BUG: soft lockup in __do_softirq

46 views
Skip to first unread message

syzbot

unread,
Mar 23, 2021, 4:32:20 PM3/23/21
to syzkaller...@googlegroups.com
Hello,

syzbot found the following issue on:

HEAD commit: cb83ddcd Linux 4.14.226
git tree: linux-4.14.y
console output: https://syzkaller.appspot.com/x/log.txt?x=128686f6d00000
kernel config: https://syzkaller.appspot.com/x/.config?x=124f4e6b89b71fac
dashboard link: https://syzkaller.appspot.com/bug?extid=70cbd1b4257a8631183e
syz repro: https://syzkaller.appspot.com/x/repro.syz?x=105936dcd00000

IMPORTANT: if you fix the issue, please add the following tag to the commit:
Reported-by: syzbot+70cbd1...@syzkaller.appspotmail.com

watchdog: BUG: soft lockup - CPU#0 stuck for 53s! [syz-executor.1:16927]
Modules linked in:
irq event stamp: 77865471
hardirqs last enabled at (77865470): [<ffffffff87400976>] restore_regs_and_return_to_kernel+0x0/0x2a
hardirqs last disabled at (77865471): [<ffffffff874018ae>] apic_timer_interrupt+0x8e/0xa0 arch/x86/entry/entry_64.S:793
softirqs last enabled at (298): [<ffffffff8760068b>] __do_softirq+0x68b/0x9ff kernel/softirq.c:314
softirqs last disabled at (77865467): [<ffffffff81320ae3>] invoke_softirq kernel/softirq.c:368 [inline]
softirqs last disabled at (77865467): [<ffffffff81320ae3>] irq_exit+0x193/0x240 kernel/softirq.c:409
CPU: 0 PID: 16927 Comm: syz-executor.1 Not tainted 4.14.226-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
task: ffff8880abb1a300 task.stack: ffff88808d3d0000
RIP: 0010:ffs arch/x86/include/asm/bitops.h:427 [inline]
RIP: 0010:__do_softirq+0x215/0x9ff kernel/softirq.c:276
RSP: 0018:ffff8880ba407f30 EFLAGS: 00000282 ORIG_RAX: ffffffffffffff10
RAX: 1ffffffff11e125b RBX: ffff8880abb1a300 RCX: 1ffff11015763575
RDX: 0000000000000000 RSI: ffff8880abb1abb0 RDI: ffff8880abb1ab84
RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000000 R12: 00000000000000b1
R13: 00000000000000b1 R14: 0000000000000000 R15: dffffc0000000000
FS: 00007ff64ad51700(0000) GS:ffff8880ba400000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000000 CR3: 00000000abf77000 CR4: 00000000001426f0
Call Trace:
<IRQ>
invoke_softirq kernel/softirq.c:368 [inline]
irq_exit+0x193/0x240 kernel/softirq.c:409
exiting_irq arch/x86/include/asm/apic.h:638 [inline]
do_IRQ+0x112/0x1d0 arch/x86/kernel/irq.c:242
common_interrupt+0x93/0x93 arch/x86/entry/entry_64.S:576
</IRQ>
RIP: 0010:arch_local_irq_restore arch/x86/include/asm/paravirt.h:779 [inline]
RIP: 0010:lock_acquire+0x1ec/0x3f0 kernel/locking/lockdep.c:4001
RSP: 0018:ffff88808d3d7a98 EFLAGS: 00000286 ORIG_RAX: ffffffffffffff4e
RAX: 1ffffffff11e1259 RBX: ffff8880abb1a300 RCX: efe5d90771f32514
RDX: dffffc0000000000 RSI: 0000000000000001 RDI: 0000000000000286
RBP: ffff88807c7ee528 R08: 0000000000000000 R09: 0000000000020634
R10: ffff8880abb1abb0 R11: ffff8880abb1a300 R12: 0000000000000000
R13: 0000000000000000 R14: 0000000000000002 R15: 0000000000000000
rcu_lock_acquire include/linux/rcupdate.h:242 [inline]
srcu_read_lock include/linux/srcu.h:160 [inline]
vcpu_run arch/x86/kvm/x86.c:7395 [inline]
kvm_arch_vcpu_ioctl_run+0x13d7/0x5ae0 arch/x86/kvm/x86.c:7531
kvm_vcpu_ioctl+0x3de/0xc50 arch/x86/kvm/../../../virt/kvm/kvm_main.c:2661
vfs_ioctl fs/ioctl.c:46 [inline]
file_ioctl fs/ioctl.c:500 [inline]
do_vfs_ioctl+0x75a/0xff0 fs/ioctl.c:684
SYSC_ioctl fs/ioctl.c:701 [inline]
SyS_ioctl+0x7f/0xb0 fs/ioctl.c:692
do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292
entry_SYSCALL_64_after_hwframe+0x46/0xbb
RIP: 0033:0x466459
RSP: 002b:00007ff64ad51188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: ffffffffffffffda RBX: 000000000056c0b0 RCX: 0000000000466459
RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005
RBP: 00000000004bf9fb R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056c0b0
R13: 00007fffc7566eff R14: 00007ff64ad51300 R15: 0000000000022000
Code: 48 c7 c0 d8 92 f0 88 48 c1 e8 03 42 80 3c 38 00 0f 85 38 07 00 00 48 83 3d d0 90 90 01 00 0f 84 8e 06 00 00 fb 66 0f 1f 44 00 00 <b8> ff ff ff ff 48 c7 c3 c0 90 e0 88 0f bc 44 24 04 89 c6 83 c6
Sending NMI from CPU 0 to CPUs 1:
NMI backtrace for cpu 1
CPU: 1 PID: 8091 Comm: kworker/1:0 Not tainted 4.14.226-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Workqueue: events jump_label_update_timeout
task: ffff8880afb38340 task.stack: ffff8880af9a8000
RIP: 0010:__read_once_size include/linux/compiler.h:183 [inline]
RIP: 0010:csd_lock_wait kernel/smp.c:108 [inline]
RIP: 0010:smp_call_function_single+0x181/0x370 kernel/smp.c:302
RSP: 0018:ffff8880af9afa40 EFLAGS: 00000297
RAX: ffff8880afb38340 RBX: 1ffff11015f35f4c RCX: 1ffff11015f67191
RDX: 0000000000000000 RSI: ffff8880afb38c68 RDI: 0000000000000286
RBP: ffff8880af9afae8 R08: 0000000000000001 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000000
FS: 0000000000000000(0000) GS:ffff8880ba500000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000562e055af148 CR3: 0000000099c25000 CR4: 00000000001426e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
smp_call_function_many+0x60f/0x7a0 kernel/smp.c:434
smp_call_function kernel/smp.c:492 [inline]
on_each_cpu+0x40/0x210 kernel/smp.c:602
text_poke_bp+0x90/0x110 arch/x86/kernel/alternative.c:796
__jump_label_transform+0x269/0x300 arch/x86/kernel/jump_label.c:102
arch_jump_label_transform+0x26/0x40 arch/x86/kernel/jump_label.c:110
__jump_label_update+0x113/0x170 kernel/jump_label.c:374
jump_label_update kernel/jump_label.c:741 [inline]
jump_label_update+0x140/0x2d0 kernel/jump_label.c:720
__static_key_slow_dec_cpuslocked+0x3d/0xf0 kernel/jump_label.c:204
__static_key_slow_dec kernel/jump_label.c:214 [inline]
jump_label_update_timeout+0x1b/0x30 kernel/jump_label.c:222
process_one_work+0x793/0x14a0 kernel/workqueue.c:2116
worker_thread+0x5cc/0xff0 kernel/workqueue.c:2250
kthread+0x30d/0x420 kernel/kthread.c:232
ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:404
Code: c3 08 00 48 8b 54 24 10 4c 89 e9 8b 7c 24 1c 48 8d 74 24 40 e8 71 fa ff ff 41 89 c4 8b 44 24 58 a8 01 74 0f e8 e1 c2 08 00 f3 90 <8b> 44 24 58 a8 01 75 f1 e8 d2 c2 08 00 e8 cd c2 08 00 bf 01 00


---
This report is generated by a bot. It may contain errors.
See https://goo.gl/tpsmEJ for more information about syzbot.
syzbot engineers can be reached at syzk...@googlegroups.com.

syzbot will keep track of this issue. See:
https://goo.gl/tpsmEJ#status for how to communicate with syzbot.
syzbot can test patches for this issue, for details see:
https://goo.gl/tpsmEJ#testing-patches
Reply all
Reply to author
Forward
0 new messages