[moderation] [kernel?] BUG: soft lockup in perf_event_open (2)

1 view
Skip to first unread message

syzbot

unread,
Dec 8, 2025, 8:40:30 PM (12 hours ago) Dec 8
to syzkaller-upst...@googlegroups.com
Hello,

syzbot found the following issue on:

HEAD commit: 835a50753579 selftests/bpf: Add -fms-extensions to bpf bui..
git tree: bpf
console output: https://syzkaller.appspot.com/x/log.txt?x=118cb192580000
kernel config: https://syzkaller.appspot.com/x/.config?x=9e5198eaf003f1d1
dashboard link: https://syzkaller.appspot.com/bug?extid=fdcfa358fecfb04c612a
compiler: Debian clang version 20.1.8 (++20250708063551+0c9f909b7976-1~exp1~20250708183702.136), Debian LLD 20.1.8
CC: [linux-...@vger.kernel.org lu...@kernel.org net...@vger.kernel.org pet...@infradead.org tg...@linutronix.de]

Unfortunately, I don't have any reproducer for this issue yet.

Downloadable assets:
disk image: https://storage.googleapis.com/syzbot-assets/df77f71a9e7a/disk-835a5075.raw.xz
vmlinux: https://storage.googleapis.com/syzbot-assets/c98ca38be16a/vmlinux-835a5075.xz
kernel image: https://storage.googleapis.com/syzbot-assets/ac3cdc1f57ac/bzImage-835a5075.xz

IMPORTANT: if you fix the issue, please add the following tag to the commit:
Reported-by: syzbot+fdcfa3...@syzkaller.appspotmail.com

watchdog: BUG: soft lockup - CPU#0 stuck for 144s! [syz.1.7212:29686]
Modules linked in:
irq event stamp: 13137181
hardirqs last enabled at (13137180): [<ffffffff8b494f9d>] irqentry_exit+0x5dd/0x660 kernel/entry/common.c:219
hardirqs last disabled at (13137181): [<ffffffff8b49380e>] sysvec_apic_timer_interrupt+0xe/0xc0 arch/x86/kernel/apic/apic.c:1056
softirqs last enabled at (12704392): [<ffffffff8185372a>] __do_softirq kernel/softirq.c:656 [inline]
softirqs last enabled at (12704392): [<ffffffff8185372a>] invoke_softirq kernel/softirq.c:496 [inline]
softirqs last enabled at (12704392): [<ffffffff8185372a>] __irq_exit_rcu+0xca/0x1f0 kernel/softirq.c:723
softirqs last disabled at (12704395): [<ffffffff8185372a>] __do_softirq kernel/softirq.c:656 [inline]
softirqs last disabled at (12704395): [<ffffffff8185372a>] invoke_softirq kernel/softirq.c:496 [inline]
softirqs last disabled at (12704395): [<ffffffff8185372a>] __irq_exit_rcu+0xca/0x1f0 kernel/softirq.c:723
CPU: 0 UID: 0 PID: 29686 Comm: syz.1.7212 Not tainted syzkaller #0 PREEMPT(full)
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025
RIP: 0010:lock_acquire+0x261/0x340 kernel/locking/lockdep.c:-1
Code: ff ff e9 26 ff ff ff 48 8d 3d eb 71 e5 0d 67 48 0f b9 3a 83 3d 9f 5e e2 0d 00 0f 85 1d fe ff ff e9 08 ff ff ff e8 7f 14 ab 09 <f3> 0f 1e fa 4c 89 6c 24 18 4c 89 64 24 20 4c 89 7c 24 28 4c 89 74
RSP: 0018:ffffc900000075f8 EFLAGS: 00000282
RAX: fb3a72c7dcff8d00 RBX: 0000000000000000 RCX: 0000000000000002
RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffffff8df41cc0
RBP: ffffffff8173ef25 R08: 0000000000000000 R09: 0000000000000000
R10: dffffc0000000000 R11: ffffffff81ad4ad0 R12: 0000000000000002
R13: ffffffff8df41cc0 R14: 0000000000000000 R15: 0000000000000000
FS: 00007f462dff66c0(0000) GS:ffff8881260b1000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000000 CR3: 00000000728e8000 CR4: 00000000003526f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600
Call Trace:
<IRQ>
rcu_lock_acquire include/linux/rcupdate.h:331 [inline]
rcu_read_lock include/linux/rcupdate.h:867 [inline]
class_rcu_constructor include/linux/rcupdate.h:1195 [inline]
unwind_next_frame+0xc2/0x2390 arch/x86/kernel/unwind_orc.c:479
arch_stack_walk+0x11c/0x150 arch/x86/kernel/stacktrace.c:25
stack_trace_save+0x9c/0xe0 kernel/stacktrace.c:122
kasan_save_stack mm/kasan/common.c:56 [inline]
kasan_save_track+0x3e/0x80 mm/kasan/common.c:77
__kasan_save_free_info+0x46/0x50 mm/kasan/generic.c:587
kasan_save_free_info mm/kasan/kasan.h:406 [inline]
poison_slab_object mm/kasan/common.c:252 [inline]
__kasan_slab_free+0x5c/0x80 mm/kasan/common.c:284
kasan_slab_free include/linux/kasan.h:234 [inline]
slab_free_hook mm/slub.c:2540 [inline]
slab_free mm/slub.c:6663 [inline]
kfree+0x1c0/0x660 mm/slub.c:6871
slab_free_after_rcu_debug+0x5d/0x260 mm/slub.c:6709
rcu_do_batch kernel/rcu/tree.c:2605 [inline]
rcu_core+0xd70/0x1870 kernel/rcu/tree.c:2857
handle_softirqs+0x27d/0x850 kernel/softirq.c:622
__do_softirq kernel/softirq.c:656 [inline]
invoke_softirq kernel/softirq.c:496 [inline]
__irq_exit_rcu+0xca/0x1f0 kernel/softirq.c:723
irq_exit_rcu+0x9/0x30 kernel/softirq.c:739
instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1056 [inline]
sysvec_apic_timer_interrupt+0xa6/0xc0 arch/x86/kernel/apic/apic.c:1056
</IRQ>
<TASK>
asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:697
RIP: 0010:preempt_schedule_irq+0xb0/0x150 kernel/sched/core.c:7190
Code: 24 20 f6 44 24 21 02 74 0c 90 0f 0b 48 f7 03 10 00 00 00 74 64 bf 01 00 00 00 e8 cb 4d 46 f6 e8 b6 93 7e f6 fb bf 01 00 00 00 <e8> 1b a8 ff ff 48 c7 44 24 40 00 00 00 00 9c 8f 44 24 40 8b 44 24
RSP: 0018:ffffc90003dcf3a0 EFLAGS: 00000286
RAX: fb3a72c7dcff8d00 RBX: 0000000000000000 RCX: fb3a72c7dcff8d00
RDX: 0000000000000006 RSI: ffffffff8d76bd39 RDI: 0000000000000001
RBP: ffffc90003dcf440 R08: ffffffff8f805a77 R09: 1ffffffff1f00b4e
R10: dffffc0000000000 R11: fffffbfff1f00b4f R12: 0000000000000000
R13: 0000000000000000 R14: dffffc0000000000 R15: 1ffff920007b9e74
irqentry_exit+0x5d8/0x660 kernel/entry/common.c:216
asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:697
RIP: 0010:native_save_fl arch/x86/include/asm/irqflags.h:26 [inline]
RIP: 0010:arch_local_save_flags arch/x86/include/asm/irqflags.h:109 [inline]
RIP: 0010:arch_local_irq_save arch/x86/include/asm/irqflags.h:127 [inline]
RIP: 0010:rcu_read_unlock_special+0xdd/0x520 kernel/rcu/tree_plugin.h:736
Code: 00 00 00 0f 85 48 03 00 00 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d e9 51 29 a4 09 cc 49 89 ff 48 c7 44 24 60 00 00 00 00 9c <8f> 44 24 60 4c 8b 64 24 60 fa 41 f7 c4 00 02 00 00 74 0f e8 2b 08
RSP: 0018:ffffc90003dcf558 EFLAGS: 00000246
RAX: f2f2f200f1f1f1f1 RBX: 1ffff920007b9eb0 RCX: fb3a72c7dcff8d00
RDX: 0000000000000007 RSI: ffffffff8d952009 RDI: ffff888042825b80
RBP: ffffc90003dcf640 R08: ffff88801a064063 R09: 1ffff1100340c80c
R10: dffffc0000000000 R11: ffffed100340c80d R12: 1ffff11008504c00
R13: dffffc0000000000 R14: 0000000080000000 R15: ffff888042825b80
__rcu_read_unlock+0x84/0xe0 kernel/rcu/tree_plugin.h:438
rcu_read_unlock include/linux/rcupdate.h:899 [inline]
pte_unmap include/linux/pgtable.h:136 [inline]
__text_poke+0x88a/0x9f0 arch/x86/kernel/alternative.c:2586
text_poke arch/x86/kernel/alternative.c:2610 [inline]
smp_text_poke_batch_finish+0x90a/0x1130 arch/x86/kernel/alternative.c:2943
arch_jump_label_transform_apply+0x1c/0x30 arch/x86/kernel/jump_label.c:146
static_key_enable_cpuslocked+0x128/0x240 kernel/jump_label.c:210
static_key_enable+0x1a/0x20 kernel/jump_label.c:223
tracepoint_add_func+0x994/0xa10 kernel/tracepoint.c:315
tracepoint_probe_register_prio kernel/tracepoint.c:464 [inline]
tracepoint_probe_register+0x5d/0x90 kernel/tracepoint.c:484
perf_trace_event_reg kernel/trace/trace_event_perf.c:129 [inline]
perf_trace_event_init+0x4e1/0x9d0 kernel/trace/trace_event_perf.c:202
perf_trace_init+0x23d/0x2d0 kernel/trace/trace_event_perf.c:226
perf_tp_event_init+0x8d/0x120 kernel/events/core.c:10943
perf_try_init_event+0x17f/0x870 kernel/events/core.c:12686
perf_init_event kernel/events/core.c:12784 [inline]
perf_event_alloc+0x1430/0x2d50 kernel/events/core.c:13059
__do_sys_perf_event_open kernel/events/core.c:13577 [inline]
__se_sys_perf_event_open+0x756/0x1d90 kernel/events/core.c:13458
do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
do_syscall_64+0xfa/0xf80 arch/x86/entry/syscall_64.c:94
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f462fd8f749
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f462dff6038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a
RAX: ffffffffffffffda RBX: 00007f462ffe5fa0 RCX: 00007f462fd8f749
RDX: 0000000000000001 RSI: 0000000000000000 RDI: 0000200000000040
RBP: 00007f462fe13f91 R08: 0000000000000000 R09: 0000000000000000
R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000000
R13: 00007f462ffe6038 R14: 00007f462ffe5fa0 R15: 00007ffd84aa8108
</TASK>
Sending NMI from CPU 0 to CPUs 1:
NMI backtrace for cpu 1
CPU: 1 UID: 0 PID: 29701 Comm: kworker/u9:1 Not tainted syzkaller #0 PREEMPT(full)
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025
Workqueue: hci0 hci_cmd_timeout
RIP: 0010:memcpy_orig+0x8f/0x130 arch/x86/lib/memcpy_64.S:121
Code: 8d 76 e0 4c 89 47 f8 4c 89 4f f0 4c 89 57 e8 4c 89 5f e0 48 8d 7f e0 73 d2 83 c2 20 48 29 d6 48 29 d7 83 fa 10 72 34 4c 8b 06 <4c> 8b 4e 08 4c 8b 54 16 f0 4c 8b 5c 16 f8 4c 89 07 4c 89 4f 08 4c
RSP: 0018:ffffc9000407f118 EFLAGS: 00000206
RAX: ffffffff998639e0 RBX: 000000000000001c RCX: ffffffff81a25ba9
RDX: 000000000000001c RSI: ffffffff9985ee08 RDI: ffffffff998639e0
RBP: ffffc9000407f2a0 R08: 6e65717269203f20 R09: 1ffffffff330c73f
R10: dffffc0000000000 R11: fffffbfff330c740 R12: dffffc0000000000
R13: 0000000100000aa3 R14: ffffffff99863900 R15: ffffc9000407f2b0
FS: 0000000000000000(0000) GS:ffff8881261b1000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fc2f5000218 CR3: 00000000591d0000 CR4: 00000000003526f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000200000000300
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600
Call Trace:
<TASK>
copy_data kernel/printk/printk_ringbuffer.c:1908 [inline]
prb_read kernel/printk/printk_ringbuffer.c:1993 [inline]
_prb_read_valid+0x7c9/0xa90 kernel/printk/printk_ringbuffer.c:2170
prb_read_valid+0x3c/0x60 kernel/printk/printk_ringbuffer.c:2242
printk_get_next_message+0x15c/0x7b0 kernel/printk/printk.c:2999
console_emit_next_record kernel/printk/printk.c:3083 [inline]
console_flush_one_record kernel/printk/printk.c:3215 [inline]
console_flush_all+0x514/0xb60 kernel/printk/printk.c:3289
__console_flush_and_unlock kernel/printk/printk.c:3319 [inline]
console_unlock+0xbb/0x190 kernel/printk/printk.c:3359
vprintk_emit+0x4f8/0x5f0 kernel/printk/printk.c:2426
_printk+0xcf/0x120 kernel/printk/printk.c:2451
bt_err+0x10b/0x160 net/bluetooth/lib.c:296
hci_cmd_timeout+0xd8/0x1e0 net/bluetooth/hci_core.c:1469
process_one_work kernel/workqueue.c:3257 [inline]
process_scheduled_works+0xad1/0x1770 kernel/workqueue.c:3340
worker_thread+0x8a0/0xda0 kernel/workqueue.c:3421
kthread+0x711/0x8a0 kernel/kthread.c:463
ret_from_fork+0x599/0xb30 arch/x86/kernel/process.c:158
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:246
</TASK>


---
This report is generated by a bot. It may contain errors.
See https://goo.gl/tpsmEJ for more information about syzbot.
syzbot engineers can be reached at syzk...@googlegroups.com.

syzbot will keep track of this issue. See:
https://goo.gl/tpsmEJ#status for how to communicate with syzbot.

If the report is already addressed, let syzbot know by replying with:
#syz fix: exact-commit-title

If you want to overwrite report's subsystems, reply with:
#syz set subsystems: new-subsystem
(See the list of subsystem names on the web dashboard)

If the report is a duplicate of another one, reply with:
#syz dup: exact-subject-of-another-report

If you want to undo deduplication, reply with:
#syz undup
Reply all
Reply to author
Forward
0 new messages