INFO: task hung in ext4_put_super

6 views
Skip to first unread message

syzbot

unread,
May 24, 2021, 11:18:15 PM5/24/21
to syzkaller...@googlegroups.com
Hello,

syzbot found the following issue on:

HEAD commit: 1e986fe9 Linux 4.19.191
git tree: linux-4.19.y
console output: https://syzkaller.appspot.com/x/log.txt?x=157404efd00000
kernel config: https://syzkaller.appspot.com/x/.config?x=44f656322d91580c
dashboard link: https://syzkaller.appspot.com/bug?extid=69a169605d24b16f9a9c
syz repro: https://syzkaller.appspot.com/x/repro.syz?x=1495ba03d00000
C reproducer: https://syzkaller.appspot.com/x/repro.c?x=105eadabd00000

IMPORTANT: if you fix the issue, please add the following tag to the commit:
Reported-by: syzbot+69a169...@syzkaller.appspotmail.com

EXT4-fs (loop0): re-mounted. Opts: (null)
EXT4-fs (loop0): re-mounted. Opts: (null)
EXT4-fs (loop0): re-mounted. Opts: (null)
EXT4-fs (loop0): re-mounted. Opts: (null)
INFO: task syz-executor388:8109 blocked for more than 140 seconds.
Not tainted 4.19.191-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
syz-executor388 D27744 8109 8107 0x00000000
Call Trace:
context_switch kernel/sched/core.c:2828 [inline]
__schedule+0x887/0x2040 kernel/sched/core.c:3517
schedule+0x8d/0x1b0 kernel/sched/core.c:3561
schedule_timeout+0x92d/0xfe0 kernel/time/timer.c:1794
do_wait_for_common kernel/sched/completion.c:83 [inline]
__wait_for_common kernel/sched/completion.c:104 [inline]
wait_for_common+0x29c/0x470 kernel/sched/completion.c:115
kthread_stop+0x109/0x6b0 kernel/kthread.c:588
ext4_put_super+0x93c/0x1010 fs/ext4/super.c:1054
generic_shutdown_super+0x144/0x370 fs/super.c:456
kill_block_super+0x97/0xf0 fs/super.c:1185
deactivate_locked_super+0x94/0x160 fs/super.c:329
deactivate_super+0x174/0x1a0 fs/super.c:360
cleanup_mnt+0x1a8/0x290 fs/namespace.c:1098
task_work_run+0x148/0x1c0 kernel/task_work.c:113
tracehook_notify_resume include/linux/tracehook.h:193 [inline]
exit_to_usermode_loop+0x251/0x2a0 arch/x86/entry/common.c:167
prepare_exit_to_usermode arch/x86/entry/common.c:198 [inline]
syscall_return_slowpath arch/x86/entry/common.c:271 [inline]
do_syscall_64+0x538/0x620 arch/x86/entry/common.c:296
entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x4461d7
Code: Bad RIP value.
RSP: 002b:00007ffdbf70f8a8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a6
RAX: 0000000000000000 RBX: 00000000000e04e7 RCX: 00000000004461d7
RDX: 00007ffdbf70f96b RSI: 0000000000000002 RDI: 00007ffdbf70f960
RBP: 00007ffdbf70f960 R08: 00000000ffffffff R09: 00007ffdbf70f740
R10: 000000000185f663 R11: 0000000000000202 R12: 00007ffdbf7109d0
R13: 000000000185f5f0 R14: 00007ffdbf70f8d0 R15: 0000000000000314

Showing all locks held in the system:
1 lock held by khungtaskd/1570:
#0: 00000000fcf5113a (rcu_read_lock){....}, at: debug_show_all_locks+0x53/0x265 kernel/locking/lockdep.c:4441
1 lock held by in:imklog/7799:
#0: 000000009009cf18 (&f->f_pos_lock){+.+.}, at: __fdget_pos+0x26f/0x310 fs/file.c:767
1 lock held by syz-executor388/8109:
#0: 000000006cadba91 (&type->s_umount_key#36){++++}, at: deactivate_super+0x16c/0x1a0 fs/super.c:359

=============================================

NMI backtrace for cpu 1
CPU: 1 PID: 1570 Comm: khungtaskd Not tainted 4.19.191-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:77 [inline]
dump_stack+0x1fc/0x2ef lib/dump_stack.c:118
nmi_cpu_backtrace.cold+0x63/0xa2 lib/nmi_backtrace.c:101
nmi_trigger_cpumask_backtrace+0x1a6/0x1f0 lib/nmi_backtrace.c:62
trigger_all_cpu_backtrace include/linux/nmi.h:146 [inline]
check_hung_uninterruptible_tasks kernel/hung_task.c:203 [inline]
watchdog+0x991/0xe60 kernel/hung_task.c:287
kthread+0x33f/0x460 kernel/kthread.c:259
ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415
Sending NMI from CPU 1 to CPUs 0:
NMI backtrace for cpu 0
CPU: 0 PID: 4693 Comm: systemd-journal Not tainted 4.19.191-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:_raw_spin_lock+0x0/0x40 kernel/locking/spinlock.c:143
Code: 58 82 f1 89 e8 21 18 80 f9 e9 2d fe ff ff 48 89 df e8 14 18 80 f9 e9 63 fe ff ff 4c 89 ef e8 27 19 80 f9 e9 2e ff ff ff 90 90 <55> 48 89 fd bf 01 00 00 00 e8 e2 47 29 f9 45 31 c9 41 b8 01 00 00
RSP: 0018:ffff8880a0d3fc40 EFLAGS: 00000082
RAX: 0000000000000001 RBX: 0000000000000001 RCX: 0000000000000000
RDX: dffffc0000000000 RSI: 00000000ffffffff RDI: ffff8880ba02b040
RBP: ffff8880a0d3fd10 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000005 R11: 0000000000000000 R12: ffff8880a0d325c0
R13: 000000000002b040 R14: ffff8880a0d38000 R15: ffff8880ba02b040
FS: 00007f0f2b0798c0(0000) GS:ffff8880ba000000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f0f2848c000 CR3: 00000000a137f000 CR4: 00000000001406f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
rq_lock kernel/sched/sched.h:1824 [inline]
__schedule+0x1f9/0x2040 kernel/sched/core.c:3455
preempt_schedule_irq+0xb0/0x140 kernel/sched/core.c:3744
retint_kernel+0x1b/0x2d
RIP: 0010:arch_local_irq_restore arch/x86/include/asm/paravirt.h:789 [inline]
RIP: 0010:slab_alloc mm/slab.c:3390 [inline]
RIP: 0010:kmem_cache_alloc+0x2c4/0x370 mm/slab.c:3557
Code: 00 48 c7 c7 db 43 b8 89 e8 19 83 a9 ff e9 b5 fd ff ff e8 df ad cf ff 48 83 3d 4f 93 59 08 00 0f 84 ae 00 00 00 4c 89 ff 57 9d <0f> 1f 44 00 00 e9 1c fe ff ff 65 ff 05 fb ef 69 7e 48 8b 05 4c ea
RSP: 0018:ffff8880a0d3fdf8 EFLAGS: 00000282 ORIG_RAX: ffffffffffffff13
RAX: 0000000000000007 RBX: 00000000006000c0 RCX: 0000000000000000
RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000282
RBP: 00000000006000c0 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000000 R12: ffff8880b3cba800
R13: ffff88823b843380 R14: ffff88823b843380 R15: 0000000000000282
getname_flags+0xce/0x590 fs/namei.c:140
getname fs/namei.c:211 [inline]
user_path_create fs/namei.c:3696 [inline]
do_mkdirat+0x8d/0x2d0 fs/namei.c:3834
do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293
entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x7f0f2a334687
Code: 00 b8 ff ff ff ff c3 0f 1f 40 00 48 8b 05 09 d8 2b 00 64 c7 00 5f 00 00 00 b8 ff ff ff ff c3 0f 1f 40 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d e1 d7 2b 00 f7 d8 64 89 01 48
RSP: 002b:00007fff61747458 EFLAGS: 00000293 ORIG_RAX: 0000000000000053
RAX: ffffffffffffffda RBX: 00007fff6174a4c0 RCX: 00007f0f2a334687
RDX: 0000000000000000 RSI: 00000000000001ed RDI: 0000562d0f8058a0
RBP: 00007fff61747490 R08: 0000562d0df743e5 R09: 0000000000000018
R10: 0000000000000069 R11: 0000000000000293 R12: 0000000000000000
R13: 0000000000000001 R14: 0000562d0f8058a0 R15: 00007fff61747ad0


---
This report is generated by a bot. It may contain errors.
See https://goo.gl/tpsmEJ for more information about syzbot.
syzbot engineers can be reached at syzk...@googlegroups.com.

syzbot will keep track of this issue. See:
https://goo.gl/tpsmEJ#status for how to communicate with syzbot.
syzbot can test patches for this issue, for details see:
https://goo.gl/tpsmEJ#testing-patches
Reply all
Reply to author
Forward
0 new messages