syzbot


INFO: task hung in ip6mr_sk_done

Status: auto-closed as invalid on 2020/07/14 17:23
Reported-by: syzbot+5f462d62210009324ecc@syzkaller.appspotmail.com
First crash: 830d, last: 830d
similar bugs (6):
Kernel Title Repro Cause bisect Fix bisect Count Last Reported Patched Status
upstream INFO: task hung in ip6mr_sk_done (2) 1 629d 629d 0/22 auto-closed as invalid on 2021/01/01 18:48
android-49 INFO: task hung in ip6mr_sk_done 1 1519d 1519d 0/3 auto-closed as invalid on 2019/02/22 12:59
upstream INFO: task hung in ip6mr_sk_done (3) 15 247d 285d 0/22 auto-closed as invalid on 2022/01/19 01:57
android-44 INFO: task hung in ip6mr_sk_done 1 1531d 1531d 0/2 auto-closed as invalid on 2019/02/22 13:39
upstream INFO: task hung in ip6mr_sk_done 1 730d 730d 0/22 auto-closed as invalid on 2020/09/23 10:25
linux-4.19 INFO: task hung in ip6mr_sk_done 1 162d 162d 0/1 auto-closed as invalid on 2022/05/13 06:41

Sample crash report:
FAT-fs (loop4): bogus number of reserved sectors
FAT-fs (loop4): Can't find a valid FAT filesystem
INFO: task syz-executor.1:30167 blocked for more than 140 seconds.
      Not tainted 4.14.173-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
syz-executor.1  D27984 30167   7404 0x80000002
Call Trace:
 schedule+0x8d/0x1b0 kernel/sched/core.c:3428
 schedule_preempt_disabled+0xf/0x20 kernel/sched/core.c:3486
 __mutex_lock_common kernel/locking/mutex.c:833 [inline]
 __mutex_lock+0x73c/0x1470 kernel/locking/mutex.c:893
 ip6mr_sk_done+0x3a/0x230 net/ipv6/ip6mr.c:1623
 rawv6_close+0x48/0x70 net/ipv6/raw.c:1245
 inet_release+0xdf/0x1b0 net/ipv4/af_inet.c:425
 inet6_release+0x4c/0x70 net/ipv6/af_inet6.c:450
 __sock_release+0xcd/0x2b0 net/socket.c:602
 sock_close+0x15/0x20 net/socket.c:1139
 __fput+0x25f/0x790 fs/file_table.c:210
 task_work_run+0x113/0x190 kernel/task_work.c:113
 exit_task_work include/linux/task_work.h:22 [inline]
 do_exit+0x9f2/0x2b00 kernel/exit.c:858
 do_group_exit+0x100/0x310 kernel/exit.c:955
 get_signal+0x385/0x1ca0 kernel/signal.c:2418
 do_signal+0x7c/0x1690 arch/x86/kernel/signal.c:814
 exit_to_usermode_loop+0x159/0x220 arch/x86/entry/common.c:160
 prepare_exit_to_usermode arch/x86/entry/common.c:199 [inline]
 syscall_return_slowpath arch/x86/entry/common.c:270 [inline]
 do_syscall_64+0x4a3/0x640 arch/x86/entry/common.c:297
 entry_SYSCALL_64_after_hwframe+0x42/0xb7
RIP: 0033:0x45c849
RSP: 002b:00007f6d2984dcf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca
RAX: fffffffffffffe00 RBX: 000000000076c048 RCX: 000000000045c849
RDX: 0000000000000000 RSI: 0000000000000080 RDI: 000000000076c048
RBP: 000000000076c040 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 000000000076c04c
R13: 00007ffedb991f4f R14: 00007f6d2984e9c0 R15: 000000000076c04c

Showing all locks held in the system:
1 lock held by khungtaskd/1057:
 #0:  (tasklist_lock){.+.?}, at: [<ffffffff81465b23>] debug_show_all_locks+0x7c/0x21a kernel/locking/lockdep.c:4544
2 locks held by getty/7356:
 #0:  (&tty->ldisc_sem){++++}, at: [<ffffffff833ad812>] tty_ldisc_ref_wait+0x22/0x80 drivers/tty/tty_ldisc.c:284
 #1:  (&ldata->atomic_read_lock){+.+.}, at: [<ffffffff833a1454>] n_tty_read+0x1e4/0x16f0 drivers/tty/n_tty.c:2156
2 locks held by getty/7357:
 #0:  (&tty->ldisc_sem){++++}, at: [<ffffffff833ad812>] tty_ldisc_ref_wait+0x22/0x80 drivers/tty/tty_ldisc.c:284
 #1:  (&ldata->atomic_read_lock){+.+.}, at: [<ffffffff833a1454>] n_tty_read+0x1e4/0x16f0 drivers/tty/n_tty.c:2156
2 locks held by getty/7358:
 #0:  (&tty->ldisc_sem){++++}, at: [<ffffffff833ad812>] tty_ldisc_ref_wait+0x22/0x80 drivers/tty/tty_ldisc.c:284
 #1:  (&ldata->atomic_read_lock){+.+.}, at: [<ffffffff833a1454>] n_tty_read+0x1e4/0x16f0 drivers/tty/n_tty.c:2156
2 locks held by getty/7359:
 #0:  (&tty->ldisc_sem){++++}, at: [<ffffffff833ad812>] tty_ldisc_ref_wait+0x22/0x80 drivers/tty/tty_ldisc.c:284
 #1:  (&ldata->atomic_read_lock){+.+.}, at: [<ffffffff833a1454>] n_tty_read+0x1e4/0x16f0 drivers/tty/n_tty.c:2156
2 locks held by getty/7360:
 #0:  (&tty->ldisc_sem){++++}, at: [<ffffffff833ad812>] tty_ldisc_ref_wait+0x22/0x80 drivers/tty/tty_ldisc.c:284
 #1:  (&ldata->atomic_read_lock){+.+.}, at: [<ffffffff833a1454>] n_tty_read+0x1e4/0x16f0 drivers/tty/n_tty.c:2156
2 locks held by getty/7361:
 #0:  (&tty->ldisc_sem){++++}, at: [<ffffffff833ad812>] tty_ldisc_ref_wait+0x22/0x80 drivers/tty/tty_ldisc.c:284
 #1:  (&ldata->atomic_read_lock){+.+.}, at: [<ffffffff833a1454>] n_tty_read+0x1e4/0x16f0 drivers/tty/n_tty.c:2156
2 locks held by getty/7362:
 #0:  (&tty->ldisc_sem){++++}, at: [<ffffffff833ad812>] tty_ldisc_ref_wait+0x22/0x80 drivers/tty/tty_ldisc.c:284
 #1:  (&ldata->atomic_read_lock){+.+.}, at: [<ffffffff833a1454>] n_tty_read+0x1e4/0x16f0 drivers/tty/n_tty.c:2156
1 lock held by syz-executor.1/22407:
 #0:  (rcu_preempt_state.barrier_mutex){+.+.}, at: [<ffffffff814bbb36>] _rcu_barrier+0x56/0x400 kernel/rcu/tree.c:3546

=============================================

NMI backtrace for cpu 0
CPU: 0 PID: 1057 Comm: khungtaskd Not tainted 4.14.173-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:17 [inline]
 dump_stack+0x13e/0x194 lib/dump_stack.c:58
 nmi_cpu_backtrace.cold+0x57/0x93 lib/nmi_backtrace.c:101
 nmi_trigger_cpumask_backtrace+0x139/0x17e lib/nmi_backtrace.c:62
 trigger_all_cpu_backtrace include/linux/nmi.h:140 [inline]
 check_hung_uninterruptible_tasks kernel/hung_task.c:195 [inline]
 watchdog+0x5e2/0xb80 kernel/hung_task.c:274
 kthread+0x30d/0x420 kernel/kthread.c:232
 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:404
Sending NMI from CPU 0 to CPUs 1:
NMI backtrace for cpu 1
CPU: 1 PID: 18120 Comm: syz-executor.0 Not tainted 4.14.173-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
task: ffff8880937026c0 task.stack: ffff888170c40000
RIP: 0010:__preempt_count_sub arch/x86/include/asm/preempt.h:81 [inline]
RIP: 0010:preempt_count_sub+0x5a/0x130 kernel/sched/core.c:3142
RSP: 0000:ffff888170c47790 EFLAGS: 00000002
RAX: 0000000080000002 RBX: 0000000000000001 RCX: 0000000000000000
RDX: 0000000000000004 RSI: ffff888170c47758 RDI: 0000000000000001
RBP: 1ffff1102e188efb R08: 0000000000000001 R09: ffff888170c47960
R10: ffff888170c4791d R11: 0000000000058071 R12: ffff888170c47970
R13: ffff888170c40000 R14: ffff888170c47970 R15: 0000000000000001
FS:  00007f0cd8279700(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000000004b8006e8 CR3: 000000020c00f000 CR4: 00000000001406e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 unwind_next_frame+0xbc6/0x17a0 arch/x86/kernel/unwind_orc.c:498
 __unwind_start arch/x86/kernel/unwind_orc.c:578 [inline]
 __unwind_start+0x450/0x800 arch/x86/kernel/unwind_orc.c:508
 unwind_start arch/x86/include/asm/unwind.h:60 [inline]
 __save_stack_trace+0x4a/0xd0 arch/x86/kernel/stacktrace.c:43
 save_stack+0x32/0xa0 mm/kasan/kasan.c:447
 set_track mm/kasan/kasan.c:459 [inline]
 kasan_kmalloc mm/kasan/kasan.c:551 [inline]
 kasan_kmalloc+0xbf/0xe0 mm/kasan/kasan.c:529
 kmem_cache_alloc+0x127/0x770 mm/slab.c:3552
 __sigqueue_alloc+0x1d3/0x3f0 kernel/signal.c:395
 __send_signal+0x194/0x1280 kernel/signal.c:1092
 specific_send_sig_info kernel/signal.c:1203 [inline]
 force_sig_info+0x240/0x340 kernel/signal.c:1255
 force_sig_info_fault.constprop.0+0x185/0x260 arch/x86/mm/fault.c:225
 __bad_area_nosemaphore+0x1d9/0x2a0 arch/x86/mm/fault.c:918
 __do_page_fault+0x859/0xb40 arch/x86/mm/fault.c:1390
 page_fault+0x45/0x50 arch/x86/entry/entry_64.S:1122
RIP: 0be8:0x4ce0c3
RSP: d82796d4:000000000076c180 EFLAGS: ffffffff
Code: 00 00 8b 0d e9 71 1a 09 85 c9 75 18 65 8b 05 ae e4 c3 7e 25 ff ff ff 7f 39 c3 7f 1a 81 fb fe 00 00 00 76 55 65 8b 05 96 e4 c3 7e <f7> db 65 01 1d 8d e4 c3 7e 5b c3 e8 f6 e0 bc 01 85 c0 74 f5 48 

Crashes (1):
Manager Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Title
ci2-linux-4-14 2020/03/16 17:22 linux-4.14.y 12cd844a39ed 749688d2 .config log report