syzbot


INFO: task hung in tls_sw_sendmsg

Status: closed as dup on 2019/08/19 21:10
Reported-by: syzbot+8a6df99c3b1812093b70@syzkaller.appspotmail.com
First crash: 1306d, last: 1117d
Duplicate of (1):
Title Repro Cause bisect Fix bisect Count Last Reported
INFO: task hung in aead_recvmsg C done 11991 987d 1760d
similar bugs (2):
Kernel Title Repro Cause bisect Fix bisect Count Last Reported Patched Status
upstream INFO: task hung in tls_sw_sendmsg (2) 3 755d 756d 0/24 auto-closed as invalid on 2020/12/09 14:32
upstream INFO: task hung in tls_sw_sendmsg (3) 38 6d22h 163d 0/24 upstream: reported on 2022/04/25 07:30

Sample crash report:
INFO: task syz-executor.5:9369 blocked for more than 143 seconds.
      Not tainted 5.2.0-rc6+ #34
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
syz-executor.5  D27280  9369   9172 0x00004004
Call Trace:
 context_switch kernel/sched/core.c:2818 [inline]
 __schedule+0x7cb/0x1560 kernel/sched/core.c:3445
 schedule+0xa8/0x260 kernel/sched/core.c:3509
 schedule_timeout+0x717/0xc50 kernel/time/timer.c:1783
 do_wait_for_common kernel/sched/completion.c:83 [inline]
 __wait_for_common kernel/sched/completion.c:104 [inline]
 wait_for_common kernel/sched/completion.c:115 [inline]
 wait_for_completion+0x29c/0x440 kernel/sched/completion.c:136
 crypto_wait_req include/linux/crypto.h:675 [inline]
 crypto_wait_req include/linux/crypto.h:670 [inline]
 tls_sw_sendmsg+0x13a4/0x17a0 net/tls/tls_sw.c:1072
 inet_sendmsg+0x141/0x5d0 net/ipv4/af_inet.c:798
 sock_sendmsg_nosec net/socket.c:646 [inline]
 sock_sendmsg+0xd7/0x130 net/socket.c:665
 sock_write_iter+0x27c/0x3e0 net/socket.c:994
 call_write_iter include/linux/fs.h:1872 [inline]
 new_sync_write+0x4d3/0x770 fs/read_write.c:483
 __vfs_write+0xe1/0x110 fs/read_write.c:496
 vfs_write+0x20c/0x580 fs/read_write.c:558
 ksys_write+0x14f/0x290 fs/read_write.c:611
 __do_sys_write fs/read_write.c:623 [inline]
 __se_sys_write fs/read_write.c:620 [inline]
 __x64_sys_write+0x73/0xb0 fs/read_write.c:620
 do_syscall_64+0xfd/0x680 arch/x86/entry/common.c:301
 entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x459519
Code: 48 89 98 e0 00 00 00 c7 04 24 00 00 00 00 48 8d 05 f4 2a 53 00 48 89 44 24 08 e8 72 0c fd ff 85 c0 0f 85 1c 02 00 00 48 8b 05 <c3> 70 76 00 48 89 44 24 28 31 c0 eb 03 48 ff c0 48 83 f8 41 7d 5a
RSP: 002b:00007f78e8a21c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459519
RDX: 0000000000000001 RSI: 0000000020000380 RDI: 0000000000000003
RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 00007f78e8a226d4
R13: 00000000004c9396 R14: 00000000004e0610 R15: 00000000ffffffff

Showing all locks held in the system:
2 locks held by kworker/u4:0/7:
 #0: 0000000060dc78c0 (&rq->lock){-.-.}, at: rq_lock kernel/sched/sched.h:1168 [inline]
 #0: 0000000060dc78c0 (&rq->lock){-.-.}, at: __schedule+0x1f5/0x1560 kernel/sched/core.c:3397
 #1: 00000000298fecc2 (rcu_read_lock){....}, at: __update_idle_core+0x45/0x3f0 kernel/sched/fair.c:6087
1 lock held by khungtaskd/1043:
 #0: 00000000298fecc2 (rcu_read_lock){....}, at: debug_show_all_locks+0x5f/0x27e kernel/locking/lockdep.c:5149
1 lock held by rsyslogd/8990:
 #0: 00000000ec97c1b8 (&f->f_pos_lock){+.+.}, at: __fdget_pos+0xee/0x110 fs/file.c:801
2 locks held by getty/9112:
 #0: 00000000fd5699f1 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:341
 #1: 00000000c3b56128 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 drivers/tty/n_tty.c:2156
2 locks held by getty/9113:
 #0: 00000000c9d59af6 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:341
 #1: 0000000090735de1 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 drivers/tty/n_tty.c:2156
2 locks held by getty/9114:
 #0: 00000000c57e6159 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:341
 #1: 00000000509eba6b (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 drivers/tty/n_tty.c:2156
2 locks held by getty/9115:
 #0: 000000003a032dfd (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:341
 #1: 0000000012aeddd9 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 drivers/tty/n_tty.c:2156
2 locks held by getty/9116:
 #0: 0000000029443ce1 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:341
 #1: 0000000078739f6a (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 drivers/tty/n_tty.c:2156
2 locks held by getty/9117:
 #0: 000000001ec227f8 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:341
 #1: 00000000ef7c1180 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 drivers/tty/n_tty.c:2156
2 locks held by getty/9118:
 #0: 000000008850037e (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:341
 #1: 0000000050813501 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 drivers/tty/n_tty.c:2156
1 lock held by syz-executor.5/9369:
 #0: 000000005f3e4133 (sk_lock-AF_INET6){+.+.}, at: lock_sock include/net/sock.h:1522 [inline]
 #0: 000000005f3e4133 (sk_lock-AF_INET6){+.+.}, at: tls_sw_sendmsg+0x25d/0x17a0 net/tls/tls_sw.c:900

=============================================

NMI backtrace for cpu 1
CPU: 1 PID: 1043 Comm: khungtaskd Not tainted 5.2.0-rc6+ #34
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0x172/0x1f0 lib/dump_stack.c:113
 nmi_cpu_backtrace.cold+0x63/0xa4 lib/nmi_backtrace.c:101
 nmi_trigger_cpumask_backtrace+0x1be/0x236 lib/nmi_backtrace.c:62
 arch_trigger_cpumask_backtrace+0x14/0x20 arch/x86/kernel/apic/hw_nmi.c:38
 trigger_all_cpu_backtrace include/linux/nmi.h:146 [inline]
 check_hung_uninterruptible_tasks kernel/hung_task.c:205 [inline]
 watchdog+0x9b7/0xec0 kernel/hung_task.c:289
 kthread+0x354/0x420 kernel/kthread.c:255
 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:352
Sending NMI from CPU 1 to CPUs 0:
NMI backtrace for cpu 0
CPU: 0 PID: 7 Comm: kworker/u4:0 Not tainted 5.2.0-rc6+ #34
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Workqueue: bat_events batadv_nc_worker
RIP: 0010:lock_acquire+0x18/0x3f0 kernel/locking/lockdep.c:4292
Code: 85 70 ff ff ff e9 48 fc ff ff 0f 1f 84 00 00 00 00 00 48 b8 00 00 00 00 00 fc ff df 55 45 89 c3 48 89 e5 41 57 41 89 cf 41 56 <41> 89 d6 41 55 41 89 f5 41 54 49 89 fc 53 65 48 8b 1c 25 c0 fd 01
RSP: 0018:ffff8880a989fcb8 EFLAGS: 00000246
RAX: dffffc0000000000 RBX: ffff8880969e2c80 RCX: 0000000000000002
RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffffff88ba3700
RBP: ffff8880a989fcc8 R08: 0000000000000000 R09: 0000000000000000
R10: ffffed1015d06c6f R11: 0000000000000000 R12: 0000000000000001
R13: 0000000000000147 R14: ffff8880580411b8 R15: 0000000000000002
FS:  0000000000000000(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fe4f3ee2000 CR3: 00000000a035b000 CR4: 00000000001406f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 rcu_lock_acquire include/linux/rcupdate.h:208 [inline]
 rcu_read_lock include/linux/rcupdate.h:593 [inline]
 batadv_nc_purge_orig_hash net/batman-adv/network-coding.c:407 [inline]
 batadv_nc_worker+0x117/0x760 net/batman-adv/network-coding.c:718
 process_one_work+0x989/0x1790 kernel/workqueue.c:2269
 worker_thread+0x98/0xe40 kernel/workqueue.c:2415
 kthread+0x354/0x420 kernel/kthread.c:255
 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:352

Crashes (18):
Manager Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Title
ci-upstream-kasan-gce-selinux-root 2019/06/27 23:34 upstream 249155c20f9b 7509bf36 .config log report
ci-upstream-net-this-kasan-gce 2019/09/14 21:40 net 4d7ffcf3bf1b 32d59357 .config log report
ci-upstream-net-this-kasan-gce 2019/09/09 00:02 net 28abe5796252 a60cb4cd .config log report
ci-upstream-net-this-kasan-gce 2019/06/17 14:01 net d4d5d8e83c96 442206d7 .config log report
ci-upstream-net-this-kasan-gce 2019/05/11 12:25 net daf3ddbe11a2 46caad94 .config log report
ci-upstream-net-this-kasan-gce 2019/03/23 19:07 net c8248c6c1a3d a2cef203 .config log report
ci-upstream-net-kasan-gce 2019/09/14 03:40 net-next 022c10d6c73b 32d59357 .config log report
ci-upstream-net-kasan-gce 2019/08/06 00:34 net-next 31cc088a4f5d 6affd8e8 .config log report
ci-upstream-net-kasan-gce 2019/06/26 05:12 net-next 045df37e743c 0a8d1a96 .config log report
ci-upstream-net-kasan-gce 2019/06/20 00:29 net-next 6c9bef32c6e7 34bf9440 .config log report
ci-upstream-net-kasan-gce 2019/06/16 20:01 net-next 9d9f3fba4c46 442206d7 .config log report
ci-upstream-net-kasan-gce 2019/04/29 23:01 net-next 88d6272acaaa b617407b .config log report
ci-upstream-net-kasan-gce 2019/04/28 10:15 net-next 7cb523d4fec7 b617407b .config log report
ci-upstream-net-kasan-gce 2019/04/20 00:36 net-next 5c2e6e14a0ad b0e8efcb .config log report
ci-upstream-net-kasan-gce 2019/04/16 04:21 net-next 47a1a225ab35 505ab413 .config log report
ci-upstream-net-kasan-gce 2019/03/22 07:23 net-next 0b03a5ca8b14 dce6e62f .config log report
ci-upstream-net-kasan-gce 2019/03/09 20:07 net-next d9862cfbe209 12365b99 .config log report
ci-upstream-net-kasan-gce 2019/03/09 15:15 net-next d9862cfbe209 12365b99 .config log report
* Struck through repros no longer work on HEAD.