syzbot


BUG: soft lockup in perf_event_open (2)

Status: moderation: reported on 2025/12/09 01:40
Subsystems: net virt
[Documentation on labels]
Reported-by: syzbot+fdcfa358fecfb04c612a@syzkaller.appspotmail.com
First crash: 54d, last: 1d03h
Similar bugs (12)
Kernel Title Rank 🛈 Repro Cause bisect Fix bisect Count Last Reported Patched Status
upstream BUG: soft lockup in perf_event_open trace bpf 1 2 217d 213d 0/29 auto-obsoleted due to no activity on 2025/09/23 09:29
linux-5.15 INFO: rcu detected stall in sys_perf_event_open (2) origin:lts-only 1 C error 59 2d09h 750d 0/3 upstream: reported C repro on 2024/01/09 18:19
linux-6.6 INFO: rcu detected stall in perf_event_open (2) origin:lts-only 1 C inconclusive 29 2d03h 79d 0/2 upstream: reported C repro on 2025/11/10 01:14
upstream INFO: rcu detected stall in perf_event_open (2) perf 1 1 1583d 1583d 0/29 auto-closed as invalid on 2021/11/26 20:49
upstream INFO: rcu detected stall in perf_event_open kernel 1 1 1680d 1680d 0/29 auto-closed as invalid on 2021/09/21 01:14
linux-6.1 INFO: rcu detected stall in sys_perf_event_open (2) origin:lts-only 1 C done 33 13h19m 492d 0/3 upstream: reported C repro on 2024/09/23 05:55
linux-6.6 INFO: rcu detected stall in perf_event_open 1 C done 4 153d 167d 2/2 fixed on 2025/10/06 10:09
android-5-15 BUG: soft lockup in sys_perf_event_open 1 1 632d 632d 0/2 auto-obsoleted due to no activity on 2024/08/04 07:07
upstream BUG: soft lockup in sys_perf_event_open perf 1 1 607d 603d 0/29 auto-obsoleted due to no activity on 2024/08/29 01:52
upstream BUG: soft lockup in sys_perf_event_open (2) kvm fs 1 6 375d 482d 0/29 auto-obsoleted due to no activity on 2025/04/18 04:31
linux-6.1 INFO: rcu detected stall in sys_perf_event_open 1 1 596d 596d 0/3 auto-obsoleted due to no activity on 2024/09/19 01:45
linux-5.15 INFO: rcu detected stall in sys_perf_event_open 1 1 1015d 1015d 0/3 auto-obsoleted due to no activity on 2023/08/17 04:33

Sample crash report:
watchdog: BUG: soft lockup - CPU#1 stuck for 144s! [syz.2.407:7202]
Modules linked in:
irq event stamp: 11017141
hardirqs last  enabled at (11017140): [<ffffffff8b96fbbc>] irqentry_exit+0x59c/0x620 kernel/entry/common.c:219
hardirqs last disabled at (11017141): [<ffffffff8b96e5ce>] sysvec_apic_timer_interrupt+0xe/0xc0 arch/x86/kernel/apic/apic.c:1056
softirqs last  enabled at (1158618): [<ffffffff8186fcaf>] __do_softirq kernel/softirq.c:656 [inline]
softirqs last  enabled at (1158618): [<ffffffff8186fcaf>] invoke_softirq kernel/softirq.c:496 [inline]
softirqs last  enabled at (1158618): [<ffffffff8186fcaf>] __irq_exit_rcu+0x5f/0x150 kernel/softirq.c:723
softirqs last disabled at (1158621): [<ffffffff8186fcaf>] __do_softirq kernel/softirq.c:656 [inline]
softirqs last disabled at (1158621): [<ffffffff8186fcaf>] invoke_softirq kernel/softirq.c:496 [inline]
softirqs last disabled at (1158621): [<ffffffff8186fcaf>] __irq_exit_rcu+0x5f/0x150 kernel/softirq.c:723
CPU: 1 UID: 0 PID: 7202 Comm: syz.2.407 Not tainted syzkaller #0 PREEMPT(full) 
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026
RIP: 0010:orc_ip arch/x86/kernel/unwind_orc.c:81 [inline]
RIP: 0010:__orc_find arch/x86/kernel/unwind_orc.c:103 [inline]
RIP: 0010:orc_find arch/x86/kernel/unwind_orc.c:238 [inline]
RIP: 0010:unwind_next_frame+0x513/0x23c0 arch/x86/kernel/unwind_orc.c:510
Code: c1 e8 3f 48 01 c8 48 83 e0 fe 4c 8d 3c 45 00 00 00 00 49 01 ef 4c 89 f8 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df 0f b6 04 08 <84> c0 75 27 49 63 07 4c 01 f8 49 8d 4f 04 4c 39 e0 48 0f 46 e9 49
RSP: 0018:ffffc90000a08298 EFLAGS: 00000a07
RAX: 0000000000000000 RBX: ffffffff90105e04 RCX: dffffc0000000000
RDX: ffffffff90105db8 RSI: ffffffff909037ee RDI: ffffffff8c073920
RBP: ffffffff90105db8 R08: 0000000000000014 R09: ffffffff8e55a360
R10: ffffc90000a08040 R11: ffffffff81afb170 R12: ffffffff822c920b
R13: ffffffff90105db8 R14: ffffc90000a08368 R15: ffffffff90105ddc
FS:  00007f5675fa96c0(0000) GS:ffff8881257f5000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f04877456b8 CR3: 00000000758f6000 CR4: 00000000003526f0
Call Trace:
 <IRQ>
 arch_stack_walk+0x11b/0x150 arch/x86/kernel/stacktrace.c:25
 stack_trace_save+0xa9/0x100 kernel/stacktrace.c:122
 kasan_save_stack mm/kasan/common.c:57 [inline]
 kasan_save_track+0x3e/0x80 mm/kasan/common.c:78
 unpoison_slab_object mm/kasan/common.c:340 [inline]
 __kasan_slab_alloc+0x6c/0x80 mm/kasan/common.c:366
 kasan_slab_alloc include/linux/kasan.h:253 [inline]
 slab_post_alloc_hook mm/slub.c:4953 [inline]
 kmem_cache_alloc_bulk_noprof+0x48c/0x740 mm/slub.c:7525
 napi_skb_cache_get+0x41e/0x780 net/core/skbuff.c:291
 __alloc_skb+0x152/0x390 net/core/skbuff.c:668
 napi_alloc_skb+0x84/0x7c0 net/core/skbuff.c:832
 page_to_skb+0x2ce/0x870 drivers/net/virtio_net.c:887
 receive_mergeable drivers/net/virtio_net.c:2497 [inline]
 receive_buf+0x546/0x1900 drivers/net/virtio_net.c:2643
 virtnet_receive_packets drivers/net/virtio_net.c:2970 [inline]
 virtnet_receive drivers/net/virtio_net.c:2994 [inline]
 virtnet_poll+0x21f0/0x2fe0 drivers/net/virtio_net.c:3083
 __napi_poll+0xae/0x340 net/core/dev.c:7681
 napi_poll net/core/dev.c:7744 [inline]
 net_rx_action+0x627/0xf70 net/core/dev.c:7896
 handle_softirqs+0x22a/0x7c0 kernel/softirq.c:622
 __do_softirq kernel/softirq.c:656 [inline]
 invoke_softirq kernel/softirq.c:496 [inline]
 __irq_exit_rcu+0x5f/0x150 kernel/softirq.c:723
 irq_exit_rcu+0x9/0x30 kernel/softirq.c:739
 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1056 [inline]
 sysvec_apic_timer_interrupt+0xa6/0xc0 arch/x86/kernel/apic/apic.c:1056
 </IRQ>
 <TASK>
 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:697
RIP: 0010:preempt_schedule_irq+0x48/0xa0 kernel/sched/core.c:7194
Code: 49 be 00 00 00 00 00 fc ff df eb 09 48 f7 03 10 00 00 00 74 53 bf 01 00 00 00 e8 b3 9c fa f5 e8 ae 30 34 f6 fb bf 01 00 00 00 <e8> 43 a9 ff ff 9c 58 fa a9 00 02 00 00 74 05 e8 34 32 34 f6 bf 01
RSP: 0018:ffffc90004b8f530 EFLAGS: 00000202
RAX: 0000000000007025 RBX: 0000000000000000 RCX: 0000000000000001
RDX: 0000000000000007 RSI: ffffffff8dcc9112 RDI: 0000000000000001
RBP: 0000000000000000 R08: ffffffff8fef1a77 R09: 1ffffffff1fde34e
R10: dffffc0000000000 R11: fffffbfff1fde34f R12: 0000000000000000
R13: 0000000000000000 R14: dffffc0000000000 R15: 0000000000000000
 irqentry_exit+0x597/0x620 kernel/entry/common.c:216
 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:697
RIP: 0010:orc_find arch/x86/kernel/unwind_orc.c:229 [inline]
RIP: 0010:unwind_next_frame+0x223/0x23c0 arch/x86/kernel/unwind_orc.c:510
Code: 86 78 04 00 00 44 89 f8 4c 8d 2c 85 8c eb 2d 91 4c 89 e8 48 c1 e8 03 0f b6 04 28 84 c0 48 89 eb 0f 85 25 1c 00 00 45 8b 6d 00 <44> 89 f8 ff c0 48 8d 2c 85 8c eb 2d 91 48 89 e8 48 c1 e8 03 0f b6
RSP: 0018:ffffc90004b8f658 EFLAGS: 00000246
RAX: 0000000000000000 RBX: dffffc0000000000 RCX: 0000000080000000
RDX: 00000000000a9ab5 RSI: ffffffff8c073960 RDI: ffffffff8c073920
RBP: dffffc0000000000 R08: ffffffff81759195 R09: ffffffff8e55a360
R10: ffffc90004b8f400 R11: ffffffff81afb170 R12: ffffffff81f6b0e8
R13: 0000000000032842 R14: ffffc90004b8f728 R15: 000000000000f6b0
 arch_stack_walk+0x11b/0x150 arch/x86/kernel/stacktrace.c:25
 stack_trace_save+0xa9/0x100 kernel/stacktrace.c:122
 kasan_save_stack mm/kasan/common.c:57 [inline]
 kasan_save_track+0x3e/0x80 mm/kasan/common.c:78
 unpoison_slab_object mm/kasan/common.c:340 [inline]
 __kasan_slab_alloc+0x6c/0x80 mm/kasan/common.c:366
 kasan_slab_alloc include/linux/kasan.h:253 [inline]
 slab_post_alloc_hook mm/slub.c:4953 [inline]
 slab_alloc_node mm/slub.c:5263 [inline]
 kmem_cache_alloc_node_noprof+0x427/0x6f0 mm/slub.c:5315
 perf_event_alloc+0x1cb/0x2e40 kernel/events/core.c:12960
 __do_sys_perf_event_open kernel/events/core.c:13590 [inline]
 __se_sys_perf_event_open+0x7a9/0x1d60 kernel/events/core.c:13471
 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
 do_syscall_64+0xe2/0xf80 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f567519aeb9
Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f5675fa9028 EFLAGS: 00000246 ORIG_RAX: 000000000000012a
RAX: ffffffffffffffda RBX: 00007f5675415fa0 RCX: 00007f567519aeb9
RDX: ffffffffffffffff RSI: 0000000000000000 RDI: 0000200000000440
RBP: 00007f5675208c1f R08: 0000000000000002 R09: 0000000000000000
R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000000
R13: 00007f5675416038 R14: 00007f5675415fa0 R15: 00007ffda8335dc8
 </TASK>
Sending NMI from CPU 1 to CPUs 0:
NMI backtrace for cpu 0
CPU: 0 UID: 0 PID: 18 Comm: rcu_exp_gp_kthr Not tainted syzkaller #0 PREEMPT(full) 
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026
RIP: 0010:kasan_check_range+0x5/0x2c0 mm/kasan/generic.c:199
Code: 48 c7 c6 a5 56 f3 8d e8 49 64 fb fe 90 0f 0b cc cc cc cc cc cc 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1f 40 d6 55 <41> 57 41 56 41 55 41 54 53 b0 01 48 85 f6 0f 84 ae 01 00 00 4c 8d
RSP: 0018:ffffc90000007a28 EFLAGS: 00000002
RAX: 0000000000000001 RBX: 000000000000000d RCX: ffffffff819f9e7b
RDX: 0000000000000001 RSI: 000000000000000d RDI: ffffe8ffffcc4018
RBP: ffffc90000007b60 R08: 0000000000000004 R09: 0000000000000006
R10: dffffc0000000000 R11: fffffbfff175bf69 R12: ffffffff819f9e7b
R13: 000000000000000e R14: ffffffff8badfb40 R15: ffffe8ffffcc4018
FS:  0000000000000000(0000) GS:ffff8881256f5000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000200000051000 CR3: 00000000688bc000 CR4: 00000000003526f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600
Call Trace:
 <IRQ>
 __asan_memcpy+0x40/0x70 mm/kasan/shadow.c:106
 do_perf_trace_lock include/trace/events/lock.h:50 [inline]
 perf_trace_lock+0x2ab/0x3f0 include/trace/events/lock.h:50
 __do_trace_lock_release include/trace/events/lock.h:69 [inline]
 trace_lock_release include/trace/events/lock.h:69 [inline]
 lock_release+0x379/0x3a0 kernel/locking/lockdep.c:5879
 rcu_lock_release include/linux/rcupdate.h:341 [inline]
 rcu_read_unlock include/linux/rcupdate.h:897 [inline]
 select_task_rq_fair+0x2b53/0x43f0 kernel/sched/fair.c:8583
 select_task_rq kernel/sched/core.c:3497 [inline]
 try_to_wake_up+0x4d7/0x1380 kernel/sched/core.c:4206
 hrtimer_wakeup+0x4e/0x60 kernel/time/hrtimer.c:2013
 __run_hrtimer kernel/time/hrtimer.c:1777 [inline]
 __hrtimer_run_queues+0x527/0xc30 kernel/time/hrtimer.c:1841
 hrtimer_interrupt+0x42b/0x1010 kernel/time/hrtimer.c:1903
 local_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1045 [inline]
 __sysvec_apic_timer_interrupt+0x102/0x3d0 arch/x86/kernel/apic/apic.c:1062
 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1056 [inline]
 sysvec_apic_timer_interrupt+0xa1/0xc0 arch/x86/kernel/apic/apic.c:1056
 </IRQ>
 <TASK>
 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:697
RIP: 0010:console_trylock_spinning kernel/printk/printk.c:2037 [inline]
RIP: 0010:vprintk_emit+0x45d/0x560 kernel/printk/printk.c:2425
Code: 0f 84 44 ff ff ff e8 e2 45 21 00 fb eb 44 e8 da 45 21 00 e8 a5 bd f3 09 4d 85 f6 74 94 e8 cb 45 21 00 fb 48 c7 c7 60 c7 54 8e <31> f6 ba 01 00 00 00 31 c9 41 b8 01 00 00 00 45 31 c9 53 e8 3b 1b
RSP: 0018:ffffc90000177940 EFLAGS: 00000293
RAX: ffffffff81a33185 RBX: ffffffff81a32fff RCX: ffff88801cef1e80
RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffffff8e54c760
RBP: ffffc900001779f0 R08: ffffffff8fef1a77 R09: 1ffffffff1fde34e
R10: dffffc0000000000 R11: fffffbfff1fde34f R12: 0000000000000000
R13: 0000000000000041 R14: 0000000000000200 R15: 1ffff9200002ef2c
 _printk+0xdd/0x130 kernel/printk/printk.c:2451
 synchronize_rcu_expedited_stall+0x5f/0x1170 kernel/rcu/tree_exp.h:570
 synchronize_rcu_expedited_wait kernel/rcu/tree_exp.h:668 [inline]
 rcu_exp_wait_wake kernel/rcu/tree_exp.h:687 [inline]
 rcu_exp_sel_wait_wake+0x897/0xe50 kernel/rcu/tree_exp.h:721
 kthread_worker_fn+0x4ee/0xb00 kernel/kthread.c:1005
 kthread+0x726/0x8b0 kernel/kthread.c:463
 ret_from_fork+0x51b/0xa40 arch/x86/kernel/process.c:158
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:246
 </TASK>

Crashes (3):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2026/01/27 15:15 bpf 63804fed149a 9a514c2f .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-kasan-gce BUG: soft lockup in perf_event_open
2026/01/06 10:45 bpf 22cc16c04b78 d6526ea3 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-kasan-gce BUG: soft lockup in perf_event_open
2025/12/05 01:35 bpf 835a50753579 d6526ea3 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-kasan-gce BUG: soft lockup in perf_event_open
* Struck through repros no longer work on HEAD.