kernel/sched/ext.c | 7 +++++-- 1 file changed, 5 insertions(+), 2 deletions(-)
When printing the deprecation warning for scx_bpf_cpu_rq(), we may hit a
NULL pointer dereference if the kfunc is called before a BPF scheduler
is fully attached, for example, when invoked from a BPF timer or during
ops.init():
[ 50.752775] BUG: kernel NULL pointer dereference, address: 0000000000000331
...
[ 50.764205] RIP: 0010:scx_bpf_cpu_rq+0x30/0xa0
...
[ 50.787661] Call Trace:
[ 50.788398] <TASK>
[ 50.789061] bpf_prog_08f7fd2dcb187aaf_wakeup_timerfn+0x75/0x1a8
[ 50.792477] bpf_timer_cb+0x7e/0x140
[ 50.796003] hrtimer_run_softirq+0x91/0xe0
[ 50.796952] handle_softirqs+0xce/0x3c0
[ 50.799087] run_ksoftirqd+0x3e/0x70
[ 50.800197] smpboot_thread_fn+0x133/0x290
[ 50.802320] kthread+0x115/0x220
[ 50.804984] ret_from_fork+0x17a/0x1d0
[ 50.806920] ret_from_fork_asm+0x1a/0x30
[ 50.807799] </TASK>
Fix this by only printing the warning once the scheduler is fully
registered.
Fixes: 5c48d88fe0049 ("sched_ext: deprecation warn for scx_bpf_cpu_rq()")
Cc: Christian Loehle <christian.loehle@arm.com>
Signed-off-by: Andrea Righi <arighi@nvidia.com>
---
kernel/sched/ext.c | 7 +++++--
1 file changed, 5 insertions(+), 2 deletions(-)
diff --git a/kernel/sched/ext.c b/kernel/sched/ext.c
index 489462290142a..04fefd34db238 100644
--- a/kernel/sched/ext.c
+++ b/kernel/sched/ext.c
@@ -6362,17 +6362,20 @@ __bpf_kfunc s32 scx_bpf_task_cpu(const struct task_struct *p)
*/
__bpf_kfunc struct rq *scx_bpf_cpu_rq(s32 cpu)
{
- struct scx_sched *sch = scx_root;
+ struct scx_sched *sch;
if (!kf_cpu_valid(cpu, NULL))
return NULL;
- if (!sch->warned_deprecated_rq) {
+ rcu_read_lock();
+ sch = rcu_dereference(scx_root);
+ if (sch && sch->warned_deprecated_rq) {
printk_deferred(KERN_WARNING "sched_ext: %s() is deprecated; "
"use scx_bpf_locked_rq() when holding rq lock "
"or scx_bpf_cpu_curr() to read remote curr safely.\n", __func__);
sch->warned_deprecated_rq = true;
}
+ rcu_read_unlock();
return cpu_rq(cpu);
}
--
2.51.0
On Thu, Sep 04, 2025 at 02:55:22PM +0200, Andrea Righi wrote:
> When printing the deprecation warning for scx_bpf_cpu_rq(), we may hit a
> NULL pointer dereference if the kfunc is called before a BPF scheduler
> is fully attached, for example, when invoked from a BPF timer or during
> ops.init():
>
> [ 50.752775] BUG: kernel NULL pointer dereference, address: 0000000000000331
> ...
> [ 50.764205] RIP: 0010:scx_bpf_cpu_rq+0x30/0xa0
> ...
> [ 50.787661] Call Trace:
> [ 50.788398] <TASK>
> [ 50.789061] bpf_prog_08f7fd2dcb187aaf_wakeup_timerfn+0x75/0x1a8
> [ 50.792477] bpf_timer_cb+0x7e/0x140
> [ 50.796003] hrtimer_run_softirq+0x91/0xe0
> [ 50.796952] handle_softirqs+0xce/0x3c0
> [ 50.799087] run_ksoftirqd+0x3e/0x70
> [ 50.800197] smpboot_thread_fn+0x133/0x290
> [ 50.802320] kthread+0x115/0x220
> [ 50.804984] ret_from_fork+0x17a/0x1d0
> [ 50.806920] ret_from_fork_asm+0x1a/0x30
> [ 50.807799] </TASK>
>
> Fix this by only printing the warning once the scheduler is fully
> registered.
>
> Fixes: 5c48d88fe0049 ("sched_ext: deprecation warn for scx_bpf_cpu_rq()")
> Cc: Christian Loehle <christian.loehle@arm.com>
> Signed-off-by: Andrea Righi <arighi@nvidia.com>
> ---
> kernel/sched/ext.c | 7 +++++--
> 1 file changed, 5 insertions(+), 2 deletions(-)
>
> diff --git a/kernel/sched/ext.c b/kernel/sched/ext.c
> index 489462290142a..04fefd34db238 100644
> --- a/kernel/sched/ext.c
> +++ b/kernel/sched/ext.c
> @@ -6362,17 +6362,20 @@ __bpf_kfunc s32 scx_bpf_task_cpu(const struct task_struct *p)
> */
> __bpf_kfunc struct rq *scx_bpf_cpu_rq(s32 cpu)
> {
> - struct scx_sched *sch = scx_root;
> + struct scx_sched *sch;
>
> if (!kf_cpu_valid(cpu, NULL))
> return NULL;
>
> - if (!sch->warned_deprecated_rq) {
> + rcu_read_lock();
> + sch = rcu_dereference(scx_root);
> + if (sch && sch->warned_deprecated_rq) {
This drops ! from the condition.
Thanks.
--
tejun
On Thu, Sep 04, 2025 at 07:39:34AM -1000, Tejun Heo wrote:
> On Thu, Sep 04, 2025 at 02:55:22PM +0200, Andrea Righi wrote:
> > When printing the deprecation warning for scx_bpf_cpu_rq(), we may hit a
> > NULL pointer dereference if the kfunc is called before a BPF scheduler
> > is fully attached, for example, when invoked from a BPF timer or during
> > ops.init():
> >
> > [ 50.752775] BUG: kernel NULL pointer dereference, address: 0000000000000331
> > ...
> > [ 50.764205] RIP: 0010:scx_bpf_cpu_rq+0x30/0xa0
> > ...
> > [ 50.787661] Call Trace:
> > [ 50.788398] <TASK>
> > [ 50.789061] bpf_prog_08f7fd2dcb187aaf_wakeup_timerfn+0x75/0x1a8
> > [ 50.792477] bpf_timer_cb+0x7e/0x140
> > [ 50.796003] hrtimer_run_softirq+0x91/0xe0
> > [ 50.796952] handle_softirqs+0xce/0x3c0
> > [ 50.799087] run_ksoftirqd+0x3e/0x70
> > [ 50.800197] smpboot_thread_fn+0x133/0x290
> > [ 50.802320] kthread+0x115/0x220
> > [ 50.804984] ret_from_fork+0x17a/0x1d0
> > [ 50.806920] ret_from_fork_asm+0x1a/0x30
> > [ 50.807799] </TASK>
> >
> > Fix this by only printing the warning once the scheduler is fully
> > registered.
> >
> > Fixes: 5c48d88fe0049 ("sched_ext: deprecation warn for scx_bpf_cpu_rq()")
> > Cc: Christian Loehle <christian.loehle@arm.com>
> > Signed-off-by: Andrea Righi <arighi@nvidia.com>
> > ---
> > kernel/sched/ext.c | 7 +++++--
> > 1 file changed, 5 insertions(+), 2 deletions(-)
> >
> > diff --git a/kernel/sched/ext.c b/kernel/sched/ext.c
> > index 489462290142a..04fefd34db238 100644
> > --- a/kernel/sched/ext.c
> > +++ b/kernel/sched/ext.c
> > @@ -6362,17 +6362,20 @@ __bpf_kfunc s32 scx_bpf_task_cpu(const struct task_struct *p)
> > */
> > __bpf_kfunc struct rq *scx_bpf_cpu_rq(s32 cpu)
> > {
> > - struct scx_sched *sch = scx_root;
> > + struct scx_sched *sch;
> >
> > if (!kf_cpu_valid(cpu, NULL))
> > return NULL;
> >
> > - if (!sch->warned_deprecated_rq) {
> > + rcu_read_lock();
> > + sch = rcu_dereference(scx_root);
> > + if (sch && sch->warned_deprecated_rq) {
>
> This drops ! from the condition.
>
> Thanks.
Oops, thanks for noticing it Tejun. I'll send a v2.
-Andrea
On 9/4/25 13:55, Andrea Righi wrote:
> When printing the deprecation warning for scx_bpf_cpu_rq(), we may hit a
> NULL pointer dereference if the kfunc is called before a BPF scheduler
> is fully attached, for example, when invoked from a BPF timer or during
> ops.init():
>
> [ 50.752775] BUG: kernel NULL pointer dereference, address: 0000000000000331
> ...
> [ 50.764205] RIP: 0010:scx_bpf_cpu_rq+0x30/0xa0
> ...
> [ 50.787661] Call Trace:
> [ 50.788398] <TASK>
> [ 50.789061] bpf_prog_08f7fd2dcb187aaf_wakeup_timerfn+0x75/0x1a8
> [ 50.792477] bpf_timer_cb+0x7e/0x140
> [ 50.796003] hrtimer_run_softirq+0x91/0xe0
> [ 50.796952] handle_softirqs+0xce/0x3c0
> [ 50.799087] run_ksoftirqd+0x3e/0x70
> [ 50.800197] smpboot_thread_fn+0x133/0x290
> [ 50.802320] kthread+0x115/0x220
> [ 50.804984] ret_from_fork+0x17a/0x1d0
> [ 50.806920] ret_from_fork_asm+0x1a/0x30
> [ 50.807799] </TASK>
>
> Fix this by only printing the warning once the scheduler is fully
> registered.
>
> Fixes: 5c48d88fe0049 ("sched_ext: deprecation warn for scx_bpf_cpu_rq()")
> Cc: Christian Loehle <christian.loehle@arm.com>
> Signed-off-by: Andrea Righi <arighi@nvidia.com>
> ---
> kernel/sched/ext.c | 7 +++++--
> 1 file changed, 5 insertions(+), 2 deletions(-)
>
> diff --git a/kernel/sched/ext.c b/kernel/sched/ext.c
> index 489462290142a..04fefd34db238 100644
> --- a/kernel/sched/ext.c
> +++ b/kernel/sched/ext.c
> @@ -6362,17 +6362,20 @@ __bpf_kfunc s32 scx_bpf_task_cpu(const struct task_struct *p)
> */
> __bpf_kfunc struct rq *scx_bpf_cpu_rq(s32 cpu)
> {
> - struct scx_sched *sch = scx_root;
> + struct scx_sched *sch;
>
> if (!kf_cpu_valid(cpu, NULL))
> return NULL;
>
> - if (!sch->warned_deprecated_rq) {
> + rcu_read_lock();
> + sch = rcu_dereference(scx_root);
> + if (sch && sch->warned_deprecated_rq) {
> printk_deferred(KERN_WARNING "sched_ext: %s() is deprecated; "
> "use scx_bpf_locked_rq() when holding rq lock "
> "or scx_bpf_cpu_curr() to read remote curr safely.\n", __func__);
> sch->warned_deprecated_rq = true;
> }
> + rcu_read_unlock();
>
> return cpu_rq(cpu);
> }
Ah yes of course.
I guess the other ones that can happen during the actual lifetime
of the scheduler have a likely(sch) around it, which we could
add here as well.
© 2016 - 2026 Red Hat, Inc.