INFO: task hung in ip6gre_exit_batch_net (3)

4 views
Skip to first unread message

syzbot

unread,
Jul 30, 2021, 1:52:25 AM7/30/21
to syzkaller...@googlegroups.com
Hello,

syzbot found the following issue on:

HEAD commit: a89b48fe9308 Linux 4.19.199
git tree: linux-4.19.y
console output: https://syzkaller.appspot.com/x/log.txt?x=16d5d362300000
kernel config: https://syzkaller.appspot.com/x/.config?x=72b91bfdb2e2b668
dashboard link: https://syzkaller.appspot.com/bug?extid=a56b712111440d952493
compiler: gcc version 10.2.1 20210110 (Debian 10.2.1-6)

Unfortunately, I don't have any reproducer for this issue yet.

IMPORTANT: if you fix the issue, please add the following tag to the commit:
Reported-by: syzbot+a56b71...@syzkaller.appspotmail.com

wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge)
wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge)
ieee802154 phy0 wpan0: encryption failed: -22
ieee802154 phy1 wpan1: encryption failed: -22
INFO: task kworker/u4:7:16841 blocked for more than 140 seconds.
Not tainted 4.19.199-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
kworker/u4:7 D26288 16841 2 0x80000000
Workqueue: netns cleanup_net
Call Trace:
context_switch kernel/sched/core.c:2828 [inline]
__schedule+0x887/0x2040 kernel/sched/core.c:3517
schedule+0x8d/0x1b0 kernel/sched/core.c:3561
schedule_timeout+0x92d/0xfe0 kernel/time/timer.c:1794
do_wait_for_common kernel/sched/completion.c:83 [inline]
__wait_for_common kernel/sched/completion.c:104 [inline]
wait_for_common+0x29c/0x470 kernel/sched/completion.c:115
__flush_work+0x4bb/0x8b0 kernel/workqueue.c:2926
flush_all_backlogs net/core/dev.c:5283 [inline]
rollback_registered_many+0x4b1/0xe70 net/core/dev.c:8180
unregister_netdevice_many.part.0+0x1a/0x300 net/core/dev.c:9323
unregister_netdevice_many+0x36/0x50 net/core/dev.c:9322
ip6gre_exit_batch_net+0x4c8/0x6c0 net/ipv6/ip6_gre.c:1635
ops_exit_list+0xf9/0x150 net/core/net_namespace.c:156
cleanup_net+0x3b4/0x8b0 net/core/net_namespace.c:553
process_one_work+0x864/0x1570 kernel/workqueue.c:2153
worker_thread+0x64c/0x1130 kernel/workqueue.c:2296
kthread+0x33f/0x460 kernel/kthread.c:259
ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415
INFO: task syz-executor.2:18830 blocked for more than 140 seconds.
Not tainted 4.19.199-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
syz-executor.2 D26288 18830 8105 0x80000002
Call Trace:
context_switch kernel/sched/core.c:2828 [inline]
__schedule+0x887/0x2040 kernel/sched/core.c:3517
schedule+0x8d/0x1b0 kernel/sched/core.c:3561
schedule_preempt_disabled+0xf/0x20 kernel/sched/core.c:3619
__mutex_lock_common kernel/locking/mutex.c:1015 [inline]
__mutex_lock+0x604/0x1200 kernel/locking/mutex.c:1083
tun_detach drivers/net/tun.c:759 [inline]
tun_chr_close+0x3a/0x180 drivers/net/tun.c:3323
__fput+0x2ce/0x890 fs/file_table.c:278
task_work_run+0x148/0x1c0 kernel/task_work.c:113
exit_task_work include/linux/task_work.h:22 [inline]
do_exit+0xbf3/0x2be0 kernel/exit.c:870
do_group_exit+0x125/0x310 kernel/exit.c:967
get_signal+0x3f2/0x1f70 kernel/signal.c:2589
do_signal+0x8f/0x1670 arch/x86/kernel/signal.c:799
exit_to_usermode_loop+0x204/0x2a0 arch/x86/entry/common.c:163
prepare_exit_to_usermode arch/x86/entry/common.c:198 [inline]
syscall_return_slowpath arch/x86/entry/common.c:271 [inline]
do_syscall_64+0x538/0x620 arch/x86/entry/common.c:296
entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x4665e9
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f55acc93218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca
RAX: fffffffffffffe00 RBX: 000000000056bf88 RCX: 00000000004665e9
RDX: 0000000000000000 RSI: 0000000000000080 RDI: 000000000056bf88
RBP: 000000000056bf80 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf8c
R13: 00007fff3427afcf R14: 00007f55acc93300 R15: 0000000000022000

Showing all locks held in the system:
1 lock held by khungtaskd/1570:
#0: 000000004e9d5953 (rcu_read_lock){....}, at: debug_show_all_locks+0x53/0x265 kernel/locking/lockdep.c:4441
6 locks held by kworker/0:1H/2836:
1 lock held by in:imklog/7750:
#0: 0000000071fe7187 (&f->f_pos_lock){+.+.}, at: __fdget_pos+0x26f/0x310 fs/file.c:767
3 locks held by kworker/1:4/9345:
#0: 000000001d2a3781 ((wq_completion)"%s"("ipv6_addrconf")){+.+.}, at: process_one_work+0x767/0x1570 kernel/workqueue.c:2124
#1: 00000000c5f1fc6d ((addr_chk_work).work){+.+.}, at: process_one_work+0x79c/0x1570 kernel/workqueue.c:2128
#2: 0000000092dcd0b0 (rtnl_mutex){+.+.}, at: addrconf_verify_work+0xa/0x20 net/ipv6/addrconf.c:4476
5 locks held by kworker/u4:7/16841:
#0: 00000000108e6e3f ((wq_completion)"%s""netns"){+.+.}, at: process_one_work+0x767/0x1570 kernel/workqueue.c:2124
#1: 0000000077cca1c0 (net_cleanup_work){+.+.}, at: process_one_work+0x79c/0x1570 kernel/workqueue.c:2128
#2: 00000000a357afcd (pernet_ops_rwsem){++++}, at: cleanup_net+0xa8/0x8b0 net/core/net_namespace.c:520
#3: 0000000092dcd0b0 (rtnl_mutex){+.+.}, at: ip6gre_exit_batch_net+0x82/0x6c0 net/ipv6/ip6_gre.c:1632
#4: 00000000b8c1487d (cpu_hotplug_lock.rw_sem){++++}, at: get_online_cpus include/linux/cpu.h:137 [inline]
#4: 00000000b8c1487d (cpu_hotplug_lock.rw_sem){++++}, at: flush_all_backlogs net/core/dev.c:5276 [inline]
#4: 00000000b8c1487d (cpu_hotplug_lock.rw_sem){++++}, at: rollback_registered_many+0x3a8/0xe70 net/core/dev.c:8180
1 lock held by syz-executor.2/18830:
#0: 0000000092dcd0b0 (rtnl_mutex){+.+.}, at: tun_detach drivers/net/tun.c:759 [inline]
#0: 0000000092dcd0b0 (rtnl_mutex){+.+.}, at: tun_chr_close+0x3a/0x180 drivers/net/tun.c:3323
2 locks held by agetty/1662:
#0: 00000000a3fae90e (&tty->ldisc_sem){++++}, at: tty_ldisc_ref_wait+0x22/0x80 drivers/tty/tty_ldisc.c:272
#1: 000000006039e1a5 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x217/0x1950 drivers/tty/n_tty.c:2154

=============================================

NMI backtrace for cpu 1
CPU: 1 PID: 1570 Comm: khungtaskd Not tainted 4.19.199-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:77 [inline]
dump_stack+0x1fc/0x2ef lib/dump_stack.c:118
nmi_cpu_backtrace.cold+0x63/0xa2 lib/nmi_backtrace.c:101
nmi_trigger_cpumask_backtrace+0x1a6/0x1f0 lib/nmi_backtrace.c:62
trigger_all_cpu_backtrace include/linux/nmi.h:146 [inline]
check_hung_uninterruptible_tasks kernel/hung_task.c:203 [inline]
watchdog+0x991/0xe60 kernel/hung_task.c:287
kthread+0x33f/0x460 kernel/kthread.c:259
ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415
Sending NMI from CPU 1 to CPUs 0:
NMI backtrace for cpu 0
CPU: 0 PID: 2836 Comm: kworker/0:1H Not tainted 4.19.199-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Workqueue: events_highpri snd_vmidi_output_work
RIP: 0010:arch_local_irq_disable arch/x86/include/asm/paravirt.h:794 [inline]
RIP: 0010:arch_local_irq_save arch/x86/include/asm/paravirt.h:807 [inline]
RIP: 0010:lock_acquire+0xd0/0x3c0 kernel/locking/lockdep.c:3903
Code: df 48 89 44 24 08 48 c7 c0 90 82 f1 89 48 c1 e8 03 80 3c 10 00 0f 85 a1 02 00 00 48 83 3d 37 31 a6 08 00 0f 84 3e 02 00 00 fa <66> 0f 1f 44 00 00 65 48 8b 1c 25 80 df 01 00 48 8d bb 84 08 00 00
RSP: 0018:ffff8880adedf990 EFLAGS: 00000082
RAX: 1ffffffff13e3052 RBX: ffff8880aded6080 RCX: 0000000000000002
RDX: dffffc0000000000 RSI: 0000000000000000 RDI: ffff8880aded6904
RBP: ffff8880a5718628 R08: 0000000000000001 R09: 0000000000000000
R10: 0000000000000005 R11: 0000000000000000 R12: 0000000000000000
R13: 0000000000000000 R14: 0000000000000002 R15: 0000000000000001
FS: 0000000000000000(0000) GS:ffff8880ba000000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000543038 CR3: 0000000052b51000 CR4: 00000000001406f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
__raw_read_lock include/linux/rwlock_api_smp.h:149 [inline]
_raw_read_lock+0x2d/0x40 kernel/locking/spinlock.c:216
snd_seq_port_use_ptr+0x38/0x1a0 sound/core/seq/seq_ports.c:66
snd_seq_deliver_single_event.constprop.0+0x1ba/0x800 sound/core/seq/seq_clientmgr.c:598
deliver_to_subscribers sound/core/seq/seq_clientmgr.c:676 [inline]
snd_seq_deliver_event+0x2fa/0x960 sound/core/seq/seq_clientmgr.c:811
snd_seq_kernel_client_dispatch+0x145/0x170 sound/core/seq/seq_clientmgr.c:2325
snd_vmidi_output_work+0x1cf/0x3b0 sound/core/seq/seq_virmidi.c:166
process_one_work+0x864/0x1570 kernel/workqueue.c:2153
worker_thread+0x64c/0x1130 kernel/workqueue.c:2296
kthread+0x33f/0x460 kernel/kthread.c:259
ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415


---
This report is generated by a bot. It may contain errors.
See https://goo.gl/tpsmEJ for more information about syzbot.
syzbot engineers can be reached at syzk...@googlegroups.com.

syzbot will keep track of this issue. See:
https://goo.gl/tpsmEJ#status for how to communicate with syzbot.

syzbot

unread,
May 13, 2022, 2:16:24 AM5/13/22
to syzkaller...@googlegroups.com
Auto-closing this bug as obsolete.
Crashes did not happen for a while, no reproducer and no activity.
Reply all
Reply to author
Forward
0 new messages