syzbot


INFO: task hung in ipv6_sock_ac_close

Status: auto-closed as invalid on 2019/03/27 06:43
First crash: 2246d, last: 2246d
Similar bugs (1)
Kernel Title Repro Cause bisect Fix bisect Count Last Reported Patched Status
upstream INFO: task hung in ipv6_sock_ac_close net 4 161d 162d 0/28 auto-obsoleted due to no activity on 2024/09/10 18:53

Sample crash report:
binder: undelivered TRANSACTION_ERROR: 29189
INFO: task syz-executor5:22698 blocked for more than 140 seconds.
      Not tainted 4.9.129+ #45
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
syz-executor5   D28056 22698  28275 0x80000002
 ffff8801c67a2f80 ffff8801d7acb700 ffff8801a1bdc780 ffff8801a3d3c740
 ffff8801db721018 ffff8801a29f7758 ffffffff827f2ab2 0000000000000001
 ffff8801c67a3830 ffffed0038cf4705 00ff8801c67a2f80 ffff8801db7218f0
Call Trace:
 [<ffffffff827f3fdf>] schedule+0x7f/0x1b0 kernel/sched/core.c:3553
 [<ffffffff827f4963>] schedule_preempt_disabled+0x13/0x20 kernel/sched/core.c:3586
 [<ffffffff827f69dd>] __mutex_lock_common kernel/locking/mutex.c:582 [inline]
 [<ffffffff827f69dd>] mutex_lock_nested+0x38d/0x900 kernel/locking/mutex.c:621
 [<ffffffff8232def7>] rtnl_lock+0x17/0x20 net/core/rtnetlink.c:70
 [<ffffffff8267a92a>] ipv6_sock_ac_close+0xea/0x270 net/ipv6/anycast.c:184
 [<ffffffff82675d98>] inet6_release+0x48/0x70 net/ipv6/af_inet6.c:438
 [<ffffffff82288b87>] __sock_release+0xd7/0x260 net/socket.c:605
 [<ffffffff82288d29>] sock_close+0x19/0x20 net/socket.c:1059
 [<ffffffff81510003>] __fput+0x263/0x700 fs/file_table.c:208
 [<ffffffff81510525>] ____fput+0x15/0x20 fs/file_table.c:244
 [<ffffffff8113d73c>] task_work_run+0x10c/0x180 kernel/task_work.c:116
 [<ffffffff810e689d>] exit_task_work include/linux/task_work.h:21 [inline]
 [<ffffffff810e689d>] do_exit+0x78d/0x29d0 kernel/exit.c:833
 [<ffffffff810ecf71>] do_group_exit+0x111/0x300 kernel/exit.c:937
 [<ffffffff8110e711>] get_signal+0x4e1/0x1460 kernel/signal.c:2321
 [<ffffffff810526c5>] do_signal+0x95/0x1b00 arch/x86/kernel/signal.c:807
 [<ffffffff81003e2e>] exit_to_usermode_loop+0x10e/0x150 arch/x86/entry/common.c:158
 [<ffffffff81005932>] prepare_exit_to_usermode arch/x86/entry/common.c:194 [inline]
 [<ffffffff81005932>] syscall_return_slowpath arch/x86/entry/common.c:263 [inline]
 [<ffffffff81005932>] do_syscall_64+0x3e2/0x550 arch/x86/entry/common.c:290
 [<ffffffff82802d13>] entry_SYSCALL_64_after_swapgs+0x5d/0xdb

Showing all locks held in the system:
1 lock held by rcu_preempt/7:
 #0:  (&rq->lock){-.-.-.}, at: [<ffffffff827f258c>] __schedule+0x13c/0x1b10 kernel/sched/core.c:3448
2 locks held by khungtaskd/24:
 #0:  (rcu_read_lock){......}, at: [<ffffffff8131b83c>] check_hung_uninterruptible_tasks kernel/hung_task.c:168 [inline]
 #0:  (rcu_read_lock){......}, at: [<ffffffff8131b83c>] watchdog+0x11c/0xa20 kernel/hung_task.c:239
 #1:  (tasklist_lock){.+.?..}, at: [<ffffffff813fdfe4>] debug_show_all_locks+0x79/0x218 kernel/locking/lockdep.c:4336
1 lock held by rsyslogd/1896:
 #0:  (&f->f_pos_lock){+.+.+.}, at: [<ffffffff8156c9ec>] __fdget_pos+0xac/0xd0 fs/file.c:781
2 locks held by getty/2023:
 #0:  (&tty->ldisc_sem){++++++}, at: [<ffffffff82800e02>] ldsem_down_read+0x32/0x40 drivers/tty/tty_ldsem.c:367
 #1:  (&ldata->atomic_read_lock){+.+.+.}, at: [<ffffffff81d2abd2>] n_tty_read+0x202/0x16e0 drivers/tty/n_tty.c:2142
2 locks held by syz-executor5/22698:
 #0:  (&sb->s_type->i_mutex_key#9){+.+.+.}, at: [<ffffffff82288b3b>] inode_lock include/linux/fs.h:766 [inline]
 #0:  (&sb->s_type->i_mutex_key#9){+.+.+.}, at: [<ffffffff82288b3b>] __sock_release+0x8b/0x260 net/socket.c:604
 #1:  (rtnl_mutex){+.+.+.}, at: [<ffffffff8232def7>] rtnl_lock+0x17/0x20 net/core/rtnetlink.c:70
1 lock held by syz-executor5/30170:
 #0:  (rtnl_mutex){+.+.+.}, at: [<ffffffff8232def7>] rtnl_lock+0x17/0x20 net/core/rtnetlink.c:70

=============================================

NMI backtrace for cpu 0
CPU: 0 PID: 24 Comm: khungtaskd Not tainted 4.9.129+ #45
 ffff8801d9907d08 ffffffff81b36939 0000000000000000 0000000000000000
 0000000000000000 0000000000000001 ffffffff81098180 ffff8801d9907d40
 ffffffff81b41a49 0000000000000000 0000000000000000 0000000000000003
Call Trace:
 [<ffffffff81b36939>] __dump_stack lib/dump_stack.c:15 [inline]
 [<ffffffff81b36939>] dump_stack+0xc1/0x128 lib/dump_stack.c:51
 [<ffffffff81b41a49>] nmi_cpu_backtrace.cold.0+0x48/0x87 lib/nmi_backtrace.c:99
 [<ffffffff81b419dc>] nmi_trigger_cpumask_backtrace+0x12c/0x151 lib/nmi_backtrace.c:60
 [<ffffffff81098284>] arch_trigger_cpumask_backtrace+0x14/0x20 arch/x86/kernel/apic/hw_nmi.c:37
 [<ffffffff8131bdcd>] trigger_all_cpu_backtrace include/linux/nmi.h:58 [inline]
 [<ffffffff8131bdcd>] check_hung_task kernel/hung_task.c:125 [inline]
 [<ffffffff8131bdcd>] check_hung_uninterruptible_tasks kernel/hung_task.c:182 [inline]
 [<ffffffff8131bdcd>] watchdog+0x6ad/0xa20 kernel/hung_task.c:239
 [<ffffffff8114272d>] kthread+0x26d/0x300 kernel/kthread.c:211
 [<ffffffff82802edc>] ret_from_fork+0x5c/0x70 arch/x86/entry/entry_64.S:373
Sending NMI from CPU 0 to CPUs 1:
NMI backtrace for cpu 1
CPU: 1 PID: 30183 Comm: syz-executor0 Not tainted 4.9.129+ #45
task: ffff8801c87497c0 task.stack: ffff8801a2fb8000
RIP: 0010:[<ffffffff8131de29>] c [<ffffffff8131de29>] seccomp_run_filters kernel/seccomp.c:200 [inline]
RIP: 0010:[<ffffffff8131de29>] c [<ffffffff8131de29>] __seccomp_filter+0x119/0xc80 kernel/seccomp.c:589
RSP: 0018:ffff8801a2fbfcb8  EFLAGS: 00000246
RAX: 1ffff100391f9970 RBX: ffff8801c8fccb70 RCX: ffffc90001f32000
RDX: 0000000000040000 RSI: ffffffff8131de19 RDI: ffff8801c8fccb80
RBP: ffff8801a2fbfdc0 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000000 R12: ffff8801a2fbfd98
R13: 000000007fff0000 R14: dffffc0000000000 R15: ffff8801a2fbfe48
FS:  00007f7e5cfa7700(0000) GS:ffff8801db700000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000000c423a5f000 CR3: 000000019540f000 CR4: 00000000001606b0
DR0: 0000000020000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600
Stack:
 ffffffff8100226ac 0000000000000000c 0000000000000000c 0000000000000100c
 0000000000000001c 0000000000000007c 000000ca00000000c 1ffff100345f7f9fc
 0000000041b58ab3c ffffffff82e2e977c ffffffff8131dd10c ffffffff828036a6c
Call Trace:
 [<ffffffff81320356>] __secure_computing+0xa6/0x290 kernel/seccomp.c:692
 [<ffffffff81004940>] syscall_trace_enter+0x550/0xd20 arch/x86/entry/common.c:118
 [<ffffffff81005891>] do_syscall_64+0x341/0x550 arch/x86/entry/common.c:276
 [<ffffffff82802d13>] entry_SYSCALL_64_after_swapgs+0x5d/0xdb
Code: ce8 c03 c42 c80 c3c c30 c00 c0f c85 c5f c09 c00 c00 c48 c8b c5b c08 c48 c85 cdb c74 c6c ce8 cb7 cd3 cff cff c48 c8d c7b c10 c48 c89 cf8 c48 cc1 ce8 c03 c42 c80 c3c c30 c00 c<0f> c85 c31 c09 c00 c00 c4c c8b c63 c10 c49 c8d c7c c24 c20 c48 c89 cf8 c48 cc1 ce8 c

Crashes (1):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2018/09/28 06:40 https://android.googlesource.com/kernel/common android-4.9 4fc79c48d27f 0c2fa87b .config console log report ci-android-49-kasan-gce-root
* Struck through repros no longer work on HEAD.