syzbot


BUG: soft lockup in smp_call_function

Status: auto-closed as invalid on 2022/03/05 18:04
Reported-by: syzbot+4da02e510512454d555b@syzkaller.appspotmail.com
First crash: 900d, last: 900d
Similar bugs (10)
Kernel Title Repro Cause bisect Fix bisect Count Last Reported Patched Status
android-6-1 BUG: soft lockup in smp_call_function origin:upstream C 22 38m 22d 0/2 upstream: reported C repro on 2024/04/02 06:05
linux-4.19 BUG: soft lockup in smp_call_function C error 2 603d 732d 0/1 upstream: reported C repro on 2022/04/23 05:26
upstream BUG: soft lockup in smp_call_function kernel C done 1003 10h34m 1381d 0/26 upstream: reported C repro on 2020/07/12 23:02
linux-6.1 BUG: soft lockup in smp_call_function 47 9d20h 403d 0/3 upstream: reported on 2023/03/18 00:36
linux-4.14 BUG: soft lockup in smp_call_function C 1 429d 732d 0/1 upstream: reported C repro on 2022/04/23 04:43
linux-5.15 BUG: soft lockup in smp_call_function origin:upstream missing-backport C error 85 3d18h 402d 0/3 upstream: reported C repro on 2023/03/19 12:10
android-5-15 BUG: soft lockup in smp_call_function origin:upstream C error inconclusive 262 now 415d 0/2 upstream: reported C repro on 2023/03/05 21:20
android-54 BUG: soft lockup in smp_call_function (2) C 15 2d13h 87d 0/2 upstream: reported C repro on 2024/01/28 03:58
android-5-10 BUG: soft lockup in smp_call_function C error 35 10h05m 276d 0/2 upstream: reported C repro on 2023/07/22 22:59
upstream INFO: rcu detected stall in smp_call_function perf C 107 1110d 1365d 20/26 fixed on 2021/04/13 06:26

Sample crash report:
 rcu_gp_fqs_loop kernel/rcu/tree.c:1648 [inline]
 rcu_gp_kthread+0xc4d/0x1640 kernel/rcu/tree.c:1808
 kthread+0x30f/0x330 kernel/kthread.c:288
 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:352
watchdog: BUG: soft lockup - CPU#1 stuck for 123s! [syz-executor.4:12156]
Modules linked in:
CPU: 1 PID: 12156 Comm: syz-executor.4 Not tainted 5.4.147-syzkaller-00040-g2138e7367558 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:check_kcov_mode kernel/kcov.c:164 [inline]
RIP: 0010:__sanitizer_cov_trace_pc+0x23/0x50 kernel/kcov.c:187
Code: 90 90 90 90 90 90 90 48 8b 04 24 65 48 8b 0c 25 80 ed 01 00 65 8b 15 18 1e a1 7e f7 c2 00 01 1f 00 74 01 c3 8b 91 f8 09 00 00 <83> fa 02 75 f4 48 8b 91 00 0a 00 00 48 8b 32 48 8d 7e 01 8b 89 fc
RSP: 0018:ffff8881ef187958 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13
RAX: ffffffff8156dade RBX: 1ffff1103de30f33 RCX: ffff8881dd91af40
RDX: 0000000000000002 RSI: 000000000003ffff RDI: 0000000000040000
RBP: ffff8881ef187a10 R08: ffffffff8156daac R09: ffffed103edc9da1
R10: ffffed103edc9da1 R11: 0000000000000000 R12: dffffc0000000000
R13: 0000000000000001 R14: ffff8881ef187998 R15: 0000000000000000
FS:  00007f19a332e700(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f6bbe76efe8 CR3: 00000001a806c000 CR4: 00000000003406e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 csd_lock_wait kernel/smp.c:109 [inline]
 smp_call_function_single+0x20e/0x410 kernel/smp.c:311
 smp_call_function_many+0x5e1/0x860 kernel/smp.c:451
 smp_call_function kernel/smp.c:509 [inline]
 on_each_cpu+0x5b/0x140 kernel/smp.c:616
 __purge_vmap_area_lazy+0x103/0x1870 mm/vmalloc.c:1278
 try_purge_vmap_area_lazy mm/vmalloc.c:1309 [inline]
 free_vmap_area_noflush+0x27a/0x2d0 mm/vmalloc.c:1345
 free_unmap_vmap_area mm/vmalloc.c:1358 [inline]
 remove_vm_area+0x1e7/0x200 mm/vmalloc.c:2164
 vm_remove_mappings mm/vmalloc.c:2191 [inline]
 __vunmap+0x1c8/0x8f0 mm/vmalloc.c:2251
 __do_replace+0x790/0x9b0 net/ipv6/netfilter/ip6_tables.c:1105
 do_replace net/ipv4/netfilter/ip_tables.c:1140 [inline]
 do_ipt_set_ctl+0x32f/0x4d0 net/ipv4/netfilter/ip_tables.c:1674
 nf_sockopt net/netfilter/nf_sockopt.c:106 [inline]
 nf_setsockopt+0x2ad/0x2d0 net/netfilter/nf_sockopt.c:115
 __sys_setsockopt+0x471/0x700 net/socket.c:2074
 __do_sys_setsockopt net/socket.c:2090 [inline]
 __se_sys_setsockopt net/socket.c:2087 [inline]
 __x64_sys_setsockopt+0xb1/0xc0 net/socket.c:2087
 do_syscall_64+0xcb/0x1e0 arch/x86/entry/common.c:290
 entry_SYSCALL_64_after_hwframe+0x44/0xa9
RIP: 0033:0x7f19a55b7ae9
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f19a332e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036
RAX: ffffffffffffffda RBX: 00007f19a56caf60 RCX: 00007f19a55b7ae9
RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000003
RBP: 00007f19a5611f25 R08: 0000000000000001 R09: 0000000000000000
R10: 0000000020000200 R11: 0000000000000246 R12: 0000000000000000
R13: 00007ffe9b5f6ddf R14: 00007f19a332e300 R15: 0000000000022000
Sending NMI from CPU 1 to CPUs 0:
NMI backtrace for cpu 0
CPU: 0 PID: 12167 Comm: syz-executor.0 Not tainted 5.4.147-syzkaller-00040-g2138e7367558 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:native_halt arch/x86/include/asm/irqflags.h:66 [inline]
RIP: 0010:halt arch/x86/include/asm/irqflags.h:112 [inline]
RIP: 0010:kvm_wait+0xa9/0x100 arch/x86/kernel/kvm.c:834
Code: d8 48 c1 e8 03 42 8a 04 38 84 c0 75 52 8a 03 44 38 e0 75 26 41 f7 c6 00 02 00 00 75 0f e9 07 00 00 00 0f 00 2d 98 1a 5a 03 f4 <eb> 0e e9 07 00 00 00 0f 00 2d 89 1a 5a 03 fb f4 4c 89 34 24 ff 34
RSP: 0018:ffff8881b0297618 EFLAGS: 00000046
RAX: 1ffff110350c3603 RBX: ffff8881a861b138 RCX: ffffffff8149fe67
RDX: 0000000000000001 RSI: 0000000000000003 RDI: ffff8881a861b138
RBP: 1ffff11036052ec4 R08: dffffc0000000000 R09: ffffed10350c3628
R10: ffffed10350c3628 R11: 0000000000000000 R12: 0000000000000003
R13: 1ffff110350c3627 R14: 0000000000000046 R15: dffffc0000000000
FS:  00007f9b14719700(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000001b32121000 CR3: 00000001793c6000 CR4: 00000000003406f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 pv_wait arch/x86/include/asm/paravirt.h:652 [inline]
 pv_wait_head_or_lock kernel/locking/qspinlock_paravirt.h:470 [inline]
 __pv_queued_spin_lock_slowpath+0x6d1/0xbf0 kernel/locking/qspinlock.c:507
 pv_queued_spin_lock_slowpath arch/x86/include/asm/paravirt.h:642 [inline]
 queued_spin_lock_slowpath arch/x86/include/asm/qspinlock.h:50 [inline]
 queued_spin_lock include/asm-generic/qspinlock.h:81 [inline]
 do_raw_spin_lock_flags include/linux/spinlock.h:193 [inline]
 __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:119 [inline]
 _raw_spin_lock_irqsave+0x11c/0x190 kernel/locking/spinlock.c:159
 __wake_up_common_lock kernel/sched/wait.c:122 [inline]
 __wake_up+0x98/0x110 kernel/sched/wait.c:142
 ep_poll_safewake fs/eventpoll.c:581 [inline]
 ep_poll_callback+0x66b/0x930 fs/eventpoll.c:1287
 __wake_up_common+0x25a/0x460 kernel/sched/wait.c:93
 __wake_up_common_lock kernel/sched/wait.c:123 [inline]
 __wake_up+0xb1/0x110 kernel/sched/wait.c:142
 __io_commit_cqring fs/io_uring.c:496 [inline]
 io_commit_cqring+0xb1c/0x13d0 fs/io_uring.c:559
 io_poll_complete fs/io_uring.c:1803 [inline]
 io_poll_wake+0x8ac/0xb40 fs/io_uring.c:1861
 __wake_up_common+0x25a/0x460 kernel/sched/wait.c:93
 __wake_up_common_lock kernel/sched/wait.c:123 [inline]
 __wake_up+0xb1/0x110 kernel/sched/wait.c:142
 ep_poll_safewake fs/eventpoll.c:581 [inline]
 ep_scan_ready_list+0x683/0x6d0 fs/eventpoll.c:758
 ep_eventpoll_poll+0xcc/0x120 fs/eventpoll.c:941
 vfs_poll include/linux/poll.h:90 [inline]
 io_poll_add fs/io_uring.c:1930 [inline]
 __io_submit_sqe+0x1f98/0x3980 fs/io_uring.c:2143
 __io_queue_sqe+0x39/0xc70 fs/io_uring.c:2459
 io_ring_submit fs/io_uring.c:2967 [inline]
 __do_sys_io_uring_enter fs/io_uring.c:3853 [inline]
 __se_sys_io_uring_enter+0x7ee/0x1d40 fs/io_uring.c:3814
 do_syscall_64+0xcb/0x1e0 arch/x86/entry/common.c:290
 entry_SYSCALL_64_after_hwframe+0x44/0xa9
RIP: 0033:0x7f9b169a2ae9
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f9b14719188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa
RAX: ffffffffffffffda RBX: 00007f9b16ab5f60 RCX: 00007f9b169a2ae9
RDX: 0000000000000000 RSI: 00000000000002ff RDI: 0000000000000006
RBP: 00007f9b169fcf25 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007fff1f22e34f R14: 00007f9b14719300 R15: 0000000000022000
----------------
Code disassembly (best guess):
   0:	90                   	nop
   1:	90                   	nop
   2:	90                   	nop
   3:	90                   	nop
   4:	90                   	nop
   5:	90                   	nop
   6:	90                   	nop
   7:	48 8b 04 24          	mov    (%rsp),%rax
   b:	65 48 8b 0c 25 80 ed 	mov    %gs:0x1ed80,%rcx
  12:	01 00
  14:	65 8b 15 18 1e a1 7e 	mov    %gs:0x7ea11e18(%rip),%edx        # 0x7ea11e33
  1b:	f7 c2 00 01 1f 00    	test   $0x1f0100,%edx
  21:	74 01                	je     0x24
  23:	c3                   	retq
  24:	8b 91 f8 09 00 00    	mov    0x9f8(%rcx),%edx
* 2a:	83 fa 02             	cmp    $0x2,%edx <-- trapping instruction
  2d:	75 f4                	jne    0x23
  2f:	48 8b 91 00 0a 00 00 	mov    0xa00(%rcx),%rdx
  36:	48 8b 32             	mov    (%rdx),%rsi
  39:	48 8d 7e 01          	lea    0x1(%rsi),%rdi
  3d:	8b                   	.byte 0x8b
  3e:	89 fc                	mov    %edi,%esp

Crashes (1):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2021/11/05 18:04 android12-5.4 2138e7367558 4c1be0be .config console log report info ci2-android-5-4-kasan BUG: soft lockup in smp_call_function
* Struck through repros no longer work on HEAD.