github.com/google/syzkaller@v0.0.0-20240517125934-c0f1611a36d6/pkg/report/testdata/linux/guilty/59 (about)

     1  FILE: kernel/smp.c
     2  
     3  
     4  watchdog: BUG: soft lockup - CPU#1 stuck for 23s! [syz-executor.2:3705]
     5  Modules linked in:
     6  irq event stamp: 7238
     7  hardirqs last  enabled at (7237): [<ffff80000bfb8138>] __exit_to_kernel_mode arch/arm64/kernel/entry-common.c:84 [inline]
     8  hardirqs last  enabled at (7237): [<ffff80000bfb8138>] exit_to_kernel_mode+0xe8/0x118 arch/arm64/kernel/entry-common.c:94
     9  hardirqs last disabled at (7238): [<ffff80000bfb6088>] __el1_irq arch/arm64/kernel/entry-common.c:467 [inline]
    10  hardirqs last disabled at (7238): [<ffff80000bfb6088>] el1_interrupt+0x24/0x68 arch/arm64/kernel/entry-common.c:485
    11  softirqs last  enabled at (3114): [<ffff8000080102e4>] _stext+0x2e4/0x37c
    12  softirqs last disabled at (2783): [<ffff800008017c14>] ____do_softirq+0x14/0x20 arch/arm64/kernel/irq.c:79
    13  CPU: 1 PID: 3705 Comm: syz-executor.2 Not tainted 6.0.0-rc7-syzkaller-18095-gbbed346d5a96 #0
    14  Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/30/2022
    15  pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
    16  pc : csd_lock_wait kernel/smp.c:443 [inline]
    17  pc : smp_call_function_many_cond+0x958/0xa04 kernel/smp.c:988
    18  lr : csd_lock_wait kernel/smp.c:443 [inline]
    19  lr : smp_call_function_many_cond+0x964/0xa04 kernel/smp.c:988
    20  sp : ffff80001394b9c0
    21  x29: ffff80001394ba10 x28: 0000000000000008 x27: ffff0001fefefc80
    22  x26: ffff80000d309000 x25: 0000000000000001 x24: 0000000000000011
    23  x23: ffff80000d30cf28 x22: 0000000000000008 x21: ffffffffffffffff
    24  x20: ffff0001fefd7148 x19: 0000000000000000 x18: 00000000000000c0
    25  x17: ffff80000dd0b198 x16: 0000000000000000 x15: 0000000000000000
    26  x14: 0000000000000000 x13: 0000000000000406 x12: ffff80000d4552c8
    27  x11: ff808000082497ec x10: 0000000000000000 x9 : 0000000000000000
    28  x8 : 0000000000000011 x7 : ffff8000083d3920 x6 : 0000000000000000
    29  x5 : 0000000000000000 x4 : ffff8000086359b0 x3 : 0000000000000000
    30  x2 : 0000000000000006 x1 : 0000000000000001 x0 : 0000000000000000
    31  Call trace:
    32   __cmpwait_case_32 arch/arm64/include/asm/cmpxchg.h:252 [inline]
    33   __cmpwait arch/arm64/include/asm/cmpxchg.h:278 [inline]
    34   csd_lock_wait kernel/smp.c:443 [inline]
    35   smp_call_function_many_cond+0x958/0xa04 kernel/smp.c:988
    36   on_each_cpu_cond_mask+0x5c/0xa4 kernel/smp.c:1154
    37   on_each_cpu_cond include/linux/smp.h:105 [inline]
    38   invalidate_bh_lrus+0x34/0x40 fs/buffer.c:1423
    39   kill_bdev block/bdev.c:74 [inline]
    40   blkdev_flush_mapping+0x84/0x190 block/bdev.c:661
    41   blkdev_put_whole block/bdev.c:692 [inline]
    42   blkdev_put+0x1e0/0x284 block/bdev.c:952
    43   blkdev_close+0x24/0x38 block/fops.c:499
    44   __fput+0x198/0x3dc fs/file_table.c:320
    45   ____fput+0x20/0x30 fs/file_table.c:353
    46   task_work_run+0xc4/0x14c kernel/task_work.c:177
    47   exit_task_work include/linux/task_work.h:38 [inline]
    48   do_exit+0x26c/0xbe0 kernel/exit.c:795
    49   do_group_exit+0x70/0xe8 kernel/exit.c:925
    50   get_signal+0xb0c/0xb40 kernel/signal.c:2857
    51   do_signal+0x128/0x438 arch/arm64/kernel/signal.c:1071
    52   do_notify_resume+0xc0/0x1f0 arch/arm64/kernel/signal.c:1124
    53   prepare_exit_to_user_mode arch/arm64/kernel/entry-common.c:137 [inline]
    54   exit_to_user_mode arch/arm64/kernel/entry-common.c:142 [inline]
    55   asm_exit_to_user_mode+0x70/0x84 arch/arm64/kernel/entry-common.c:149
    56   ret_from_fork+0x1c/0x20 arch/arm64/kernel/entry.S:863