syzbot


INFO: rcu detected stall in call_usermodehelper_exec_async (4)

Status: upstream: reported C repro on 2025/11/27 14:55
Subsystems: mm
[Documentation on labels]
Reported-by: syzbot+be81254ae29faa71cdfe@syzkaller.appspotmail.com
First crash: 336d, last: 37d
Cause bisection: failed (error log, bisect log)
  
Discussions (1)
Title Replies (including bot) Last reply
[syzbot] [udf?] INFO: rcu detected stall in call_usermodehelper_exec_async (4) 0 (1) 2025/11/27 14:55
Similar bugs (7)
Kernel Title Rank 🛈 Repro Cause bisect Fix bisect Count Last Reported Patched Status
linux-6.1 INFO: rcu detected stall in call_usermodehelper_exec_async (2) 1 1 314d 314d 0/3 auto-obsoleted due to no activity on 2025/10/01 17:46
linux-6.1 INFO: rcu detected stall in call_usermodehelper_exec_async 1 1 695d 695d 0/3 auto-obsoleted due to no activity on 2024/09/16 03:00
upstream INFO: rcu detected stall in call_usermodehelper_exec_async mm 1 1 2344d 2344d 0/29 closed as invalid on 2019/12/04 14:14
linux-5.15 INFO: rcu detected stall in call_usermodehelper_exec_async 1 1 1037d 1037d 0/3 auto-obsoleted due to no activity on 2023/10/09 16:55
upstream INFO: rcu detected stall in call_usermodehelper_exec_async (3) mm 1 23 444d 940d 0/29 auto-obsoleted due to no activity on 2025/05/14 21:52
upstream INFO: rcu detected stall in call_usermodehelper_exec_async (2) cgroups mm 1 1 1434d 1434d 0/29 auto-closed as invalid on 2022/08/28 20:38
upstream BUG: soft lockup in call_usermodehelper_exec_async mm 1 2 1639d 1690d 0/29 closed as dup on 2021/09/17 07:37
Last patch testing requests (1)
Created Duration User Patch Repo Result
2025/12/07 22:22 37m retest repro linux-next OK log

Sample crash report:
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ee:9b:9c:d9:a5:b5, vlan:0)
rcu: INFO: rcu_preempt detected stalls on CPUs/tasks:
rcu: 	Tasks blocked on level-0 rcu_node (CPUs 0-1): P13486/1:b..l
rcu: 	(detected by 0, t=10502 jiffies, g=149985, q=748 ncpus=2)
task:kworker/u10:4   state:R  running task     stack:29848 pid:13486 tgid:13486 ppid:2      task_flags:0x8040 flags:0x00080000
Call Trace:
 <TASK>
 context_switch kernel/sched/core.c:5298 [inline]
 __schedule+0xfee/0x6120 kernel/sched/core.c:6911
 preempt_schedule_irq+0x50/0x90 kernel/sched/core.c:7238
 irqentry_exit+0x17b/0x670 kernel/entry/common.c:239
 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:697
RIP: 0010:unwind_next_frame+0xe45/0x1ea0 arch/x86/kernel/unwind_orc.c:679
Code: 00 00 00 00 fc ff df 48 c1 ea 03 80 3c 02 00 0f 85 ee 0d 00 00 49 89 6d 40 48 b8 00 00 00 00 00 fc ff df 4c 89 ea 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e d3 0d 00 00 41 39 5d 00 0f 84
RSP: 0018:ffffc900055bf998 EFLAGS: 00000a06
RAX: dffffc0000000000 RBX: 0000000000000001 RCX: ffffffff91add644
RDX: 1ffff92000ab7f41 RSI: ffffc900055bfdf8 RDI: ffffc900055bfa48
RBP: ffff88802378de00 R08: 0000000000000001 R09: 0000000000000007
R10: 0000000000000200 R11: 000000000003a684 R12: ffffc900055bfa58
R13: ffffc900055bfa08 R14: ffffc900055bfe10 R15: ffffc900055bfa3c
 arch_stack_walk+0x94/0xf0 arch/x86/kernel/stacktrace.c:25
 stack_trace_save+0x8e/0xc0 kernel/stacktrace.c:122
 save_stack+0x162/0x1e0 mm/page_owner.c:165
 __reset_page_owner+0x84/0x190 mm/page_owner.c:320
 reset_page_owner include/linux/page_owner.h:25 [inline]
 __free_pages_prepare mm/page_alloc.c:1433 [inline]
 __free_frozen_pages+0x7e1/0x10d0 mm/page_alloc.c:2978
 qlink_free mm/kasan/quarantine.c:163 [inline]
 qlist_free_all+0x47/0xe0 mm/kasan/quarantine.c:179
 kasan_quarantine_reduce+0x1a0/0x1f0 mm/kasan/quarantine.c:286
 __kasan_slab_alloc+0x69/0x90 mm/kasan/common.c:350
 kasan_slab_alloc include/linux/kasan.h:253 [inline]
 slab_post_alloc_hook mm/slub.c:4538 [inline]
 slab_alloc_node mm/slub.c:4866 [inline]
 __do_kmalloc_node mm/slub.c:5259 [inline]
 __kmalloc_noprof+0x2b9/0x850 mm/slub.c:5272
 kmalloc_noprof include/linux/slab.h:954 [inline]
 kzalloc_noprof include/linux/slab.h:1188 [inline]
 lsm_blob_alloc+0x68/0x90 security/security.c:193
 lsm_cred_alloc security/security.c:210 [inline]
 security_prepare_creds+0x2d/0x290 security/security.c:2764
 prepare_kernel_cred+0x50d/0x8b0 kernel/cred.c:596
 call_usermodehelper_exec_async+0xee/0x4b0 kernel/umh.c:88
 ret_from_fork+0x754/0xd80 arch/x86/kernel/process.c:158
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245
 </TASK>
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ee:9b:9c:d9:a5:b5, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ee:9b:9c:d9:a5:b5, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ee:9b:9c:d9:a5:b5, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ee:9b:9c:d9:a5:b5, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ee:9b:9c:d9:a5:b5, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ee:9b:9c:d9:a5:b5, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ee:9b:9c:d9:a5:b5, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ee:9b:9c:d9:a5:b5, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ee:9b:9c:d9:a5:b5, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:ee:9b:9c:d9:a5:b5, vlan:0)

Crashes (10):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2026/03/27 19:54 upstream 46b513250491 ef441708 .config console log report info [disk image] [vmlinux] [kernel image] ci-qemu-gce-upstream-auto INFO: rcu detected stall in call_usermodehelper_exec_async
2026/03/07 18:48 upstream 4ae12d8bd9a8 5cb44a80 .config console log report info [disk image] [vmlinux] [kernel image] ci-qemu-gce-upstream-auto INFO: rcu detected stall in call_usermodehelper_exec_async
2025/11/08 20:08 upstream e811c33b1f13 4e1406b4 .config console log report info [disk image] [vmlinux] [kernel image] ci-qemu-gce-upstream-auto INFO: rcu detected stall in call_usermodehelper_exec_async
2025/10/30 20:52 upstream e53642b87a4f fd2207e7 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root INFO: rcu detected stall in call_usermodehelper_exec_async
2025/08/19 15:22 upstream be48bcf004f9 523f460e .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root INFO: rcu detected stall in call_usermodehelper_exec_async
2025/07/19 17:01 upstream 4871b7cb27f4 7117feec .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root INFO: rcu detected stall in call_usermodehelper_exec_async
2025/07/11 04:54 upstream bc9ff192a6c9 3cda49cf .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce INFO: rcu detected stall in call_usermodehelper_exec_async
2025/06/01 16:48 upstream 7d4e49a77d99 3d2f584d .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce INFO: rcu detected stall in call_usermodehelper_exec_async
2025/12/31 03:21 net 1adaea51c61b d6526ea3 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: rcu detected stall in call_usermodehelper_exec_async
2025/11/23 14:41 linux-next d724c6f85e80 4fb8ef37 .config console log report syz / log C [disk image] [vmlinux] [kernel image] [mounted in repro] ci-upstream-linux-next-kasan-gce-root INFO: rcu detected stall in call_usermodehelper_exec_async
* Struck through repros no longer work on HEAD.