syzbot


BUG: soft lockup in smp_call_function (2)

Status: upstream: reported C repro on 2024/01/28 03:58
Reported-by: syzbot+1c28af2c1ffa3d34f12e@syzkaller.appspotmail.com
First crash: 141d, last: 16d
Similar bugs (10)
Kernel Title Repro Cause bisect Fix bisect Count Last Reported Patched Status
android-6-1 BUG: soft lockup in smp_call_function origin:upstream C 59 14h31m 76d 0/2 upstream: reported C repro on 2024/04/02 06:05
linux-4.19 BUG: soft lockup in smp_call_function C error 2 657d 786d 0/1 upstream: reported C repro on 2022/04/23 05:26
upstream BUG: soft lockup in smp_call_function kernel C done 1130 18h40m 1435d 0/27 upstream: reported C repro on 2020/07/12 23:02
linux-6.1 BUG: soft lockup in smp_call_function 63 22h46m 457d 0/3 upstream: reported on 2023/03/18 00:36
android-54 BUG: soft lockup in smp_call_function 1 954d 954d 0/2 auto-closed as invalid on 2022/03/05 18:04
linux-4.14 BUG: soft lockup in smp_call_function C 1 483d 786d 0/1 upstream: reported C repro on 2022/04/23 04:43
linux-5.15 BUG: soft lockup in smp_call_function origin:upstream missing-backport C error 100 1d13h 455d 0/3 upstream: reported C repro on 2023/03/19 12:10
android-5-15 BUG: soft lockup in smp_call_function origin:upstream C error inconclusive 587 3h15m 469d 0/2 upstream: reported C repro on 2023/03/05 21:20
android-5-10 BUG: soft lockup in smp_call_function C error 68 1d19h 330d 0/2 upstream: reported C repro on 2023/07/22 22:59
upstream INFO: rcu detected stall in smp_call_function perf C 107 1163d 1418d 20/27 fixed on 2021/04/13 06:26
Last patch testing requests (1)
Created Duration User Patch Repo Result
2024/02/11 05:45 14m retest repro android12-5.4 report log

Sample crash report:
watchdog: BUG: soft lockup - CPU#0 stuck for 123s! [kworker/u4:2:179]
Modules linked in:
CPU: 0 PID: 179 Comm: kworker/u4:2 Not tainted 5.4.268-syzkaller-00003-g2d5d8240a7cb #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024
Workqueue: events_unbound toggle_allocation_gate
RIP: 0010:__read_once_size include/linux/compiler.h:268 [inline]
RIP: 0010:csd_lock_wait kernel/smp.c:109 [inline]
RIP: 0010:smp_call_function_single+0x23a/0x4a0 kernel/smp.c:311
Code: 00 44 8b 74 24 58 44 89 f6 83 e6 01 31 ff e8 6d b0 0a 00 41 83 e6 01 75 0a e8 72 ad 0a 00 e9 f4 00 00 00 f3 90 42 0f b6 04 2b <84> c0 75 15 f7 44 24 58 01 00 00 00 0f 84 d6 00 00 00 e8 4f ad 0a
RSP: 0018:ffff8881e4dcf8a0 EFLAGS: 00000293 ORIG_RAX: ffffffffffffff13
RAX: 0000000000000000 RBX: 1ffff1103c9b9f1f RCX: ffff8881e4dc3f00
RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000
RBP: ffff8881e4dcf990 R08: ffffffff815999a3 R09: ffffed103edeb189
R10: 0000000000000000 R11: dffffc0000000001 R12: 1ffff1103c9b9f18
R13: dffffc0000000000 R14: 0000000000000001 R15: 0000000000000000
FS:  0000000000000000(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000555555bc0338 CR3: 00000001dc96e000 CR4: 00000000003406b0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 <IRQ>
 </IRQ>
 smp_call_function_many+0x6fe/0x9b0 kernel/smp.c:451
 smp_call_function kernel/smp.c:509 [inline]
 on_each_cpu+0xa5/0x1a0 kernel/smp.c:616
 text_poke_bp_batch+0x11a/0x2b0 arch/x86/kernel/alternative.c:1038
 arch_jump_label_transform_apply+0x27/0x40 arch/x86/kernel/jump_label.c:167
 static_key_enable_cpuslocked+0x12c/0x240 kernel/jump_label.c:177
 static_key_enable+0x16/0x20 kernel/jump_label.c:190
 toggle_allocation_gate+0xb1/0x240 mm/kfence/core.c:624
 process_one_work+0x765/0xd20 kernel/workqueue.c:2290
 worker_thread+0xaef/0x1470 kernel/workqueue.c:2436
 kthread+0x2da/0x360 kernel/kthread.c:288
 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:354

Crashes (23):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2024/04/27 13:20 android12-5.4 2d5d8240a7cb 07b455f9 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci2-android-5-4-kasan BUG: soft lockup in smp_call_function
2024/04/21 22:49 android12-5.4 2d5d8240a7cb af24b050 .config console log report syz C [disk image] [vmlinux] [kernel image] ci2-android-5-4-kasan BUG: soft lockup in smp_call_function
2024/04/18 15:50 android12-5.4 2d5d8240a7cb af24b050 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci2-android-5-4-perf-kasan BUG: soft lockup in smp_call_function
2024/04/18 15:50 android12-5.4 2d5d8240a7cb af24b050 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci2-android-5-4-kasan BUG: soft lockup in smp_call_function
2024/04/16 10:25 android12-5.4 2d5d8240a7cb 0d592ce4 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci2-android-5-4-kasan BUG: soft lockup in smp_call_function
2024/04/13 19:12 android12-5.4 d0d34dcb02cc c8349e48 .config console log report syz C [disk image] [vmlinux] [kernel image] ci2-android-5-4-kasan BUG: soft lockup in smp_call_function
2024/04/07 01:34 android12-5.4 d0d34dcb02cc ca620dd8 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci2-android-5-4-kasan BUG: soft lockup in smp_call_function
2024/04/05 00:21 android12-5.4 d0d34dcb02cc 0ee3535e .config strace log report syz C [disk image] [vmlinux] [kernel image] ci2-android-5-4-kasan BUG: soft lockup in smp_call_function
2024/03/24 02:02 android12-5.4 43a5ead9254d 0ea90952 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci2-android-5-4-kasan BUG: soft lockup in smp_call_function
2024/01/28 03:57 android12-5.4 4d7b888b5774 cc4a4020 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci2-android-5-4-kasan BUG: soft lockup in smp_call_function
2024/05/09 02:45 android12-5.4 51cf29fc2bfc 20bf80e1 .config console log report syz [disk image] [vmlinux] [kernel image] ci2-android-5-4-kasan BUG: soft lockup in smp_call_function
2024/06/01 01:38 android12-5.4 8322246edffa 3113787f .config console log report info [disk image] [vmlinux] [kernel image] ci2-android-5-4-perf-kasan BUG: soft lockup in smp_call_function
2024/05/27 08:19 android12-5.4 8322246edffa a10a183e .config console log report info [disk image] [vmlinux] [kernel image] ci2-android-5-4-perf-kasan BUG: soft lockup in smp_call_function
2024/05/26 19:16 android12-5.4 8322246edffa a10a183e .config console log report info [disk image] [vmlinux] [kernel image] ci2-android-5-4-perf-kasan BUG: soft lockup in smp_call_function
2024/05/23 01:46 android12-5.4 51cf29fc2bfc 4d098039 .config console log report info [disk image] [vmlinux] [kernel image] ci2-android-5-4-perf-kasan BUG: soft lockup in smp_call_function
2024/05/18 09:13 android12-5.4 51cf29fc2bfc c0f1611a .config console log report info [disk image] [vmlinux] [kernel image] ci2-android-5-4-perf-kasan BUG: soft lockup in smp_call_function
2024/05/11 12:29 android12-5.4 51cf29fc2bfc 9026e142 .config console log report info [disk image] [vmlinux] [kernel image] ci2-android-5-4-perf-kasan BUG: soft lockup in smp_call_function
2024/04/10 03:00 android12-5.4 d0d34dcb02cc 171ec371 .config console log report info [disk image] [vmlinux] [kernel image] ci2-android-5-4-perf-kasan BUG: soft lockup in smp_call_function
2024/03/30 05:35 android12-5.4 47710d1d3563 6baf5069 .config console log report info [disk image] [vmlinux] [kernel image] ci2-android-5-4-perf-kasan BUG: soft lockup in smp_call_function
2024/03/29 23:08 android12-5.4 47710d1d3563 c52bcb23 .config console log report info [disk image] [vmlinux] [kernel image] ci2-android-5-4-perf-kasan BUG: soft lockup in smp_call_function
2024/03/29 15:50 android12-5.4 47710d1d3563 c52bcb23 .config console log report info [disk image] [vmlinux] [kernel image] ci2-android-5-4-perf-kasan BUG: soft lockup in smp_call_function
2024/03/29 11:48 android12-5.4 47710d1d3563 c52bcb23 .config console log report info [disk image] [vmlinux] [kernel image] ci2-android-5-4-perf-kasan BUG: soft lockup in smp_call_function
2024/03/28 20:24 android12-5.4 47710d1d3563 e91187ee .config console log report info [disk image] [vmlinux] [kernel image] ci2-android-5-4-perf-kasan BUG: soft lockup in smp_call_function
* Struck through repros no longer work on HEAD.