Title | Replies (including bot) | Last reply |
---|---|---|
[syzbot] [kernel?] BUG: soft lockup in sys_bpf | 0 (1) | 2025/04/23 05:48 |
syzbot |
sign-in | mailing list | source | docs |
Title | Replies (including bot) | Last reply |
---|---|---|
[syzbot] [kernel?] BUG: soft lockup in sys_bpf | 0 (1) | 2025/04/23 05:48 |
watchdog: BUG: soft lockup - CPU#1 stuck for 142s! [syz.1.54:6083] Modules linked in: irq event stamp: 11540043 hardirqs last enabled at (11540042): [<ffffffff8b55e3c4>] irqentry_exit+0x74/0x90 kernel/entry/common.c:357 hardirqs last disabled at (11540043): [<ffffffff8b55cdbe>] sysvec_apic_timer_interrupt+0xe/0xc0 arch/x86/kernel/apic/apic.c:1049 softirqs last enabled at (11470168): [<ffffffff8185c3fa>] __do_softirq kernel/softirq.c:613 [inline] softirqs last enabled at (11470168): [<ffffffff8185c3fa>] invoke_softirq kernel/softirq.c:453 [inline] softirqs last enabled at (11470168): [<ffffffff8185c3fa>] __irq_exit_rcu+0xca/0x1f0 kernel/softirq.c:680 softirqs last disabled at (11470171): [<ffffffff8185c3fa>] __do_softirq kernel/softirq.c:613 [inline] softirqs last disabled at (11470171): [<ffffffff8185c3fa>] invoke_softirq kernel/softirq.c:453 [inline] softirqs last disabled at (11470171): [<ffffffff8185c3fa>] __irq_exit_rcu+0xca/0x1f0 kernel/softirq.c:680 CPU: 1 UID: 0 PID: 6083 Comm: syz.1.54 Not tainted 6.15.0-rc4-syzkaller-gb4432656b36e #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/29/2025 RIP: 0010:check_kcov_mode kernel/kcov.c:183 [inline] RIP: 0010:write_comp_data kernel/kcov.c:246 [inline] RIP: 0010:__sanitizer_cov_trace_switch+0xa9/0x130 kernel/kcov.c:351 Code: c9 eb 08 49 ff c1 4c 39 c8 74 77 4e 8b 54 ce 10 65 44 8b 1d 49 7b b5 10 41 81 e3 00 01 ff 00 74 13 41 81 fb 00 01 00 00 75 d9 <41> 83 b8 3c 16 00 00 00 74 cf 45 8b 98 18 16 00 00 41 83 fb 03 75 RSP: 0018:ffffc90000a083c8 EFLAGS: 00000246 RAX: 0000000000000020 RBX: ffff88801c6fb290 RCX: 0000000000000005 RDX: ffffffff81c38a30 RSI: ffffffff8df90d30 RDI: 0000000000000004 RBP: 00000038c3583ef7 R08: ffff888026370000 R09: 000000000000001b R10: 000000000000001b R11: 0000000000000100 R12: ffff88801c6fb010 R13: 0000000000000004 R14: 00000000130c78a4 R15: 0000000000000280 FS: 00007f76098666c0(0000) GS:ffff8881261cc000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000001b2fc18ff8 CR3: 0000000027cd4000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 Call Trace: <IRQ> rb_read_data_buffer+0x110/0x580 kernel/trace/ring_buffer.c:1820 check_buffer+0x28a/0x750 kernel/trace/ring_buffer.c:4297 __rb_reserve_next+0x592/0xdb0 kernel/trace/ring_buffer.c:4396 rb_reserve_next_event kernel/trace/ring_buffer.c:4533 [inline] ring_buffer_lock_reserve+0xbb5/0x1010 kernel/trace/ring_buffer.c:4592 __trace_buffer_lock_reserve kernel/trace/trace.c:1028 [inline] trace_event_buffer_lock_reserve+0x1d0/0x6f0 kernel/trace/trace.c:2742 trace_event_buffer_reserve+0x2a6/0x3d0 kernel/trace/trace_events.c:661 do_trace_event_raw_event_bpf_trace_printk kernel/trace/bpf_trace.h:11 [inline] trace_event_raw_event_bpf_trace_printk+0x100/0x260 kernel/trace/bpf_trace.h:11 __do_trace_bpf_trace_printk kernel/trace/bpf_trace.h:11 [inline] trace_bpf_trace_printk+0x170/0x1d0 kernel/trace/bpf_trace.h:11 ____bpf_trace_printk kernel/trace/bpf_trace.c:380 [inline] bpf_trace_printk+0x11e/0x190 kernel/trace/bpf_trace.c:363 bpf_prog_0605f9f479290f07+0x38/0x3c bpf_dispatcher_nop_func include/linux/bpf.h:1316 [inline] __bpf_prog_run include/linux/filter.h:718 [inline] bpf_prog_run include/linux/filter.h:725 [inline] __bpf_trace_run kernel/trace/bpf_trace.c:2363 [inline] bpf_trace_run1+0x27c/0x4b0 kernel/trace/bpf_trace.c:2403 __bpf_trace_rcu_utilization+0xa1/0xf0 include/trace/events/rcu.h:27 __do_trace_rcu_utilization include/trace/events/rcu.h:27 [inline] trace_rcu_utilization+0x1ad/0x1d0 include/trace/events/rcu.h:27 rcu_core+0x12b/0x1710 kernel/rcu/tree.c:2796 handle_softirqs+0x283/0x870 kernel/softirq.c:579 __do_softirq kernel/softirq.c:613 [inline] invoke_softirq kernel/softirq.c:453 [inline] __irq_exit_rcu+0xca/0x1f0 kernel/softirq.c:680 irq_exit_rcu+0x9/0x30 kernel/softirq.c:696 instr_sysvec_irq_work arch/x86/kernel/irq_work.c:17 [inline] sysvec_irq_work+0xa3/0xc0 arch/x86/kernel/irq_work.c:17 </IRQ> <TASK> asm_sysvec_irq_work+0x1a/0x20 arch/x86/include/asm/idtentry.h:738 RIP: 0010:in_lock_functions+0x0/0x30 kernel/locking/spinlock.c:408 Code: c7 88 db 7c 95 e8 50 18 83 00 e9 61 ff ff ff cc cc cc cc cc cc cc cc cc cc cc 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 <f3> 0f 1e fa 48 81 ff f0 55 58 8b 0f 93 c0 48 81 ff 84 9b 58 8b 0f RSP: 0018:ffffc9000b6a6df8 EFLAGS: 00010246 RAX: 0000000000000001 RBX: ffffffff8b56f5de RCX: 0000000000000000 RDX: 0000000000000000 RSI: ffffffff8d749f78 RDI: ffffffff8b56f5de RBP: ffffc9000b6a6ea8 R08: ffffffff8f7ed377 R09: 1ffffffff1efda6e R10: dffffc0000000000 R11: fffffbfff1efda6f R12: 00000000ffffffff R13: ffff88802fb7e000 R14: dffffc0000000000 R15: dffffc0000000000 get_lock_parent_ip include/linux/ftrace.h:1089 [inline] preempt_latency_start kernel/sched/core.c:5838 [inline] preempt_schedule_common+0x43/0xd0 kernel/sched/core.c:6946 preempt_schedule+0xae/0xc0 kernel/sched/core.c:6971 preempt_schedule_thunk+0x16/0x30 arch/x86/entry/thunk.S:12 __slab_alloc mm/slub.c:3964 [inline] __slab_alloc_node mm/slub.c:4037 [inline] slab_alloc_node mm/slub.c:4198 [inline] __kmalloc_cache_noprof+0x2b7/0x3d0 mm/slub.c:4367 kmalloc_noprof include/linux/slab.h:905 [inline] kzalloc_noprof include/linux/slab.h:1039 [inline] copy_verifier_state+0x90f/0xed0 kernel/bpf/verifier.c:1762 is_state_visited kernel/bpf/verifier.c:19269 [inline] do_check+0x4d4e/0xd630 kernel/bpf/verifier.c:19431 do_check_common+0x168d/0x20b0 kernel/bpf/verifier.c:22776 do_check_main kernel/bpf/verifier.c:22867 [inline] bpf_check+0x13679/0x19a70 kernel/bpf/verifier.c:24033 bpf_prog_load+0x1318/0x1930 kernel/bpf/syscall.c:2971 __sys_bpf+0x5f1/0x860 kernel/bpf/syscall.c:5834 __do_sys_bpf kernel/bpf/syscall.c:5941 [inline] __se_sys_bpf kernel/bpf/syscall.c:5939 [inline] __x64_sys_bpf+0x7c/0x90 kernel/bpf/syscall.c:5939 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xf6/0x210 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f760898e969 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f7609866038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 RAX: ffffffffffffffda RBX: 00007f7608bb5fa0 RCX: 00007f760898e969 RDX: 0000000000000094 RSI: 0000200000000700 RDI: 0000000000000005 RBP: 00007f7608a10ab1 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000000 R14: 00007f7608bb5fa0 R15: 00007fff2aa66ac8 </TASK> Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 5841 Comm: kworker/u9:8 Not tainted 6.15.0-rc4-syzkaller-gb4432656b36e #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/29/2025 Workqueue: hci0 hci_cmd_timeout RIP: 0010:check_wait_context kernel/locking/lockdep.c:-1 [inline] RIP: 0010:__lock_acquire+0x565/0xd20 kernel/locking/lockdep.c:5185 Code: 24 0f b6 81 c4 00 00 00 84 c0 0f 84 68 ff ff ff 41 0f b6 f4 0f b6 d0 40 38 c6 0f 42 d6 80 b9 c6 00 00 00 02 0f 84 51 ff ff ff <89> d0 e9 4a ff ff ff 48 c7 c7 d0 ca e0 8d 48 89 de e8 f5 75 4f 03 RSP: 0018:ffffc900042cf1a0 EFLAGS: 00000093 RAX: 0000000000000002 RBX: 0000000000000004 RCX: ffffffff931de108 RDX: 0000000000000002 RSI: 0000000000000005 RDI: ffff888033955a00 RBP: ffff8880339564f0 R08: 0000000000000000 R09: 0000000000080000 R10: 0000000000000000 R11: ffffffff81cad457 R12: 00000000ffffff05 R13: 0000000000000000 R14: ffff8880339565b0 R15: ffff8880339565b8 FS: 0000000000000000(0000) GS:ffff8881260cc000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007ffd061fb078 CR3: 0000000031116000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 Call Trace: <TASK> lock_acquire+0x120/0x360 kernel/locking/lockdep.c:5866 rcu_lock_acquire include/linux/rcupdate.h:331 [inline] rcu_read_lock include/linux/rcupdate.h:841 [inline] trace_call_bpf+0xd4/0x850 kernel/trace/bpf_trace.c:-1 perf_trace_run_bpf_submit+0x78/0x170 kernel/events/core.c:10788 do_perf_trace_lock include/trace/events/lock.h:50 [inline] perf_trace_lock+0x2f8/0x3b0 include/trace/events/lock.h:50 __do_trace_lock_release include/trace/events/lock.h:69 [inline] trace_lock_release include/trace/events/lock.h:69 [inline] lock_release+0x3b2/0x3e0 kernel/locking/lockdep.c:5877 __raw_spin_unlock include/linux/spinlock_api_smp.h:141 [inline] _raw_spin_unlock+0x16/0x50 kernel/locking/spinlock.c:186 console_lock_spinning_enable kernel/printk/printk.c:1920 [inline] console_emit_next_record kernel/printk/printk.c:3132 [inline] console_flush_all+0x6ac/0xc40 kernel/printk/printk.c:3226 __console_flush_and_unlock kernel/printk/printk.c:3285 [inline] console_unlock+0xc4/0x270 kernel/printk/printk.c:3325 vprintk_emit+0x5b7/0x7a0 kernel/printk/printk.c:2450 _printk+0xcf/0x120 kernel/printk/printk.c:2475 bt_err+0x10b/0x160 net/bluetooth/lib.c:296 hci_cmd_timeout+0xd8/0x1e0 net/bluetooth/hci_core.c:1453 process_one_work kernel/workqueue.c:3238 [inline] process_scheduled_works+0xadb/0x17a0 kernel/workqueue.c:3319 worker_thread+0x8a0/0xda0 kernel/workqueue.c:3400 kthread+0x70e/0x8a0 kernel/kthread.c:464 ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:153 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 </TASK>
Time | Kernel | Commit | Syzkaller | Config | Log | Report | Syz repro | C repro | VM info | Assets (help?) | Manager | Title |
---|---|---|---|---|---|---|---|---|---|---|---|---|
2025/05/08 08:04 | bpf | b4432656b36e | dbf35fa1 | .config | console log | report | info | [disk image] [vmlinux] [kernel image] | ci-upstream-bpf-kasan-gce | BUG: soft lockup in sys_bpf | ||
2025/04/20 15:22 | bpf | 82303a059aab | 2a20f901 | .config | console log | report | info | [disk image] [vmlinux] [kernel image] | ci-upstream-bpf-kasan-gce | BUG: soft lockup in sys_bpf | ||
2025/05/11 05:18 | bpf-next | 7220eabff8cb | 77908e5f | .config | console log | report | info | [disk image] [vmlinux] [kernel image] | ci-upstream-bpf-next-kasan-gce | BUG: soft lockup in sys_bpf | ||
2025/04/23 05:48 | bpf-next | be2fea9c07d4 | 53a8b9bd | .config | console log | report | info | [disk image] [vmlinux] [kernel image] | ci-upstream-bpf-next-kasan-gce | BUG: soft lockup in sys_bpf | ||
2025/04/05 10:31 | bpf-next | c9661394850d | 1c4febdb | .config | console log | report | info | [disk image] [vmlinux] [kernel image] | ci-upstream-bpf-next-kasan-gce | BUG: soft lockup in sys_bpf | ||
2025/04/21 00:33 | upstream | ac71fabf1567 | 2a20f901 | .config | console log | report | info | [disk image] [vmlinux] [kernel image] | ci-upstream-kasan-gce-root | INFO: rcu detected stall in sys_bpf | ||
2025/04/21 13:55 | net | 750d0ac001e8 | 2a20f901 | .config | console log | report | info | [disk image] [vmlinux] [kernel image] | ci-upstream-net-this-kasan-gce | INFO: rcu detected stall in sys_bpf | ||
2025/05/12 05:26 | net-next | 0b28182c73a3 | 77908e5f | .config | console log | report | info | [disk image] [vmlinux] [kernel image] | ci-upstream-net-kasan-gce | INFO: rcu detected stall in sys_bpf |