syzbot


BUG: soft lockup in bpf_prog_free_deferred

Status: upstream: reported on 2025/05/07 09:41
Subsystems: bpf
[Documentation on labels]
Reported-by: syzbot+05fc8ab5779d08c3dc9b@syzkaller.appspotmail.com
First crash: 5d07h, last: 5d07h
Discussions (1)
Title Replies (including bot) Last reply
[syzbot] [bpf?] BUG: soft lockup in bpf_prog_free_deferred 0 (1) 2025/05/07 09:41
Similar bugs (2)
Kernel Title Repro Cause bisect Fix bisect Count Last Reported Patched Status
android-5-15 BUG: soft lockup in bpf_prog_free_deferred origin:downstream C 7 277d 376d 0/2 auto-obsoleted due to no activity on 2024/11/12 14:27
upstream INFO: rcu detected stall in bpf_prog_free_deferred bpf 1 637d 637d 0/28 auto-obsoleted due to no activity on 2023/11/07 19:00

Sample crash report:
watchdog: BUG: soft lockup - CPU#1 stuck for 22s! [kworker/1:4:3595]
Modules linked in:
irq event stamp: 150378
hardirqs last  enabled at (150377): [<ffff80008545c1e8>] __exit_to_kernel_mode arch/arm64/kernel/entry-common.c:85 [inline]
hardirqs last  enabled at (150377): [<ffff80008545c1e8>] exit_to_kernel_mode+0x38/0x118 arch/arm64/kernel/entry-common.c:95
hardirqs last disabled at (150378): [<ffff80008545e390>] __el1_irq arch/arm64/kernel/entry-common.c:557 [inline]
hardirqs last disabled at (150378): [<ffff80008545e390>] el1_interrupt+0x24/0x54 arch/arm64/kernel/entry-common.c:575
softirqs last  enabled at (150376): [<ffff8000801b6c10>] softirq_handle_end kernel/softirq.c:425 [inline]
softirqs last  enabled at (150376): [<ffff8000801b6c10>] handle_softirqs+0x88c/0xdb4 kernel/softirq.c:607
softirqs last disabled at (150361): [<ffff800080010760>] __do_softirq+0x14/0x20 kernel/softirq.c:613
CPU: 1 UID: 0 PID: 3595 Comm: kworker/1:4 Not tainted 6.15.0-rc4-syzkaller-00189-g2bfcee565c3a #0 PREEMPT 
Hardware name: linux,dummy-virt (DT)
Workqueue: events bpf_prog_free_deferred
pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : __kasan_check_read+0x0/0x2c mm/kasan/shadow.c:30
lr : csd_lock_wait kernel/smp.c:340 [inline]
lr : smp_call_function_many_cond+0x38c/0x1528 kernel/smp.c:885
sp : ffff8000a07c7770
x29: ffff8000a07c7770 x28: 1fffe0000d41ac31 x27: dfff800000000000
x26: 0000000000000000 x25: dfff800000000000 x24: ffff8000870c13a8
x23: 0000000000000000 x22: ffffffffffffffff x21: ffff00006a0d6180
x20: ffff00006a0b8c48 x19: 1ffff000140f8f0c x18: 0000000000000000
x17: 0000000000000000 x16: 0000000000000000 x15: 0000ffffd0f80258
x14: ffff00006a0c05b0 x13: 0000000000000000 x12: ffff60000d41718a
x11: 1fffe0000d417189 x10: ffff60000d417189 x9 : dfff800000000000
x8 : ffff00006a0b8c4b x7 : 0000000000000001 x6 : ffff60000d417189
x5 : ffff00006a0b8c48 x4 : ffff60000d41718a x3 : ffff80008044d488
x2 : 0000000000000000 x1 : 0000000000000004 x0 : ffff00006a0b8c48
Call trace:
 __kasan_check_read+0x0/0x2c (P)
 smp_call_function_many kernel/smp.c:909 [inline]
 smp_call_function kernel/smp.c:931 [inline]
 kick_all_cpus_sync+0x3c/0x94 kernel/smp.c:1076
 flush_icache_range arch/arm64/include/asm/cacheflush.h:103 [inline]
 __text_poke+0xbc/0xdc arch/arm64/kernel/patching.c:130
 aarch64_insn_set+0x30/0x4c arch/arm64/kernel/patching.c:177
 bpf_arch_text_invalidate+0x1c/0x34 arch/arm64/net/bpf_jit_comp.c:250
 bpf_prog_pack_free+0x160/0x43c kernel/bpf/core.c:1014
 bpf_jit_binary_pack_free+0x4c/0x80 kernel/bpf/core.c:1212
 bpf_jit_free+0xe4/0x1d4 arch/arm64/net/bpf_jit_comp.c:2794
 bpf_prog_free_deferred+0x344/0x4c4 kernel/bpf/core.c:2886
 process_one_work+0x7cc/0x18d4 kernel/workqueue.c:3238
 process_scheduled_works kernel/workqueue.c:3319 [inline]
 worker_thread+0x734/0xb84 kernel/workqueue.c:3400
 kthread+0x348/0x5fc kernel/kthread.c:464
 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:862
Sending NMI from CPU 1 to CPUs 0:

Crashes (1):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2025/05/03 06:56 upstream 2bfcee565c3a b0714e37 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm64 BUG: soft lockup in bpf_prog_free_deferred
* Struck through repros no longer work on HEAD.