syzbot


INFO: task hung in ip_set_net_exit

Status: auto-closed as invalid on 2021/08/25 19:07
Subsystems: netfilter
[Documentation on labels]
Reported-by: syzbot+06b04e24a895e5e349f0@syzkaller.appspotmail.com
First crash: 1532d, last: 1056d
Discussions (1)
Title Replies (including bot) Last reply
INFO: task hung in ip_set_net_exit 0 (1) 2020/01/07 16:04

Sample crash report:
INFO: task kworker/u4:2:51 blocked for more than 143 seconds.
      Not tainted 5.12.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/u4:2    state:D stack:24496 pid:   51 ppid:     2 flags:0x00004000
Workqueue: netns cleanup_net
Call Trace:
 context_switch kernel/sched/core.c:4322 [inline]
 __schedule+0x911/0x21b0 kernel/sched/core.c:5073
 schedule+0xcf/0x270 kernel/sched/core.c:5152
 schedule_preempt_disabled+0xf/0x20 kernel/sched/core.c:5211
 __mutex_lock_common kernel/locking/mutex.c:1026 [inline]
 __mutex_lock+0x81f/0x1120 kernel/locking/mutex.c:1096
 ip_set_net_exit+0x194/0x5b0 net/netfilter/ipset/ip_set_core.c:2382
 ops_exit_list+0xb0/0x160 net/core/net_namespace.c:175
 cleanup_net+0x4ea/0xb10 net/core/net_namespace.c:595
 process_one_work+0x98d/0x1600 kernel/workqueue.c:2275
 worker_thread+0x64c/0x1120 kernel/workqueue.c:2421
 kthread+0x3b1/0x4a0 kernel/kthread.c:292
 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:294
INFO: task syz-executor.5:15446 blocked for more than 143 seconds.
      Not tainted 5.12.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:syz-executor.5  state:D stack:27600 pid:15446 ppid:  8569 flags:0x00004004
Call Trace:
 context_switch kernel/sched/core.c:4322 [inline]
 __schedule+0x911/0x21b0 kernel/sched/core.c:5073
 schedule+0xcf/0x270 kernel/sched/core.c:5152
 schedule_preempt_disabled+0xf/0x20 kernel/sched/core.c:5211
 __mutex_lock_common kernel/locking/mutex.c:1026 [inline]
 __mutex_lock+0x81f/0x1120 kernel/locking/mutex.c:1096
 nfnl_lock net/netfilter/nfnetlink.c:92 [inline]
 nfnetlink_rcv_msg+0xad7/0x12b0 net/netfilter/nfnetlink.c:277
 netlink_rcv_skb+0x153/0x420 net/netlink/af_netlink.c:2502
 nfnetlink_rcv+0x1ac/0x420 net/netfilter/nfnetlink.c:632
 netlink_unicast_kernel net/netlink/af_netlink.c:1312 [inline]
 netlink_unicast+0x533/0x7d0 net/netlink/af_netlink.c:1338
 netlink_sendmsg+0x856/0xd90 net/netlink/af_netlink.c:1927
 sock_sendmsg_nosec net/socket.c:654 [inline]
 sock_sendmsg+0xcf/0x120 net/socket.c:674
 ____sys_sendmsg+0x6e8/0x810 net/socket.c:2350
 ___sys_sendmsg+0xf3/0x170 net/socket.c:2404
 __sys_sendmsg+0xe5/0x1b0 net/socket.c:2433
 do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46
 entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x4665f9
RSP: 002b:00007f7efb079188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
RAX: ffffffffffffffda RBX: 000000000056c008 RCX: 00000000004665f9
RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000003
RBP: 00000000004bfce1 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056c008
R13: 00007ffc92ad84ff R14: 00007f7efb079300 R15: 0000000000022000

Showing all locks held in the system:
4 locks held by kworker/u4:2/51:
 #0: ffff88814074b138 ((wq_completion)netns){+.+.}-{0:0}, at: arch_atomic64_set arch/x86/include/asm/atomic64_64.h:34 [inline]
 #0: ffff88814074b138 ((wq_completion)netns){+.+.}-{0:0}, at: atomic64_set include/asm-generic/atomic-instrumented.h:856 [inline]
 #0: ffff88814074b138 ((wq_completion)netns){+.+.}-{0:0}, at: atomic_long_set include/asm-generic/atomic-long.h:41 [inline]
 #0: ffff88814074b138 ((wq_completion)netns){+.+.}-{0:0}, at: set_work_data kernel/workqueue.c:616 [inline]
 #0: ffff88814074b138 ((wq_completion)netns){+.+.}-{0:0}, at: set_work_pool_and_clear_pending kernel/workqueue.c:643 [inline]
 #0: ffff88814074b138 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x871/0x1600 kernel/workqueue.c:2246
 #1: ffffc90000f1fda8 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x8a5/0x1600 kernel/workqueue.c:2250
 #2: ffffffff8d65fb90 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x9b/0xb10 net/core/net_namespace.c:557
 #3: ffffffff901f3e38 (nfnl_subsys_ipset){+.+.}-{3:3}, at: ip_set_net_exit+0x194/0x5b0 net/netfilter/ipset/ip_set_core.c:2382
1 lock held by khungtaskd/1626:
 #0: ffffffff8bf74520 (rcu_read_lock){....}-{1:2}, at: debug_show_all_locks+0x53/0x260 kernel/locking/lockdep.c:6328
1 lock held by in:imklog/8106:
 #0: ffff888011f54ff0 (&f->f_pos_lock){+.+.}-{3:3}, at: __fdget_pos+0xe9/0x100 fs/file.c:974
2 locks held by kworker/1:11/5871:
 #0: ffff8880b9d35198 (&rq->lock){-.-.}-{2:2}, at: rq_lock kernel/sched/sched.h:1321 [inline]
 #0: ffff8880b9d35198 (&rq->lock){-.-.}-{2:2}, at: __schedule+0x21c/0x21b0 kernel/sched/core.c:4990
 #1: ffff8880b9d1f948 (&per_cpu_ptr(group->pcpu, cpu)->seq){-.-.}-{0:0}, at: psi_task_switch+0x305/0x440 kernel/sched/psi.c:833
2 locks held by syz-executor.5/15442:
1 lock held by syz-executor.5/15446:
 #0: ffffffff901f3e38 (nfnl_subsys_ipset){+.+.}-{3:3}, at: nfnl_lock net/netfilter/nfnetlink.c:92 [inline]
 #0: ffffffff901f3e38 (nfnl_subsys_ipset){+.+.}-{3:3}, at: nfnetlink_rcv_msg+0xad7/0x12b0 net/netfilter/nfnetlink.c:277

=============================================

NMI backtrace for cpu 1
CPU: 1 PID: 1626 Comm: khungtaskd Not tainted 5.12.0-rc7-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:79 [inline]
 dump_stack+0x141/0x1d7 lib/dump_stack.c:120
 nmi_cpu_backtrace.cold+0x44/0xd7 lib/nmi_backtrace.c:105
 nmi_trigger_cpumask_backtrace+0x1b3/0x230 lib/nmi_backtrace.c:62
 trigger_all_cpu_backtrace include/linux/nmi.h:146 [inline]
 check_hung_uninterruptible_tasks kernel/hung_task.c:209 [inline]
 watchdog+0xd48/0xfb0 kernel/hung_task.c:294
 kthread+0x3b1/0x4a0 kernel/kthread.c:292
 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:294
Sending NMI from CPU 1 to CPUs 0:
NMI backtrace for cpu 0
CPU: 0 PID: 15442 Comm: syz-executor.5 Not tainted 5.12.0-rc7-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:__sanitizer_cov_trace_pc+0x37/0x60 kernel/kcov.c:197
Code: 81 e1 00 01 00 00 65 48 8b 14 25 00 f0 01 00 a9 00 01 ff 00 74 0e 85 c9 74 35 8b 82 34 15 00 00 85 c0 74 2b 8b 82 10 15 00 00 <83> f8 02 75 20 48 8b 8a 18 15 00 00 8b 92 14 15 00 00 48 8b 01 48
RSP: 0018:ffffc900025f7148 EFLAGS: 00000246
RAX: 0000000000000002 RBX: 000000000000007c RCX: 0000000000000000
RDX: ffff88802466b880 RSI: ffffffff875fa030 RDI: 0000000000000003
RBP: ffff888023a82000 R08: 0000000000000000 R09: 000000000000001d
R10: ffffffff875fa021 R11: 000000000000001f R12: 000000000000001d
R13: dffffc0000000000 R14: ffff888021838800 R15: ffff888030ed5c80
FS:  00007f7efb09a700(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f9c38f6d000 CR3: 0000000014b01000 CR4: 00000000001506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 hash_ip6_list+0x210/0xfc0 net/netfilter/ipset/ip_set_hash_gen.h:1358
 ip_set_dump_do+0x11cd/0x1dc0 net/netfilter/ipset/ip_set_core.c:1627
 netlink_dump+0x4b9/0xb70 net/netlink/af_netlink.c:2276
 __netlink_dump_start+0x642/0x900 net/netlink/af_netlink.c:2381
 netlink_dump_start include/linux/netlink.h:258 [inline]
 ip_set_dump+0x133/0x1a0 net/netfilter/ipset/ip_set_core.c:1686
 nfnetlink_rcv_msg+0xffb/0x12b0 net/netfilter/nfnetlink.c:282
 netlink_rcv_skb+0x153/0x420 net/netlink/af_netlink.c:2502
 nfnetlink_rcv+0x1ac/0x420 net/netfilter/nfnetlink.c:632
 netlink_unicast_kernel net/netlink/af_netlink.c:1312 [inline]
 netlink_unicast+0x533/0x7d0 net/netlink/af_netlink.c:1338
 netlink_sendmsg+0x856/0xd90 net/netlink/af_netlink.c:1927
 sock_sendmsg_nosec net/socket.c:654 [inline]
 sock_sendmsg+0xcf/0x120 net/socket.c:674
 ____sys_sendmsg+0x6e8/0x810 net/socket.c:2350
 ___sys_sendmsg+0xf3/0x170 net/socket.c:2404
 __sys_sendmsg+0xe5/0x1b0 net/socket.c:2433
 do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46
 entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x4665f9
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f7efb09a188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9
RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000003
RBP: 00000000004bfce1 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf60
R13: 00007ffc92ad84ff R14: 00007f7efb09a300 R15: 0000000000022000

Crashes (21):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2021/04/27 19:07 net-next-old 95aafe911db6 805b5003 .config console log report info ci-upstream-net-kasan-gce INFO: task hung in ip_set_net_exit
2021/01/25 08:51 net-next-old a61e4b60761f 52e37319 .config console log report info ci-upstream-net-kasan-gce INFO: task hung in ip_set_net_exit
2020/06/18 06:05 upstream 7ae77150d94d d45a4d69 .config console log report ci-upstream-kasan-gce
2020/01/07 12:18 upstream ae6088216ce4 1bcd407e .config console log report ci-upstream-kasan-gce
2020/01/09 19:06 upstream b07f636fca1c 4de4e9f0 .config console log report ci-upstream-kasan-gce-386
2020/01/08 14:06 upstream ae6088216ce4 ddc3e859 .config console log report ci-upstream-kasan-gce-386
2021/01/01 15:15 net-old 4bfc4714849d 79264ae3 .config console log report info ci-upstream-net-this-kasan-gce
2020/12/12 05:30 net-old d9838b1d3928 ba24ffcd .config console log report info ci-upstream-net-this-kasan-gce
2020/08/01 06:04 net-old 85496a292241 d895b3be .config console log report ci-upstream-net-this-kasan-gce
2020/07/10 01:05 net-old 1412bb2b4bb7 bc238812 .config console log report ci-upstream-net-this-kasan-gce
2020/05/28 12:19 net-old 183be6f967fe 142a0957 .config console log report ci-upstream-net-this-kasan-gce
2020/05/15 10:33 net-old e776af608f69 2d572622 .config console log report ci-upstream-net-this-kasan-gce
2020/01/30 15:21 net-old ccd1f27368e4 5ed23f9a .config console log report ci-upstream-net-this-kasan-gce
2020/09/02 03:37 net-next-old dc1a9bf2c816 abf9ba4f .config console log report ci-upstream-net-kasan-gce
2020/06/17 20:57 net-next-old cb8e59cc8720 b9f3810b .config console log report ci-upstream-net-kasan-gce
2020/06/17 03:40 net-next-old cb8e59cc8720 559fbe2d .config console log report ci-upstream-net-kasan-gce
2020/04/17 17:33 net-next-old 2fcd80144b93 18397578 .config console log report ci-upstream-net-kasan-gce
2020/04/17 06:33 net-next-old 2fcd80144b93 18397578 .config console log report ci-upstream-net-kasan-gce
2020/04/13 14:00 net-next-old 63bef48fd6c9 17a986e5 .config console log report ci-upstream-net-kasan-gce
2020/04/02 18:31 net-next-old 1a323ea5356e a34e2c33 .config console log report ci-upstream-net-kasan-gce
2020/01/08 01:04 linux-next 264673852033 6738e0b3 .config console log report ci-upstream-linux-next-kasan-gce-root
* Struck through repros no longer work on HEAD.