syzbot


INFO: task hung in trace_hardirqs_on_thunk

Status: auto-closed as invalid on 2020/08/23 01:27
Subsystems: can
[Documentation on labels]
First crash: 1443d, last: 1432d

Sample crash report:
INFO: task syz-executor.5:22870 blocked for more than 143 seconds.
      Not tainted 5.7.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
syz-executor.5  D27944 22870   7585 0x00004004
Call Trace:
 context_switch kernel/sched/core.c:3367 [inline]
 __schedule+0x937/0x1ff0 kernel/sched/core.c:4083
 __sched_text_start+0x8/0x8
 schedule+0xd0/0x2a0 kernel/sched/core.c:4158
 rwsem_down_write_slowpath+0x706/0xf90 kernel/locking/rwsem.c:1235
 rwsem_mark_wake+0x8d0/0x8d0 include/linux/compiler.h:199
 lock_acquire+0x282/0x8f0 kernel/locking/lockdep.c:4906
 trace_hardirqs_on_thunk+0x1a/0x1c arch/x86/entry/thunk_64.S:41
 __down_write kernel/locking/rwsem.c:1389 [inline]
 down_write+0x137/0x150 kernel/locking/rwsem.c:1532
 __down_write kernel/locking/rwsem.c:1389 [inline]
 down_write+0x137/0x150 kernel/locking/rwsem.c:1532
 __down_timeout+0x2d0/0x2d0
 retint_kernel+0x2b/0x2b
 register_netdevice_notifier+0x1e/0x270 net/core/dev.c:1729
 bcm_init+0x1a3/0x210 net/can/bcm.c:1451
 canbcm_pernet_init+0x90/0x90 net/can/bcm.c:1677
 can_create+0x27c/0x500 net/can/af_can.c:168
 __sock_create+0x3cb/0x730 net/socket.c:1433
 sock_create net/socket.c:1484 [inline]
 __sys_socket+0xef/0x200 net/socket.c:1526
 move_addr_to_kernel+0x70/0x70 net/socket.c:195
 __do_sys_clock_gettime kernel/time/posix-timers.c:1094 [inline]
 __se_sys_clock_gettime kernel/time/posix-timers.c:1082 [inline]
 __x64_sys_clock_gettime+0x165/0x240 kernel/time/posix-timers.c:1082
 __ia32_sys_clock_settime+0x260/0x260 kernel/time/posix-timers.c:1410
 trace_hardirqs_off_caller+0x55/0x230 kernel/trace/trace_preemptirq.c:73
 __do_sys_socket net/socket.c:1535 [inline]
 __se_sys_socket net/socket.c:1533 [inline]
 __x64_sys_socket+0x6f/0xb0 net/socket.c:1533
 __trace_hardirqs_on_caller kernel/locking/lockdep.c:3657 [inline]
 lockdep_hardirqs_on+0x463/0x620 kernel/locking/lockdep.c:3702
 do_syscall_64+0xf6/0x7d0 arch/x86/entry/common.c:295
 entry_SYSCALL_64_after_hwframe+0x49/0xb3
INFO: task syz-executor.5:22875 blocked for more than 143 seconds.
      Not tainted 5.7.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
syz-executor.5  D28080 22875   7585 0x00000004
Call Trace:
 context_switch kernel/sched/core.c:3367 [inline]
 __schedule+0x937/0x1ff0 kernel/sched/core.c:4083
 rwsem_down_write_slowpath+0x90a/0xf90 kernel/locking/rwsem.c:1216
 __sched_text_start+0x8/0x8
 schedule+0xd0/0x2a0 kernel/sched/core.c:4158
 rwsem_down_write_slowpath+0x706/0xf90 kernel/locking/rwsem.c:1235
 rwsem_mark_wake+0x8d0/0x8d0 include/linux/compiler.h:199
 lock_acquire+0x1f2/0x8f0 kernel/locking/lockdep.c:4934
 register_netdevice_notifier+0x1e/0x270 net/core/dev.c:1729
 __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:161 [inline]
 _raw_spin_unlock_irqrestore+0x9b/0xe0 kernel/locking/spinlock.c:191
 __down_write kernel/locking/rwsem.c:1389 [inline]
 down_write+0x137/0x150 kernel/locking/rwsem.c:1532
 __down_write kernel/locking/rwsem.c:1389 [inline]
 down_write+0x137/0x150 kernel/locking/rwsem.c:1532
 __down_timeout+0x2d0/0x2d0
 register_netdevice_notifier+0x1e/0x270 net/core/dev.c:1729
 bcm_init+0x1a3/0x210 net/can/bcm.c:1451
 canbcm_pernet_init+0x90/0x90 net/can/bcm.c:1677
 can_create+0x27c/0x500 net/can/af_can.c:168
 __sock_create+0x3cb/0x730 net/socket.c:1433
 sock_create net/socket.c:1484 [inline]
 __sys_socket+0xef/0x200 net/socket.c:1526
 move_addr_to_kernel+0x70/0x70 net/socket.c:195
 __do_sys_clock_gettime kernel/time/posix-timers.c:1094 [inline]
 __se_sys_clock_gettime kernel/time/posix-timers.c:1082 [inline]
 __x64_sys_clock_gettime+0x165/0x240 kernel/time/posix-timers.c:1082
 __ia32_sys_clock_settime+0x260/0x260 kernel/time/posix-timers.c:1410
 trace_hardirqs_off_caller+0x55/0x230 kernel/trace/trace_preemptirq.c:73
 __do_sys_socket net/socket.c:1535 [inline]
 __se_sys_socket net/socket.c:1533 [inline]
 __x64_sys_socket+0x6f/0xb0 net/socket.c:1533
 __trace_hardirqs_on_caller kernel/locking/lockdep.c:3657 [inline]
 lockdep_hardirqs_on+0x463/0x620 kernel/locking/lockdep.c:3702
 do_syscall_64+0xf6/0x7d0 arch/x86/entry/common.c:295
 entry_SYSCALL_64_after_hwframe+0x49/0xb3

Showing all locks held in the system:
3 locks held by kworker/u4:0/7:
 #0: ffff8880a9771938 ((wq_completion)netns){+.+.}-{0:0}, at: __write_once_size include/linux/compiler.h:226 [inline]
 #0: ffff8880a9771938 ((wq_completion)netns){+.+.}-{0:0}, at: arch_atomic64_set arch/x86/include/asm/atomic64_64.h:34 [inline]
 #0: ffff8880a9771938 ((wq_completion)netns){+.+.}-{0:0}, at: atomic64_set include/asm-generic/atomic-instrumented.h:855 [inline]
 #0: ffff8880a9771938 ((wq_completion)netns){+.+.}-{0:0}, at: atomic_long_set include/asm-generic/atomic-long.h:40 [inline]
 #0: ffff8880a9771938 ((wq_completion)netns){+.+.}-{0:0}, at: set_work_data kernel/workqueue.c:615 [inline]
 #0: ffff8880a9771938 ((wq_completion)netns){+.+.}-{0:0}, at: set_work_pool_and_clear_pending kernel/workqueue.c:642 [inline]
 #0: ffff8880a9771938 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x844/0x16a0 kernel/workqueue.c:2239
 #1: ffffc90000cdfdc0 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x878/0x16a0 kernel/workqueue.c:2243
 #2: ffffffff8a57aaf0 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x9b/0xa50 net/core/net_namespace.c:565
1 lock held by khungtaskd/1142:
 #0: ffffffff899bea80 (rcu_read_lock){....}-{1:2}, at: debug_show_all_locks+0x53/0x260 kernel/locking/lockdep.c:5754
1 lock held by in:imklog/6789:
 #0: ffff88809cca3170 (&f->f_pos_lock){+.+.}-{3:3}, at: __fdget_pos+0xe9/0x100 fs/file.c:826
3 locks held by kworker/u4:5/7003:
1 lock held by syz-executor.5/22870:
 #0: ffffffff8a57aaf0 (pernet_ops_rwsem){++++}-{3:3}, at: register_netdevice_notifier+0x1e/0x270 net/core/dev.c:1729
1 lock held by syz-executor.5/22875:
 #0: ffffffff8a57aaf0 (pernet_ops_rwsem){++++}-{3:3}, at: register_netdevice_notifier+0x1e/0x270 net/core/dev.c:1729

=============================================

NMI backtrace for cpu 0
CPU: 0 PID: 1142 Comm: khungtaskd Not tainted 5.7.0-rc6-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0x188/0x20d lib/dump_stack.c:118
 nmi_cpu_backtrace.cold+0x70/0xb1 lib/nmi_backtrace.c:101
 lapic_can_unplug_cpu.cold+0x3b/0x3b
 nmi_trigger_cpumask_backtrace+0x231/0x27e lib/nmi_backtrace.c:62
 trigger_all_cpu_backtrace include/linux/nmi.h:146 [inline]
 check_hung_uninterruptible_tasks kernel/hung_task.c:205 [inline]
 watchdog+0xa8c/0x1010 kernel/hung_task.c:289
 reset_hung_task_detector+0x30/0x30 kernel/hung_task.c:243
 kthread+0x388/0x470 kernel/kthread.c:268
 kthread_mod_delayed_work+0x1a0/0x1a0 kernel/kthread.c:1090
 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:351
Sending NMI from CPU 0 to CPUs 1:
NMI backtrace for cpu 1
CPU: 1 PID: 4108 Comm: systemd-journal Not tainted 5.7.0-rc6-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:lockdep_recursion_finish kernel/locking/lockdep.c:417 [inline]
RIP: 0010:lockdep_hardirqs_on+0x274/0x620 kernel/locking/lockdep.c:3703
Code: 00 00 fc ff df 89 ab 64 08 00 00 0f b6 04 02 84 c0 74 08 3c 03 0f 8e e2 02 00 00 89 ab 80 08 00 00 65 48 8b 1c 25 00 1f 02 00 <48> 8d bb c4 08 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1
RSP: 0018:ffffc90001fafc18 EFLAGS: 00000046
RAX: 0000000000000000 RBX: ffff888093d20240 RCX: 0000000000000000
RDX: 1ffff110127a4158 RSI: ffff888093d20b08 RDI: ffff888093d20ac0
RBP: 000000000024d6df R08: ffff888093d20240 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000000 R12: ffff888061d52000
R13: ffffc90001fafc68 R14: ffff88821b777700 R15: 0000000000000282
FS:  00007ff7972538c0(0000) GS:ffff8880ae700000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007ff79486b028 CR3: 00000000946fb000 CR4: 00000000001406e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 qlink_free mm/kasan/quarantine.c:151 [inline]
 qlist_free_all+0xed/0x140 mm/kasan/quarantine.c:167
 quarantine_reduce+0x135/0x170 mm/kasan/quarantine.c:260
 __kasan_kmalloc.constprop.0+0x97/0xd0 mm/kasan/common.c:476
 slab_post_alloc_hook mm/slab.h:586 [inline]
 slab_alloc mm/slab.c:3320 [inline]
 kmem_cache_alloc+0x11b/0x740 mm/slab.c:3484
 getname_flags fs/namei.c:138 [inline]
 getname_flags+0xd2/0x5b0 fs/namei.c:128
 rcu_read_lock_any_held.part.0+0x50/0x50 arch/x86/include/asm/paravirt.h:754
 do_sys_openat2+0x3fc/0x7d0 fs/open.c:1142
 file_open_root+0x400/0x400 fs/open.c:1129
 __secure_computing+0x104/0x360 kernel/seccomp.c:950
 syscall_trace_enter+0x41d/0xd10 arch/x86/entry/common.c:130
 do_sys_open+0xc3/0x140 fs/open.c:1164
 filp_open+0x70/0x70 fs/open.c:1117
 trace_hardirqs_off_caller+0x55/0x230 kernel/trace/trace_preemptirq.c:73
 do_syscall_64+0xf6/0x7d0 arch/x86/entry/common.c:295
 entry_SYSCALL_64_after_hwframe+0x49/0xb3
RIP: 0033:0x7ff7967e3840
Code: 73 01 c3 48 8b 0d 68 77 20 00 f7 d8 64 89 01 48 83 c8 ff c3 66 0f 1f 44 00 00 83 3d 89 bb 20 00 00 75 10 b8 02 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 1e f6 ff ff 48 89 04 24
RSP: 002b:00007ffc94a82d18 EFLAGS: 00000246 ORIG_RAX: 0000000000000002
RAX: ffffffffffffffda RBX: 00007ffc94a83020 RCX: 00007ff7967e3840
RDX: 00000000000001a0 RSI: 0000000000080042 RDI: 0000562f3343d450
RBP: 000000000000000d R08: 000000000000c0ff R09: 00000000ffffffff
R10: 0000000000000069 R11: 0000000000000246 R12: 00000000ffffffff
R13: 0000562f33432040 R14: 00007ffc94a82fe0 R15: 0000562f3343d270

Crashes (9):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2020/05/25 01:25 upstream caffb99b6929 bd28eb9d .config console log report ci-upstream-kasan-gce
2020/05/14 14:17 upstream 24085f70a6e1 2d572622 .config console log report ci-upstream-kasan-gce-root
2020/05/19 05:23 upstream 45088963ca9c 684d3606 .config console log report ci-upstream-kasan-gce-386
2020/05/15 22:57 upstream 1ae7efb38854 d7f9fffa .config console log report ci-upstream-kasan-gce-386
2020/05/15 01:48 upstream 8c1684bb81f1 2d572622 .config console log report ci-upstream-kasan-gce-386
2020/05/24 20:49 bpf d04322a0da1e bd28eb9d .config console log report ci-upstream-bpf-kasan-gce
2020/05/24 14:22 linux-next c11d28ab4a69 bd28eb9d .config console log report ci-upstream-linux-next-kasan-gce-root
2020/05/18 16:56 https://github.com/google/kasan.git usb-fuzzer 806d8acc2890 24d91142 .config console log report ci2-upstream-usb
2020/05/18 13:00 https://github.com/google/kasan.git usb-fuzzer 806d8acc2890 24d91142 .config console log report ci2-upstream-usb
* Struck through repros no longer work on HEAD.