BUG: soft lockup in kvm_dev_ioctl

10 views
Skip to first unread message

syzbot

unread,
May 11, 2021, 4:48:20 PM5/11/21
to syzkaller...@googlegroups.com
Hello,

syzbot found the following issue on:

HEAD commit: 3c8c2309 Linux 4.19.190
git tree: linux-4.19.y
console output: https://syzkaller.appspot.com/x/log.txt?x=12f85fd5d00000
kernel config: https://syzkaller.appspot.com/x/.config?x=d3c2572d41264a3d
dashboard link: https://syzkaller.appspot.com/bug?extid=9c48ee72dce2b6d867fb

Unfortunately, I don't have any reproducer for this issue yet.

IMPORTANT: if you fix the issue, please add the following tag to the commit:
Reported-by: syzbot+9c48ee...@syzkaller.appspotmail.com

audit: type=1326 audit(1620766027.559:211): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=31181 comm="syz-executor.1" exe="/root/syz-executor.1" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665f9 code=0x0
watchdog: BUG: soft lockup - CPU#0 stuck for 23s! [syz-executor.4:31133]
Modules linked in:
irq event stamp: 2604482
hardirqs last enabled at (2604481): [<ffffffff81003ce4>] trace_hardirqs_on_thunk+0x1a/0x1c
hardirqs last disabled at (2604482): [<ffffffff81003d00>] trace_hardirqs_off_thunk+0x1a/0x1c
softirqs last enabled at (27560): [<ffffffff88400678>] __do_softirq+0x678/0x980 kernel/softirq.c:318
softirqs last disabled at (25915): [<ffffffff813926d5>] invoke_softirq kernel/softirq.c:372 [inline]
softirqs last disabled at (25915): [<ffffffff813926d5>] irq_exit+0x215/0x260 kernel/softirq.c:412
CPU: 0 PID: 31133 Comm: syz-executor.4 Not tainted 4.19.190-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:pv_wait_head_or_lock kernel/locking/qspinlock_paravirt.h:435 [inline]
RIP: 0010:__pv_queued_spin_lock_slowpath+0x3a6/0xae0 kernel/locking/qspinlock.c:474
Code: eb c6 45 01 01 41 bc 00 80 00 00 48 c1 e9 03 83 e3 07 41 be 01 00 00 00 48 b8 00 00 00 00 00 fc ff df 4c 8d 2c 01 eb 0c f3 90 <41> 83 ec 01 0f 84 38 04 00 00 41 0f b6 45 00 38 d8 7f 08 84 c0 0f
RSP: 0018:ffff888048027800 EFLAGS: 00000206 ORIG_RAX: ffffffffffffff13
RAX: 0000000000000003 RBX: 0000000000000000 RCX: 1ffffffff1403138
RDX: 0000000000000001 RSI: ffffffff81678725 RDI: 0000000000000282
RBP: ffffffff8a0189c0 R08: 0000000000000001 R09: 0000000000000000
R10: 0000000000000001 R11: 0000000000000000 R12: 0000000000000543
R13: fffffbfff1403138 R14: 0000000000000001 R15: ffff8880ba02bd80
FS: 00007f75dacfd700(0000) GS:ffff8880ba000000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f75dacfc000 CR3: 00000000b14b3000 CR4: 00000000001426f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
pv_queued_spin_lock_slowpath arch/x86/include/asm/paravirt.h:679 [inline]
queued_spin_lock_slowpath arch/x86/include/asm/qspinlock.h:53 [inline]
queued_spin_lock include/asm-generic/qspinlock.h:88 [inline]
do_raw_spin_lock+0x189/0x220 kernel/locking/spinlock_debug.c:113
spin_lock include/linux/spinlock.h:329 [inline]
alloc_vmap_area+0x186/0x980 mm/vmalloc.c:432
__get_vm_area_node+0x17b/0x3a0 mm/vmalloc.c:1401
__vmalloc_node_range mm/vmalloc.c:1748 [inline]
__vmalloc_node mm/vmalloc.c:1804 [inline]
__vmalloc_node_flags mm/vmalloc.c:1818 [inline]
vzalloc+0xe6/0x1a0 mm/vmalloc.c:1857
kvm_dev_ioctl_get_cpuid+0x121/0x6d0 arch/x86/kvm/cpuid.c:807
kvm_arch_dev_ioctl+0x2f8/0x4a0 arch/x86/kvm/x86.c:3163
kvm_dev_ioctl+0xd2/0x16e0 arch/x86/kvm/../../../virt/kvm/kvm_main.c:3499
vfs_ioctl fs/ioctl.c:46 [inline]
file_ioctl fs/ioctl.c:501 [inline]
do_vfs_ioctl+0xcdb/0x12e0 fs/ioctl.c:688
ksys_ioctl+0x9b/0xc0 fs/ioctl.c:705
__do_sys_ioctl fs/ioctl.c:712 [inline]
__se_sys_ioctl fs/ioctl.c:710 [inline]
__x64_sys_ioctl+0x6f/0xb0 fs/ioctl.c:710
do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293
entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x4663b7
Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f75dacfb5f8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: ffffffffffffffda RBX: 0000000020000000 RCX: 00000000004663b7
RDX: 00007f75dacfbd30 RSI: 00000000c008ae05 RDI: 0000000000000008
RBP: 0000000020001000 R08: 0000000000000000 R09: 00000000000000b3
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020001800
R13: 00007f75dacfbd30 R14: 0000000000000008 R15: 0000000000000000
Sending NMI from CPU 0 to CPUs 1:
NMI backtrace for cpu 1
CPU: 1 PID: 31189 Comm: syz-executor.0 Not tainted 4.19.190-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:__kernel_text_address+0x1/0x30 kernel/extable.c:106
Code: 89 ef e8 22 d3 2d 00 0f b6 c0 eb cf 48 c7 c7 84 b1 26 8b e8 21 06 59 00 e9 64 ff ff ff 66 66 2e 0f 1f 84 00 00 00 00 00 90 53 <48> 89 fb e8 07 ff ff ff 85 c0 75 17 48 81 fb 00 60 37 8c 72 0c 31
RSP: 0018:ffff8880ba107828 EFLAGS: 00000246
RAX: dffffc0000000000 RBX: ffff8880ba107860 RCX: 0000000000000000
RDX: 1ffff11017420f15 RSI: ffff8880ba1076c0 RDI: ffffffff84a6c67f
RBP: ffff8880ba1078a8 R08: 0000000000000001 R09: 0000000000000001
R10: ffff8880ba1078bf R11: 0000000000074071 R12: ffff8880ba1078f8
R13: 0000000000000000 R14: ffff88823b2b7540 R15: 00000000000000e8
FS: 00007f5551524700(0000) GS:ffff8880ba100000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fac91f80c70 CR3: 000000003f834000 CR4: 00000000001426e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
<IRQ>
unwind_get_return_address arch/x86/kernel/unwind_orc.c:297 [inline]
unwind_get_return_address+0x51/0x90 arch/x86/kernel/unwind_orc.c:292
__save_stack_trace+0xaf/0x190 arch/x86/kernel/stacktrace.c:45
save_stack mm/kasan/kasan.c:448 [inline]
set_track mm/kasan/kasan.c:460 [inline]
kasan_kmalloc+0xeb/0x160 mm/kasan/kasan.c:553
slab_post_alloc_hook mm/slab.h:445 [inline]
slab_alloc_node mm/slab.c:3340 [inline]
kmem_cache_alloc_node+0x133/0x3b0 mm/slab.c:3647
__alloc_skb+0x71/0x560 net/core/skbuff.c:193
__netdev_alloc_skb+0x76/0x460 net/core/skbuff.c:407
netdev_alloc_skb include/linux/skbuff.h:2680 [inline]
dev_alloc_skb include/linux/skbuff.h:2693 [inline]
__ieee80211_beacon_get+0xc7d/0x1a30 net/mac80211/tx.c:4332
ieee80211_beacon_get_tim+0x88/0x890 net/mac80211/tx.c:4443
ieee80211_beacon_get include/net/mac80211.h:4484 [inline]
mac80211_hwsim_beacon_tx+0xff/0x680 drivers/net/wireless/mac80211_hwsim.c:1577
__iterate_interfaces+0x2e1/0x4a0 net/mac80211/util.c:614
ieee80211_iterate_active_interfaces_atomic+0x8d/0x170 net/mac80211/util.c:650
mac80211_hwsim_beacon+0xc9/0x190 drivers/net/wireless/mac80211_hwsim.c:1615
__tasklet_hrtimer_trampoline+0x29/0xa0 kernel/softirq.c:601
tasklet_action_common.constprop.0+0x265/0x360 kernel/softirq.c:522
__do_softirq+0x265/0x980 kernel/softirq.c:292
invoke_softirq kernel/softirq.c:372 [inline]
irq_exit+0x215/0x260 kernel/softirq.c:412
exiting_irq arch/x86/include/asm/apic.h:535 [inline]
smp_apic_timer_interrupt+0x136/0x550 arch/x86/kernel/apic/apic.c:1098
apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:894
</IRQ>
RIP: 0010:vsnprintf+0xe7f/0x14f0 lib/vsprintf.c:2338
Code: 00 0f 85 9d 05 00 00 41 89 ee 4d 03 77 10 83 c5 08 41 89 2f e8 02 18 73 f9 4c 89 f0 48 c1 e8 03 80 3c 18 00 0f 85 6d 05 00 00 <4d> 8b 36 eb 69 e8 e7 17 73 f9 89 ee bf 2f 00 00 00 e8 4b 19 73 f9
RSP: 0018:ffff88803e8d7600 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13
RAX: 1ffff11007d1aeef RBX: dffffc0000000000 RCX: ffffc90005b67000
RDX: 0000000000040000 RSI: ffffffff87ef42bc RDI: ffff88803e8d7710
RBP: 0000000000000020 R08: 0000000000000009 R09: 000000000000002f
R10: 0000000000000005 R11: 0000000000000000 R12: ffff88803e8d78e7
R13: ffffffff886c76ca R14: ffff88803e8d7778 R15: ffff88803e8d7700
sprintf+0xc0/0x100 lib/vsprintf.c:2495
__sprint_symbol+0x193/0x1c0 kernel/kallsyms.c:373
symbol_string+0x1d2/0x210 lib/vsprintf.c:696
pointer+0x30f/0x850 lib/vsprintf.c:1879
vsnprintf+0x5b2/0x14f0 lib/vsprintf.c:2297
seq_vprintf fs/seq_file.c:391 [inline]
seq_printf+0x195/0x240 fs/seq_file.c:406
s_show mm/vmalloc.c:2730 [inline]
s_show+0x1b6/0x840 mm/vmalloc.c:2704
traverse.part.0+0xcf/0x590 fs/seq_file.c:113
traverse fs/seq_file.c:103 [inline]
seq_lseek+0x1c1/0x470 fs/seq_file.c:325
proc_reg_llseek+0x1b6/0x2b0 fs/proc/inode.c:217
vfs_llseek fs/read_write.c:300 [inline]
ksys_lseek+0x14f/0x1b0 fs/read_write.c:313
do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293
entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x4665f9
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f5551524188 EFLAGS: 00000246 ORIG_RAX: 0000000000000008
RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9
RDX: 0000000000000000 RSI: 0000000000006080 RDI: 0000000000000003
RBP: 00000000004bfce1 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf60
R13: 00007ffc898c727f R14: 00007f5551524300 R15: 0000000000022000


---
This report is generated by a bot. It may contain errors.
See https://goo.gl/tpsmEJ for more information about syzbot.
syzbot engineers can be reached at syzk...@googlegroups.com.

syzbot will keep track of this issue. See:
https://goo.gl/tpsmEJ#status for how to communicate with syzbot.

syzbot

unread,
Sep 8, 2021, 4:48:17 PM9/8/21
to syzkaller...@googlegroups.com
Auto-closing this bug as obsolete.
Crashes did not happen for a while, no reproducer and no activity.
Reply all
Reply to author
Forward
0 new messages