linux-perf-users.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* Re: [syzbot] [perf?] BUG: using __this_cpu_add() in preemptible code in graph_lock
@ 2024-04-26  1:42 lee bruce
  0 siblings, 0 replies; 2+ messages in thread
From: lee bruce @ 2024-04-26  1:42 UTC (permalink / raw)
  To: syzbot+60761fc6ef65e4f00974
  Cc: acme, adrian.hunter, alexander.shishkin, irogers, jolsa,
	linux-kernel, linux-perf-users, mark.rutland, mingo, namhyung,
	netdev, peterz, syzkaller-bugs, yue sun

Hello, I reproduced this bug.

If you fix this issue, please add the following tag to the commit:
Reported-by: xingwei lee <xrivendell7@gmail.com>
Reported-by: yue sun <samsun1006219@gmail.com>

I use the same kernel as syzbot instance:
https://syzkaller.appspot.com/bug?extid=60761fc6ef65e4f00974
Kernel Commit: bpf 443574b033876c85a35de4c65c14f7fe092222b2
Kernel Config: https://syzkaller.appspot.com/text?tag=KernelConfig&x=6fb1be60a193d440

=* repro.c =*
#define _GNU_SOURCE

#include <dirent.h>
#include <endian.h>
#include <errno.h>
#include <fcntl.h>
#include <signal.h>
#include <stdarg.h>
#include <stdbool.h>
#include <stdint.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <sys/prctl.h>
#include <sys/stat.h>
#include <sys/syscall.h>
#include <sys/types.h>
#include <sys/wait.h>
#include <time.h>
#include <unistd.h>

#ifndef __NR_bpf
#define __NR_bpf 321
#endif

static void sleep_ms(uint64_t ms) {
   usleep(ms * 1000);
}

static uint64_t current_time_ms(void) {
   struct timespec ts;
   if (clock_gettime(CLOCK_MONOTONIC, &ts))
       exit(1);
   return (uint64_t)ts.tv_sec * 1000 + (uint64_t)ts.tv_nsec / 1000000;
}

static bool write_file(const char* file, const char* what, ...) {
   char buf[1024];
   va_list args;
   va_start(args, what);
   vsnprintf(buf, sizeof(buf), what, args);
   va_end(args);
   buf[sizeof(buf) - 1] = 0;
   int len = strlen(buf);
   int fd = open(file, O_WRONLY | O_CLOEXEC);
   if (fd == -1)
       return false;
   if (write(fd, buf, len) != len) {
       int err = errno;
       close(fd);
       errno = err;
       return false;
   }
   close(fd);
   return true;
}

static void kill_and_wait(int pid, int* status) {
   kill(-pid, SIGKILL);
   kill(pid, SIGKILL);
   for (int i = 0; i < 100; i++) {
       if (waitpid(-1, status, WNOHANG | __WALL) == pid)
           return;
       usleep(1000);
   }
   DIR* dir = opendir("/sys/fs/fuse/connections");
   if (dir) {
       for (;;) {
           struct dirent* ent = readdir(dir);
           if (!ent)
               break;
           if (strcmp(ent->d_name, ".") == 0 || strcmp(ent->d_name, "..") == 0)
               continue;
           char abort[300];
           snprintf(abort, sizeof(abort), "/sys/fs/fuse/connections/%s/abort",
                            ent->d_name);
           int fd = open(abort, O_WRONLY);
           if (fd == -1) {
               continue;
           }
           if (write(fd, abort, 1) < 0) {
           }
           close(fd);
       }
       closedir(dir);
   } else {
   }
   while (waitpid(-1, status, __WALL) != pid) {
   }
}

static void setup_test() {
   prctl(PR_SET_PDEATHSIG, SIGKILL, 0, 0, 0);
   setpgrp();
   write_file("/proc/self/oom_score_adj", "1000");
}

static void execute_one(void);

#define WAIT_FLAGS __WALL

static void loop(void) {
   int iter = 0;
   for (;; iter++) {
       int pid = fork();
       if (pid < 0)
           exit(1);
       if (pid == 0) {
           setup_test();
           execute_one();
           exit(0);
       }
       int status = 0;
       uint64_t start = current_time_ms();
       for (;;) {
           if (waitpid(-1, &status, WNOHANG | WAIT_FLAGS) == pid)
               break;
           sleep_ms(1);
           if (current_time_ms() - start < 5000)
               continue;
           kill_and_wait(pid, &status);
           break;
       }
   }
}

uint64_t r[2] = {0xffffffffffffffff, 0xffffffffffffffff};

void execute_one(void) {
   intptr_t res = 0;
   *(uint32_t*)0x200009c0 = 0x12;
   *(uint32_t*)0x200009c4 = 4;
   *(uint32_t*)0x200009c8 = 8;
   *(uint32_t*)0x200009cc = 8;
   *(uint32_t*)0x200009d0 = 0;
   *(uint32_t*)0x200009d4 = -1;
   *(uint32_t*)0x200009d8 = 0;
   memset((void*)0x200009dc, 0, 16);
   *(uint32_t*)0x200009ec = 0;
   *(uint32_t*)0x200009f0 = -1;
   *(uint32_t*)0x200009f4 = 0;
   *(uint32_t*)0x200009f8 = 0;
   *(uint32_t*)0x200009fc = 0;
   *(uint64_t*)0x20000a00 = 0;
   res = syscall(__NR_bpf, /*cmd=*/0ul, /*arg=*/0x200009c0ul, /*size=*/0x48ul);
   if (res != -1)
       r[0] = res;
   *(uint32_t*)0x200000c0 = 0;
   *(uint32_t*)0x200000c4 = 0xc;
   *(uint64_t*)0x200000c8 = 0x20000440;
   memcpy((void*)0x20000440,

"\x18\x00\x00\x00\xa9\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00\x18"
                "\x11\x00\x00",
                20);
   *(uint32_t*)0x20000454 = r[0];
   memcpy((void*)0x20000458,

"\x00\x00\x00\x00\x00\x00\x00\x00\xb7\x08\x00\x00\x00\x00\x00\x00\x7b"

"\x8a\xf8\xff\x00\x00\x00\x00\xbf\xa2\x00\x00\x00\x00\x00\x00\x07\x02"

"\x00\x00\xf8\xff\xff\xff\xb7\x03\x00\x00\x08\x00\x00\x00\xb7\x04\x00"
                "\x00\x00\x00\x00\x00\x85\x00\x00\x00\x03\x00\x00\x00\x95",
                65);
   *(uint64_t*)0x200000d0 = 0;
   *(uint32_t*)0x200000d8 = 0;
   *(uint32_t*)0x200000dc = 0;
   *(uint64_t*)0x200000e0 = 0;
   *(uint32_t*)0x200000e8 = 0;
   *(uint32_t*)0x200000ec = 0;
   memset((void*)0x200000f0, 0, 16);
   *(uint32_t*)0x20000100 = 0;
   *(uint32_t*)0x20000104 = 0;
   *(uint32_t*)0x20000108 = -1;
   *(uint32_t*)0x2000010c = 0;
   *(uint64_t*)0x20000110 = 0;
   *(uint32_t*)0x20000118 = 0;
   *(uint32_t*)0x2000011c = 0;
   *(uint64_t*)0x20000120 = 0;
   *(uint32_t*)0x20000128 = 0;
   *(uint32_t*)0x2000012c = 0;
   *(uint32_t*)0x20000130 = 0;
   *(uint32_t*)0x20000134 = 0;
   *(uint64_t*)0x20000138 = 0;
   *(uint64_t*)0x20000140 = 0;
   *(uint32_t*)0x20000148 = 0;
   *(uint32_t*)0x2000014c = 0;
   syscall(__NR_bpf, /*cmd=*/5ul, /*arg=*/0x200000c0ul, /*size=*/0x90ul);
   *(uint32_t*)0x200000c0 = 0x11;
   *(uint32_t*)0x200000c4 = 0xc;
   *(uint64_t*)0x200000c8 = 0x20000440;
   *(uint64_t*)0x200000d0 = 0x20000240;
   memcpy((void*)0x20000240, "GPL\000", 4);
   *(uint32_t*)0x200000d8 = 0;
   *(uint32_t*)0x200000dc = 0;
   *(uint64_t*)0x200000e0 = 0;
   *(uint32_t*)0x200000e8 = 0;
   *(uint32_t*)0x200000ec = 0;
   memset((void*)0x200000f0, 0, 16);
   *(uint32_t*)0x20000100 = 0;
   *(uint32_t*)0x20000104 = 0;
   *(uint32_t*)0x20000108 = -1;
   *(uint32_t*)0x2000010c = 0;
   *(uint64_t*)0x20000110 = 0;
   *(uint32_t*)0x20000118 = 0;
   *(uint32_t*)0x2000011c = 0;
   *(uint64_t*)0x20000120 = 0;
   *(uint32_t*)0x20000128 = 0;
   *(uint32_t*)0x2000012c = 0;
   *(uint32_t*)0x20000130 = 0;
   *(uint32_t*)0x20000134 = 0;
   *(uint64_t*)0x20000138 = 0;
   *(uint64_t*)0x20000140 = 0;
   *(uint32_t*)0x20000148 = 0;
   *(uint32_t*)0x2000014c = 0;
   res = syscall(__NR_bpf, /*cmd=*/5ul, /*arg=*/0x200000c0ul, /*size=*/0x90ul);
   if (res != -1)
       r[1] = res;
   *(uint64_t*)0x20000180 = 0x20000080;
   memcpy((void*)0x20000080, "contention_end\000", 15);
   *(uint32_t*)0x20000188 = r[1];
   syscall(__NR_bpf, /*cmd=*/0x11ul, /*arg=*/0x20000180ul, /*size=*/0x10ul);
}
int main(void) {
   syscall(__NR_mmap, /*addr=*/0x1ffff000ul, /*len=*/0x1000ul, /*prot=*/0ul,
                   /*flags=MAP_FIXED|MAP_ANONYMOUS|MAP_PRIVATE*/
0x32ul, /*fd=*/-1,
                   /*offset=*/0ul);
   syscall(__NR_mmap, /*addr=*/0x20000000ul, /*len=*/0x1000000ul,
                   /*prot=PROT_WRITE|PROT_READ|PROT_EXEC*/ 7ul,
                   /*flags=MAP_FIXED|MAP_ANONYMOUS|MAP_PRIVATE*/
0x32ul, /*fd=*/-1,
                   /*offset=*/0ul);
   syscall(__NR_mmap, /*addr=*/0x21000000ul, /*len=*/0x1000ul, /*prot=*/0ul,
                   /*flags=MAP_FIXED|MAP_ANONYMOUS|MAP_PRIVATE*/
0x32ul, /*fd=*/-1,
                   /*offset=*/0ul);
   loop();
   return 0;
}


=* repro.txt =*
r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x12, 0x4, 0x8, 0x8}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc,
&(0x7f0000000440)=ANY=[@ANYBLOB="18000000a9000000000000000200000018110000",
@ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"],
0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff,
0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc,
&(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0,
0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0,
0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11,
&(0x7f0000000180)={&(0x7f0000000080)='contention_end\x00', r1}, 0x10)

and see also in
https://gist.github.com/xrivendell7/db53a0e46672f13acc6797e8d99729d3

I hope it helps.
Best regards
xingwei lee

^ permalink raw reply	[flat|nested] 2+ messages in thread

* [syzbot] [perf?] BUG: using __this_cpu_add() in preemptible code in graph_lock
@ 2024-04-22  7:20 syzbot
  0 siblings, 0 replies; 2+ messages in thread
From: syzbot @ 2024-04-22  7:20 UTC (permalink / raw)
  To: acme, adrian.hunter, alexander.shishkin, irogers, jolsa,
	linux-kernel, linux-perf-users, mark.rutland, mingo, namhyung,
	netdev, peterz, syzkaller-bugs

Hello,

syzbot found the following issue on:

HEAD commit:    443574b03387 riscv, bpf: Fix kfunc parameters incompatibil..
git tree:       bpf
console output: https://syzkaller.appspot.com/x/log.txt?x=10755af5180000
kernel config:  https://syzkaller.appspot.com/x/.config?x=6fb1be60a193d440
dashboard link: https://syzkaller.appspot.com/bug?extid=60761fc6ef65e4f00974
compiler:       Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40

Unfortunately, I don't have any reproducer for this issue yet.

Downloadable assets:
disk image: https://storage.googleapis.com/syzbot-assets/3f355021a085/disk-443574b0.raw.xz
vmlinux: https://storage.googleapis.com/syzbot-assets/44cf4de7472a/vmlinux-443574b0.xz
kernel image: https://storage.googleapis.com/syzbot-assets/a99a36c7ad65/bzImage-443574b0.xz

IMPORTANT: if you fix the issue, please add the following tag to the commit:
Reported-by: syzbot+60761fc6ef65e4f00974@syzkaller.appspotmail.com

BUG: using __this_cpu_add() in preemptible [00000000] code: syz-executor.3/9981
caller is __pv_queued_spin_lock_slowpath+0x945/0xc60 kernel/locking/qspinlock.c:565
CPU: 0 PID: 9981 Comm: syz-executor.3 Not tainted 6.8.0-syzkaller-05236-g443574b03387 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024
Call Trace:
 <TASK>
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0x1e7/0x2e0 lib/dump_stack.c:106
 check_preemption_disabled+0x10e/0x120 lib/smp_processor_id.c:49
 __pv_queued_spin_lock_slowpath+0x945/0xc60 kernel/locking/qspinlock.c:565
 pv_queued_spin_lock_slowpath arch/x86/include/asm/paravirt.h:584 [inline]
 queued_spin_lock_slowpath+0x42/0x50 arch/x86/include/asm/qspinlock.h:51
 queued_spin_lock include/asm-generic/qspinlock.h:114 [inline]
 lockdep_lock+0x1b0/0x2b0 kernel/locking/lockdep.c:144
 graph_lock+0x5/0x60 kernel/locking/lockdep.c:170
 mark_lock+0x15c/0x350 kernel/locking/lockdep.c:4659
 __lock_acquire+0x116e/0x1fd0 kernel/locking/lockdep.c:5091
 lock_acquire+0x1e4/0x530 kernel/locking/lockdep.c:5754
 percpu_down_write+0x57/0x320 kernel/locking/percpu-rwsem.c:229
 bp_constraints_lock+0xdd/0x1c0 kernel/events/hw_breakpoint.c:133
 reserve_bp_slot kernel/events/hw_breakpoint.c:600 [inline]
 register_perf_hw_breakpoint+0x90/0x250 kernel/events/hw_breakpoint.c:718
 hw_breakpoint_event_init+0x8d/0x110 kernel/events/hw_breakpoint.c:958
 perf_try_init_event+0x139/0x3f0 kernel/events/core.c:11668
 perf_init_event kernel/events/core.c:11738 [inline]
 perf_event_alloc+0xeed/0x2130 kernel/events/core.c:12018
 __do_sys_perf_event_open kernel/events/core.c:12525 [inline]
 __se_sys_perf_event_open+0x7f9/0x38d0 kernel/events/core.c:12416
 do_syscall_64+0xfb/0x240
 entry_SYSCALL_64_after_hwframe+0x6d/0x75
RIP: 0033:0x7f4f88a7dea9
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f4f897950c8 EFLAGS: 00000246 ORIG_RAX: 000000000000012a
RAX: ffffffffffffffda RBX: 00007f4f88babf80 RCX: 00007f4f88a7dea9
RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180
RBP: 00007f4f88aca4a4 R08: 0000000000000000 R09: 0000000000000000
R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000000
R13: 000000000000000b R14: 00007f4f88babf80 R15: 00007fffadfb1b08
 </TASK>

=============================
WARNING: suspicious RCU usage
6.8.0-syzkaller-05236-g443574b03387 #0 Not tainted
-----------------------------
kernel/sched/core.c:5982 Illegal context switch in RCU-bh read-side critical section!

other info that might help us debug this:


rcu_scheduler_active = 2, debug_locks = 1
1 lock held by syz-executor.3/9981:
 #0: ffffffff94511910 (&pmus_srcu){.+.+}-{0:0}, at: srcu_lock_acquire include/linux/srcu.h:116 [inline]
 #0: ffffffff94511910 (&pmus_srcu){.+.+}-{0:0}, at: srcu_read_lock include/linux/srcu.h:215 [inline]
 #0: ffffffff94511910 (&pmus_srcu){.+.+}-{0:0}, at: perf_init_event kernel/events/core.c:11698 [inline]
 #0: ffffffff94511910 (&pmus_srcu){.+.+}-{0:0}, at: perf_event_alloc+0xacf/0x2130 kernel/events/core.c:12018

stack backtrace:
CPU: 0 PID: 9981 Comm: syz-executor.3 Not tainted 6.8.0-syzkaller-05236-g443574b03387 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024
Call Trace:
 <TASK>
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0x1e7/0x2e0 lib/dump_stack.c:106
 lockdep_rcu_suspicious+0x221/0x340 kernel/locking/lockdep.c:6712
 schedule_debug kernel/sched/core.c:5982 [inline]
 __schedule+0x23b/0x4a20 kernel/sched/core.c:6629
 preempt_schedule_common+0x84/0xd0 kernel/sched/core.c:6915
 preempt_schedule+0xe1/0xf0 kernel/sched/core.c:6939
 preempt_schedule_thunk+0x1a/0x30 arch/x86/entry/thunk_64.S:12
 unwind_next_frame+0x2124/0x2a00 arch/x86/kernel/unwind_orc.c:672
 __unwind_start+0x641/0x7c0 arch/x86/kernel/unwind_orc.c:760
 unwind_start arch/x86/include/asm/unwind.h:64 [inline]
 arch_stack_walk+0x103/0x1b0 arch/x86/kernel/stacktrace.c:24
 stack_trace_save+0x118/0x1d0 kernel/stacktrace.c:122
 save_trace+0x5a/0xb40 kernel/locking/lockdep.c:582
 mark_lock+0x1d3/0x350 kernel/locking/lockdep.c:4673
 __lock_acquire+0x116e/0x1fd0 kernel/locking/lockdep.c:5091
 lock_acquire+0x1e4/0x530 kernel/locking/lockdep.c:5754
 percpu_down_write+0x57/0x320 kernel/locking/percpu-rwsem.c:229
 bp_constraints_lock+0xdd/0x1c0 kernel/events/hw_breakpoint.c:133
 reserve_bp_slot kernel/events/hw_breakpoint.c:600 [inline]
 register_perf_hw_breakpoint+0x90/0x250 kernel/events/hw_breakpoint.c:718
 hw_breakpoint_event_init+0x8d/0x110 kernel/events/hw_breakpoint.c:958
 perf_try_init_event+0x139/0x3f0 kernel/events/core.c:11668
 perf_init_event kernel/events/core.c:11738 [inline]
 perf_event_alloc+0xeed/0x2130 kernel/events/core.c:12018
 __do_sys_perf_event_open kernel/events/core.c:12525 [inline]
 __se_sys_perf_event_open+0x7f9/0x38d0 kernel/events/core.c:12416
 do_syscall_64+0xfb/0x240
 entry_SYSCALL_64_after_hwframe+0x6d/0x75
RIP: 0033:0x7f4f88a7dea9
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f4f897950c8 EFLAGS: 00000246 ORIG_RAX: 000000000000012a
RAX: ffffffffffffffda RBX: 00007f4f88babf80 RCX: 00007f4f88a7dea9
RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180
RBP: 00007f4f88aca4a4 R08: 0000000000000000 R09: 0000000000000000
R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000000
R13: 000000000000000b R14: 00007f4f88babf80 R15: 00007fffadfb1b08
 </TASK>

=============================
WARNING: suspicious RCU usage
6.8.0-syzkaller-05236-g443574b03387 #0 Not tainted
-----------------------------
kernel/sched/core.c:5982 Illegal context switch in RCU-sched read-side critical section!

other info that might help us debug this:


rcu_scheduler_active = 2, debug_locks = 1
1 lock held by syz-executor.3/9981:
 #0: ffffffff94511910 (&pmus_srcu){.+.+}-{0:0}, at: srcu_lock_acquire include/linux/srcu.h:116 [inline]
 #0: ffffffff94511910 (&pmus_srcu){.+.+}-{0:0}, at: srcu_read_lock include/linux/srcu.h:215 [inline]
 #0: ffffffff94511910 (&pmus_srcu){.+.+}-{0:0}, at: perf_init_event kernel/events/core.c:11698 [inline]
 #0: ffffffff94511910 (&pmus_srcu){.+.+}-{0:0}, at: perf_event_alloc+0xacf/0x2130 kernel/events/core.c:12018

stack backtrace:
CPU: 0 PID: 9981 Comm: syz-executor.3 Not tainted 6.8.0-syzkaller-05236-g443574b03387 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024
Call Trace:
 <TASK>
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0x1e7/0x2e0 lib/dump_stack.c:106
 lockdep_rcu_suspicious+0x221/0x340 kernel/locking/lockdep.c:6712
 schedule_debug kernel/sched/core.c:5982 [inline]
 __schedule+0x28a/0x4a20 kernel/sched/core.c:6629
 preempt_schedule_common+0x84/0xd0 kernel/sched/core.c:6915
 preempt_schedule+0xe1/0xf0 kernel/sched/core.c:6939
 preempt_schedule_thunk+0x1a/0x30 arch/x86/entry/thunk_64.S:12
 unwind_next_frame+0x2124/0x2a00 arch/x86/kernel/unwind_orc.c:672
 __unwind_start+0x641/0x7c0 arch/x86/kernel/unwind_orc.c:760
 unwind_start arch/x86/include/asm/unwind.h:64 [inline]
 arch_stack_walk+0x103/0x1b0 arch/x86/kernel/stacktrace.c:24
 stack_trace_save+0x118/0x1d0 kernel/stacktrace.c:122
 save_trace+0x5a/0xb40 kernel/locking/lockdep.c:582
 mark_lock+0x1d3/0x350 kernel/locking/lockdep.c:4673
 __lock_acquire+0x116e/0x1fd0 kernel/locking/lockdep.c:5091
 lock_acquire+0x1e4/0x530 kernel/locking/lockdep.c:5754
 percpu_down_write+0x57/0x320 kernel/locking/percpu-rwsem.c:229
 bp_constraints_lock+0xdd/0x1c0 kernel/events/hw_breakpoint.c:133
 reserve_bp_slot kernel/events/hw_breakpoint.c:600 [inline]
 register_perf_hw_breakpoint+0x90/0x250 kernel/events/hw_breakpoint.c:718
 hw_breakpoint_event_init+0x8d/0x110 kernel/events/hw_breakpoint.c:958
 perf_try_init_event+0x139/0x3f0 kernel/events/core.c:11668
 perf_init_event kernel/events/core.c:11738 [inline]
 perf_event_alloc+0xeed/0x2130 kernel/events/core.c:12018
 __do_sys_perf_event_open kernel/events/core.c:12525 [inline]
 __se_sys_perf_event_open+0x7f9/0x38d0 kernel/events/core.c:12416
 do_syscall_64+0xfb/0x240
 entry_SYSCALL_64_after_hwframe+0x6d/0x75
RIP: 0033:0x7f4f88a7dea9
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f4f897950c8 EFLAGS: 00000246 ORIG_RAX: 000000000000012a
RAX: ffffffffffffffda RBX: 00007f4f88babf80 RCX: 00007f4f88a7dea9
RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180
RBP: 00007f4f88aca4a4 R08: 0000000000000000 R09: 0000000000000000
R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000000
R13: 000000000000000b R14: 00007f4f88babf80 R15: 00007fffadfb1b08
 </TASK>


---
This report is generated by a bot. It may contain errors.
See https://goo.gl/tpsmEJ for more information about syzbot.
syzbot engineers can be reached at syzkaller@googlegroups.com.

syzbot will keep track of this issue. See:
https://goo.gl/tpsmEJ#status for how to communicate with syzbot.

If the report is already addressed, let syzbot know by replying with:
#syz fix: exact-commit-title

If you want to overwrite report's subsystems, reply with:
#syz set subsystems: new-subsystem
(See the list of subsystem names on the web dashboard)

If the report is a duplicate of another one, reply with:
#syz dup: exact-subject-of-another-report

If you want to undo deduplication, reply with:
#syz undup

^ permalink raw reply	[flat|nested] 2+ messages in thread

end of thread, other threads:[~2024-04-26  1:42 UTC | newest]

Thread overview: 2+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2024-04-26  1:42 [syzbot] [perf?] BUG: using __this_cpu_add() in preemptible code in graph_lock lee bruce
  -- strict thread matches above, loose matches on Subject: below --
2024-04-22  7:20 syzbot

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).