syzbot


INFO: rcu detected stall in security_file_open (2)

Status: upstream: reported on 2024/08/28 07:18
Reported-by: syzbot+c8137155968acf081db3@syzkaller.appspotmail.com
First crash: 19d, last: 19d
Similar bugs (8)
Kernel Title Repro Cause bisect Fix bisect Count Last Reported Patched Status
upstream INFO: rcu detected stall in security_file_open (5) tomoyo 4 1027d 1137d 0/28 closed as invalid on 2022/02/08 09:50
upstream INFO: rcu detected stall in security_file_open (3) afs C done done 2 1448d 1447d 15/28 fixed on 2020/11/16 12:12
upstream INFO: rcu detected stall in security_file_open kernel 5 1748d 1749d 0/28 closed as invalid on 2019/12/04 14:04
upstream INFO: rcu detected stall in security_file_open (2) kernel 2 1713d 1713d 0/28 closed as invalid on 2020/01/08 05:23
linux-6.1 INFO: rcu detected stall in security_file_open 1 362d 362d 0/3 auto-obsoleted due to no activity on 2023/12/28 22:15
upstream INFO: rcu detected stall in security_file_open (4) tomoyo 1 1246d 1246d 0/28 auto-closed as invalid on 2021/06/18 10:54
linux-5.15 INFO: rcu detected stall in security_file_open 1 58d 58d 0/3 upstream: reported on 2024/07/20 06:20
upstream INFO: rcu detected stall in security_file_open (6) tomoyo C error 35 8d04h 447d 0/28 closed as dup on 2023/06/27 10:07

Sample crash report:
rcu: INFO: rcu_preempt detected stalls on CPUs/tasks:
rcu: 	Tasks blocked on level-0 rcu_node (CPUs 0-1): P3091/2:b..l
	(detected by 0, t=10502 jiffies, g=77105, q=205 ncpus=2)
task:udevd           state:R  running task     stack:22600 pid:3091  ppid:1      flags:0x00004002
Call Trace:
 <TASK>
 context_switch kernel/sched/core.c:5241 [inline]
 __schedule+0x143f/0x4570 kernel/sched/core.c:6558
 preempt_schedule_irq+0xf7/0x1c0 kernel/sched/core.c:6870
 irqentry_exit+0x53/0x80 kernel/entry/common.c:439
 asm_sysvec_apic_timer_interrupt+0x16/0x20 arch/x86/include/asm/idtentry.h:653
RIP: 0010:lock_acquire+0x26f/0x5a0 kernel/locking/lockdep.c:5666
Code: 2b 00 74 08 4c 89 f7 e8 3f aa 77 00 f6 44 24 61 02 0f 85 84 01 00 00 41 f7 c7 00 02 00 00 74 01 fb 48 c7 44 24 40 0e 36 e0 45 <4b> c7 44 25 00 00 00 00 00 43 c7 44 25 09 00 00 00 00 43 c7 44 25
RSP: 0018:ffffc9000319f260 EFLAGS: 00000206
RAX: 0000000000000001 RBX: 1ffff92000633e58 RCX: 1ffff92000633df8
RDX: dffffc0000000000 RSI: ffffffff8b0c13e0 RDI: ffffffff8b5d62c0
RBP: ffffc9000319f3a8 R08: dffffc0000000000 R09: fffffbfff20e7645
R10: 0000000000000000 R11: dffffc0000000001 R12: 1ffff92000633e54
R13: dffffc0000000000 R14: ffffc9000319f2c0 R15: 0000000000000246
 rcu_lock_acquire include/linux/rcupdate.h:350 [inline]
 rcu_read_lock include/linux/rcupdate.h:791 [inline]
 prepend_path+0x1f0/0xbe0 fs/d_path.c:167
 d_absolute_path+0x175/0x300 fs/d_path.c:233
 tomoyo_get_absolute_path security/tomoyo/realpath.c:101 [inline]
 tomoyo_realpath_from_path+0x2aa/0x5d0 security/tomoyo/realpath.c:271
 tomoyo_get_realpath security/tomoyo/file.c:151 [inline]
 tomoyo_check_open_permission+0x240/0x4c0 security/tomoyo/file.c:771
 security_file_open+0x5f/0xa0 security/security.c:1681
 do_dentry_open+0x308/0x10f0 fs/open.c:869
 do_open fs/namei.c:3628 [inline]
 path_openat+0x2644/0x2e60 fs/namei.c:3785
 do_filp_open+0x230/0x480 fs/namei.c:3812
 do_sys_openat2+0x13b/0x4f0 fs/open.c:1318
 do_sys_open fs/open.c:1334 [inline]
 __do_sys_openat fs/open.c:1350 [inline]
 __se_sys_openat fs/open.c:1345 [inline]
 __x64_sys_openat+0x243/0x290 fs/open.c:1345
 do_syscall_x64 arch/x86/entry/common.c:51 [inline]
 do_syscall_64+0x3b/0xb0 arch/x86/entry/common.c:81
 entry_SYSCALL_64_after_hwframe+0x68/0xd2
RIP: 0033:0x7f0a6cd6f477
RSP: 002b:00007fff0e6068e8 EFLAGS: 00000287 ORIG_RAX: 0000000000000101
RAX: ffffffffffffffda RBX: 000055fb077902c0 RCX: 00007f0a6cd6f477
RDX: 0000000000090800 RSI: 000055fb077973a0 RDI: 00000000ffffff9c
RBP: 000055fb077d0990 R08: 0000000000090800 R09: 000055fb077973a0
R10: 0000000000000000 R11: 0000000000000287 R12: 000055fb077973a0
R13: 00000000000000ff R14: 000055fb06a511c4 R15: 0000000000000000
 </TASK>
rcu: rcu_preempt kthread starved for 10340 jiffies! g77105 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=1
rcu: 	Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior.
rcu: RCU grace-period kthread stack dump:
task:rcu_preempt     state:R  running task     stack:25368 pid:16    ppid:2      flags:0x00004000
Call Trace:
 <TASK>
 context_switch kernel/sched/core.c:5241 [inline]
 __schedule+0x143f/0x4570 kernel/sched/core.c:6558
 schedule+0xbf/0x180 kernel/sched/core.c:6634
 schedule_timeout+0x1b9/0x300 kernel/time/timer.c:1965
 rcu_gp_fqs_loop+0x2d2/0x1150 kernel/rcu/tree.c:1706
 rcu_gp_kthread+0xa3/0x3b0 kernel/rcu/tree.c:1905
 kthread+0x28d/0x320 kernel/kthread.c:376
 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:295
 </TASK>
rcu: Stack dump where RCU GP kthread last ran:
Sending NMI from CPU 0 to CPUs 1:
NMI backtrace for cpu 1 skipped: idling at native_safe_halt arch/x86/include/asm/irqflags.h:51 [inline]
NMI backtrace for cpu 1 skipped: idling at arch_safe_halt arch/x86/include/asm/irqflags.h:89 [inline]
NMI backtrace for cpu 1 skipped: idling at acpi_safe_halt drivers/acpi/processor_idle.c:111 [inline]
NMI backtrace for cpu 1 skipped: idling at acpi_idle_do_entry+0x10f/0x340 drivers/acpi/processor_idle.c:567

Crashes (1):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2024/08/28 07:18 linux-6.1.y ee5e09825b81 6c853ff9 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-1-kasan INFO: rcu detected stall in security_file_open
* Struck through repros no longer work on HEAD.