syzbot


BUG: soft lockup in sys_bpf

Status: upstream: reported on 2025/04/23 05:48
Subsystems: mm
[Documentation on labels]
Reported-by: syzbot+9431dc0c0741cff46a99@syzkaller.appspotmail.com
First crash: 64d, last: 4d09h
Discussions (1)
Title Replies (including bot) Last reply
[syzbot] [kernel?] BUG: soft lockup in sys_bpf 0 (1) 2025/04/23 05:48
Similar bugs (15)
Kernel Title Repro Cause bisect Fix bisect Count Last Reported Patched Status
android-54 BUG: soft lockup in sys_bpf 1 114d 114d 0/2 auto-obsoleted due to no activity on 2025/05/15 12:21
upstream INFO: rcu detected stall in sys_bpf (5) bpf C unreliable 56 1233d 1326d 0/28 closed as invalid on 2022/02/08 10:34
android-5-15 BUG: soft lockup in sys_bpf origin:upstream C error 108 269d 436d 0/2 upstream: reported C repro on 2024/03/29 12:25
upstream INFO: rcu detected stall in sys_bpf (9) bpf net C error 74 136d 376d 0/28 auto-obsoleted due to no activity on 2025/04/03 05:23
android-5-10 BUG: soft lockup in sys_bpf 2 349d 353d 0/2 auto-obsoleted due to no activity on 2024/09/22 11:37
linux-5.15 INFO: rcu detected stall in sys_bpf (2) 18 1d16h 425d 0/3 upstream: reported on 2024/04/09 19:57
linux-5.15 INFO: rcu detected stall in sys_bpf 2 549d 592d 0/3 auto-obsoleted due to no activity on 2024/03/16 17:33
upstream INFO: rcu detected stall in sys_bpf (8) bpf 1 568d 568d 0/28 auto-obsoleted due to no activity on 2024/02/17 03:10
linux-6.1 INFO: rcu detected stall in sys_bpf 20 38d 414d 0/3 upstream: reported on 2024/04/20 10:27
upstream INFO: rcu detected stall in sys_bpf (6) net 7 1044d 1195d 0/28 auto-obsoleted due to no activity on 2022/10/28 06:32
upstream INFO: rcu detected stall in sys_bpf (3) bpf 4 1978d 1978d 0/28 closed as invalid on 2020/01/09 08:13
upstream INFO: rcu detected stall in sys_bpf bpf net 3 2145d 2265d 0/28 auto-closed as invalid on 2019/11/23 00:18
upstream INFO: rcu detected stall in sys_bpf (2) bpf 12 2013d 2015d 0/28 closed as invalid on 2019/12/04 14:14
linux-4.19 INFO: rcu detected stall in sys_bpf 3 1962d 2092d 0/1 auto-closed as invalid on 2020/05/23 14:47
upstream INFO: rcu detected stall in sys_bpf (4) bpf net 3 1931d 1970d 0/28 auto-closed as invalid on 2020/05/24 13:03

Sample crash report:
watchdog: BUG: soft lockup - CPU#0 stuck for 128s! [syz.1.10:5949]
Modules linked in:
irq event stamp: 19475207
hardirqs last  enabled at (19475206): [<ffffffff8b649414>] irqentry_exit+0x74/0x90 kernel/entry/common.c:310
hardirqs last disabled at (19475207): [<ffffffff8b647f5e>] sysvec_apic_timer_interrupt+0xe/0xc0 arch/x86/kernel/apic/apic.c:1050
softirqs last  enabled at (19021494): [<ffffffff8185919a>] __do_softirq kernel/softirq.c:613 [inline]
softirqs last  enabled at (19021494): [<ffffffff8185919a>] invoke_softirq kernel/softirq.c:453 [inline]
softirqs last  enabled at (19021494): [<ffffffff8185919a>] __irq_exit_rcu+0xca/0x1f0 kernel/softirq.c:680
softirqs last disabled at (19021497): [<ffffffff8185919a>] __do_softirq kernel/softirq.c:613 [inline]
softirqs last disabled at (19021497): [<ffffffff8185919a>] invoke_softirq kernel/softirq.c:453 [inline]
softirqs last disabled at (19021497): [<ffffffff8185919a>] __irq_exit_rcu+0xca/0x1f0 kernel/softirq.c:680
CPU: 0 UID: 0 PID: 5949 Comm: syz.1.10 Not tainted 6.15.0-syzkaller-gdf3bed9ea576 #0 PREEMPT(full) 
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
RIP: 0010:rcu_read_unlock_special+0x87/0x4c0 kernel/rcu/tree_plugin.h:694
Code: f1 f1 f1 00 f2 f2 f2 4a 89 04 2b 66 42 c7 44 2b 09 f3 f3 42 c6 44 2b 0b f3 65 44 8b 35 72 54 f4 10 41 f7 c6 00 00 f0 00 74 49 <48> c7 44 24 40 0e 36 e0 45 4a c7 04 2b 00 00 00 00 66 42 c7 44 2b
RSP: 0018:ffffc90000007560 EFLAGS: 00000206
RAX: e1482f97ef490000 RBX: 1ffff92000000eb4 RCX: e1482f97ef490000
RDX: 0000000000000000 RSI: ffffffff8d9705ba RDI: ffffffff8be26f40
RBP: ffffc90000007658 R08: ffffffff8fa0bcf7 R09: 1ffffffff1f4179e
R10: dffffc0000000000 R11: fffffbfff1f4179f R12: ffffffff8e142400
R13: dffffc0000000000 R14: 0000000000000246 R15: 0000000000000001
FS:  00007f324ad1b6c0(0000) GS:ffff888125c5f000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000555bfbfe8fb0 CR3: 0000000077ce4000 CR4: 00000000003526f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 <IRQ>
 __rcu_read_unlock+0x84/0xe0 kernel/rcu/tree_plugin.h:438
 rcu_read_unlock include/linux/rcupdate.h:873 [inline]
 class_rcu_destructor include/linux/rcupdate.h:1155 [inline]
 unwind_next_frame+0x19ae/0x2390 arch/x86/kernel/unwind_orc.c:680
 arch_stack_walk+0x11c/0x150 arch/x86/kernel/stacktrace.c:25
 stack_trace_save+0x9c/0xe0 kernel/stacktrace.c:122
 kasan_save_stack mm/kasan/common.c:47 [inline]
 kasan_save_track+0x3e/0x80 mm/kasan/common.c:68
 kasan_save_free_info+0x46/0x50 mm/kasan/generic.c:576
 poison_slab_object mm/kasan/common.c:247 [inline]
 __kasan_slab_free+0x62/0x70 mm/kasan/common.c:264
 kasan_slab_free include/linux/kasan.h:233 [inline]
 slab_free_hook mm/slub.c:2380 [inline]
 slab_free mm/slub.c:4642 [inline]
 kfree+0x18e/0x440 mm/slub.c:4841
 ip_dst_metrics_put include/net/ip.h:546 [inline]
 ip6_dst_destroy+0x9b/0x3b0 net/ipv6/route.c:360
 dst_destroy+0xd7/0x350 net/core/dst.c:113
 rcu_do_batch kernel/rcu/tree.c:2576 [inline]
 rcu_core+0xca5/0x1710 kernel/rcu/tree.c:2832
 handle_softirqs+0x283/0x870 kernel/softirq.c:579
 __do_softirq kernel/softirq.c:613 [inline]
 invoke_softirq kernel/softirq.c:453 [inline]
 __irq_exit_rcu+0xca/0x1f0 kernel/softirq.c:680
 irq_exit_rcu+0x9/0x30 kernel/softirq.c:696
 instr_sysvec_irq_work arch/x86/kernel/irq_work.c:17 [inline]
 sysvec_irq_work+0xa3/0xc0 arch/x86/kernel/irq_work.c:17
 </IRQ>
 <TASK>
 asm_sysvec_irq_work+0x1a/0x20 arch/x86/include/asm/idtentry.h:738
RIP: 0010:preempt_schedule_irq+0xb0/0x150 kernel/sched/core.c:7104
Code: 24 20 f6 44 24 21 02 74 0c 90 0f 0b 48 f7 03 08 00 00 00 74 64 bf 01 00 00 00 e8 8b 0a 2b f6 e8 d6 1b 62 f6 fb bf 01 00 00 00 <e8> 1b ab ff ff 48 c7 44 24 40 00 00 00 00 9c 8f 44 24 40 8b 44 24
RSP: 0018:ffffc9000b1f7640 EFLAGS: 00000286
RAX: e1482f97ef490000 RBX: 0000000000000000 RCX: e1482f97ef490000
RDX: 0000000000000000 RSI: ffffffff8d9705ba RDI: 0000000000000001
RBP: ffffc9000b1f76e0 R08: ffffffff8fa0bcf7 R09: 1ffffffff1f4179e
R10: dffffc0000000000 R11: fffffbfff1f4179f R12: 0000000000000000
R13: 0000000000000000 R14: dffffc0000000000 R15: 1ffff9200163eec8
 irqentry_exit+0x6f/0x90 kernel/entry/common.c:307
 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702
RIP: 0010:p4d_alloc_track mm/pgalloc-track.h:10 [inline]
RIP: 0010:vmap_pages_p4d_range mm/vmalloc.c:592 [inline]
RIP: 0010:vmap_small_pages_range_noflush mm/vmalloc.c:619 [inline]
RIP: 0010:__vmap_pages_range_noflush+0x249/0xe10 mm/vmalloc.c:648
Code: ff 4c 39 f3 4c 0f 43 6c 24 10 4c 89 6c 24 70 e9 7b 08 00 00 e8 b8 5f ad ff 48 8b 7c 24 08 49 89 fe 49 c1 ee 03 43 80 3c 3e 00 <74> 0a e8 30 ea 10 00 48 8b 7c 24 08 48 8b 1f e9 6d 08 00 00 e8 8e
RSP: 0018:ffffc9000b1f77a8 EFLAGS: 00000246
RAX: ffffffff8212e3a7 RBX: ffffc97fffffffff RCX: 0000000000080000
RDX: ffffc9000bc99000 RSI: 000000000001eef0 RDI: ffffffff8df36c90
RBP: 0000000000000000 R08: 000000000000000c R09: 1ffffffff1f4179e
R10: dffffc0000000000 R11: fffffbfff1f4179f R12: ffffc900032a0000
R13: ffffc900032a1000 R14: 1ffffffff1be6d92 R15: dffffc0000000000
 vmap_pages_range_noflush mm/vmalloc.c:673 [inline]
 vmap_pages_range mm/vmalloc.c:693 [inline]
 __vmalloc_area_node mm/vmalloc.c:3754 [inline]
 __vmalloc_node_range_noprof+0xeb5/0x12f0 mm/vmalloc.c:3885
 __vmalloc_node_noprof mm/vmalloc.c:3948 [inline]
 __vmalloc_noprof+0xb1/0xf0 mm/vmalloc.c:3962
 bpf_prog_alloc_no_stats+0x4a/0x4e0 kernel/bpf/core.c:104
 bpf_prog_alloc+0x3c/0x1a0 kernel/bpf/core.c:146
 bpf_prog_load+0x735/0x1930 kernel/bpf/syscall.c:2882
 __sys_bpf+0x5f1/0x860 kernel/bpf/syscall.c:5836
 __do_sys_bpf kernel/bpf/syscall.c:5943 [inline]
 __se_sys_bpf kernel/bpf/syscall.c:5941 [inline]
 __x64_sys_bpf+0x7c/0x90 kernel/bpf/syscall.c:5941
 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
 do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f3249f8e929
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f324ad1b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
RAX: ffffffffffffffda RBX: 00007f324a1b5fa0 RCX: 00007f3249f8e929
RDX: 0000000000000094 RSI: 0000200000000380 RDI: 0000000000000005
RBP: 00007f324a010ab1 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 0000000000000000 R14: 00007f324a1b5fa0 R15: 00007ffed7350698
 </TASK>
Sending NMI from CPU 0 to CPUs 1:
NMI backtrace for cpu 1
CPU: 1 UID: 0 PID: 1298 Comm: aoe_tx0 Not tainted 6.15.0-syzkaller-gdf3bed9ea576 #0 PREEMPT(full) 
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
RIP: 0010:__sanitizer_cov_trace_switch+0x74/0x130 kernel/kcov.c:-1
Code: 00 b9 07 00 00 00 48 85 c0 75 13 e9 c2 00 00 00 b9 01 00 00 00 48 85 c0 0f 84 b4 00 00 00 41 57 41 56 41 54 53 48 8b 54 24 20 <65> 4c 8b 04 25 08 10 9c 92 45 31 c9 eb 08 49 ff c1 4c 39 c8 74 77
RSP: 0018:ffffc9000422ea48 EFLAGS: 00000202
RAX: 0000000000000002 RBX: 0000000000000001 RCX: 0000000000000001
RDX: ffffffff8b60b67f RSI: ffffffff8f87c8f0 RDI: 0000000000000001
RBP: ffffffff8b8b7b6b R08: ffffc9000422ea37 R09: 0000000000000000
R10: ffffc9000422ea20 R11: fffff52000845d47 R12: ffffc9000422ebc0
R13: ffffc9000422eb18 R14: 0000000000000801 R15: ffffffff8b8b7b6b
FS:  0000000000000000(0000) GS:ffff888125d5f000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007efeb41b6038 CR3: 0000000031fca000 CR4: 00000000003526f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 <TASK>
 format_decode+0x2f/0xe30 lib/vsprintf.c:2598
 vsnprintf+0x102/0xf00 lib/vsprintf.c:2817
 sprintf+0xd9/0x120 lib/vsprintf.c:3037
 print_time kernel/printk/printk.c:1381 [inline]
 info_print_prefix+0x155/0x310 kernel/printk/printk.c:1407
 record_print_text+0x154/0x430 kernel/printk/printk.c:1456
 printk_get_next_message+0x26d/0x7b0 kernel/printk/printk.c:3024
 console_emit_next_record kernel/printk/printk.c:3092 [inline]
 console_flush_all+0x4ca/0xc40 kernel/printk/printk.c:3226
 __console_flush_and_unlock kernel/printk/printk.c:3285 [inline]
 console_unlock+0xc4/0x270 kernel/printk/printk.c:3325
 vprintk_emit+0x5b7/0x7a0 kernel/printk/printk.c:2450
 dev_vprintk_emit+0x337/0x3f0 drivers/base/core.c:4917
 dev_printk_emit+0xe0/0x130 drivers/base/core.c:4928
 __netdev_printk+0x3d7/0x4d0 net/core/dev.c:12508
 netdev_warn+0x10a/0x160 net/core/dev.c:12561
 ieee802154_subif_start_xmit+0x136/0x190 net/mac802154/tx.c:232
 __netdev_start_xmit include/linux/netdevice.h:5215 [inline]
 netdev_start_xmit include/linux/netdevice.h:5224 [inline]
 xmit_one net/core/dev.c:3830 [inline]
 dev_hard_start_xmit+0x2d4/0x830 net/core/dev.c:3846
 sch_direct_xmit+0x241/0x4b0 net/sched/sch_generic.c:344
 __dev_xmit_skb net/core/dev.c:4102 [inline]
 __dev_queue_xmit+0x17b6/0x3a70 net/core/dev.c:4679
 dev_queue_xmit include/linux/netdevice.h:3355 [inline]
 tx+0x6b/0x190 drivers/block/aoe/aoenet.c:62
 kthread+0x1cd/0x3e0 drivers/block/aoe/aoecmd.c:1237
 kthread+0x711/0x8a0 kernel/kthread.c:464
 ret_from_fork+0x3fc/0x770 arch/x86/kernel/process.c:148
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245
 </TASK>

Crashes (12):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2025/06/04 19:55 bpf df3bed9ea576 fd5e6e61 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-kasan-gce BUG: soft lockup in sys_bpf
2025/06/02 00:03 bpf bb1556ec9464 3d2f584d .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-kasan-gce BUG: soft lockup in sys_bpf
2025/05/08 08:04 bpf b4432656b36e dbf35fa1 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-kasan-gce BUG: soft lockup in sys_bpf
2025/04/20 15:22 bpf 82303a059aab 2a20f901 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-kasan-gce BUG: soft lockup in sys_bpf
2025/05/11 05:18 bpf-next 7220eabff8cb 77908e5f .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce BUG: soft lockup in sys_bpf
2025/04/23 05:48 bpf-next be2fea9c07d4 53a8b9bd .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce BUG: soft lockup in sys_bpf
2025/04/05 10:31 bpf-next c9661394850d 1c4febdb .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce BUG: soft lockup in sys_bpf
2025/04/21 00:33 upstream ac71fabf1567 2a20f901 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root INFO: rcu detected stall in sys_bpf
2025/05/29 04:21 net 57a92d14659d 3d2f584d .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: rcu detected stall in sys_bpf
2025/04/21 13:55 net 750d0ac001e8 2a20f901 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: rcu detected stall in sys_bpf
2025/05/12 05:26 net-next 0b28182c73a3 77908e5f .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce INFO: rcu detected stall in sys_bpf
2025/05/28 21:20 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci d7fa1af5b33e 3d2f584d .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 INFO: rcu detected stall in sys_bpf
* Struck through repros no longer work on HEAD.