INFO: task hung in iterate_supers

10 views
Skip to first unread message

syzbot

unread,
Apr 25, 2019, 10:13:06 AM4/25/19
to syzkaller...@googlegroups.com
Hello,

syzbot found the following crash on:

HEAD commit: 68d7a45e Linux 4.14.113
git tree: linux-4.14.y
console output: https://syzkaller.appspot.com/x/log.txt?x=1450f9b0a00000
kernel config: https://syzkaller.appspot.com/x/.config?x=dbf1fde4d7489e1c
dashboard link: https://syzkaller.appspot.com/bug?extid=f9b2878f3e8b8648e10a
compiler: gcc (GCC) 9.0.0 20181231 (experimental)

Unfortunately, I don't have any reproducer for this crash yet.

IMPORTANT: if you fix the bug, please add the following tag to the commit:
Reported-by: syzbot+f9b287...@syzkaller.appspotmail.com

protocol 88fb is buggy, dev hsr_slave_1
protocol 88fb is buggy, dev hsr_slave_0
protocol 88fb is buggy, dev hsr_slave_1
protocol 88fb is buggy, dev hsr_slave_0
protocol 88fb is buggy, dev hsr_slave_1
INFO: task syz-executor.2:22536 blocked for more than 140 seconds.
Not tainted 4.14.113 #3
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
syz-executor.2 D29592 22536 7159 0x00000004
Call Trace:
context_switch kernel/sched/core.c:2807 [inline]
__schedule+0x7be/0x1cf0 kernel/sched/core.c:3383
schedule+0x92/0x1c0 kernel/sched/core.c:3427
__rwsem_down_read_failed_common kernel/locking/rwsem-xadd.c:276 [inline]
rwsem_down_read_failed+0x1f4/0x380 kernel/locking/rwsem-xadd.c:293
call_rwsem_down_read_failed+0x18/0x30 arch/x86/lib/rwsem.S:94
__down_read arch/x86/include/asm/rwsem.h:66 [inline]
down_read+0x49/0xb0 kernel/locking/rwsem.c:26
iterate_supers+0xe1/0x250 fs/super.c:611
sys_sync+0x7a/0x130 fs/sync.c:113
do_syscall_64+0x1eb/0x630 arch/x86/entry/common.c:289
entry_SYSCALL_64_after_hwframe+0x42/0xb7
RIP: 0033:0x458d99
RSP: 002b:00007fa9f474dc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a2
RAX: ffffffffffffffda RBX: 000000000073bf08 RCX: 0000000000458d99
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa9f474e6d4
R13: 00000000004c543b R14: 00000000004dd530 R15: 00000000ffffffff
INFO: task syz-executor.2:22540 blocked for more than 140 seconds.
Not tainted 4.14.113 #3
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
syz-executor.2 D29616 22540 7159 0x00000004
Call Trace:
context_switch kernel/sched/core.c:2807 [inline]
__schedule+0x7be/0x1cf0 kernel/sched/core.c:3383
schedule+0x92/0x1c0 kernel/sched/core.c:3427
__rwsem_down_read_failed_common kernel/locking/rwsem-xadd.c:276 [inline]
rwsem_down_read_failed+0x1f4/0x380 kernel/locking/rwsem-xadd.c:293
call_rwsem_down_read_failed+0x18/0x30 arch/x86/lib/rwsem.S:94
__down_read arch/x86/include/asm/rwsem.h:66 [inline]
down_read+0x49/0xb0 kernel/locking/rwsem.c:26
iterate_supers+0xe1/0x250 fs/super.c:611
sys_sync+0x7a/0x130 fs/sync.c:113
do_syscall_64+0x1eb/0x630 arch/x86/entry/common.c:289
entry_SYSCALL_64_after_hwframe+0x42/0xb7
RIP: 0033:0x458d99
RSP: 002b:00007fa9f472cc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a2
RAX: ffffffffffffffda RBX: 000000000073bfa8 RCX: 0000000000458d99
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa9f472d6d4
R13: 00000000004c543b R14: 00000000004dd530 R15: 00000000ffffffff

Showing all locks held in the system:
1 lock held by khungtaskd/1008:
#0: (tasklist_lock){.+.+}, at: [<ffffffff81486f98>]
debug_show_all_locks+0x7f/0x21f kernel/locking/lockdep.c:4544
2 locks held by getty/7109:
#0: (&tty->ldisc_sem){++++}, at: [<ffffffff861b0323>]
ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:377
#1: (&ldata->atomic_read_lock){+.+.}, at: [<ffffffff8310c666>]
n_tty_read+0x1e6/0x17b0 drivers/tty/n_tty.c:2156
2 locks held by getty/7110:
#0: (&tty->ldisc_sem){++++}, at: [<ffffffff861b0323>]
ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:377
#1: (&ldata->atomic_read_lock){+.+.}, at: [<ffffffff8310c666>]
n_tty_read+0x1e6/0x17b0 drivers/tty/n_tty.c:2156
2 locks held by getty/7111:
#0: (&tty->ldisc_sem){++++}, at: [<ffffffff861b0323>]
ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:377
#1: (&ldata->atomic_read_lock){+.+.}, at: [<ffffffff8310c666>]
n_tty_read+0x1e6/0x17b0 drivers/tty/n_tty.c:2156
2 locks held by getty/7112:
#0: (&tty->ldisc_sem){++++}, at: [<ffffffff861b0323>]
ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:377
#1: (&ldata->atomic_read_lock){+.+.}, at: [<ffffffff8310c666>]
n_tty_read+0x1e6/0x17b0 drivers/tty/n_tty.c:2156
2 locks held by getty/7113:
#0: (&tty->ldisc_sem){++++}, at: [<ffffffff861b0323>]
ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:377
#1: (&ldata->atomic_read_lock){+.+.}, at: [<ffffffff8310c666>]
n_tty_read+0x1e6/0x17b0 drivers/tty/n_tty.c:2156
2 locks held by getty/7114:
#0: (&tty->ldisc_sem){++++}, at: [<ffffffff861b0323>]
ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:377
#1: (&ldata->atomic_read_lock){+.+.}, at: [<ffffffff8310c666>]
n_tty_read+0x1e6/0x17b0 drivers/tty/n_tty.c:2156
2 locks held by getty/7115:
#0: (&tty->ldisc_sem){++++}, at: [<ffffffff861b0323>]
ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:377
#1: (&ldata->atomic_read_lock){+.+.}, at: [<ffffffff8310c666>]
n_tty_read+0x1e6/0x17b0 drivers/tty/n_tty.c:2156
1 lock held by syz-executor.2/22536:
#0: (&type->s_umount_key#79){++++}, at: [<ffffffff818e11d1>]
iterate_supers+0xe1/0x250 fs/super.c:611
1 lock held by syz-executor.2/22540:
#0: (&type->s_umount_key#79){++++}, at: [<ffffffff818e11d1>]
iterate_supers+0xe1/0x250 fs/super.c:611

=============================================

NMI backtrace for cpu 0
CPU: 0 PID: 1008 Comm: khungtaskd Not tainted 4.14.113 #3
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS
Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:17 [inline]
dump_stack+0x138/0x19c lib/dump_stack.c:53
nmi_cpu_backtrace.cold+0x57/0x94 lib/nmi_backtrace.c:101
nmi_trigger_cpumask_backtrace+0x141/0x189 lib/nmi_backtrace.c:62
arch_trigger_cpumask_backtrace+0x14/0x20 arch/x86/kernel/apic/hw_nmi.c:38
trigger_all_cpu_backtrace include/linux/nmi.h:140 [inline]
check_hung_uninterruptible_tasks kernel/hung_task.c:195 [inline]
watchdog+0x5e7/0xb90 kernel/hung_task.c:274
kthread+0x31c/0x430 kernel/kthread.c:232
ret_from_fork+0x3a/0x50 arch/x86/entry/entry_64.S:402
Sending NMI from CPU 0 to CPUs 1:
NMI backtrace for cpu 1
CPU: 1 PID: 12539 Comm: syz-executor.1 Not tainted 4.14.113 #3
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS
Google 01/01/2011
task: ffff88805dea05c0 task.stack: ffff888067af8000
RIP: 0010:__lock_acquire+0x22c/0x45e0 kernel/locking/lockdep.c:3392
RSP: 0018:ffff888067aff400 EFLAGS: 00000002
RAX: ffffffff88cc49d0 RBX: 0000000000000000 RCX: 0000000000000002
RDX: dffffc0000000000 RSI: ffff88805dea0e38 RDI: ffffffff8778ed68
RBP: ffff888067aff5a8 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: ffff88805dea05c0 R12: ffffffff8778ed60
R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000002
FS: 00007fbca3603700(0000) GS:ffff8880aef00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000000c427cff010 CR3: 0000000092c95000 CR4: 00000000001426e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600
Call Trace:
lock_acquire+0x16f/0x430 kernel/locking/lockdep.c:3994
rcu_lock_acquire include/linux/rcupdate.h:244 [inline]
rcu_read_lock include/linux/rcupdate.h:631 [inline]
find_get_entry+0x47/0x520 mm/filemap.c:1329
pagecache_get_page+0x4a/0x750 mm/filemap.c:1442
find_get_page_flags include/linux/pagemap.h:282 [inline]
__find_get_block_slow fs/buffer.c:214 [inline]
__find_get_block fs/buffer.c:1357 [inline]
__find_get_block+0x457/0xb10 fs/buffer.c:1351
__getblk_slow fs/buffer.c:1100 [inline]
__getblk_gfp+0x18b/0x710 fs/buffer.c:1383
__bread_gfp+0x2e/0x290 fs/buffer.c:1417
sb_bread include/linux/buffer_head.h:307 [inline]
udf_tread+0xe8/0x130 fs/udf/misc.c:44
udf_read_tagged+0x40/0x4b0 fs/udf/misc.c:210
udf_check_anchor_block+0x19b/0x580 fs/udf/super.c:1810
udf_scan_anchors+0x19b/0x5a0 fs/udf/super.c:1850
udf_find_anchor fs/udf/super.c:1915 [inline]
udf_load_vrs+0x79c/0xae0 fs/udf/super.c:1972
udf_fill_super+0x727/0x157f fs/udf/super.c:2164
mount_bdev+0x2c1/0x370 fs/super.c:1134
udf_mount+0x35/0x40 fs/udf/super.c:132
mount_fs+0x9d/0x2a7 fs/super.c:1237
vfs_kern_mount.part.0+0x5e/0x3d0 fs/namespace.c:1046
vfs_kern_mount fs/namespace.c:1036 [inline]
do_new_mount fs/namespace.c:2549 [inline]
do_mount+0x417/0x27d0 fs/namespace.c:2879
SYSC_mount fs/namespace.c:3095 [inline]
SyS_mount+0xab/0x120 fs/namespace.c:3072
do_syscall_64+0x1eb/0x630 arch/x86/entry/common.c:289
entry_SYSCALL_64_after_hwframe+0x42/0xb7
RIP: 0033:0x458d99
RSP: 002b:00007fbca3602c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5
RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000458d99
RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040
RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbca36036d4
R13: 00000000004c4d81 R14: 00000000004d89e8 R15: 00000000ffffffff
Code: ec 08 48 85 c0 0f 84 15 ff ff ff f0 ff 80 38 01 00 00 49 8d b3 78 08
00 00 48 ba 00 00 00 00 00 fc ff df 48 89 b4 24 88 00 00 00 <48> c1 ee 03
0f b6 14 16 84 d2 74 09 80 fa 03 0f 8e 84 2b 00 00


---
This bug is generated by a bot. It may contain errors.
See https://goo.gl/tpsmEJ for more information about syzbot.
syzbot engineers can be reached at syzk...@googlegroups.com.

syzbot will keep track of this bug report. See:
https://goo.gl/tpsmEJ#status for how to communicate with syzbot.

syzbot

unread,
Apr 29, 2021, 8:11:10 AM4/29/21
to syzkaller...@googlegroups.com
Auto-closing this bug as obsolete.
Crashes did not happen for a while, no reproducer and no activity.
Reply all
Reply to author
Forward
0 new messages