lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <CACT4Y+bGNU1WkyHW3nNBg49rhg8uN1j0sA0DxRj5cmZOSmsWSQ@mail.gmail.com>
Date:   Sun, 3 Dec 2017 15:36:33 +0100
From:   Dmitry Vyukov <dvyukov@...gle.com>
To:     syzbot 
        <bot+e38be687a2450270a3b593bacb6b5795a7a74edb@...kaller.appspotmail.com>
Cc:     Greg Kroah-Hartman <gregkh@...uxfoundation.org>,
        Kate Stewart <kstewart@...uxfoundation.org>,
        LKML <linux-kernel@...r.kernel.org>,
        Linux-MM <linux-mm@...ck.org>,
        Philippe Ombredanne <pombredanne@...b.com>,
        syzkaller-bugs@...glegroups.com,
        Thomas Gleixner <tglx@...utronix.de>
Subject: Re: BUG: workqueue lockup (2)

On Sun, Dec 3, 2017 at 3:31 PM, syzbot
<bot+e38be687a2450270a3b593bacb6b5795a7a74edb@...kaller.appspotmail.com>
wrote:
> Hello,
>
> syzkaller hit the following crash on
> 2db767d9889cef087149a5eaa35c1497671fa40f
> git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/master
> compiler: gcc (GCC) 7.1.1 20170620
> .config is attached
> Raw console output is attached.
>
> Unfortunately, I don't have any reproducer for this bug yet.
>
>
> BUG: workqueue lockup - pool cpus=0 node=0 flags=0x0 nice=0 stuck for 48s!
> BUG: workqueue lockup - pool cpus=0-1 flags=0x4 nice=0 stuck for 47s!
> Showing busy workqueues and worker pools:
> workqueue events: flags=0x0
>   pwq 0: cpus=0 node=0 flags=0x0 nice=0 active=4/256
>     pending: perf_sched_delayed, vmstat_shepherd, jump_label_update_timeout,
> cache_reap
> workqueue events_power_efficient: flags=0x80
>   pwq 0: cpus=0 node=0 flags=0x0 nice=0 active=4/256
>     pending: neigh_periodic_work, neigh_periodic_work, do_cache_clean,
> reg_check_chans_work
> workqueue mm_percpu_wq: flags=0x8
>   pwq 0: cpus=0 node=0 flags=0x0 nice=0 active=1/256
>     pending: vmstat_update
> workqueue writeback: flags=0x4e
>   pwq 4: cpus=0-1 flags=0x4 nice=0 active=1/256
>     in-flight: 3401:wb_workfn
> workqueue kblockd: flags=0x18
>   pwq 1: cpus=0 node=0 flags=0x0 nice=-20 active=1/256
>     pending: blk_mq_timeout_work
> pool 4: cpus=0-1 flags=0x4 nice=0 hung=0s workers=11 idle: 3423 4249 92 21


This error report does not look actionable. Perhaps if code that
detect it would dump cpu/task stacks, it would be actionable.


> 3549 34 4803 5 4243 3414
> audit: type=1326 audit(1512291140.021:615): auid=4294967295 uid=0 gid=0
> ses=4294967295 subj=kernel pid=7002 comm="syz-executor7"
> exe="/root/syz-executor7" sig=0 arch=c000003e syscall=202 compat=0
> ip=0x4529d9 code=0x7ffc0000
> audit: type=1326 audit(1512291140.044:616): auid=4294967295 uid=0 gid=0
> ses=4294967295 subj=kernel pid=7002 comm="syz-executor7"
> exe="/root/syz-executor7" sig=0 arch=c000003e syscall=202 compat=0
> ip=0x4529d9 code=0x7ffc0000
> audit: type=1326 audit(1512291140.045:617): auid=4294967295 uid=0 gid=0
> ses=4294967295 subj=kernel pid=7002 comm="syz-executor7"
> exe="/root/syz-executor7" sig=0 arch=c000003e syscall=55 compat=0
> ip=0x4529d9 code=0x7ffc0000
> audit: type=1326 audit(1512291140.045:618): auid=4294967295 uid=0 gid=0
> ses=4294967295 subj=kernel pid=7002 comm="syz-executor7"
> exe="/root/syz-executor7" sig=0 arch=c000003e syscall=202 compat=0
> ip=0x4529d9 code=0x7ffc0000
> audit: type=1326 audit(1512291140.045:619): auid=4294967295 uid=0 gid=0
> ses=4294967295 subj=kernel pid=7002 comm="syz-executor7"
> exe="/root/syz-executor7" sig=0 arch=c000003e syscall=202 compat=0
> ip=0x4529d9 code=0x7ffc0000
> audit: type=1326 audit(1512291140.047:620): auid=4294967295 uid=0 gid=0
> ses=4294967295 subj=kernel pid=7002 comm="syz-executor7"
> exe="/root/syz-executor7" sig=0 arch=c000003e syscall=257 compat=0
> ip=0x4529d9 code=0x7ffc0000
> audit: type=1326 audit(1512291140.047:621): auid=4294967295 uid=0 gid=0
> ses=4294967295 subj=kernel pid=7002 comm="syz-executor7"
> exe="/root/syz-executor7" sig=0 arch=c000003e syscall=202 compat=0
> ip=0x4529d9 code=0x7ffc0000
> audit: type=1326 audit(1512291140.047:622): auid=4294967295 uid=0 gid=0
> ses=4294967295 subj=kernel pid=7002 comm="syz-executor7"
> exe="/root/syz-executor7" sig=0 arch=c000003e syscall=202 compat=0
> ip=0x4529d9 code=0x7ffc0000
> audit: type=1326 audit(1512291140.048:623): auid=4294967295 uid=0 gid=0
> ses=4294967295 subj=kernel pid=7002 comm="syz-executor7"
> exe="/root/syz-executor7" sig=0 arch=c000003e syscall=16 compat=0
> ip=0x4529d9 code=0x7ffc0000
> audit: type=1326 audit(1512291140.049:624): auid=4294967295 uid=0 gid=0
> ses=4294967295 subj=kernel pid=7002 comm="syz-executor7"
> exe="/root/syz-executor7" sig=0 arch=c000003e syscall=202 compat=0
> ip=0x4529d9 code=0x7ffc0000
> netlink: 2 bytes leftover after parsing attributes in process
> `syz-executor2'.
> netlink: 2 bytes leftover after parsing attributes in process
> `syz-executor2'.
> netlink: 17 bytes leftover after parsing attributes in process
> `syz-executor7'.
> device gre0 entered promiscuous mode
> device gre0 entered promiscuous mode
> could not allocate digest TFM handle [vmnet1%
> could not allocate digest TFM handle [vmnet1%
> SELinux: unrecognized netlink message: protocol=0 nlmsg_type=7
> sclass=netlink_route_socket pig=7627 comm=syz-executor3
> sock: sock_set_timeout: `syz-executor6' (pid 7625) tries to set negative
> timeout
> Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable
> SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0
> sclass=netlink_route_socket pig=7648 comm=syz-executor3
> sock: sock_set_timeout: `syz-executor6' (pid 7625) tries to set negative
> timeout
> Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable
> SELinux: unrecognized netlink message: protocol=0 nlmsg_type=7
> sclass=netlink_route_socket pig=7648 comm=syz-executor3
> SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0
> sclass=netlink_route_socket pig=7627 comm=syz-executor3
> Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable
> Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable
> netlink: 4 bytes leftover after parsing attributes in process
> `syz-executor3'.
> netlink: 4 bytes leftover after parsing attributes in process
> `syz-executor3'.
> netlink: 1 bytes leftover after parsing attributes in process
> `syz-executor3'.
> QAT: Invalid ioctl
> netlink: 1 bytes leftover after parsing attributes in process
> `syz-executor3'.
> QAT: Invalid ioctl
> FAULT_INJECTION: forcing a failure.
> name failslab, interval 1, probability 0, space 0, times 1
> CPU: 1 PID: 7838 Comm: syz-executor4 Not tainted 4.15.0-rc1+ #205
> Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS
> Google 01/01/2011
> Call Trace:
>  __dump_stack lib/dump_stack.c:17 [inline]
>  dump_stack+0x194/0x257 lib/dump_stack.c:53
>  fail_dump lib/fault-inject.c:51 [inline]
>  should_fail+0x8c0/0xa40 lib/fault-inject.c:149
>  should_failslab+0xec/0x120 mm/failslab.c:32
>  slab_pre_alloc_hook mm/slab.h:421 [inline]
>  slab_alloc mm/slab.c:3371 [inline]
>  __do_kmalloc mm/slab.c:3709 [inline]
>  __kmalloc_track_caller+0x5f/0x760 mm/slab.c:3726
>  memdup_user+0x2c/0x90 mm/util.c:164
>  msr_io+0xec/0x3b0 arch/x86/kvm/x86.c:2650
>  kvm_arch_vcpu_ioctl+0x31d/0x4710 arch/x86/kvm/x86.c:3566
>  kvm_vcpu_ioctl+0x240/0x1010 arch/x86/kvm/../../../virt/kvm/kvm_main.c:2726
>  vfs_ioctl fs/ioctl.c:46 [inline]
>  do_vfs_ioctl+0x1b1/0x1530 fs/ioctl.c:686
>  SYSC_ioctl fs/ioctl.c:701 [inline]
>  SyS_ioctl+0x8f/0xc0 fs/ioctl.c:692
>  entry_SYSCALL_64_fastpath+0x1f/0x96
> RIP: 0033:0x4529d9
> RSP: 002b:00007fd7722d4c58 EFLAGS: 00000212 ORIG_RAX: 0000000000000010
> RAX: ffffffffffffffda RBX: 00007fd7722d4aa0 RCX: 00000000004529d9
> RDX: 0000000020002000 RSI: 000000004008ae89 RDI: 0000000000000016
> RBP: 00007fd7722d4a90 R08: 0000000000000000 R09: 0000000000000000
> R10: 0000000000000000 R11: 0000000000000212 R12: 00000000004b759b
> R13: 00007fd7722d4bc8 R14: 00000000004b759b R15: 0000000000000000
> device lo left promiscuous mode
> device lo entered promiscuous mode
> device lo left promiscuous mode
> kvm_hv_set_msr: 127 callbacks suppressed
> kvm [8010]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x4000008e data
> 0x47
> kvm [8010]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x4000008c data
> 0x47
> kvm [8010]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x4000008a data
> 0x47
> kvm [8010]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x40000088 data
> 0x47
> kvm [8010]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x40000086 data
> 0x47
> program syz-executor2 is using a deprecated SCSI ioctl, please convert it to
> SG_IO
> sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0
> program syz-executor2 is using a deprecated SCSI ioctl, please convert it to
> SG_IO
> sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0
> netlink: 2 bytes leftover after parsing attributes in process
> `syz-executor5'.
> program syz-executor2 is using a deprecated SCSI ioctl, please convert it to
> SG_IO
> sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0
> netlink: 2 bytes leftover after parsing attributes in process
> `syz-executor5'.
> program syz-executor2 is using a deprecated SCSI ioctl, please convert it to
> SG_IO
> sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0
> kauditd_printk_skb: 264 callbacks suppressed
> audit: type=1326 audit(1512291148.643:889): auid=4294967295 uid=0 gid=0
> ses=4294967295 subj=kernel pid=8160 comm="syz-executor5"
> exe="/root/syz-executor5" sig=0 arch=c000003e syscall=202 compat=0
> ip=0x4529d9 code=0x7ffc0000
> audit: type=1326 audit(1512291148.643:890): auid=4294967295 uid=0 gid=0
> ses=4294967295 subj=kernel pid=8160 comm="syz-executor5"
> exe="/root/syz-executor5" sig=0 arch=c000003e syscall=202 compat=0
> ip=0x4529d9 code=0x7ffc0000
> audit: type=1326 audit(1512291148.643:891): auid=4294967295 uid=0 gid=0
> ses=4294967295 subj=kernel pid=8160 comm="syz-executor5"
> exe="/root/syz-executor5" sig=0 arch=c000003e syscall=22 compat=0
> ip=0x4529d9 code=0x7ffc0000
> audit: type=1326 audit(1512291148.650:892): auid=4294967295 uid=0 gid=0
> ses=4294967295 subj=kernel pid=8160 comm="syz-executor5"
> exe="/root/syz-executor5" sig=0 arch=c000003e syscall=202 compat=0
> ip=0x4529d9 code=0x7ffc0000
> audit: type=1326 audit(1512291148.650:893): auid=4294967295 uid=0 gid=0
> ses=4294967295 subj=kernel pid=8160 comm="syz-executor5"
> exe="/root/syz-executor5" sig=0 arch=c000003e syscall=54 compat=0
> ip=0x4529d9 code=0x7ffc0000
> audit: type=1326 audit(1512291148.650:894): auid=4294967295 uid=0 gid=0
> ses=4294967295 subj=kernel pid=8160 comm="syz-executor5"
> exe="/root/syz-executor5" sig=0 arch=c000003e syscall=202 compat=0
> ip=0x4529d9 code=0x7ffc0000
> audit: type=1326 audit(1512291148.650:895): auid=4294967295 uid=0 gid=0
> ses=4294967295 subj=kernel pid=8160 comm="syz-executor5"
> exe="/root/syz-executor5" sig=0 arch=c000003e syscall=298 compat=0
> ip=0x4529d9 code=0x7ffc0000
> audit: type=1326 audit(1512291148.672:896): auid=4294967295 uid=0 gid=0
> ses=4294967295 subj=kernel pid=8160 comm="syz-executor5"
> exe="/root/syz-executor5" sig=0 arch=c000003e syscall=202 compat=0
> ip=0x4529d9 code=0x7ffc0000
> audit: type=1326 audit(1512291148.705:897): auid=4294967295 uid=0 gid=0
> ses=4294967295 subj=kernel pid=8160 comm="syz-executor5"
> exe="/root/syz-executor5" sig=0 arch=c000003e syscall=2 compat=0 ip=0x40cd11
> code=0x7ffc0000
> audit: type=1326 audit(1512291148.705:898): auid=4294967295 uid=0 gid=0
> ses=4294967295 subj=kernel pid=8160 comm="syz-executor5"
> exe="/root/syz-executor5" sig=0 arch=c000003e syscall=202 compat=0
> ip=0x4529d9 code=0x7ffc0000
> QAT: Invalid ioctl
> QAT: Invalid ioctl
>
>
> ---
> This bug is generated by a dumb bot. It may contain errors.
> See https://goo.gl/tpsmEJ for details.
> Direct all questions to syzkaller@...glegroups.com.
> Please credit me with: Reported-by: syzbot <syzkaller@...glegroups.com>
>
> syzbot will keep track of this bug report.
> Once a fix for this bug is committed, please reply to this email with:
> #syz fix: exact-commit-title
> To mark this as a duplicate of another syzbot report, please reply with:
> #syz dup: exact-subject-of-another-report
> If it's a one-off invalid bug report, please reply with:
> #syz invalid
> Note: if the crash happens again, it will cause creation of a new bug
> report.
> Note: all commands must start from beginning of the line in the email body.
>
> --
> You received this message because you are subscribed to the Google Groups
> "syzkaller-bugs" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to syzkaller-bugs+unsubscribe@...glegroups.com.
> To view this discussion on the web visit
> https://groups.google.com/d/msgid/syzkaller-bugs/94eb2c03c9bc75aff2055f70734c%40google.com.
> For more options, visit https://groups.google.com/d/optout.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ