 44 24 21 02 75 4f f7 c3 00 02 00 00 74 01 fb bf 01 00 00 00 e8
RSP: 0018:ffffc90000a08ca0 EFLAGS: 00000046
RAX: 0000000000000001 RBX: 0000000000000016 RCX: 0000000000000001
RDX: 0000000000000000 RSI: 0000000000000004 RDI: ffff8880b89276c0
RBP: ffffc90000a08d30 R08: ffff8880b89276c3 R09: 1ffff11017124ed8
R10: dffffc0000000000 R11: ffffed1017124ed9 R12: dffffc0000000000
R13: dffffc0000000000 R14: ffff8880b89276c0 R15: 1ffff92000141194
FS:  00007f69cbf796c0(0000) GS:ffff8881261cc000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f0b69e99000 CR3: 000000003ce70000 CR4: 0000000000350ef0
Call Trace:
 <IRQ>
 __run_hrtimer kernel/time/hrtimer.c:1757 [inline]
 __hrtimer_run_queues+0x408/0xc60 kernel/time/hrtimer.c:1825
 hrtimer_interrupt+0x45b/0xaa0 kernel/time/hrtimer.c:1887
 local_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1038 [inline]
 __sysvec_apic_timer_interrupt+0x10b/0x410 arch/x86/kernel/apic/apic.c:1055
 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1049 [inline]
 sysvec_apic_timer_interrupt+0xa1/0xc0 arch/x86/kernel/apic/apic.c:1049
 </IRQ>
 <TASK>
 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702
RIP: 0010:console_flush_all+0x7f7/0xc40 kernel/printk/printk.c:3227
Code: 48 21 c3 0f 85 e9 01 00 00 e8 85 b5 1e 00 48 8b 5c 24 20 4d 85 f6 75 07 e8 76 b5 1e 00 eb 06 e8 6f b5 1e 00 fb 48 8b 44 24 28 <42> 80 3c 20 00 74 08 48 89 df e8 ea a9 80 00 48 8b 1b 48 8b 44 24
RSP: 0018:ffffc900047af720 EFLAGS: 00000293
RAX: 1ffffffff1cf3f9b RBX: ffffffff8e79fcd8 RCX: ffff88802f1d3c00
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
RBP: ffffc900047af870 R08: ffffffff8f7ed377 R09: 1ffffffff1efda6e
R10: dffffc0000000000 R11: fffffbfff1efda6f R12: dffffc0000000000
R13: 0000000000000001 R14: 0000000000000200 R15: ffffffff8e79fc80
 __console_flush_and_unlock kernel/printk/printk.c:3285 [inline]
 console_unlock+0xc4/0x270 kernel/printk/printk.c:3325
 vprintk_emit+0x5b7/0x7a0 kernel/printk/printk.c:2450
 _printk+0xcf/0x120 kernel/printk/printk.c:2475
 tomoyo_warn_oom+0x9c/0xf0 security/tomoyo/memory.c:24
 tomoyo_realpath_from_path+0x5b8/0x5d0 security/tomoyo/realpath.c:288
 tomoyo_get_realpath security/tomoyo/file.c:151 [inline]
 tomoyo_path_number_perm+0x1e8/0x5a0 security/tomoyo/file.c:723
 security_file_ioctl+0xcb/0x2d0 security/security.c:2913
 __do_sys_ioctl fs/ioctl.c:900 [inline]
 __se_sys_ioctl+0x47/0x170 fs/ioctl.c:892
 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
 do_syscall_64+0xf6/0x210 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f69cb18e969
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f69cbf79038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: ffffffffffffffda RBX: 00007f69cb3b5fa0 RCX: 00007f69cb18e969
RDX: 0000200000000100 RSI: 000000000000127f RDI: 0000000000000003
RBP: 00007f69cbf79090 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
R13: 0000000000000000 R14: 00007f69cb3b5fa0 R15: 00007ffd8fe69648
 </TASK>
rcu: rcu_preempt kthread starved for 10490 jiffies! g175749 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=0
rcu: 	Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior.
rcu: RCU grace-period kthread stack dump:
task:rcu_preempt     state:R  running task     stack:27304 pid:16    tgid:16    ppid:2      task_flags:0x208040 flags:0x00004000
Call Trace:
 <TASK>
 context_switch kernel/sched/core.c:5382 [inline]
 __schedule+0x16e2/0x4cd0 kernel/sched/core.c:6767
 __schedule_loop kernel/sched/core.c:6845 [inline]
 schedule+0x165/0x360 kernel/sched/core.c:6860
 schedule_timeout+0x12b/0x270 kernel/time/sleep_timeout.c:99
 rcu_gp_fqs_loop+0x301/0x1540 kernel/rcu/tree.c:2046
 rcu_gp_kthread+0x99/0x390 kernel/rcu/tree.c:2248
 kthread+0x711/0x8a0 kernel/kthread.c:464
 ret_from_fork+0x4e/0x80 arch/x86/kernel/process.c:153
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245
 </TASK>
rcu: Stack dump where RCU GP kthread last ran:
CPU: 0 UID: 0 PID: 20059 Comm: kworker/u8:4 Not tainted 6.15.0-rc5-syzkaller-00275-gbec6f00f120e #0 PREEMPT(full) 
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
Workqueue: events_unbound toggle_allocation_gate
RIP: 0010:csd_lock_wait kernel/smp.c:340 [inline]
RIP: 0010:smp_call_function_many_cond+0xe6e/0x11c0 kernel/smp.c:885
Code: 89 ee 83 e6 01 31 ff e8 20 6d 0b 00 41 83 e5 01 49 bd 00 00 00 00 00 fc ff df 75 07 e8 cb 68 0b 00 eb 37 f3 90 43 0f b6 04 2c <84> c0 75 10 41 f7 07 01 00 00 00 74 1e e8 b0 68 0b 00 eb e5 44 89
RSP: 0018:ffffc9000388f700 EFLAGS: 00000293
RAX: 0000000000000000 RBX: ffff8880b883ad40 RCX: ffff88802a595a00
RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000
RBP: ffffc9000388f860 R08: ffffffff8f7ed377 R09: 1ffffffff1efda6e
R10: dffffc0000000000 R11: fffffbfff1efda6f R12: 1ffff11017127e99
R13: dffffc0000000000 R14: 0000000000000001 R15: ffff8880b893f4c8
FS:  0000000000000000(0000) GS:ffff8881260cc000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000001b2e610ff8 CR3: 000000000dd36000 CR4: 0000000000350ef0
Call Trace:
 <TASK>
 on_each_cpu_cond_mask+0x3f/0x80 kernel/smp.c:1052
 on_each_cpu include/linux/smp.h:71 [inline]
 text_poke_sync arch/x86/kernel/alternative.c:2455 [inline]
 text_poke_bp_batch+0x319/0x940 arch/x86/kernel/alternative.c:2665
 text_poke_flush arch/x86/kernel/alternative.c:2856 [inline]
 text_poke_finish+0x30/0x50 arch/x86/kernel/alternative.c:2863
 arch_jump_label_transform_apply+0x1c/0x30 arch/x86/kernel/jump_label.c:146
 static_key_enable_cpuslocked+0x128/0x250 kernel/jump_label.c:210
 static_key_enable+0x1a/0x20 kernel/jump_label.c:223
 toggle_allocation_gate+0xad/0x240 mm/kfence/core.c:850
 process_one_work kernel/workqueue.c:3238 [inline]
 process_scheduled_works+0xade/0x17a0 kernel/workqueue.c:3319
 worker_thread+0x8a0/0xda0 kernel/workqueue.c:3400
 kthread+0x711/0x8a0 kernel/kthread.c:464
 ret_from_fork+0x4e/0x80 arch/x86/kernel/process.c:153
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245
 </TASK>
watchdog: BUG: soft lockup - CPU#0 stuck for 225s! [kworker/u8:4:20059]
Modules linked in:
irq event stamp: 7113607
hardirqs last  enabled at (7113606): [<ffffffff8b589aa5>] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:151 [inline]
hardirqs last  enabled at (7113606): [<ffffffff8b589aa5>] _raw_spin_unlock_irqrestore+0x85/0x110 kernel/locking/spinlock.c:194
hardirqs last disabled at (7113607): [<ffffffff8b560dbe>] sysvec_apic_timer_interrupt+0xe/0xc0 arch/x86/kernel/apic/apic.c:1049
softirqs last  enabled at (7113578): [<ffffffff8185d3ba>] __do_softirq kernel/softirq.c:613 [inline]
softirqs last  enabled at (7113578): [<ffffffff8185d3ba>] invoke_softirq kernel/softirq.c:453 [inline]
softirqs last  enabled at (7113578): [<ffffffff8185d3ba>] __irq_exit_rcu+0xca/0x1f0 kernel/softirq.c:680
softirqs last disabled at (7113587): [<ffffffff8185d3ba>] __do_softirq kernel/softirq.c:613 [inline]
softirqs last disabled at (7113587): [<ffffffff8185d3ba>] invoke_softirq kernel/softirq.c:453 [inline]
softirqs last disabled at (7113587): [<ffffffff8185d3ba>] __irq_exit_rcu+0xca/0x1f0 kernel/softirq.c:680
CPU: 0 UID: 0 PID: 20059 Comm: kworker/u8:4 Not tainted 6.15.0-rc5-syzkaller-00275-gbec6f00f120e #0 PREEMPT(full) 
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
Workqueue: events_unbound toggle_allocation_gate
RIP: 0010:__raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:152 [inline]
RIP: 0010:_raw_spin_unlock_irqrestore+0xa8/0x110 kernel/locking/spinlock.c:194
Code: 74 05 e8 ab b2 6e f6 48 c7 44 24 20 00 00 00 00 9c 8f 44 24 20 f6 44 24 21 02 75 4f f7 c3 00 02 00 00 74 01 fb bf 01 00 00 00 <e8> d3 34 38 f6 65 8b 05 5c a5 1c 07 85 c0 74 40 48 c7 04 24 0e 36
RSP: 0018:ffffc90000007c00 EFLAGS: 00000206
RAX: 5b78c0db63232200 RBX: 0000000000000216 RCX: 5b78c0db63232200
RDX: 0000000000000002 RSI: ffffffff8d74ac5b RDI: 0000000000000001
RBP: ffffc90000007c90 R08: ffffffff8f7ed377 R09: 1ffffffff1efda6e
R10: dffffc0000000000 R11: fffffbfff1efda6f R12: dffffc0000000000
R13: dffffc0000000000 R14: ffff8880b88276c0 R15: 1ffff92000000f80
FS:  0000000000000000(0000) GS:ffff8881260cc000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000001b2e610ff8 CR3: 000000000dd36000 CR4: 0000000000350ef0
Call Trace:
 <IRQ>
 __run_hrtimer kernel/time/hrtimer.c:1757 [inline]
 __hrtimer_run_queues+0x408/0xc60 kernel/time/hrtimer.c:1825
 hrtimer_run_softirq+0x187/0x2b0 kernel/time/hrtimer.c:1842
 handle_softirqs+0x286/0x870 kernel/softirq.c:579
 __do_softirq kernel/softirq.c:613 [inline]
 invoke_softirq kernel/softirq.c:453 [inline]
 __irq_exit_rcu+0xca/0x1f0 kernel/softirq.c:680
 irq_exit_rcu+0x9/0x30 kernel/softirq.c:696
 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1049 [inline]
 sysvec_apic_timer_interrupt+0xa6/0xc0 arch/x86/kernel/apic/apic.c:1049
 </IRQ>
 <TASK>
 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702
RIP: 0010:csd_lock_wait kernel/smp.c:340 [inline]
RIP: 0010:smp_call_function_many_cond+0xe69/0x11c0 kernel/smp.c:885
Code: 00 45 8b 2f 44 89 ee 83 e6 01 31 ff e8 20 6d 0b 00 41 83 e5 01 49 bd 00 00 00 00 00 fc ff df 75 07 e8 cb 68 0b 00 eb 37 f3 90 <43> 0f b6 04 2c 84 c0 75 10 41 f7 07 01 00 00 00 74 1e e8 b0 68 0b
RSP: 0018:ffffc9000388f700 EFLAGS: 00000293
RAX: ffffffff81b46780 RBX: ffff8880b883ad40 RCX: ffff88802a595a00
RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000
RBP: ffffc9000388f860 R08: ffffffff8f7ed377 R09: 1ffffffff1efda6e
R10: dffffc0000000000 R11: fffffbfff1efda6f R12: 1ffff11017127e99
R13: dffffc0000000000 R14: 0000000000000001 R15: ffff8880b893f4c8
 on_each_cpu_cond_mask+0x3f/0x80 kernel/smp.c:1052
 on_each_cpu include/linux/smp.h:71 [inline]
 text_poke_sync arch/x86/kernel/alternative.c:2455 [inline]
 text_poke_bp_batch+0x319/0x940 arch/x86/kernel/alternative.c:2665
 text_poke_flush arch/x86/kernel/alternative.c:2856 [inline]
 text_poke_finish+0x30/0x50 arch/x86/kernel/alternative.c:2863
 arch_jump_label_transform_apply+0x1c/0x30 arch/x86/kernel/jump_label.c:146
 static_key_enable_cpuslocked+0x128/0x250 kernel/jump_label.c:210
 static_key_enable+0x1a/0x20 kernel/jump_label.c:223
 toggle_allocation_gate+0xad/0x240 mm/kfence/core.c:850
 process_one_work kernel/workqueue.c:3238 [inline]
 process_scheduled_works+0xade/0x17a0 kernel/workqueue.c:3319
 worker_thread+0x8a0/0xda0 kernel/workqueue.c:3400
 kthread+0x711/0x8a0 kernel/kthread.c:464
 ret_from_fork+0x4e/0x80 arch/x86/kernel/process.c:153
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245
 </TASK>
Sending NMI from CPU 0 to CPUs 1:
NMI backtrace for cpu 1
CPU: 1 UID: 0 PID: 23657 Comm: syz.8.4636 Not tainted 6.15.0-rc5-syzkaller-00275-gbec6f00f120e #0 PREEMPT(full) 
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
RIP: 0010:_test_bit include/asm-generic/bitops/instrumented-non-atomic.h:141 [inline]
RIP: 0010:cpumask_test_cpu include/linux/cpumask.h:587 [inline]
RIP: 0010:cpu_online include/linux/cpumask.h:1143 [inline]
RIP: 0010:trace_hrtimer_cancel include/trace/events/timer.h:317 [inline]
RIP: 0010:debug_deactivate+0x47/0x200 kernel/time/hrtimer.c:491
Code: 0f 1f 44 00 00 e8 79 65 11 00 65 8b 1d 76 d5 c6 10 bf 07 00 00 00 89 de e8 a6 69 11 00 83 fb 07 77 6d e8 5c 65 11 00 41 89 de <c1> eb 06 48 8d 3c dd 70 d3 7e 8f be 08 00 00 00 e8 44 5c 73 00 31
RSP: 0018:ffffc90000a08d18 EFLAGS: 00000006
RAX: ffffffff81ae6ad4 RBX: 0000000000000001 RCX: ffff88802f1d3c00
RDX: 0000000000010000 RSI: 0000000000000001 RDI: 0000000000000007
RBP: ffffc90000a08e90 R08: ffffffff999f0623 R09: 1ffffffff333e0c4
R10: dffffc0000000000 R11: fffffbfff333e0c5 R12: ffff888059652340
R13: dffffc0000000000 R14: 0000000000000001 R15: ffff8880b89278c0
FS:  00007f69cbf796c0(0000) GS:ffff8881261cc000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f0b69e99000 CR3: 000000003ce70000 CR4: 0000000000350ef0
Call Trace:
 <IRQ>
 __run_hrtimer kernel/time/hrtimer.c:1729 [inline]
 __hrtimer_run_queues+0x2b0/0xc60 kernel/time/hrtimer.c:1825
 hrtimer_interrupt+0x45b/0xaa0 kernel/time/hrtimer.c:1887
 local_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1038 [inline]
 __sysvec_apic_timer_interrupt+0x10b/0x410 arch/x86/kernel/apic/apic.c:1055
 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1049 [inline]
 sysvec_apic_timer_interrupt+0xa1/0xc0 arch/x86/kernel/apic/apic.c:1049
 </IRQ>
 <TASK>
 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702
RIP: 0010:console_flush_all+0x7f7/0xc40 kernel/printk/printk.c:3227
Code: 48 21 c3 0f 85 e9 01 00 00 e8 85 b5 1e 00 48 8b 5c 24 20 4d 85 f6 75 07 e8 76 b5 1e 00 eb 06 e8 6f b5 1e 00 fb 48 8b 44 24 28 <42> 80 3c 20 00 74 08 48 89 df e8 ea a9 80 00 48 8b 1b 48 8b 44 24
RSP: 0018:ffffc900047af720 EFLAGS: 00000293
RAX: 1ffffffff1cf3f9b RBX: ffffffff8e79fcd8 RCX: ffff88802f1d3c00
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
RBP: ffffc900047af870 R08: ffffffff8f7ed377 R09: 1ffffffff1efda6e
R10: dffffc0000000000 R11: fffffbfff1efda6f R12: dffffc0000000000
R13: 0000000000000001 R14: 0000000000000200 R15: ffffffff8e79fc80
 __console_flush_and_unlock kernel/printk/printk.c:3285 [inline]
 console_unlock+0xc4/0x270 kernel/printk/printk.c:3325
 vprintk_emit+0x5b7/0x7a0 kernel/printk/printk.c:2450
 _printk+0xcf/0x120 kernel/printk/printk.c:2475
 tomoyo_warn_oom+0x9c/0xf0 security/tomoyo/memory.c:24
 tomoyo_realpath_from_path+0x5b8/0x5d0 security/tomoyo/realpath.c:288
 tomoyo_get_realpath security/tomoyo/file.c:151 [inline]
 tomoyo_path_number_perm+0x1e8/0x5a0 security/tomoyo/file.c:723
 security_file_ioctl+0xcb/0x2d0 security/security.c:2913
 __do_sys_ioctl fs/ioctl.c:900 [inline]
 __se_sys_ioctl+0x47/0x170 fs/ioctl.c:892
 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
 do_syscall_64+0xf6/0x210 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f69cb18e969
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f69cbf79038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: ffffffffffffffda RBX: 00007f69cb3b5fa0 RCX: 00007f69cb18e969
RDX: 0000200000000100 RSI: 000000000000127f RDI: 0000000000000003
RBP: 00007f69cbf79090 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
R13: 0000000000000000 R14: 00007f69cb3b5fa0 R15: 00007ffd8fe69648
 </TASK>

Crashes (68):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2025/05/11 02:25 upstream bec6f00f120e 77908e5f .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root INFO: rcu detected stall in security_file_ioctl
2025/05/04 20:57 upstream e8ab83e34bdc b0714e37 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce INFO: rcu detected stall in security_file_ioctl
2025/04/26 02:40 upstream 02ddfb981de8 c6b4fb39 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root INFO: rcu detected stall in security_file_ioctl
2025/04/21 13:05 upstream 9d7a0577c9db 2a20f901 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce INFO: rcu detected stall in security_file_ioctl
2025/04/17 20:47 upstream cfb2e2c57aef 2a6ededb .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root INFO: rcu detected stall in security_file_ioctl
2025/04/08 04:07 upstream 0af2f6be1b42 a2ada0e7 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root INFO: rcu detected stall in security_file_ioctl
2025/03/22 08:07 upstream 88d324e69ea9 c6512ef7 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root INFO: rcu detected stall in security_file_ioctl
2025/03/01 17:48 upstream 03d38806a902 c3901742 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root INFO: rcu detected stall in security_file_ioctl
2025/01/30 09:01 upstream 9c5968db9e62 afe4eff5 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root INFO: rcu detected stall in security_file_ioctl
2025/01/13 06:19 upstream be548645527a 6dbc6a9b .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root INFO: rcu detected stall in security_file_ioctl
2025/01/11 18:47 upstream 77a903cd8e5a 6dbc6a9b .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root INFO: rcu detected stall in security_file_ioctl
2024/12/14 12:02 upstream a446e965a188 7cbfbb3a .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root INFO: rcu detected stall in security_file_ioctl
2024/12/13 02:12 upstream 150b567e0d57 3547e30f .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce INFO: rcu detected stall in security_file_ioctl
2024/12/11 02:41 upstream 7cb1b4663150 cfc402b4 .config console log report info [disk image] [vmlinux] [kernel image] ci-qemu-gce-upstream-auto INFO: rcu detected stall in security_file_ioctl
2024/11/30 11:31 upstream 2ba9f676d0a2 68914665 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce INFO: rcu detected stall in security_file_ioctl
2024/11/25 07:47 upstream 9f16d5e6f220 68da6d95 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root INFO: rcu detected stall in security_file_ioctl
2024/11/14 00:42 upstream f1b785f4c787 a8c99394 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root INFO: rcu detected stall in security_file_ioctl
2024/11/10 19:36 upstream a9cda7c0ffed 6b856513 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce INFO: rcu detected stall in security_file_ioctl
2024/11/10 11:41 upstream de2f378f2b77 6b856513 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root INFO: rcu detected stall in security_file_ioctl
2024/10/28 07:50 upstream 284a2f899676 65e8686b .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root INFO: rcu detected stall in security_file_ioctl
2024/10/25 07:06 upstream ae90f6a6170d c79b8ca5 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root INFO: rcu detected stall in security_file_ioctl
2024/10/23 02:32 upstream c2ee9f594da8 15fa2979 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root INFO: rcu detected stall in security_file_ioctl
2024/10/21 08:45 upstream db87114dcf13 cd6fc0a3 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce INFO: rcu detected stall in security_file_ioctl
2024/10/16 22:07 upstream c964ced77262 666f77ed .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root INFO: rcu detected stall in security_file_ioctl
2024/10/15 10:21 upstream eca631b8fe80 14943bb8 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root INFO: rcu detected stall in security_file_ioctl
2024/10/12 02:17 upstream 9e4c6c1ad9a1 084d8178 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root INFO: rcu detected stall in security_file_ioctl
2024/10/08 19:45 upstream 5b7c893ed5ed 402f1df0 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root INFO: rcu detected stall in security_file_ioctl
2024/10/05 06:20 upstream 27cc6fdf7201 d7906eff .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce INFO: rcu detected stall in security_file_ioctl
2024/10/03 13:25 upstream 7ec462100ef9 d7906eff .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce INFO: rcu detected stall in security_file_ioctl
2024/09/26 17:20 upstream 11a299a7933e 0d19f247 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root INFO: rcu detected stall in security_file_ioctl
2024/09/21 14:35 upstream 1868f9d0260e 6f888b75 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce INFO: rcu detected stall in security_file_ioctl
2024/09/21 11:58 upstream 1868f9d0260e 6f888b75 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce INFO: rcu detected stall in security_file_ioctl
2024/08/12 12:03 upstream 7c626ce4bae1 6f4edef4 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root INFO: rcu detected stall in security_file_ioctl
2025/01/14 09:35 net 9e2bbab94b88 b1f1cd88 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: rcu detected stall in security_file_ioctl
2025/01/07 08:29 net 8c817eb26230 f3558dbf .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: rcu detected stall in security_file_ioctl
2025/01/06 22:09 net 8ce4f287524c f3558dbf .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: rcu detected stall in security_file_ioctl
2025/01/04 15:01 net aba74e639f8d f3558dbf .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: rcu detected stall in security_file_ioctl
2025/01/02 16:41 net 4f619d518db9 d3ccff63 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: rcu detected stall in security_file_ioctl
2024/12/28 20:53 net a024e377efed d3ccff63 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: rcu detected stall in security_file_ioctl
2024/12/20 14:22 net c0cc126882ba 1d58202c .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: rcu detected stall in security_file_ioctl
2024/12/20 10:07 net c0cc126882ba 1d58202c .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: rcu detected stall in security_file_ioctl
2024/12/12 14:12 net 15bfb14727bc 941924eb .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: rcu detected stall in security_file_ioctl
2024/12/04 12:51 net af8edaeddbc5 b50eb251 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: rcu detected stall in security_file_ioctl
2024/11/30 01:39 net f1cd565ce577 68914665 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: rcu detected stall in security_file_ioctl
2024/11/28 06:52 net 5dfd7d940094 5df23865 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: rcu detected stall in security_file_ioctl
2024/11/26 11:54 net 5d066766c5f1 11dbc254 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: rcu detected stall in security_file_ioctl
2024/11/01 21:32 net 0144c06c5890 f00eed24 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: rcu detected stall in security_file_ioctl
2024/11/01 11:07 net 0144c06c5890 96eb609f .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: rcu detected stall in security_file_ioctl
2024/10/18 12:45 net 07d6bf634bc8 666f77ed .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: rcu detected stall in security_file_ioctl
2025/04/23 08:22 net-next 0e0a7e3719bc 53a8b9bd .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce INFO: rcu detected stall in security_file_ioctl
2025/01/19 21:25 net-next 41c5d104f338 f2cb035c .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce INFO: rcu detected stall in security_file_ioctl
2025/01/12 06:32 net-next 7dc8f809b87d 6dbc6a9b .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce INFO: rcu detected stall in security_file_ioctl
2024/12/27 19:52 net-next 9268abe611b0 d3ccff63 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce INFO: rcu detected stall in security_file_ioctl
2024/12/07 18:07 net-next 860dbab69ad8 9ac0fdc6 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce INFO: rcu detected stall in security_file_ioctl
2024/12/02 23:09 net-next 65ae975e97d5 bb326ffb .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce INFO: rcu detected stall in security_file_ioctl
2024/11/28 17:07 net-next fcc79e1714e8 5df23865 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce INFO: rcu detected stall in security_file_ioctl
2024/11/25 01:29 net-next fcc79e1714e8 68da6d95 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce INFO: rcu detected stall in security_file_ioctl
2024/11/18 01:16 net-next 38f83a57aa8e cfe3a04a .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce INFO: rcu detected stall in security_file_ioctl
2024/11/17 07:49 net-next 38f83a57aa8e cfe3a04a .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce INFO: rcu detected stall in security_file_ioctl
2024/11/08 00:16 net-next 2a6f99ee1a80 c069283c .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce INFO: rcu detected stall in security_file_ioctl
2024/11/07 19:55 net-next 2a6f99ee1a80 c069283c .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce INFO: rcu detected stall in security_file_ioctl
2024/10/29 15:40 net-next ab101c553bc1 66aeb999 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce INFO: rcu detected stall in security_file_ioctl
2024/10/28 07:18 net-next 6d858708d465 65e8686b .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce INFO: rcu detected stall in security_file_ioctl
2024/10/23 18:50 net-next 6d858708d465 15fa2979 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce INFO: rcu detected stall in security_file_ioctl
2024/10/12 14:05 net-next d677aebd663d 084d8178 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce INFO: rcu detected stall in security_file_ioctl
2024/10/06 04:22 net-next d521db38f339 d7906eff .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce INFO: rcu detected stall in security_file_ioctl
2024/11/08 09:32 linux-next 929beafbe7ac 179b040e .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root INFO: rcu detected stall in security_file_ioctl
2025/04/28 03:09 bpf-next 91dbac407653 c6b4fb39 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce BUG: soft lockup in security_file_ioctl
* Struck through repros no longer work on HEAD.