syzbot


BUG: soft lockup in kcompactd

Status: auto-closed as invalid on 2022/01/31 12:36
Subsystems: kvm
[Documentation on labels]
Reported-by: syzbot+4698a241ed623bd5e5a4@syzkaller.appspotmail.com
First crash: 905d, last: 905d
Similar bugs (1)
Kernel Title Repro Cause bisect Fix bisect Count Last Reported Patched Status
upstream INFO: rcu detected stall in kcompactd mm 1 257d 257d 0/26 auto-obsoleted due to no activity on 2023/11/10 08:17

Sample crash report:
watchdog: BUG: soft lockup - CPU#0 stuck for 131s! [kcompactd0:30]
Modules linked in:
irq event stamp: 731616
hardirqs last  enabled at (731615): [<ffffffff8139ab6e>] kvm_wait+0x19e/0x1f0
hardirqs last disabled at (731616): [<ffffffff89fbef8a>] sysvec_apic_timer_interrupt+0xa/0xb0 arch/x86/kernel/apic/apic.c:1097
softirqs last  enabled at (703520): [<ffffffff814f813c>] __irq_exit_rcu+0xec/0x170 kernel/softirq.c:636
softirqs last disabled at (702695): [<ffffffff814f813c>] __irq_exit_rcu+0xec/0x170 kernel/softirq.c:636
CPU: 0 PID: 30 Comm: kcompactd0 Not tainted 5.15.0-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:native_safe_halt arch/x86/include/asm/irqflags.h:51 [inline]
RIP: 0010:arch_safe_halt arch/x86/include/asm/irqflags.h:89 [inline]
RIP: 0010:kvm_wait+0x1b0/0x1f0 arch/x86/kernel/kvm.c:889
Code: 4c 89 e0 48 c1 e8 03 42 8a 04 28 84 c0 75 41 45 8a 34 24 e8 f2 ba 50 00 44 3a 74 24 1c 75 10 eb 07 0f 00 2d 82 ac 11 09 fb f4 <e9> cc fe ff ff fb e9 c6 fe ff ff 44 89 e1 80 e1 07 38 c1 0f 8c 57
RSP: 0018:ffffc90000e5eda0 EFLAGS: 00000246
RAX: 6b5078e7c6b09900 RBX: 1ffff920001cbdb8 RCX: ffffffff8165ef91
RDX: dffffc0000000000 RSI: 0000000000000001 RDI: 0000000000000000
RBP: ffffc90000e5ee70 R08: dffffc0000000000 R09: fffffbfff1fa61df
R10: fffffbfff1fa61df R11: 0000000000000000 R12: ffff88816baf88a0
R13: dffffc0000000000 R14: 1ffff920001cbd03 R15: ffffc90000e5ede0
FS:  0000000000000000(0000) GS:ffff8880b9a00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000020000600 CR3: 000000007ef8f000 CR4: 00000000003526f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 pv_wait arch/x86/include/asm/paravirt.h:597 [inline]
 pv_wait_head_or_lock kernel/locking/qspinlock_paravirt.h:470 [inline]
 __pv_queued_spin_lock_slowpath+0x76c/0xcb0 kernel/locking/qspinlock.c:508
 pv_queued_spin_lock_slowpath arch/x86/include/asm/paravirt.h:585 [inline]
 queued_spin_lock_slowpath arch/x86/include/asm/qspinlock.h:51 [inline]
 queued_spin_lock include/asm-generic/qspinlock.h:85 [inline]
 do_raw_spin_lock+0x4c9/0x8e0 kernel/locking/spinlock_debug.c:115
 page_vma_mapped_walk+0x1c09/0x2050
 remove_migration_pte+0x1bc/0xfd0 mm/migrate.c:189
 rmap_walk_anon+0x385/0x590 mm/rmap.c:2297
 remove_migration_ptes mm/migrate.c:281 [inline]
 __unmap_and_move+0x932/0xda0 mm/migrate.c:1072
 unmap_and_move+0x321/0xd70 mm/migrate.c:1210
 migrate_pages+0x562/0x16f0 mm/migrate.c:1487
 compact_zone+0x2d23/0x3d10 mm/compaction.c:2393
 proactive_compact_node mm/compaction.c:2647 [inline]
 kcompactd+0x1c23/0x2920 mm/compaction.c:2957
 kthread+0x468/0x490 kernel/kthread.c:327
 ret_from_fork+0x1f/0x30
Sending NMI from CPU 0 to CPUs 1:
NMI backtrace for cpu 1
CPU: 1 PID: 32302 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:lockdep_enabled kernel/locking/lockdep.c:91 [inline]
RIP: 0010:lock_acquire+0xfc/0x4d0 kernel/locking/lockdep.c:5601
Code: 65 8b 05 37 90 9c 7e 85 c0 0f 85 8c 01 00 00 65 48 8b 1c 25 c0 ef 01 00 48 81 c3 5c 0a 00 00 48 89 d8 48 c1 e8 03 42 8a 04 38 <84> c0 0f 85 58 03 00 00 83 3b 00 0f 85 60 01 00 00 4c 89 64 24 38
RSP: 0000:ffffc90000dc0b00 EFLAGS: 00000807
RAX: 1ffff11015003400 RBX: ffff8880a801a75c RCX: 0000000000010003
RDX: 0000000000000000 RSI: 0000000000010003 RDI: 0000000000000000
RBP: ffffc90000dc0c58 R08: dffffc0000000000 R09: ffffed10173664a3
R10: ffffed10173664a3 R11: 0000000000000000 R12: 0000000000000000
R13: 1ffff920001b8168 R14: 0000000000000000 R15: dffffc0000000000
FS:  0000555555ffd400(0000) GS:ffff8880b9b00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f9237ae5000 CR3: 000000016d93d000 CR4: 00000000003526e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 <IRQ>
 __raw_spin_lock include/linux/spinlock_api_smp.h:133 [inline]
 _raw_spin_lock+0x2a/0x40 kernel/locking/spinlock.c:154
 spin_lock include/linux/spinlock.h:350 [inline]
 advance_sched+0x4c/0x930 net/sched/sch_taprio.c:710
 __run_hrtimer kernel/time/hrtimer.c:1685 [inline]
 __hrtimer_run_queues+0x50b/0xa60 kernel/time/hrtimer.c:1749
 hrtimer_interrupt+0x3b3/0x1040 kernel/time/hrtimer.c:1811
 local_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1086 [inline]
 __sysvec_apic_timer_interrupt+0xf9/0x270 arch/x86/kernel/apic/apic.c:1103
 sysvec_apic_timer_interrupt+0x8c/0xb0 arch/x86/kernel/apic/apic.c:1097
 </IRQ>
 asm_sysvec_apic_timer_interrupt+0x12/0x20
RIP: 0010:kasan_check_range+0x4/0x2f0 mm/kasan/generic.c:188
Code: c7 e8 80 9d 2d 08 31 c0 c3 0f 0b b8 ea ff ff ff c3 0f 0b b8 ea ff ff ff c3 cc cc cc cc cc cc cc cc cc cc cc cc cc 41 57 41 56 <41> 55 41 54 53 b0 01 48 85 f6 0f 84 0d 02 00 00 48 89 fb 48 01 f3
RSP: 0000:ffffc9001d7379f8 EFLAGS: 00000246
RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffffff81acdede
RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffffea0000b72080
RBP: ffffc9001d737bc0 R08: ffffffff81acdec7 R09: ffffed10173664a3
R10: ffffed10173664a3 R11: 0000000000000000 R12: dffffc0000000000
R13: 1ffffd400016e411 R14: ffffea0000b72080 R15: ffffea0000b72088
 instrument_atomic_read include/linux/instrumented.h:71 [inline]
 test_bit include/asm-generic/bitops/instrumented-non-atomic.h:134 [inline]
 folio_test_locked include/linux/page-flags.h:417 [inline]
 folio_unlock+0x5e/0x140 mm/filemap.c:1501
 filemap_map_pages+0x803/0xb50 mm/filemap.c:3330
 do_fault_around mm/memory.c:4162 [inline]
 do_read_fault+0x39b/0x650 mm/memory.c:4177
 do_fault mm/memory.c:4312 [inline]
 handle_pte_fault mm/memory.c:4570 [inline]
 __handle_mm_fault mm/memory.c:4705 [inline]
 handle_mm_fault+0x1849/0x2560 mm/memory.c:4803
 do_user_addr_fault+0x8cc/0x10c0 arch/x86/mm/fault.c:1397
 handle_page_fault arch/x86/mm/fault.c:1485 [inline]
 exc_page_fault+0xa1/0x1e0 arch/x86/mm/fault.c:1541
 asm_exc_page_fault+0x1e/0x30
RIP: 0033:0x7f923796e186
Code: 00 e8 3e d3 ff ff 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 48 8b 17 4c 8d 05 86 6e 57 00 4c 39 c2 73 0b 48 8d 42 08 48 89 07 <48> 8b 02 c3 50 49 8d 88 00 00 c0 ff 48 8d 35 d2 91 0b 00 31 c0 48
RSP: 002b:00007ffd98021718 EFLAGS: 00010287
RAX: 00007f9237ae5008 RBX: 0000000000000003 RCX: 00007f9237ae5000
RDX: 00007f9237ae5000 RSI: 00007ffd98021700 RDI: 00007ffd980217d8
RBP: 00007ffd980217d8 R08: 00007f9237ee5000 R09: 0000000000000010
R10: 00007ffd980940b8 R11: 00000000000297b0 R12: 0000000000000001
R13: 0000000000000001 R14: 00007f9237ae0f60 R15: 00000000000da97c
----------------
Code disassembly (best guess):
   0:	4c 89 e0             	mov    %r12,%rax
   3:	48 c1 e8 03          	shr    $0x3,%rax
   7:	42 8a 04 28          	mov    (%rax,%r13,1),%al
   b:	84 c0                	test   %al,%al
   d:	75 41                	jne    0x50
   f:	45 8a 34 24          	mov    (%r12),%r14b
  13:	e8 f2 ba 50 00       	callq  0x50bb0a
  18:	44 3a 74 24 1c       	cmp    0x1c(%rsp),%r14b
  1d:	75 10                	jne    0x2f
  1f:	eb 07                	jmp    0x28
  21:	0f 00 2d 82 ac 11 09 	verw   0x911ac82(%rip)        # 0x911acaa
  28:	fb                   	sti
  29:	f4                   	hlt
* 2a:	e9 cc fe ff ff       	jmpq   0xfffffefb <-- trapping instruction
  2f:	fb                   	sti
  30:	e9 c6 fe ff ff       	jmpq   0xfffffefb
  35:	44 89 e1             	mov    %r12d,%ecx
  38:	80 e1 07             	and    $0x7,%cl
  3b:	38 c1                	cmp    %al,%cl
  3d:	0f                   	.byte 0xf
  3e:	8c                   	.byte 0x8c
  3f:	57                   	push   %rdi

Crashes (1):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2021/11/02 12:36 upstream e66435936756 098b5d53 .config console log report info ci-upstream-kasan-gce-smack-root BUG: soft lockup in kcompactd
* Struck through repros no longer work on HEAD.