INFO: task hung in kvm_mmu_pre_destroy_vm (4)

8 views
Skip to first unread message

syzbot

unread,
Feb 5, 2022, 2:19:26 PM2/5/22
to syzkaller...@googlegroups.com
Hello,

syzbot found the following issue on:

HEAD commit: b86ee2b7ae42 Linux 4.14.264
git tree: linux-4.14.y
console output: https://syzkaller.appspot.com/x/log.txt?x=17663984700000
kernel config: https://syzkaller.appspot.com/x/.config?x=3fffc4e0823c0d50
dashboard link: https://syzkaller.appspot.com/bug?extid=b5682890261cb6ae9636
compiler: gcc version 10.2.1 20210110 (Debian 10.2.1-6)
syz repro: https://syzkaller.appspot.com/x/repro.syz?x=111d4914700000

IMPORTANT: if you fix the issue, please add the following tag to the commit:
Reported-by: syzbot+b56828...@syzkaller.appspotmail.com

Bluetooth: hci1 command 0x0406 tx timeout
Bluetooth: hci3 command 0x0406 tx timeout
Bluetooth: hci0 command 0x0406 tx timeout
Bluetooth: hci2 command 0x0406 tx timeout
Bluetooth: hci4 command 0x0406 tx timeout
INFO: task syz-executor.5:9732 blocked for more than 140 seconds.
Not tainted 4.14.264-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
syz-executor.5 D28880 9732 7991 0x00000004
Call Trace:
context_switch kernel/sched/core.c:2811 [inline]
__schedule+0x88b/0x1de0 kernel/sched/core.c:3387
schedule+0x8d/0x1b0 kernel/sched/core.c:3431
schedule_timeout+0x80a/0xe90 kernel/time/timer.c:1724
do_wait_for_common kernel/sched/completion.c:91 [inline]
__wait_for_common kernel/sched/completion.c:112 [inline]
wait_for_common+0x272/0x430 kernel/sched/completion.c:123
kthread_stop+0xce/0x640 kernel/kthread.c:555
kvm_mmu_pre_destroy_vm+0x41/0x50 arch/x86/kvm/mmu.c:5912
kvm_destroy_vm arch/x86/kvm/../../../virt/kvm/kvm_main.c:769 [inline]
kvm_put_kvm+0x30a/0xa90 arch/x86/kvm/../../../virt/kvm/kvm_main.c:806
kvm_vm_release+0x3f/0x50 arch/x86/kvm/../../../virt/kvm/kvm_main.c:817
__fput+0x25f/0x7a0 fs/file_table.c:210
task_work_run+0x11f/0x190 kernel/task_work.c:113
tracehook_notify_resume include/linux/tracehook.h:191 [inline]
exit_to_usermode_loop+0x1ad/0x200 arch/x86/entry/common.c:164
prepare_exit_to_usermode arch/x86/entry/common.c:199 [inline]
syscall_return_slowpath arch/x86/entry/common.c:270 [inline]
do_syscall_64+0x4a3/0x640 arch/x86/entry/common.c:297
entry_SYSCALL_64_after_hwframe+0x46/0xbb
RIP: 0033:0x7fa8c9d04c9b
RSP: 002b:00007fff1c7e5430 EFLAGS: 00000293 ORIG_RAX: 0000000000000003
RAX: 0000000000000000 RBX: 0000000000000006 RCX: 00007fa8c9d04c9b
RDX: 00007fa8c9e6a038 RSI: ffffffffffffffff RDI: 0000000000000005
RBP: 00007fa8c9e66960 R08: 0000000000000000 R09: 00007fa8c9e6a040
R10: 00007fff1c7e5530 R11: 0000000000000293 R12: 000000000000df57
R13: 00007fff1c7e5530 R14: 00007fa8c9e64f60 R15: 0000000000000032

Showing all locks held in the system:
1 lock held by khungtaskd/1533:
#0: (tasklist_lock){.+.+}, at: [<ffffffff87020867>] debug_show_all_locks+0x7c/0x21a kernel/locking/lockdep.c:4548

=============================================

NMI backtrace for cpu 1
CPU: 1 PID: 1533 Comm: khungtaskd Not tainted 4.14.264-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:17 [inline]
dump_stack+0x1b2/0x281 lib/dump_stack.c:58
nmi_cpu_backtrace.cold+0x57/0x93 lib/nmi_backtrace.c:101
nmi_trigger_cpumask_backtrace+0x13a/0x180 lib/nmi_backtrace.c:62
trigger_all_cpu_backtrace include/linux/nmi.h:140 [inline]
check_hung_uninterruptible_tasks kernel/hung_task.c:195 [inline]
watchdog+0x5b9/0xb40 kernel/hung_task.c:274
kthread+0x30d/0x420 kernel/kthread.c:232
ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:404
Sending NMI from CPU 1 to CPUs 0:
NMI backtrace for cpu 0
CPU: 0 PID: 4625 Comm: systemd-journal Not tainted 4.14.264-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
task: ffff8880a12b6180 task.stack: ffff8880a12b8000
RIP: 0010:__read_once_size include/linux/compiler.h:185 [inline]
RIP: 0010:__sanitizer_cov_trace_pc+0x1d/0x50 kernel/kcov.c:67
RSP: 0018:ffff8880a12bfbf0 EFLAGS: 00000246
RAX: ffff8880a12b6180 RBX: ffff8880a112c4c0 RCX: 000000007fff0000
RDX: 0000000000000000 RSI: ffffc90001ad4030 RDI: ffffffff878f06c8
RBP: dffffc0000000000 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000000 R12: 000000007fff0000
R13: ffff8880a12bfe68 R14: ffff8880a12bfd08 R15: 000000007fff0000
FS: 00007f76b42738c0(0000) GS:ffff8880ba400000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f76b1682000 CR3: 00000000a16f0000 CR4: 00000000003426f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
seccomp_run_filters+0x12a/0x540 kernel/seccomp.c:210
__seccomp_filter+0x7e/0xd60 kernel/seccomp.c:671
__secure_computing+0xdd/0x3e0 kernel/seccomp.c:800
syscall_trace_enter+0x359/0xc20 arch/x86/entry/common.c:121
do_syscall_64+0x41b/0x640 arch/x86/entry/common.c:283
entry_SYSCALL_64_after_hwframe+0x46/0xbb
RIP: 0033:0x7f76b3802840
RSP: 002b:00007fff3f319648 EFLAGS: 00000246 ORIG_RAX: 0000000000000002
RAX: ffffffffffffffda RBX: 00007fff3f319950 RCX: 00007f76b3802840
RDX: 00000000000001a0 RSI: 0000000000080042 RDI: 000055667cac02e0
RBP: 000000000000000d R08: 00000000000001c0 R09: 00000000ffffffff
R10: 0000000000000069 R11: 0000000000000246 R12: 00000000ffffffff
R13: 000055667cab3040 R14: 00007fff3f319910 R15: 000055667cac05e0
Code: 90 90 90 90 90 90 90 90 90 90 90 90 90 90 65 48 8b 04 25 c0 7f 02 00 48 85 c0 74 1a 65 8b 15 cb 42 ad 7e 81 e2 00 01 1f 00 75 0b <8b> 90 58 13 00 00 83 fa 01 74 01 c3 48 8b 34 24 48 8b 88 60 13
----------------
Code disassembly (best guess):
0: 90 nop
1: 90 nop
2: 90 nop
3: 90 nop
4: 90 nop
5: 90 nop
6: 90 nop
7: 90 nop
8: 90 nop
9: 90 nop
a: 90 nop
b: 90 nop
c: 90 nop
d: 90 nop
e: 65 48 8b 04 25 c0 7f mov %gs:0x27fc0,%rax
15: 02 00
17: 48 85 c0 test %rax,%rax
1a: 74 1a je 0x36
1c: 65 8b 15 cb 42 ad 7e mov %gs:0x7ead42cb(%rip),%edx # 0x7ead42ee
23: 81 e2 00 01 1f 00 and $0x1f0100,%edx
29: 75 0b jne 0x36
* 2b: 8b 90 58 13 00 00 mov 0x1358(%rax),%edx <-- trapping instruction
31: 83 fa 01 cmp $0x1,%edx
34: 74 01 je 0x37
36: c3 retq
37: 48 8b 34 24 mov (%rsp),%rsi
3b: 48 rex.W
3c: 8b .byte 0x8b
3d: 88 60 13 mov %ah,0x13(%rax)


---
This report is generated by a bot. It may contain errors.
See https://goo.gl/tpsmEJ for more information about syzbot.
syzbot engineers can be reached at syzk...@googlegroups.com.

syzbot will keep track of this issue. See:
https://goo.gl/tpsmEJ#status for how to communicate with syzbot.
syzbot can test patches for this issue, for details see:
https://goo.gl/tpsmEJ#testing-patches
Reply all
Reply to author
Forward
0 new messages