syzbot


INFO: task hung in tunnel_key_exit_net

Status: auto-closed as invalid on 2020/12/02 03:23
Reported-by: syzbot+9780f74278a718cb67ae@syzkaller.appspotmail.com
First crash: 1583d, last: 1583d
Similar bugs (3)
Kernel Title Repro Cause bisect Fix bisect Count Last Reported Patched Status
upstream INFO: task hung in tunnel_key_exit_net net syz 8 2063d 2439d 0/28 closed as dup on 2018/03/31 15:45
upstream INFO: task hung in tunnel_key_exit_net (2) net 2 166d 173d 0/28 auto-obsoleted due to no activity on 2024/09/18 19:33
linux-4.19 INFO: task hung in tunnel_key_exit_net (2) 6 1067d 1296d 0/1 auto-closed as invalid on 2022/05/02 05:35

Sample crash report:
device bridge1044 left promiscuous mode
device bridge1045 left promiscuous mode
device bridge1046 left promiscuous mode
device bridge1047 left promiscuous mode
device bridge1048 left promiscuous mode
INFO: task kworker/u4:8:7915 blocked for more than 140 seconds.
      Not tainted 4.19.136-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
kworker/u4:8    D24640  7915      2 0x80000000
Workqueue: netns cleanup_net
Call Trace:
 context_switch kernel/sched/core.c:2828 [inline]
 __schedule+0x887/0x2040 kernel/sched/core.c:3517
 schedule+0x8d/0x1b0 kernel/sched/core.c:3561
 schedule_preempt_disabled+0xf/0x20 kernel/sched/core.c:3619
 __mutex_lock_common kernel/locking/mutex.c:1002 [inline]
 __mutex_lock+0x647/0x1260 kernel/locking/mutex.c:1072
 tc_action_net_exit include/net/act_api.h:135 [inline]
 tunnel_key_exit_net+0x22/0x360 net/sched/act_tunnel_key.c:591
 ops_exit_list+0xf9/0x150 net/core/net_namespace.c:156
 cleanup_net+0x3b4/0x8b0 net/core/net_namespace.c:553
 process_one_work+0x864/0x1570 kernel/workqueue.c:2155
 worker_thread+0x64c/0x1130 kernel/workqueue.c:2298
 kthread+0x30b/0x410 kernel/kthread.c:246
 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415
device bridge1049 left promiscuous mode
INFO: task kworker/1:5:21410 blocked for more than 140 seconds.
      Not tainted 4.19.136-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
kworker/1:5     D25320 21410      2 0x80000000
Workqueue: events linkwatch_event
Call Trace:
 context_switch kernel/sched/core.c:2828 [inline]
 __schedule+0x887/0x2040 kernel/sched/core.c:3517
 schedule+0x8d/0x1b0 kernel/sched/core.c:3561
 schedule_preempt_disabled+0xf/0x20 kernel/sched/core.c:3619
 __mutex_lock_common kernel/locking/mutex.c:1002 [inline]
 __mutex_lock+0x647/0x1260 kernel/locking/mutex.c:1072
 linkwatch_event+0xb/0x60 net/core/link_watch.c:236
 process_one_work+0x864/0x1570 kernel/workqueue.c:2155
 worker_thread+0x64c/0x1130 kernel/workqueue.c:2298
 kthread+0x30b/0x410 kernel/kthread.c:246
 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415
device bridge1050 left promiscuous mode
INFO: task kworker/1:3:12028 blocked for more than 140 seconds.
      Not tainted 4.19.136-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
kworker/1:3     D25768 12028      2 0x80000000
Workqueue: ipv6_addrconf addrconf_dad_work
Call Trace:
 context_switch kernel/sched/core.c:2828 [inline]
 __schedule+0x887/0x2040 kernel/sched/core.c:3517
 schedule+0x8d/0x1b0 kernel/sched/core.c:3561
 schedule_preempt_disabled+0xf/0x20 kernel/sched/core.c:3619
 __mutex_lock_common kernel/locking/mutex.c:1002 [inline]
 __mutex_lock+0x647/0x1260 kernel/locking/mutex.c:1072
 addrconf_dad_work+0x9c/0x10a0 net/ipv6/addrconf.c:3988
 process_one_work+0x864/0x1570 kernel/workqueue.c:2155
 worker_thread+0x64c/0x1130 kernel/workqueue.c:2298
 kthread+0x30b/0x410 kernel/kthread.c:246
 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415
device bridge1051 left promiscuous mode
INFO: task kworker/1:4:31925 blocked for more than 140 seconds.
      Not tainted 4.19.136-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
kworker/1:4     D28048 31925      2 0x80000000
Workqueue: events switchdev_deferred_process_work
Call Trace:
 context_switch kernel/sched/core.c:2828 [inline]
 __schedule+0x887/0x2040 kernel/sched/core.c:3517
 schedule+0x8d/0x1b0 kernel/sched/core.c:3561
 schedule_preempt_disabled+0xf/0x20 kernel/sched/core.c:3619
 __mutex_lock_common kernel/locking/mutex.c:1002 [inline]
 __mutex_lock+0x647/0x1260 kernel/locking/mutex.c:1072
 switchdev_deferred_process_work+0xa/0x20 net/switchdev/switchdev.c:150
 process_one_work+0x864/0x1570 kernel/workqueue.c:2155
 worker_thread+0x64c/0x1130 kernel/workqueue.c:2298
 kthread+0x30b/0x410 kernel/kthread.c:246
 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415
device bridge1052 left promiscuous mode
INFO: task syz-executor.5:3318 blocked for more than 140 seconds.
      Not tainted 4.19.136-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
syz-executor.5  D24912  3318   6895 0x00000004
Call Trace:
 context_switch kernel/sched/core.c:2828 [inline]
 __schedule+0x887/0x2040 kernel/sched/core.c:3517
 schedule+0x8d/0x1b0 kernel/sched/core.c:3561
 schedule_preempt_disabled+0xf/0x20 kernel/sched/core.c:3619
 __mutex_lock_common kernel/locking/mutex.c:1002 [inline]
 __mutex_lock+0x647/0x1260 kernel/locking/mutex.c:1072
 rtnl_lock net/core/rtnetlink.c:77 [inline]
 rtnetlink_rcv_msg+0x3fe/0xb80 net/core/rtnetlink.c:4775
 netlink_rcv_skb+0x160/0x440 net/netlink/af_netlink.c:2455
 netlink_unicast_kernel net/netlink/af_netlink.c:1318 [inline]
 netlink_unicast+0x4d5/0x690 net/netlink/af_netlink.c:1344
 netlink_sendmsg+0x6bb/0xc40 net/netlink/af_netlink.c:1909
 sock_sendmsg_nosec net/socket.c:622 [inline]
 sock_sendmsg+0xc3/0x120 net/socket.c:632
 ___sys_sendmsg+0x7bb/0x8e0 net/socket.c:2115
 __sys_sendmsg net/socket.c:2153 [inline]
 __do_sys_sendmsg net/socket.c:2162 [inline]
 __se_sys_sendmsg net/socket.c:2160 [inline]
 __x64_sys_sendmsg+0x132/0x220 net/socket.c:2160
 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293
 entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x45cc79
Code: Bad RIP value.
RSP: 002b:00007f066514ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
RAX: ffffffffffffffda RBX: 000000000002c080 RCX: 000000000045cc79
RDX: 0000000000000000 RSI: 0000000020000180 RDI: 000000000000000a
RBP: 000000000078bf40 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 000000000078bf0c
R13: 00007fff548924df R14: 00007f066514f9c0 R15: 000000000078bf0c
device bridge1053 left promiscuous mode

Showing all locks held in the system:
1 lock held by khungtaskd/1090:
 #0: 0000000021dbf128 (rcu_read_lock){....}, at: debug_show_all_locks+0x53/0x265 kernel/locking/lockdep.c:4440
1 lock held by in:imklog/6197:
 #0: 000000006ae55801 (&f->f_pos_lock){+.+.}, at: __fdget_pos+0x26f/0x310 fs/file.c:767
2 locks held by agetty/6399:
 #0: 00000000743c1948 (&tty->ldisc_sem){++++}, at: tty_ldisc_ref_wait+0x22/0x80 drivers/tty/tty_ldisc.c:272
 #1: 00000000c4e03e4e (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x217/0x1950 drivers/tty/n_tty.c:2154
4 locks held by kworker/u4:8/7915:
 #0: 000000003b79a432 ((wq_completion)"%s""netns"){+.+.}, at: process_one_work+0x767/0x1570 kernel/workqueue.c:2126
 #1: 000000001fa4a3dc (net_cleanup_work){+.+.}, at: process_one_work+0x79c/0x1570 kernel/workqueue.c:2130
 #2: 00000000f4bb8cbb (pernet_ops_rwsem){++++}, at: cleanup_net+0xa8/0x8b0 net/core/net_namespace.c:520
 #3: 00000000d9149b7b (rtnl_mutex){+.+.}, at: tc_action_net_exit include/net/act_api.h:135 [inline]
 #3: 00000000d9149b7b (rtnl_mutex){+.+.}, at: tunnel_key_exit_net+0x22/0x360 net/sched/act_tunnel_key.c:591
3 locks held by kworker/1:5/21410:
 #0: 00000000b3217b90 ((wq_completion)"events"){+.+.}, at: process_one_work+0x767/0x1570 kernel/workqueue.c:2126
 #1: 00000000210ab62c ((linkwatch_work).work){+.+.}, at: process_one_work+0x79c/0x1570 kernel/workqueue.c:2130
 #2: 00000000d9149b7b (rtnl_mutex){+.+.}, at: linkwatch_event+0xb/0x60 net/core/link_watch.c:236
3 locks held by kworker/1:3/12028:
 #0: 00000000010f29ca ((wq_completion)"%s"("ipv6_addrconf")){+.+.}, at: process_one_work+0x767/0x1570 kernel/workqueue.c:2126
 #1: 00000000a1ba9519 ((work_completion)(&(&ifa->dad_work)->work)){+.+.}, at: process_one_work+0x79c/0x1570 kernel/workqueue.c:2130
 #2: 00000000d9149b7b (rtnl_mutex){+.+.}, at: addrconf_dad_work+0x9c/0x10a0 net/ipv6/addrconf.c:3988
3 locks held by kworker/1:4/31925:
 #0: 00000000b3217b90 ((wq_completion)"events"){+.+.}, at: process_one_work+0x767/0x1570 kernel/workqueue.c:2126
 #1: 00000000cae46dd4 (deferred_process_work){+.+.}, at: process_one_work+0x79c/0x1570 kernel/workqueue.c:2130
 #2: 00000000d9149b7b (rtnl_mutex){+.+.}, at: switchdev_deferred_process_work+0xa/0x20 net/switchdev/switchdev.c:150
1 lock held by syz-executor.5/3318:
 #0: 00000000d9149b7b (rtnl_mutex){+.+.}, at: rtnl_lock net/core/rtnetlink.c:77 [inline]
 #0: 00000000d9149b7b (rtnl_mutex){+.+.}, at: rtnetlink_rcv_msg+0x3fe/0xb80 net/core/rtnetlink.c:4775
2 locks held by syz-executor.4/3331:
 #0: 00000000d9149b7b (rtnl_mutex){+.+.}, at: rtnl_lock net/core/rtnetlink.c:77 [inline]
 #0: 00000000d9149b7b (rtnl_mutex){+.+.}, at: rtnetlink_rcv_msg+0x3fe/0xb80 net/core/rtnetlink.c:4775
 #1: 0000000073af9a3b (rcu_preempt_state.exp_mutex){+.+.}, at: exp_funnel_lock kernel/rcu/tree_exp.h:297 [inline]
 #1: 0000000073af9a3b (rcu_preempt_state.exp_mutex){+.+.}, at: _synchronize_rcu_expedited+0x4dc/0x6f0 kernel/rcu/tree_exp.h:667
2 locks held by kworker/1:8/3390:
 #0: 000000004446ec58 ((wq_completion)"rcu_gp"){+.+.}, at: process_one_work+0x767/0x1570 kernel/workqueue.c:2126
 #1: 000000003607137f ((work_completion)(&rew.rew_work)){+.+.}, at: process_one_work+0x79c/0x1570 kernel/workqueue.c:2130
device bridge1054 left promiscuous mode

=============================================

NMI backtrace for cpu 1
CPU: 1 PID: 1090 Comm: khungtaskd Not tainted 4.19.136-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0x1fc/0x2fe lib/dump_stack.c:118
 nmi_cpu_backtrace.cold+0x63/0xa2 lib/nmi_backtrace.c:101
 nmi_trigger_cpumask_backtrace+0x1a6/0x1eb lib/nmi_backtrace.c:62
 trigger_all_cpu_backtrace include/linux/nmi.h:146 [inline]
 check_hung_uninterruptible_tasks kernel/hung_task.c:203 [inline]
 watchdog+0x991/0xe60 kernel/hung_task.c:287
 kthread+0x30b/0x410 kernel/kthread.c:246
 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415
Sending NMI from CPU 1 to CPUs 0:
NMI backtrace for cpu 0
CPU: 0 PID: 3703 Comm: systemd-journal Not tainted 4.19.136-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:lookup_object lib/debugobjects.c:156 [inline]
RIP: 0010:debug_object_activate+0x172/0x450 lib/debugobjects.c:474
Code: 8b ab 80 50 a3 8b 31 db 48 85 ed 74 48 49 bd 00 00 00 00 00 fc ff df 48 8d 7d 18 83 c3 01 48 89 f8 48 c1 e8 03 42 80 3c 28 00 <0f> 85 1d 02 00 00 4c 3b 65 18 0f 84 c7 00 00 00 48 89 e8 48 c1 e8
RSP: 0018:ffff8880941f7d58 EFLAGS: 00000046
RAX: 1ffff11007e79896 RBX: 0000000000000002 RCX: ffffffff815255bb
RDX: 1ffffffff175c053 RSI: 0000000000000004 RDI: ffff88803f3cc4b0
RBP: ffff88803f3cc498 R08: ffffffff8bae0288 R09: 0000000000000282
R10: ffffffff8bae028b R11: 0000000000000000 R12: ffff888091a5ea00
R13: dffffc0000000000 R14: 1ffff1101283efad R15: ffffffff88d93700
FS:  00007f8abbdc38c0(0000) GS:ffff8880ae600000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f8ab59a0000 CR3: 000000009436b000 CR4: 00000000001426f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 debug_rcu_head_queue kernel/rcu/rcu.h:193 [inline]
 __call_rcu.constprop.0+0x31/0x7f0 kernel/rcu/tree.c:2977
 task_work_run+0x148/0x1c0 kernel/task_work.c:113
 tracehook_notify_resume include/linux/tracehook.h:193 [inline]
 exit_to_usermode_loop+0x251/0x2a0 arch/x86/entry/common.c:167
 prepare_exit_to_usermode arch/x86/entry/common.c:198 [inline]
 syscall_return_slowpath arch/x86/entry/common.c:271 [inline]
 do_syscall_64+0x538/0x620 arch/x86/entry/common.c:296
 entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x7f8abb35385d
Code: bb 20 00 00 75 10 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 1e f6 ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 67 f6 ff ff 48 89 d0 48 83 c4 08 48 3d 01
RSP: 002b:00007fff4ee1bf70 EFLAGS: 00000293 ORIG_RAX: 0000000000000002
RAX: fffffffffffffffe RBX: 00007fff4ee1c280 RCX: 00007f8abb35385d
RDX: 00000000000001a0 RSI: 0000000000080042 RDI: 000056191df68150
RBP: 000000000000000d R08: 000000000000ffc0 R09: 00000000ffffffff
R10: 0000000000000069 R11: 0000000000000293 R12: 00000000ffffffff
R13: 000056191df64060 R14: 00007fff4ee1c240 R15: 000056191df67ea0

Crashes (1):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2020/08/04 03:22 linux-4.19.y 13af6c74b14a 96dd3623 .config console log report ci2-linux-4-19
* Struck through repros no longer work on HEAD.