INFO: task hung in netdev_run_todo (2)

8 views
Skip to first unread message

syzbot

unread,
Jul 5, 2020, 11:01:22 AM7/5/20
to syzkaller...@googlegroups.com
Hello,

syzbot found the following crash on:

HEAD commit: 399849e4 Linux 4.19.131
git tree: linux-4.19.y
console output: https://syzkaller.appspot.com/x/log.txt?x=1361774b100000
kernel config: https://syzkaller.appspot.com/x/.config?x=eada6d424d8bae1d
dashboard link: https://syzkaller.appspot.com/bug?extid=9b2340d343584561e2e0
compiler: gcc (GCC) 10.1.0-syz 20200507

Unfortunately, I don't have any reproducer for this crash yet.

IMPORTANT: if you fix the bug, please add the following tag to the commit:
Reported-by: syzbot+9b2340...@syzkaller.appspotmail.com

netlink: 'syz-executor.0': attribute type 1 has an invalid length.
INFO: task syz-executor.1:10621 blocked for more than 140 seconds.
Not tainted 4.19.131-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
syz-executor.1 D24960 10621 6570 0x00000004
Call Trace:
context_switch kernel/sched/core.c:2826 [inline]
__schedule+0x887/0x2040 kernel/sched/core.c:3515
schedule+0x8d/0x1b0 kernel/sched/core.c:3559
schedule_preempt_disabled+0xf/0x20 kernel/sched/core.c:3617
__mutex_lock_common kernel/locking/mutex.c:1002 [inline]
__mutex_lock+0x647/0x1260 kernel/locking/mutex.c:1072
netdev_run_todo+0x719/0xab0 net/core/dev.c:8991
rtnl_unlock net/core/rtnetlink.c:117 [inline]
rtnetlink_rcv_msg+0x460/0xb80 net/core/rtnetlink.c:4778
netlink_rcv_skb+0x160/0x440 net/netlink/af_netlink.c:2455
netlink_unicast_kernel net/netlink/af_netlink.c:1318 [inline]
netlink_unicast+0x4d5/0x690 net/netlink/af_netlink.c:1344
netlink_sendmsg+0x6bb/0xc40 net/netlink/af_netlink.c:1909
sock_sendmsg_nosec net/socket.c:622 [inline]
sock_sendmsg+0xc3/0x120 net/socket.c:632
___sys_sendmsg+0x7bb/0x8e0 net/socket.c:2115
__sys_sendmsg net/socket.c:2153 [inline]
__do_sys_sendmsg net/socket.c:2162 [inline]
__se_sys_sendmsg net/socket.c:2160 [inline]
__x64_sys_sendmsg+0x132/0x220 net/socket.c:2160
do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293
entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x45cb29
Code: 48 8b 6c 24 20 48 83 c4 28 c3 48 8b 80 c8 00 00 00 48 39 c8 74 e5 48 8b 44 24 30 48 89 04 24 48 8b 44 24 38 48 89 44 24 08 0f <b6> 44 24 48 88 44 24 10 0f b6 44 24 49 88 44 24 11 0f b6 44 24 4a
RSP: 002b:00007f1ade12fc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
RAX: ffffffffffffffda RBX: 00000000005028c0 RCX: 000000000045cb29
RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000006
RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff
R13: 0000000000000a46 R14: 00000000004cd2d3 R15: 00007f1ade1306d4
INFO: task syz-executor.0:10788 blocked for more than 140 seconds.
Not tainted 4.19.131-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
syz-executor.0 D28952 10788 6442 0x00000004
Call Trace:
context_switch kernel/sched/core.c:2826 [inline]
__schedule+0x887/0x2040 kernel/sched/core.c:3515
schedule+0x8d/0x1b0 kernel/sched/core.c:3559
schedule_preempt_disabled+0xf/0x20 kernel/sched/core.c:3617
__mutex_lock_common kernel/locking/mutex.c:1002 [inline]
__mutex_lock+0x647/0x1260 kernel/locking/mutex.c:1072
rtnl_lock net/core/rtnetlink.c:77 [inline]
rtnetlink_rcv_msg+0x3fe/0xb80 net/core/rtnetlink.c:4774
netlink_rcv_skb+0x160/0x440 net/netlink/af_netlink.c:2455
netlink_unicast_kernel net/netlink/af_netlink.c:1318 [inline]
netlink_unicast+0x4d5/0x690 net/netlink/af_netlink.c:1344
netlink_sendmsg+0x6bb/0xc40 net/netlink/af_netlink.c:1909
sock_sendmsg_nosec net/socket.c:622 [inline]
sock_sendmsg+0xc3/0x120 net/socket.c:632
___sys_sendmsg+0x7bb/0x8e0 net/socket.c:2115
__sys_sendmsg net/socket.c:2153 [inline]
__do_sys_sendmsg net/socket.c:2162 [inline]
__se_sys_sendmsg net/socket.c:2160 [inline]
__x64_sys_sendmsg+0x132/0x220 net/socket.c:2160
do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293
entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x45cb29
Code: 48 8b 6c 24 20 48 83 c4 28 c3 48 8b 80 c8 00 00 00 48 39 c8 74 e5 48 8b 44 24 30 48 89 04 24 48 8b 44 24 38 48 89 44 24 08 0f <b6> 44 24 48 88 44 24 10 0f b6 44 24 49 88 44 24 11 0f b6 44 24 4a
RSP: 002b:00007fd7d90cac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
RAX: ffffffffffffffda RBX: 00000000005028c0 RCX: 000000000045cb29
RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000000000003
RBP: 000000000078bfa0 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff
R13: 0000000000000a46 R14: 00000000004cd2d3 R15: 00007fd7d90cb6d4
INFO: task syz-executor.0:10795 blocked for more than 140 seconds.
Not tainted 4.19.131-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
syz-executor.0 D28952 10795 6442 0x00000004
Call Trace:
context_switch kernel/sched/core.c:2826 [inline]
__schedule+0x887/0x2040 kernel/sched/core.c:3515
schedule+0x8d/0x1b0 kernel/sched/core.c:3559
schedule_preempt_disabled+0xf/0x20 kernel/sched/core.c:3617
__mutex_lock_common kernel/locking/mutex.c:1002 [inline]
__mutex_lock+0x647/0x1260 kernel/locking/mutex.c:1072
rtnl_lock net/core/rtnetlink.c:77 [inline]
rtnetlink_rcv_msg+0x3fe/0xb80 net/core/rtnetlink.c:4774
netlink_rcv_skb+0x160/0x440 net/netlink/af_netlink.c:2455
netlink_unicast_kernel net/netlink/af_netlink.c:1318 [inline]
netlink_unicast+0x4d5/0x690 net/netlink/af_netlink.c:1344
netlink_sendmsg+0x6bb/0xc40 net/netlink/af_netlink.c:1909
sock_sendmsg_nosec net/socket.c:622 [inline]
sock_sendmsg+0xc3/0x120 net/socket.c:632
___sys_sendmsg+0x7bb/0x8e0 net/socket.c:2115
__sys_sendmsg net/socket.c:2153 [inline]
__do_sys_sendmsg net/socket.c:2162 [inline]
__se_sys_sendmsg net/socket.c:2160 [inline]
__x64_sys_sendmsg+0x132/0x220 net/socket.c:2160
do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293
entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x45cb29
Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
RSP: 002b:00007fd7d90a9c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
RAX: ffffffffffffffda RBX: 00000000005028c0 RCX: 000000000045cb29
RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000006
RBP: 000000000078c040 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff
R13: 0000000000000a46 R14: 00000000004cd2d3 R15: 00007fd7d90aa6d4

Showing all locks held in the system:
1 lock held by khungtaskd/1076:
#0: 00000000aa69604c (rcu_read_lock){....}, at: debug_show_all_locks+0x53/0x265 kernel/locking/lockdep.c:4440
3 locks held by kworker/1:2/2930:
1 lock held by systemd-journal/3684:
2 locks held by in:imklog/6141:
1 lock held by syz-executor.1/10621:
#0: 00000000e93c2b35 (rtnl_mutex){+.+.}, at: netdev_run_todo+0x719/0xab0 net/core/dev.c:8991
1 lock held by syz-executor.0/10788:
#0: 00000000e93c2b35 (rtnl_mutex){+.+.}, at: rtnl_lock net/core/rtnetlink.c:77 [inline]
#0: 00000000e93c2b35 (rtnl_mutex){+.+.}, at: rtnetlink_rcv_msg+0x3fe/0xb80 net/core/rtnetlink.c:4774
1 lock held by syz-executor.0/10795:
#0: 00000000e93c2b35 (rtnl_mutex){+.+.}, at: rtnl_lock net/core/rtnetlink.c:77 [inline]
#0: 00000000e93c2b35 (rtnl_mutex){+.+.}, at: rtnetlink_rcv_msg+0x3fe/0xb80 net/core/rtnetlink.c:4774

=============================================

NMI backtrace for cpu 0
CPU: 0 PID: 1076 Comm: khungtaskd Not tainted 4.19.131-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:77 [inline]
dump_stack+0x1fc/0x2fe lib/dump_stack.c:118
nmi_cpu_backtrace.cold+0x63/0xa2 lib/nmi_backtrace.c:101
nmi_trigger_cpumask_backtrace+0x1a6/0x1eb lib/nmi_backtrace.c:62
trigger_all_cpu_backtrace include/linux/nmi.h:146 [inline]
check_hung_uninterruptible_tasks kernel/hung_task.c:203 [inline]
watchdog+0x991/0xe60 kernel/hung_task.c:287
kthread+0x30b/0x410 kernel/kthread.c:246
ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415
Sending NMI from CPU 0 to CPUs 1:
NMI backtrace for cpu 1
CPU: 1 PID: 10666 Comm: syz-executor.5 Not tainted 4.19.131-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:__read_once_size include/linux/compiler.h:193 [inline]
RIP: 0010:lookup_chain_cache kernel/locking/lockdep.c:2316 [inline]
RIP: 0010:lookup_chain_cache_add kernel/locking/lockdep.c:2336 [inline]
RIP: 0010:validate_chain kernel/locking/lockdep.c:2390 [inline]
RIP: 0010:__lock_acquire+0xbb3/0x3ff0 kernel/locking/lockdep.c:3415
Code: 80 46 86 c8 61 48 b8 00 00 00 00 00 fc ff df 49 0f af cc 48 c1 e9 31 4c 8d 04 cd 80 18 3d 8b 4c 89 c2 48 c1 ea 03 80 3c 02 00 <0f> 85 83 25 00 00 48 8b 1c cd 80 18 3d 8b 48 85 db 74 55 48 83 eb
RSP: 0000:ffff8882117678b8 EFLAGS: 00000046
RAX: dffffc0000000000 RBX: 0000000000000000 RCX: 0000000000000457
RDX: 1ffffffff167a767 RSI: 00000000acfec1c5 RDI: 0000000000000000
RBP: ffff888087f02c2a R08: ffffffff8b3d3b38 R09: 0000000000000000
R10: ffff888087f02c08 R11: 0000000000000000 R12: b369cb708827d641
R13: ffff888087f02380 R14: ffff888087f02c20 R15: 0000000000000001
FS: 00007fad7db55700(0000) GS:ffff8880ae700000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000028a5b8d0 CR3: 00000001f0dae000 CR4: 00000000001406e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
lock_acquire+0x170/0x3c0 kernel/locking/lockdep.c:3907
__might_fault mm/memory.c:4638 [inline]
__might_fault+0x152/0x1d0 mm/memory.c:4623
__clear_user+0x1e/0x70 arch/x86/lib/usercopy_64.c:19
copy_xregs_to_user arch/x86/include/asm/fpu/internal.h:375 [inline]
copy_fpregs_to_sigframe arch/x86/kernel/fpu/signal.c:126 [inline]
copy_fpstate_to_sigframe+0x1a1/0x6b0 arch/x86/kernel/fpu/signal.c:177
get_sigframe.constprop.0.isra.0+0x4a6/0x6a0 arch/x86/kernel/signal.c:284
__setup_rt_frame arch/x86/kernel/signal.c:466 [inline]
setup_rt_frame arch/x86/kernel/signal.c:711 [inline]
handle_signal arch/x86/kernel/signal.c:755 [inline]
do_signal+0xa55/0x1670 arch/x86/kernel/signal.c:823
exit_to_usermode_loop+0x204/0x2a0 arch/x86/entry/common.c:163
prepare_exit_to_usermode+0x277/0x2d0 arch/x86/entry/common.c:198
retint_user+0x8/0x18
RIP: 0033:0x405e49
Code: d0 ff ff ff 01 48 8b 7c 24 28 c7 44 24 34 00 00 00 00 e8 5a ef 01 00 85 c0 75 23 48 6b 44 24 20 18 8b 7c 24 1c 48 03 44 24 38 <48> 8b 48 10 48 8b 50 08 48 8b 30 e8 f7 0a 01 00 89 44 24 34 64 f0
RSP: 002b:00007fad7db54a70 EFLAGS: 00010206
RAX: 0000000028a5b8c0 RBX: 000000000050a6c0 RCX: 0000000000416987
RDX: 1120239bc7d63b87 RSI: 0000000000000000 RDI: 0000000000000008
RBP: 000000000078c0e0 R08: 00007fad7db54a70 R09: 000000000078c0e0
R10: 0000000000000000 R11: 0000000000000000 R12: 00000000ffffffff
R13: 0000000000000c3e R14: 00000000004ce90a R15: 00007fad7db556d4


---
This bug is generated by a bot. It may contain errors.
See https://goo.gl/tpsmEJ for more information about syzbot.
syzbot engineers can be reached at syzk...@googlegroups.com.

syzbot will keep track of this bug report. See:
https://goo.gl/tpsmEJ#status for how to communicate with syzbot.

syzbot

unread,
Dec 19, 2020, 11:57:07 PM12/19/20
to syzkaller...@googlegroups.com
Auto-closing this bug as obsolete.
Crashes did not happen for a while, no reproducer and no activity.
Reply all
Reply to author
Forward
0 new messages