Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp792940pxj; Fri, 7 May 2021 22:09:16 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzG2lvwK6m3sCVjX0qj+Ia/jzD/Hn3CGKpGfPu0z9esaFtW+sUzHrquaAa2pFG1HcwIvmQJ X-Received: by 2002:a17:902:b406:b029:ec:fbf2:4114 with SMTP id x6-20020a170902b406b02900ecfbf24114mr14038271plr.32.1620450556793; Fri, 07 May 2021 22:09:16 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1620450556; cv=none; d=google.com; s=arc-20160816; b=oM6U9ZBi/mqiTiadcFSGXO+QE/KiEabZUdJ+YFQ6oCTOUq+S0YRdRkkQ20VXIEtFbC YddB+MxGpIzQnC7bIcXAUBUvZPn0ClKx7eFboP6D/vqJ7RshSLqOD+TIAj3ThP2v0GoO fnibFgdIsMigUzBBvt25BfSJU1a/RoMYNhNiq3uIZSZYn1UW3pzAgjbqjYAI/BzFf7nc h5xILGMpt+qDlPFGLKRv3DdaYTQ1h3vlQ0vmK0mRgBryqb6Db5PhnaughHAs38Jp7lHJ 3STL1xHPdFvqWY/I3+/LMjxOeAam7OpgBa3e3Z4S+vruldwk+jEK+gAPlBLzkNA+pYVj SJ8w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:to:from:subject:message-id:date:mime-version; bh=GUKHVffTroMPkN1GTO/JKiOfk0hWwy68tj5egZoskrM=; b=bpw9KLkVOgPdOAE84kNOF+vbZXoqLsmYdMAGyCQsnUX8tBzJkWBHlX+5MKy4IABXg6 fnQhzkdP82zsArrEfUQfipMHI7fvwr41dcmorcSg5iOGyxMaWF5l2UpaHOHPD+U5l28/ wSKs2pcKrBQ7elN0k1esnGDU+pstL+XQx3oHM65FVUkkjflSmFFtKRBhxMErWgoSP0kP 7OxDLaLUiuF18/nfa96U//puydy+sVxkca0mrCTTNxD5kepBcFAkV765L98vytp3w0jP Tqj+ve9YkTLoYT1lUB0IlIYMWRmRT+a1BO9LbKmIKsgHxEKqyJHXbPDw4KjKMnOfc2B3 S6NA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=appspotmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id 136si9124406pfx.347.2021.05.07.22.09.05; Fri, 07 May 2021 22:09:16 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=appspotmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230349AbhEHFGX (ORCPT + 99 others); Sat, 8 May 2021 01:06:23 -0400 Received: from mail-io1-f69.google.com ([209.85.166.69]:43711 "EHLO mail-io1-f69.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229467AbhEHFGU (ORCPT ); Sat, 8 May 2021 01:06:20 -0400 Received: by mail-io1-f69.google.com with SMTP id r2-20020a5e95020000b0290435b891bacbso7432708ioj.10 for ; Fri, 07 May 2021 22:05:19 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:date:message-id:subject:from:to; bh=GUKHVffTroMPkN1GTO/JKiOfk0hWwy68tj5egZoskrM=; b=p/iZzFRtePVNXPgDXc1dAri4XczW0z3mzorNbczGKsBFTzdwpadSBbIlqvDLxzagUh 4l+C8u34pmFiV0uRPdx5yIACjp0FLmqGsdK5NpNwiqSts5tFfDWCGSIFEhMfKgoiTnQd gGfA+bl3KzbNTkN3AU9K0QJ56JUPdHNCHmyt3T/J7dHldOunaCuTdOW5ebtIoiICUZ0n MmHVS8Mw8JknQLxPTNZle4zUVwo7jYJ+c6yj0KfXCYazZReftZ2TGiULUkiTLn54fhRQ ecpPWJeikE3WoaAatGFDJ52deK3SsaLB/ru/GRld12kXzRLJDpPSEvDPRYnG1IRZkg5+ 7r2Q== X-Gm-Message-State: AOAM530XAhsqhnpgYIOaYsfSXxvDsRUPXqMyk2HPV6JqNh1k0JeZBftL e55Afd4RTH8rIQQN6LgnaDcMotsJLrb0MLYs59GNR7dXPQXD MIME-Version: 1.0 X-Received: by 2002:a05:6638:d7:: with SMTP id w23mr12364812jao.14.1620450319341; Fri, 07 May 2021 22:05:19 -0700 (PDT) Date: Fri, 07 May 2021 22:05:19 -0700 X-Google-Appengine-App-Id: s~syzkaller X-Google-Appengine-App-Id-Alias: syzkaller Message-ID: <000000000000a91ed005c1ca7d5a@google.com> Subject: [syzbot] WARNING: suspicious RCU usage in tomoyo_encode2 From: syzbot To: jmorris@namei.org, linux-kernel@vger.kernel.org, linux-security-module@vger.kernel.org, penguin-kernel@I-love.SAKURA.ne.jp, serge@hallyn.com, syzkaller-bugs@googlegroups.com, takedakn@nttdata.co.jp Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hello, syzbot found the following issue on: HEAD commit: d2b6f8a1 Merge tag 'xfs-5.13-merge-3' of git://git.kernel... git tree: upstream console output: https://syzkaller.appspot.com/x/log.txt?x=152ab345d00000 kernel config: https://syzkaller.appspot.com/x/.config?x=65c207250bba4efe dashboard link: https://syzkaller.appspot.com/bug?extid=dbea9c4c82135d4f5da3 Unfortunately, I don't have any reproducer for this issue yet. IMPORTANT: if you fix the issue, please add the following tag to the commit: Reported-by: syzbot+dbea9c4c82135d4f5da3@syzkaller.appspotmail.com ============================= WARNING: suspicious RCU usage 5.12.0-syzkaller #0 Not tainted ----------------------------- kernel/sched/core.c:8304 Illegal context switch in RCU-bh read-side critical section! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 0 1 lock held by systemd-udevd/11603: #0: ffffffff8c712b18 ( tomoyo_ss ){....}-{0:0} , at: tomoyo_path_perm+0x1c1/0x400 security/tomoyo/file.c:847 stack backtrace: CPU: 1 PID: 11603 Comm: systemd-udevd Not tainted 5.12.0-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:79 [inline] dump_stack+0x141/0x1d7 lib/dump_stack.c:120 ___might_sleep+0x229/0x2c0 kernel/sched/core.c:8304 might_alloc include/linux/sched/mm.h:197 [inline] slab_pre_alloc_hook mm/slab.h:497 [inline] slab_alloc_node mm/slub.c:2827 [inline] slab_alloc mm/slub.c:2916 [inline] __kmalloc+0x26f/0x300 mm/slub.c:4054 kmalloc include/linux/slab.h:561 [inline] kzalloc include/linux/slab.h:686 [inline] tomoyo_encode2.part.0+0xe9/0x3a0 security/tomoyo/realpath.c:45 tomoyo_encode2 security/tomoyo/realpath.c:31 [inline] tomoyo_encode+0x28/0x50 security/tomoyo/realpath.c:80 tomoyo_realpath_from_path+0x186/0x620 security/tomoyo/realpath.c:288 tomoyo_get_realpath security/tomoyo/file.c:151 [inline] tomoyo_path_perm+0x21b/0x400 security/tomoyo/file.c:822 security_inode_getattr+0xcf/0x140 security/security.c:1295 vfs_getattr fs/stat.c:131 [inline] vfs_statx+0x164/0x390 fs/stat.c:199 vfs_fstatat fs/stat.c:217 [inline] vfs_stat include/linux/fs.h:3380 [inline] __do_sys_newstat+0x91/0x110 fs/stat.c:359 do_syscall_64+0x3a/0xb0 arch/x86/entry/common.c:47 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7ffa23631295 Code: 00 00 00 e8 5d 01 00 00 48 83 c4 18 c3 0f 1f 84 00 00 00 00 00 83 ff 01 48 89 f0 77 30 48 89 c7 48 89 d6 b8 04 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 03 f3 c3 90 48 8b 15 d1 db 2b 00 f7 d8 64 89 RSP: 002b:00007fff554379b8 EFLAGS: 00000246 ORIG_RAX: 0000000000000004 RAX: ffffffffffffffda RBX: 0000558bf63356b0 RCX: 00007ffa23631295 RDX: 00007fff554379c0 RSI: 00007fff554379c0 RDI: 00007fff55437a70 RBP: 00007fff55437ae0 R08: 000000000000c0c0 R09: 0000000000000000 R10: 00007fff55437ac0 R11: 0000000000000246 R12: 00007fff55437af0 R13: 0000000000000001 R14: 0000558bf63353b0 R15: 000000000000000e --- This report is generated by a bot. It may contain errors. See https://goo.gl/tpsmEJ for more information about syzbot. syzbot engineers can be reached at syzkaller@googlegroups.com. syzbot will keep track of this issue. See: https://goo.gl/tpsmEJ#status for how to communicate with syzbot.