syzbot


BUG: soft lockup in sys_bpf (2)

Status: premoderation: reported on 2026/01/12 02:06
Reported-by: syzbot+0c69ed459ad7c8612860@syzkaller.appspotmail.com
First crash: 1d09h, last: 1d09h
Similar bugs (12)
Kernel Title Rank 🛈 Repro Cause bisect Fix bisect Count Last Reported Patched Status
android-54 BUG: soft lockup in sys_bpf 1 1 332d 332d 0/2 auto-obsoleted due to no activity on 2025/05/15 12:21
upstream INFO: rcu detected stall in sys_bpf (5) bpf 1 C unreliable 56 1451d 1544d 0/29 closed as invalid on 2022/02/08 10:34
android-5-15 BUG: soft lockup in sys_bpf origin:upstream 1 C error 108 487d 654d 0/2 upstream: reported C repro on 2024/03/29 12:25
upstream INFO: rcu detected stall in sys_bpf (9) net bpf 1 C error 74 355d 594d 0/29 auto-obsoleted due to no activity on 2025/04/03 05:23
upstream BUG: soft lockup in sys_bpf mm 1 C error 100 14h48m 265d 0/29 upstream: reported C repro on 2025/04/23 05:48
android-5-10 BUG: soft lockup in sys_bpf 1 2 567d 572d 0/2 auto-obsoleted due to no activity on 2024/09/22 11:37
linux-6.6 INFO: rcu detected stall in sys_bpf origin:lts-only 1 C inconclusive 51 4d12h 155d 0/2 upstream: reported C repro on 2025/08/10 11:50
linux-5.15 INFO: rcu detected stall in sys_bpf (2) origin:lts-only 1 syz error 121 4d02h 643d 0/3 upstream: reported syz repro on 2024/04/09 19:57
linux-5.15 INFO: rcu detected stall in sys_bpf 1 2 767d 810d 0/3 auto-obsoleted due to no activity on 2024/03/16 17:33
upstream INFO: rcu detected stall in sys_bpf (8) bpf 1 1 786d 786d 0/29 auto-obsoleted due to no activity on 2024/02/17 03:10
linux-6.1 INFO: rcu detected stall in sys_bpf origin:lts-only 1 syz inconclusive 54 28m 633d 0/3 upstream: reported syz repro on 2024/04/20 10:27
upstream INFO: rcu detected stall in sys_bpf (6) net 1 7 1263d 1413d 0/29 auto-obsoleted due to no activity on 2022/10/28 06:32

Sample crash report:
RBP: 00007fcaf704af91 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007fcaf721d038 R14: 00007fcaf721cfa0 R15: 00007ffe7213d088
watchdog: BUG: soft lockup - CPU#0 stuck for 123s! [syz.8.8403:31284]
Modules linked in:
CPU: 0 PID: 31284 Comm: syz.8.8403 Tainted: G        W         syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025
RIP: 0010:check_kcov_mode kernel/kcov.c:165 [inline]
RIP: 0010:__sanitizer_cov_trace_pc+0x30/0x60 kernel/kcov.c:197
Code: 45 08 65 48 8b 0d f0 c8 9e 7e 65 8b 15 f5 c8 9e 7e f7 c2 00 01 ff 00 74 11 f7 c2 00 01 00 00 74 35 83 b9 dc 0a 00 00 00 74 2c <8b> 91 b8 0a 00 00 83 fa 02 75 21 48 8b 91 c0 0a 00 00 48 8b 32 48
RSP: 0018:ffffc9000226faa0 EFLAGS: 00000246
RAX: ffffffff818161e6 RBX: ffff88811a4a3010 RCX: ffff88811233bb40
RDX: 0000000000000001 RSI: 000000000007ffff RDI: 0000000000080000
RBP: ffffc9000226faa0 R08: dffffc0000000000 R09: fffffbfff0d46c25
R10: fffffbfff0d46c25 R11: 1ffffffff0d46c24 R12: ffff88811a4a33e8
R13: ffff88811a4a3000 R14: ffff888128e86810 R15: ffffffff86406998
FS:  00007fcaf5a2e6c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000000 CR3: 000000012451f000 CR4: 00000000003506b0
DR0: 0000000000000000 DR1: 0000200000000300 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600
Call Trace:
 pmu_filter_match kernel/events/core.c:2325 [inline]
 event_filter_match kernel/events/core.c:2337 [inline]
 perf_iterate_sb_cpu kernel/events/core.c:7526 [inline]
 perf_iterate_sb+0x5f6/0xd50 kernel/events/core.c:7558
 perf_event_bpf_event+0x41e/0x530 kernel/events/core.c:8884
 bpf_prog_load+0x108d/0x1420 kernel/bpf/syscall.c:2261
 __do_sys_bpf kernel/bpf/syscall.c:4435 [inline]
 __se_sys_bpf+0x442/0x680 kernel/bpf/syscall.c:4391
 __x64_sys_bpf+0x7b/0x90 kernel/bpf/syscall.c:4391
 do_syscall_64+0x31/0x40 arch/x86/entry/common.c:46
 entry_SYSCALL_64_after_hwframe+0x61/0xcb
RIP: 0033:0x7fcaf6fc6749
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007fcaf5a2e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
RAX: ffffffffffffffda RBX: 00007fcaf721cfa0 RCX: 00007fcaf6fc6749
RDX: 0000000000000094 RSI: 0000200000000880 RDI: 0000000000000005
RBP: 00007fcaf704af91 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007fcaf721d038 R14: 00007fcaf721cfa0 R15: 00007ffe7213d088
Sending NMI from CPU 0 to CPUs 1:
NMI backtrace for cpu 1
CPU: 1 PID: 49 Comm: kworker/u4:2 Tainted: G        W         syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025
Workqueue: events_unbound toggle_allocation_gate
RIP: 0010:__sanitizer_cov_trace_pc+0x4/0x60 kernel/kcov.c:193
Code: 0b 0f 1f 44 00 00 55 48 89 e5 53 48 89 fb e8 13 00 00 00 48 8b 3d 0c b7 3f 05 48 89 de e8 54 4f 39 00 5b 5d c3 00 55 48 89 e5 <48> 8b 45 08 65 48 8b 0d f0 c8 9e 7e 65 8b 15 f5 c8 9e 7e f7 c2 00
RSP: 0018:ffffc900009e7710 EFLAGS: 00000202
RAX: ffffffff81593898 RBX: 0000000000000000 RCX: ffff888101ff2780
RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000
RBP: ffffc900009e7710 R08: dffffc0000000000 R09: ffffed103ee0aec9
R10: ffffed103ee0aec9 R11: 1ffff1103ee0aec8 R12: dffffc0000000000
R13: 0000000000000001 R14: 0000000000000001 R15: 1ffff9200013cee8
FS:  0000000000000000(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f03e6b63d60 CR3: 000000000620f000 CR4: 00000000003506a0
DR0: 0000000000000000 DR1: 0000200000000300 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600
Call Trace:
 csd_lock_wait kernel/smp.c:229 [inline]
 smp_call_function_single+0x208/0x470 kernel/smp.c:517
 smp_call_function_many_cond+0x8f2/0x9e0 kernel/smp.c:653
 smp_call_function_many kernel/smp.c:716 [inline]
 smp_call_function kernel/smp.c:738 [inline]
 on_each_cpu+0xab/0x170 kernel/smp.c:837
 text_poke_sync arch/x86/kernel/alternative.c:1568 [inline]
 text_poke_bp_batch+0x1c4/0x580 arch/x86/kernel/alternative.c:1768
 text_poke_flush arch/x86/kernel/alternative.c:1959 [inline]
 text_poke_finish+0x1a/0x30 arch/x86/kernel/alternative.c:1966
 arch_jump_label_transform_apply+0x15/0x30 arch/x86/kernel/jump_label.c:126
 __jump_label_update+0x37c/0x3a0 kernel/jump_label.c:459
 jump_label_update+0x34c/0x3e0 kernel/jump_label.c:825
 static_key_enable_cpuslocked+0x126/0x240 kernel/jump_label.c:177
 static_key_enable+0x1a/0x30 kernel/jump_label.c:190
 toggle_allocation_gate+0xb4/0x400 mm/kfence/core.c:624
 process_one_work+0x6e1/0xba0 kernel/workqueue.c:2301
 worker_thread+0xa6a/0x13b0 kernel/workqueue.c:2447
 kthread+0x346/0x3d0 kernel/kthread.c:313
 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:298

Crashes (1):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2026/01/12 02:05 android13-5.10-lts e253c52bbdfc d6526ea3 .config console log report info [disk image] [vmlinux] [kernel image] ci2-android-5-10-perf BUG: soft lockup in sys_bpf
* Struck through repros no longer work on HEAD.