| ID | Workflow | Result | Correct | Bug | Created | Started | Finished | Revision | Error |
|---|---|---|---|---|---|---|---|---|---|
| fef7ec2e-bb9b-4316-9eb7-e42f3326aa10 | repro | ❓ | BUG: soft lockup in perf_event_open (2) | 2026/03/07 13:46 | 2026/03/07 13:46 | 2026/03/07 13:56 | 31e9c887f7dc24e04b3ca70d0d54fc34141844b0 |
syzbot |
sign-in | mailing list | source | docs |
| ID | Workflow | Result | Correct | Bug | Created | Started | Finished | Revision | Error |
|---|---|---|---|---|---|---|---|---|---|
| fef7ec2e-bb9b-4316-9eb7-e42f3326aa10 | repro | ❓ | BUG: soft lockup in perf_event_open (2) | 2026/03/07 13:46 | 2026/03/07 13:46 | 2026/03/07 13:56 | 31e9c887f7dc24e04b3ca70d0d54fc34141844b0 |
| Title | Replies (including bot) | Last reply |
|---|---|---|
| [syzbot] [net?] [virt?] BUG: soft lockup in perf_event_open (2) | 0 (1) | 2026/03/08 04:57 |
watchdog: BUG: soft lockup - CPU#0 stuck for 144s! [syz.8.3365:19024] Modules linked in: irq event stamp: 14603813 hardirqs last enabled at (14603812): [<ffffffff8badef2e>] irqentry_exit+0x59e/0x620 kernel/entry/common.c:242 hardirqs last disabled at (14603813): [<ffffffff8badd93e>] sysvec_apic_timer_interrupt+0xe/0xc0 arch/x86/kernel/apic/apic.c:1056 softirqs last enabled at (14177998): [<ffffffff8188026f>] __do_softirq kernel/softirq.c:656 [inline] softirqs last enabled at (14177998): [<ffffffff8188026f>] invoke_softirq kernel/softirq.c:496 [inline] softirqs last enabled at (14177998): [<ffffffff8188026f>] __irq_exit_rcu+0x5f/0x150 kernel/softirq.c:723 softirqs last disabled at (14178001): [<ffffffff8188026f>] __do_softirq kernel/softirq.c:656 [inline] softirqs last disabled at (14178001): [<ffffffff8188026f>] invoke_softirq kernel/softirq.c:496 [inline] softirqs last disabled at (14178001): [<ffffffff8188026f>] __irq_exit_rcu+0x5f/0x150 kernel/softirq.c:723 CPU: 0 UID: 0 PID: 19024 Comm: syz.8.3365 Not tainted syzkaller #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 RIP: 0010:perf_swevent_event+0x734/0x7e0 kernel/events/core.c:10907 Code: 4d 85 e4 75 16 e8 4c 80 cc ff eb 15 e8 45 80 cc ff e8 20 c5 b4 09 4d 85 e4 74 ea e8 36 80 cc ff fb 48 c7 44 24 40 0e 36 e0 45 <4a> c7 04 2b 00 00 00 00 65 48 8b 05 8c b2 22 11 48 3b 84 24 80 00 RSP: 0018:ffffc90000006d60 EFLAGS: 00000246 RAX: ffffffff81f91d7a RBX: 1ffff92000000db4 RCX: ffff88804ab85b80 RDX: 0000000000000100 RSI: 0000000000000000 RDI: 0000000000000000 RBP: ffffc90000006e30 R08: ffffffff90118bb7 R09: 1ffffffff2023176 R10: dffffc0000000000 R11: fffffbfff2023177 R12: 0000000000000200 R13: dffffc0000000000 R14: 0000000000000000 R15: ffff888088568000 FS: 00007f91182806c0(0000) GS:ffff888125463000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f606b614e9c CR3: 0000000092c0a000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 Call Trace: <IRQ> perf_tp_event+0x608/0x2a90 kernel/events/core.c:11418 perf_trace_run_bpf_submit+0xee/0x170 kernel/events/core.c:11337 do_perf_trace_lock include/trace/events/lock.h:50 [inline] perf_trace_lock+0x32d/0x410 include/trace/events/lock.h:50 __do_trace_lock_release include/trace/events/lock.h:69 [inline] trace_lock_release include/trace/events/lock.h:69 [inline] lock_release+0x392/0x3d0 kernel/locking/lockdep.c:5879 rcu_lock_release include/linux/rcupdate.h:322 [inline] rcu_read_unlock include/linux/rcupdate.h:881 [inline] class_rcu_destructor include/linux/rcupdate.h:1193 [inline] unwind_next_frame+0x1aaa/0x23c0 arch/x86/kernel/unwind_orc.c:695 arch_stack_walk+0x11b/0x150 arch/x86/kernel/stacktrace.c:25 stack_trace_save+0xa9/0x100 kernel/stacktrace.c:122 kasan_save_stack mm/kasan/common.c:57 [inline] kasan_save_track+0x3e/0x80 mm/kasan/common.c:78 unpoison_slab_object mm/kasan/common.c:340 [inline] __kasan_slab_alloc+0x6c/0x80 mm/kasan/common.c:366 kasan_slab_alloc include/linux/kasan.h:253 [inline] slab_post_alloc_hook mm/slub.c:4542 [inline] slab_alloc_node mm/slub.c:4869 [inline] kmem_cache_alloc_noprof+0x2bc/0x650 mm/slub.c:4876 __build_skb+0x62/0x440 net/core/skbuff.c:492 build_skb+0x23/0x250 net/core/skbuff.c:508 virtnet_build_skb drivers/net/virtio_net.c:834 [inline] page_to_skb+0x161/0x870 drivers/net/virtio_net.c:876 receive_mergeable drivers/net/virtio_net.c:2497 [inline] receive_buf+0x546/0x1900 drivers/net/virtio_net.c:2643 virtnet_receive_packets drivers/net/virtio_net.c:2970 [inline] virtnet_receive drivers/net/virtio_net.c:2994 [inline] virtnet_poll+0x219e/0x2f90 drivers/net/virtio_net.c:3083 __napi_poll+0xae/0x340 net/core/dev.c:7692 napi_poll net/core/dev.c:7755 [inline] net_rx_action+0x627/0xf70 net/core/dev.c:7912 handle_softirqs+0x22a/0x870 kernel/softirq.c:622 __do_softirq kernel/softirq.c:656 [inline] invoke_softirq kernel/softirq.c:496 [inline] __irq_exit_rcu+0x5f/0x150 kernel/softirq.c:723 irq_exit_rcu+0x9/0x30 kernel/softirq.c:739 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1056 [inline] sysvec_apic_timer_interrupt+0xa6/0xc0 arch/x86/kernel/apic/apic.c:1056 </IRQ> <TASK> asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:697 RIP: 0010:__sanitizer_cov_trace_pc+0x5c/0x70 kernel/kcov.c:235 Code: 70 16 00 00 83 fa 02 75 21 48 8b 91 78 16 00 00 48 8b 32 48 8d 7e 01 8b 89 74 16 00 00 48 39 cf 73 08 48 89 3a 48 89 44 f2 08 <e9> 8f 2a eb 09 cc 66 66 66 66 66 2e 0f 1f 84 00 00 00 00 00 90 90 RSP: 0018:ffffc9001bf47838 EFLAGS: 00000283 RAX: ffffffff81f8ec7d RBX: ffffe8ffffc2a968 RCX: 0000000000080000 RDX: ffffc9000d411000 RSI: 0000000000005ad9 RDI: 0000000000005ada RBP: ffffc9001bf47b08 R08: ffff8880b8633350 R09: ffffe8ffffc2a968 R10: 6470755f63657865 R11: 6b636f6c5f657461 R12: 1ffff920037e8f18 R13: dffffc0000000000 R14: 00000000000000ec R15: 0000000000000034 perf_tp_event+0xcd/0x2a90 kernel/events/core.c:11388 perf_trace_run_bpf_submit+0xee/0x170 kernel/events/core.c:11337 do_perf_trace_lock include/trace/events/lock.h:50 [inline] perf_trace_lock+0x32d/0x410 include/trace/events/lock.h:50 __do_trace_lock_release include/trace/events/lock.h:69 [inline] trace_lock_release include/trace/events/lock.h:69 [inline] lock_release+0x392/0x3d0 kernel/locking/lockdep.c:5879 up_read+0x16/0x20 kernel/locking/rwsem.c:1632 __do_sys_perf_event_open kernel/events/core.c:14172 [inline] __se_sys_perf_event_open+0x1992/0x1d60 kernel/events/core.c:13808 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0x14d/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f911739c799 Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f9118280028 EFLAGS: 00000246 ORIG_RAX: 000000000000012a RAX: ffffffffffffffda RBX: 00007f9117615fa0 RCX: 00007f911739c799 RDX: ffffffffffffffff RSI: 0000000000000000 RDI: 0000200000000640 RBP: 00007f9117432c99 R08: 0000000000000002 R09: 0000000000000000 R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000000 R13: 00007f9117616038 R14: 00007f9117615fa0 R15: 00007ffed8d04d98 </TASK> Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 1300 Comm: aoe_tx0 Not tainted syzkaller #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 RIP: 0010:select_task_rq_fair+0x401/0x4320 kernel/sched/fair.c:8616 Code: c1 ed 03 43 80 7c 35 00 00 74 08 4c 89 e7 e8 c6 c6 97 00 48 c7 c3 10 89 1d 93 49 03 1c 24 48 89 d8 48 c1 e8 03 42 80 3c 30 00 <74> 08 48 89 df e8 a5 c6 97 00 89 6c 24 40 48 8b 1b e8 c9 c6 15 0a RSP: 0018:ffffc90000a08bd8 EFLAGS: 00000046 RAX: 1ffff110170e7722 RBX: ffff8880b873b910 RCX: 0000000080010206 RDX: 00000000ad839568 RSI: ffffffff8c27b360 RDI: ffffffff8c27b320 RBP: 0000000000000008 R08: ffffffff8198206e R09: ffffffff8e75e3e0 R10: dffffc0000000000 R11: ffffffff81981d20 R12: ffffffff8e1ad798 R13: 1ffffffff1c35af3 R14: dffffc0000000000 R15: 0000000000000001 FS: 0000000000000000(0000) GS:ffff888125563000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000055c0d4b9aa38 CR3: 000000007aaf6000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 Call Trace: <IRQ> select_task_rq kernel/sched/core.c:3521 [inline] try_to_wake_up+0x4db/0x1390 kernel/sched/core.c:4230 hrtimer_wakeup+0x4e/0x60 kernel/time/hrtimer.c:2021 __run_hrtimer kernel/time/hrtimer.c:1785 [inline] __hrtimer_run_queues+0x53a/0xcc0 kernel/time/hrtimer.c:1849 hrtimer_interrupt+0x42b/0x1010 kernel/time/hrtimer.c:1911 local_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1045 [inline] __sysvec_apic_timer_interrupt+0x102/0x460 arch/x86/kernel/apic/apic.c:1062 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1056 [inline] sysvec_apic_timer_interrupt+0xa1/0xc0 arch/x86/kernel/apic/apic.c:1056 </IRQ> <TASK> asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:697 RIP: 0010:console_trylock_spinning kernel/printk/printk.c:2039 [inline] RIP: 0010:vprintk_emit+0x45d/0x560 kernel/printk/printk.c:2478 Code: 0f 84 44 ff ff ff e8 42 2d 21 00 fb eb 44 e8 3a 2d 21 00 e8 15 72 09 0a 4d 85 f6 74 94 e8 2b 2d 21 00 fb 48 c7 c7 20 08 75 8e <31> f6 ba 01 00 00 00 31 c9 41 b8 01 00 00 00 45 31 c9 53 e8 cb 16 RSP: 0018:ffffc9000540f3a0 EFLAGS: 00000293 RAX: ffffffff81a47085 RBX: ffffffff81a46eff RCX: ffff8880296a9e80 RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffffff8e750820 RBP: ffffc9000540f450 R08: ffffffff90118bb7 R09: 1ffffffff2023176 R10: dffffc0000000000 R11: fffffbfff2023177 R12: 0000000000000000 R13: 000000000000002d R14: 0000000000000200 R15: 1ffff92000a81e78 dev_vprintk_emit+0x355/0x420 drivers/base/core.c:4913 dev_printk_emit+0xee/0x140 drivers/base/core.c:4924 __netdev_printk+0x3e1/0x480 net/core/dev.c:12934 netdev_warn+0x11e/0x180 net/core/dev.c:12987 ieee802154_subif_start_xmit+0x136/0x190 net/mac802154/tx.c:232 __netdev_start_xmit include/linux/netdevice.h:5292 [inline] netdev_start_xmit include/linux/netdevice.h:5301 [inline] xmit_one net/core/dev.c:3871 [inline] dev_hard_start_xmit+0x2d8/0x870 net/core/dev.c:3887 sch_direct_xmit+0x251/0x4c0 net/sched/sch_generic.c:347 __dev_xmit_skb net/core/dev.c:4186 [inline] __dev_queue_xmit+0x1550/0x3890 net/core/dev.c:4802 dev_queue_xmit include/linux/netdevice.h:3384 [inline] tx+0x6b/0x190 drivers/block/aoe/aoenet.c:62 kthread+0x1e0/0x3f0 drivers/block/aoe/aoecmd.c:1241 kthread+0x388/0x470 kernel/kthread.c:436 ret_from_fork+0x51e/0xb90 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 </TASK>
| Time | Kernel | Commit | Syzkaller | Config | Log | Report | Syz repro | C repro | VM info | Assets (help?) | Manager | Title |
|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 2026/03/14 03:43 | bpf | e06e6b800123 | ee8d34d6 | .config | console log | report | info | [disk image] [vmlinux] [kernel image] | ci-upstream-bpf-kasan-gce | BUG: soft lockup in perf_event_open | ||
| 2026/01/27 15:15 | bpf | 63804fed149a | 9a514c2f | .config | console log | report | info | [disk image] [vmlinux] [kernel image] | ci-upstream-bpf-kasan-gce | BUG: soft lockup in perf_event_open | ||
| 2026/01/06 10:45 | bpf | 22cc16c04b78 | d6526ea3 | .config | console log | report | info | [disk image] [vmlinux] [kernel image] | ci-upstream-bpf-kasan-gce | BUG: soft lockup in perf_event_open | ||
| 2025/12/05 01:35 | bpf | 835a50753579 | d6526ea3 | .config | console log | report | info | [disk image] [vmlinux] [kernel image] | ci-upstream-bpf-kasan-gce | BUG: soft lockup in perf_event_open | ||
| 2026/03/14 04:47 | bpf-next | bb41fcef5c79 | ee8d34d6 | .config | console log | report | info | [disk image] [vmlinux] [kernel image] | ci-upstream-bpf-next-kasan-gce | BUG: soft lockup in perf_event_open | ||
| 2026/03/11 21:40 | bpf-next | e95e85b8914b | 2d88ab01 | .config | console log | report | info | [disk image] [vmlinux] [kernel image] | ci-upstream-bpf-next-kasan-gce | BUG: soft lockup in perf_event_open | ||
| 2026/03/08 04:56 | bpf-next | 6dd780f97381 | 5cb44a80 | .config | console log | report | info | [disk image] [vmlinux] [kernel image] | ci-upstream-bpf-next-kasan-gce | BUG: soft lockup in perf_event_open | ||
| 2026/03/04 06:17 | bpf-next | 44dd647b6689 | 4180d919 | .config | console log | report | info | [disk image] [vmlinux] [kernel image] | ci-upstream-bpf-next-kasan-gce | BUG: soft lockup in perf_event_open |