syzbot


INFO: rcu detected stall in call_usermodehelper_exec_work (3)

Status: auto-obsoleted due to no activity on 2024/11/22 13:58
Subsystems: mm
[Documentation on labels]
First crash: 155d, last: 123d
Similar bugs (2)
Kernel Title Repro Cause bisect Fix bisect Count Last Reported Patched Status
upstream INFO: rcu detected stall in call_usermodehelper_exec_work cgroups mm 1 1814d 1814d 0/28 closed as invalid on 2020/01/09 08:13
upstream INFO: rcu detected stall in call_usermodehelper_exec_work (2) kernel 2 1124d 1133d 0/28 closed as invalid on 2022/02/08 10:00

Sample crash report:
bridge0: received packet on veth0_to_bridge with own address as source address (addr:0a:bd:60:cd:0f:00, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:0a:bd:60:cd:0f:00, vlan:0)
rcu: INFO: rcu_preempt detected stalls on CPUs/tasks:
rcu: 	Tasks blocked on level-0 rcu_node (CPUs 0-1): P7663/1:b..l P5233/1:b..l P5618/1:b..l P2567/1:b..l P7670/1:b..l
rcu: 	(detected by 1, t=10502 jiffies, g=35381, q=442 ncpus=2)
task:sed             state:R  running task     stack:26448 pid:7670  tgid:7670  ppid:7666   flags:0x00000002
Call Trace:
 <TASK>
 context_switch kernel/sched/core.c:5188 [inline]
 __schedule+0xe37/0x5490 kernel/sched/core.c:6529
 preempt_schedule_common+0x44/0xc0 kernel/sched/core.c:6708
 preempt_schedule_thunk+0x1a/0x30 arch/x86/entry/thunk.S:12
 __raw_spin_unlock include/linux/spinlock_api_smp.h:143 [inline]
 _raw_spin_unlock+0x3e/0x50 kernel/locking/spinlock.c:186
 spin_unlock include/linux/spinlock.h:391 [inline]
 wp_page_copy mm/memory.c:3436 [inline]
 do_wp_page+0x15fd/0x3430 mm/memory.c:3727
 handle_pte_fault mm/memory.c:5537 [inline]
 __handle_mm_fault+0x23d0/0x55b0 mm/memory.c:5664
 handle_mm_fault+0x44e/0x7b0 mm/memory.c:5832
 do_user_addr_fault+0x60d/0x13f0 arch/x86/mm/fault.c:1338
 handle_page_fault arch/x86/mm/fault.c:1481 [inline]
 exc_page_fault+0x5c/0xc0 arch/x86/mm/fault.c:1539
 asm_exc_page_fault+0x26/0x30 arch/x86/include/asm/idtentry.h:623
RIP: 0033:0x7f5376445d4e
RSP: 002b:00007ffd1f57e490 EFLAGS: 00010212
RAX: 00007f53763603a0 RBX: 00007f53761e4260 RCX: 00007ffd1f57e520
RDX: 00007f537635b750 RSI: 00007f53761e4a88 RDI: 00007f53761e4f38
RBP: 00007ffd1f57e590 R08: 00007f53761e4a88 R09: 0000000000000001
R10: 0000000053053053 R11: 0000000000000246 R12: 00007f53764315c0
R13: 00007f53761dd270 R14: 0000000000000000 R15: 00007f53764692a0
 </TASK>
task:kworker/u8:10   state:R  running task     stack:24008 pid:2567  tgid:2567  ppid:2      flags:0x00004000
Workqueue: events_unbound call_usermodehelper_exec_work
Call Trace:
 <TASK>
 context_switch kernel/sched/core.c:5188 [inline]
 __schedule+0xe37/0x5490 kernel/sched/core.c:6529
 preempt_schedule_irq+0x51/0x90 kernel/sched/core.c:6851
 irqentry_exit+0x36/0x90 kernel/entry/common.c:354
 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702
RIP: 0010:__reset_page_owner+0x68/0x400 mm/page_owner.c:295
Code: 00 00 48 89 c3 e8 48 4a 9a ff 48 03 1d 31 15 08 0c 48 b8 00 00 00 00 00 fc ff df 48 8d 7b 08 48 89 fa 48 c1 ea 03 0f b6 04 02 <84> c0 74 08 3c 03 0f 8e 09 03 00 00 8b 43 08 bf 00 28 00 00 41 bd
RSP: 0018:ffffc90009637640 EFLAGS: 00000a06
RAX: 0000000000000000 RBX: ffff88801710a908 RCX: ffffffff81f1bf14
RDX: 1ffff11002e21522 RSI: ffffffff81f02f28 RDI: ffff88801710a910
RBP: 0000000000000003 R08: 0000000000000007 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
R13: 0000000000000000 R14: 0000000000000003 R15: 0000000000000000
 reset_page_owner include/linux/page_owner.h:25 [inline]
 free_pages_prepare mm/page_alloc.c:1094 [inline]
 free_unref_page+0x64a/0xe40 mm/page_alloc.c:2612
 qlink_free mm/kasan/quarantine.c:163 [inline]
 qlist_free_all+0x4e/0x140 mm/kasan/quarantine.c:179
 kasan_quarantine_reduce+0x192/0x1e0 mm/kasan/quarantine.c:286
 __kasan_slab_alloc+0x69/0x90 mm/kasan/common.c:322
 kasan_slab_alloc include/linux/kasan.h:201 [inline]
 slab_post_alloc_hook mm/slub.c:3988 [inline]
 slab_alloc_node mm/slub.c:4037 [inline]
 kmem_cache_alloc_noprof+0x121/0x2f0 mm/slub.c:4044
 copy_fs_struct+0x49/0x340 fs/fs_struct.c:114
 copy_fs kernel/fork.c:1747 [inline]
 copy_process+0x35cb/0x8e90 kernel/fork.c:2378
 kernel_clone+0xfd/0x960 kernel/fork.c:2800
 user_mode_thread+0xb4/0xf0 kernel/fork.c:2878
 call_usermodehelper_exec_sync kernel/umh.c:133 [inline]
 call_usermodehelper_exec_work+0x6b/0x170 kernel/umh.c:164
 process_one_work+0x9c5/0x1b40 kernel/workqueue.c:3231
 process_scheduled_works kernel/workqueue.c:3312 [inline]
 worker_thread+0x6c8/0xed0 kernel/workqueue.c:3389
 kthread+0x2c1/0x3a0 kernel/kthread.c:389
 ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
 </TASK>
task:kworker/1:6     state:R  running task     stack:24704 pid:5618  tgid:5618  ppid:2      flags:0x00004000
Workqueue: events ovs_dp_masks_rebalance
Call Trace:
 <TASK>
 context_switch kernel/sched/core.c:5188 [inline]
 __schedule+0xe37/0x5490 kernel/sched/core.c:6529
 preempt_schedule_common+0x44/0xc0 kernel/sched/core.c:6708
 preempt_schedule_thunk+0x1a/0x30 arch/x86/entry/thunk.S:12
 unwind_next_frame+0x1c90/0x23a0 arch/x86/kernel/unwind_orc.c:672
 arch_stack_walk+0x100/0x170 arch/x86/kernel/stacktrace.c:25
 stack_trace_save+0x95/0xd0 kernel/stacktrace.c:122
 save_stack+0x162/0x1f0 mm/page_owner.c:156
 __reset_page_owner+0x8d/0x400 mm/page_owner.c:297
 reset_page_owner include/linux/page_owner.h:25 [inline]
 free_pages_prepare mm/page_alloc.c:1094 [inline]
 free_unref_page+0x64a/0xe40 mm/page_alloc.c:2612
 qlink_free mm/kasan/quarantine.c:163 [inline]
 qlist_free_all+0x4e/0x140 mm/kasan/quarantine.c:179
 kasan_quarantine_reduce+0x192/0x1e0 mm/kasan/quarantine.c:286
 __kasan_slab_alloc+0x69/0x90 mm/kasan/common.c:322
 kasan_slab_alloc include/linux/kasan.h:201 [inline]
 slab_post_alloc_hook mm/slub.c:3988 [inline]
 slab_alloc_node mm/slub.c:4037 [inline]
 __do_kmalloc_node mm/slub.c:4157 [inline]
 __kmalloc_noprof+0x199/0x400 mm/slub.c:4170
 kmalloc_noprof include/linux/slab.h:685 [inline]
 kmalloc_array_noprof include/linux/slab.h:726 [inline]
 ovs_flow_masks_rebalance+0xdc/0xa00 net/openvswitch/flow_table.c:1114
 ovs_dp_masks_rebalance+0x64/0xf0 net/openvswitch/datapath.c:2530
 process_one_work+0x9c5/0x1b40 kernel/workqueue.c:3231
 process_scheduled_works kernel/workqueue.c:3312 [inline]
 worker_thread+0x6c8/0xed0 kernel/workqueue.c:3389
 kthread+0x2c1/0x3a0 kernel/kthread.c:389
 ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
 </TASK>
task:syz-executor    state:R  running task     stack:23088 pid:5233  tgid:5233  ppid:5220   flags:0x00004002
Call Trace:
 <TASK>
 context_switch kernel/sched/core.c:5188 [inline]
 __schedule+0xe37/0x5490 kernel/sched/core.c:6529
 preempt_schedule_common+0x44/0xc0 kernel/sched/core.c:6708
 preempt_schedule_thunk+0x1a/0x30 arch/x86/entry/thunk.S:12
 unwind_next_frame+0x1c90/0x23a0 arch/x86/kernel/unwind_orc.c:672
 arch_stack_walk+0x100/0x170 arch/x86/kernel/stacktrace.c:25
 stack_trace_save+0x95/0xd0 kernel/stacktrace.c:122
 save_stack+0x162/0x1f0 mm/page_owner.c:156
 __reset_page_owner+0x8d/0x400 mm/page_owner.c:297
 reset_page_owner include/linux/page_owner.h:25 [inline]
 free_pages_prepare mm/page_alloc.c:1094 [inline]
 free_unref_page+0x64a/0xe40 mm/page_alloc.c:2612
 qlink_free mm/kasan/quarantine.c:163 [inline]
 qlist_free_all+0x4e/0x140 mm/kasan/quarantine.c:179
 kasan_quarantine_reduce+0x192/0x1e0 mm/kasan/quarantine.c:286
 __kasan_kmalloc+0x8a/0xb0 mm/kasan/common.c:378
 kasan_kmalloc include/linux/kasan.h:211 [inline]
 __do_kmalloc_node mm/slub.c:4158 [inline]
 __kmalloc_noprof+0x1e8/0x400 mm/slub.c:4170
 kmalloc_noprof include/linux/slab.h:685 [inline]
 tomoyo_realpath_from_path+0xb9/0x720 security/tomoyo/realpath.c:251
 tomoyo_get_realpath security/tomoyo/file.c:151 [inline]
 tomoyo_check_open_permission+0x2a7/0x3b0 security/tomoyo/file.c:771
 tomoyo_file_open+0x71/0x90 security/tomoyo/tomoyo.c:334
 security_file_open+0x78/0x8b0 security/security.c:2988
 do_dentry_open+0x5c7/0x15f0 fs/open.c:946
 vfs_open+0x82/0x3f0 fs/open.c:1089
 do_open fs/namei.c:3727 [inline]
 path_openat+0x2141/0x2d20 fs/namei.c:3886
 do_filp_open+0x1dc/0x430 fs/namei.c:3913
 do_sys_openat2+0x17a/0x1e0 fs/open.c:1416
 do_sys_open fs/open.c:1431 [inline]
 __do_sys_openat fs/open.c:1447 [inline]
 __se_sys_openat fs/open.c:1442 [inline]
 __x64_sys_openat+0x175/0x210 fs/open.c:1442
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f20caf79771
RSP: 002b:00007ffd314ca130 EFLAGS: 00000287 ORIG_RAX: 0000000000000101
RAX: ffffffffffffffda RBX: 00000000000001cf RCX: 00007f20caf79771
RDX: 0000000000090800 RSI: 00007f20cafe7e6d RDI: 00000000ffffff9c
RBP: 00007ffd314ca1cc R08: 0000000000000000 R09: 00007f20cbe30080
R10: 0000000000000000 R11: 0000000000000287 R12: 0000000000000000
R13: 00000000000619b5 R14: 0000000000061618 R15: 00007ffd314ca220
 </TASK>
task:syz.4.462       state:R  running task     stack:26288 pid:7663  tgid:7663  ppid:5233   flags:0x00004004
Call Trace:
 <TASK>
 context_switch kernel/sched/core.c:5188 [inline]
 __schedule+0xe37/0x5490 kernel/sched/core.c:6529
 preempt_schedule_common+0x44/0xc0 kernel/sched/core.c:6708
 preempt_schedule_thunk+0x1a/0x30 arch/x86/entry/thunk.S:12
 __raw_spin_unlock include/linux/spinlock_api_smp.h:143 [inline]
 _raw_spin_unlock+0x3e/0x50 kernel/locking/spinlock.c:186
 spin_unlock include/linux/spinlock.h:391 [inline]
 zap_pte_range mm/memory.c:1688 [inline]
 zap_pmd_range mm/memory.c:1736 [inline]
 zap_pud_range mm/memory.c:1765 [inline]
 zap_p4d_range mm/memory.c:1786 [inline]
 unmap_page_range+0xbb8/0x3c10 mm/memory.c:1807
 unmap_single_vma+0x194/0x2b0 mm/memory.c:1853
 unmap_vmas+0x22f/0x490 mm/memory.c:1897
 exit_mmap+0x1b8/0xb20 mm/mmap.c:3412
 __mmput+0x12a/0x480 kernel/fork.c:1345
 mmput+0x62/0x70 kernel/fork.c:1367
 exit_mm kernel/exit.c:571 [inline]
 do_exit+0x9bf/0x2bb0 kernel/exit.c:869
 do_group_exit+0xd3/0x2a0 kernel/exit.c:1031
 get_signal+0x25fd/0x2770 kernel/signal.c:2917
 arch_do_signal_or_restart+0x90/0x7e0 arch/x86/kernel/signal.c:310
 exit_to_user_mode_loop kernel/entry/common.c:111 [inline]
 exit_to_user_mode_prepare include/linux/entry-common.h:328 [inline]
 __syscall_exit_to_user_mode_work kernel/entry/common.c:207 [inline]
 syscall_exit_to_user_mode+0x150/0x2a0 kernel/entry/common.c:218
 do_syscall_64+0xda/0x250 arch/x86/entry/common.c:89
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f20caf79e79
RSP: 002b:00007ffd314c9f78 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca
RAX: ffffffffffffff92 RBX: 00000000000619e7 RCX: 00007f20caf79e79
RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f20cb116064
RBP: 00007f20cb116064 R08: 00007f20cb115f80 R09: 00007ffd314ca25f
R10: 00007ffd314ca070 R11: 0000000000000246 R12: 0000000000000032
R13: 00007ffd314ca070 R14: 00007ffd314ca090 R15: 00000000000619b5
 </TASK>
net_ratelimit: 4247 callbacks suppressed
bridge0: received packet on veth0_to_bridge with own address as source address (addr:0a:bd:60:cd:0f:00, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:0a:bd:60:cd:0f:00, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:0a:bd:60:cd:0f:00, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:0a:bd:60:cd:0f:00, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:0a:bd:60:cd:0f:00, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:0a:bd:60:cd:0f:00, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:0a:bd:60:cd:0f:00, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:0a:bd:60:cd:0f:00, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:0a:bd:60:cd:0f:00, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:0a:bd:60:cd:0f:00, vlan:0)
net_ratelimit: 6174 callbacks suppressed
bridge0: received packet on veth0_to_bridge with own address as source address (addr:0a:bd:60:cd:0f:00, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:0a:bd:60:cd:0f:00, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:0a:bd:60:cd:0f:00, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:0a:bd:60:cd:0f:00, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:0a:bd:60:cd:0f:00, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:0a:bd:60:cd:0f:00, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:0a:bd:60:cd:0f:00, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:0a:bd:60:cd:0f:00, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:0a:bd:60:cd:0f:00, vlan:0)
bridge0: received packet on veth0_to_bridge with own address as source address (addr:0a:bd:60:cd:0f:00, vlan:0)

Crashes (2):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2024/08/24 13:56 upstream d2bafcf224f3 d7d32352 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root INFO: rcu detected stall in call_usermodehelper_exec_work
2024/07/23 18:59 upstream 66ebbdfdeb09 708c10c4 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root INFO: rcu detected stall in call_usermodehelper_exec_work
* Struck through repros no longer work on HEAD.