syzbot


INFO: task hung in __netlink_dump_start

Status: auto-closed as invalid on 2020/10/04 12:25
Reported-by: syzbot+cca12602b93dd5fe9dea@syzkaller.appspotmail.com
First crash: 1504d, last: 1504d
Similar bugs (6)
Kernel Title Repro Cause bisect Fix bisect Count Last Reported Patched Status
upstream INFO: task hung in __netlink_dump_start (2) net 5 923d 1005d 0/27 closed as invalid on 2022/02/07 19:19
upstream INFO: task hung in __netlink_dump_start net 2 1372d 1387d 0/27 auto-closed as invalid on 2021/01/13 23:36
linux-5.15 INFO: task hung in __netlink_dump_start 14 23d 152d 0/3 upstream: reported on 2024/02/18 03:22
linux-4.19 INFO: task hung in __netlink_dump_start (2) 1 875d 875d 0/1 auto-closed as invalid on 2022/06/25 14:03
upstream INFO: task hung in rtnetlink_rcv_msg net C inconclusive inconclusive 1970 10d 1974d 27/27 fixed on 2024/07/09 19:14
linux-6.1 INFO: task hung in __netlink_dump_start 16 28d 173d 0/3 upstream: reported on 2024/01/28 21:16

Sample crash report:
device vlan0 entered promiscuous mode
device vlan1 entered promiscuous mode
device macvlan0 entered promiscuous mode
device ipvlan0 entered promiscuous mode
device ipvlan1 entered promiscuous mode
INFO: task syz-executor.0:15143 blocked for more than 140 seconds.
      Not tainted 4.19.126-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
syz-executor.0  D28400 15143   6455 0x00000004
Call Trace:
 context_switch kernel/sched/core.c:2826 [inline]
 __schedule+0x8a2/0x1fc0 kernel/sched/core.c:3515
 schedule+0x8d/0x1b0 kernel/sched/core.c:3559
 schedule_preempt_disabled+0xf/0x20 kernel/sched/core.c:3617
 __mutex_lock_common kernel/locking/mutex.c:1002 [inline]
 __mutex_lock+0x5b8/0x1300 kernel/locking/mutex.c:1072
 __netlink_dump_start+0x103/0x6f0 net/netlink/af_netlink.c:2297
 netlink_dump_start include/linux/netlink.h:213 [inline]
 rtnetlink_rcv_msg+0x71e/0xb80 net/core/rtnetlink.c:4740
 netlink_rcv_skb+0x160/0x410 net/netlink/af_netlink.c:2455
 netlink_unicast_kernel net/netlink/af_netlink.c:1318 [inline]
 netlink_unicast+0x4d7/0x6a0 net/netlink/af_netlink.c:1344
 netlink_sendmsg+0x6e3/0xcc0 net/netlink/af_netlink.c:1909
 sock_sendmsg_nosec net/socket.c:622 [inline]
 sock_sendmsg+0xc3/0x120 net/socket.c:632
 __sys_sendto+0x21a/0x330 net/socket.c:1787
 __do_sys_sendto net/socket.c:1799 [inline]
 __se_sys_sendto net/socket.c:1795 [inline]
 __x64_sys_sendto+0xdd/0x1b0 net/socket.c:1795
 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293
 entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x45ca69
Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
RSP: 002b:00007f763611ac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c
RAX: ffffffffffffffda RBX: 0000000000501240 RCX: 000000000045ca69
RDX: 000000000000001c RSI: 00000000200001c0 RDI: 0000000000000003
RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff
R13: 0000000000000a0f R14: 00000000004ccea2 R15: 00007f763611b6d4
INFO: task syz-executor.4:15162 blocked for more than 140 seconds.
      Not tainted 4.19.126-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
syz-executor.4  D28720 15162   6792 0x00000004
Call Trace:
 context_switch kernel/sched/core.c:2826 [inline]
 __schedule+0x8a2/0x1fc0 kernel/sched/core.c:3515
 schedule+0x8d/0x1b0 kernel/sched/core.c:3559
 schedule_preempt_disabled+0xf/0x20 kernel/sched/core.c:3617
 __mutex_lock_common kernel/locking/mutex.c:1002 [inline]
 __mutex_lock+0x5b8/0x1300 kernel/locking/mutex.c:1072
 sock_do_ioctl+0x24e/0x2f0 net/socket.c:963
 sock_ioctl+0x325/0x610 net/socket.c:1074
 vfs_ioctl fs/ioctl.c:46 [inline]
 file_ioctl fs/ioctl.c:501 [inline]
 do_vfs_ioctl+0xcda/0x12e0 fs/ioctl.c:688
 ksys_ioctl+0x9b/0xc0 fs/ioctl.c:705
 __do_sys_ioctl fs/ioctl.c:712 [inline]
 __se_sys_ioctl fs/ioctl.c:710 [inline]
 __x64_sys_ioctl+0x6f/0xb0 fs/ioctl.c:710
 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293
 entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x45ca69
Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
RSP: 002b:00007f3cc302fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: ffffffffffffffda RBX: 00000000004e93c0 RCX: 000000000045ca69
RDX: 0000000000400200 RSI: 0000000000008912 RDI: 0000000000000005
RBP: 000000000078bfa0 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff
R13: 0000000000000415 R14: 00000000004c6da4 R15: 00007f3cc30306d4
INFO: task syz-executor.1:15164 blocked for more than 140 seconds.
device macvtap0 entered promiscuous mode
      Not tainted 4.19.126-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
syz-executor.1  D28912 15164   6573 0x00000004
Call Trace:
 context_switch kernel/sched/core.c:2826 [inline]
 __schedule+0x8a2/0x1fc0 kernel/sched/core.c:3515
 schedule+0x8d/0x1b0 kernel/sched/core.c:3559
 schedule_preempt_disabled+0xf/0x20 kernel/sched/core.c:3617
 __mutex_lock_common kernel/locking/mutex.c:1002 [inline]
 __mutex_lock+0x5b8/0x1300 kernel/locking/mutex.c:1072
 rtnl_lock net/core/rtnetlink.c:77 [inline]
 rtnetlink_rcv_msg+0x3fe/0xb80 net/core/rtnetlink.c:4774
 netlink_rcv_skb+0x160/0x410 net/netlink/af_netlink.c:2455
 netlink_unicast_kernel net/netlink/af_netlink.c:1318 [inline]
 netlink_unicast+0x4d7/0x6a0 net/netlink/af_netlink.c:1344
 netlink_sendmsg+0x6e3/0xcc0 net/netlink/af_netlink.c:1909
 sock_sendmsg_nosec net/socket.c:622 [inline]
 sock_sendmsg+0xc3/0x120 net/socket.c:632
 ___sys_sendmsg+0x803/0x920 net/socket.c:2115

Crashes (1):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2020/06/06 12:24 linux-4.19.y 4707d8e57273 c3e9afb3 .config console log report ci2-linux-4-19
* Struck through repros no longer work on HEAD.