[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <68f32b5d.050a0220.1186a4.051d.GAE@google.com>
Date: Fri, 17 Oct 2025 22:53:33 -0700
From: syzbot <syzbot+4032319a6a907f69e985@...kaller.appspotmail.com>
To: axboe@...nel.dk, davem@...emloft.net, dvyukov@...gle.com,
edumazet@...gle.com, hdanton@...a.com, horms@...nel.org, jmaloy@...hat.com,
kuba@...nel.org, linux-block@...r.kernel.org, linux-kernel@...r.kernel.org,
linux-mm@...ck.org, linux-scsi@...r.kernel.org, netdev@...r.kernel.org,
pabeni@...hat.com, paulmck@...nel.org, peterz@...radead.org,
syzkaller-bugs@...glegroups.com, tipc-discussion@...ts.sourceforge.net
Subject: Re: [syzbot] [net?] BUG: soft lockup in sys_sendmsg (2)
syzbot has found a reproducer for the following issue on:
HEAD commit: bf45a62baffc Merge branch 'for-next/core' into for-kernelci
git tree: git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci
console output: https://syzkaller.appspot.com/x/log.txt?x=15941de2580000
kernel config: https://syzkaller.appspot.com/x/.config?x=bd2356106f507975
dashboard link: https://syzkaller.appspot.com/bug?extid=4032319a6a907f69e985
compiler: Debian clang version 20.1.8 (++20250708063551+0c9f909b7976-1~exp1~20250708183702.136), Debian LLD 20.1.8
userspace arch: arm64
syz repro: https://syzkaller.appspot.com/x/repro.syz?x=1494767c580000
C reproducer: https://syzkaller.appspot.com/x/repro.c?x=126fdde2580000
Downloadable assets:
disk image: https://storage.googleapis.com/syzbot-assets/f0d4874557e9/disk-bf45a62b.raw.xz
vmlinux: https://storage.googleapis.com/syzbot-assets/0bf44a13b5b2/vmlinux-bf45a62b.xz
kernel image: https://storage.googleapis.com/syzbot-assets/18db8bc9907c/Image-bf45a62b.gz.xz
IMPORTANT: if you fix the issue, please add the following tag to the commit:
Reported-by: syzbot+4032319a6a907f69e985@...kaller.appspotmail.com
watchdog: BUG: soft lockup - CPU#0 stuck for 22s! [syz.0.76:6894]
Modules linked in:
irq event stamp: 5181
hardirqs last enabled at (5180): [<ffff80008b064a14>] irqentry_exit+0xd8/0x108 kernel/entry/common.c:214
hardirqs last disabled at (5181): [<ffff80008b062af0>] __enter_from_kernel_mode arch/arm64/kernel/entry-common.c:43 [inline]
hardirqs last disabled at (5181): [<ffff80008b062af0>] enter_from_kernel_mode+0x14/0x34 arch/arm64/kernel/entry-common.c:50
softirqs last enabled at (522): [<ffff8000892e0188>] spin_unlock_bh include/linux/spinlock.h:396 [inline]
softirqs last enabled at (522): [<ffff8000892e0188>] release_sock+0x14c/0x1ac net/core/sock.c:3735
softirqs last disabled at (528): [<ffff8000892f4c84>] spin_lock_bh include/linux/spinlock.h:356 [inline]
softirqs last disabled at (528): [<ffff8000892f4c84>] lock_sock_nested+0x70/0x118 net/core/sock.c:3714
CPU: 0 UID: 0 PID: 6894 Comm: syz.0.76 Not tainted syzkaller #0 PREEMPT
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025
pstate: 03400005 (nzcv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--)
pc : queued_spin_lock_slowpath+0x138/0xaec kernel/locking/qspinlock.c:197
lr : queued_spin_lock_slowpath+0x144/0xaec kernel/locking/qspinlock.c:197
sp : ffff8000a1a17600
x29: ffff8000a1a176a0 x28: 1fffe0001b9124c1 x27: 1fffe000196c6002
x26: ffff0000cb630000 x25: dfff800000000000 x24: ffff700014342ec4
x23: 0000000000000001 x22: ffff0000cb630010 x21: ffff0000dc892608
x20: ffff0000dc892610 x19: ffff0000dc892600 x18: 0000000000000000
x17: 0000000000000000 x16: ffff800080537d14 x15: 0000000000000001
x14: 1fffe0001b9124c0 x13: 0000000000000000 x12: 0000000000000000
x11: ffff60001b9124c1 x10: dfff800000000000 x9 : 0000000000000000
x8 : 0000000000000001 x7 : ffff8000892f4c84 x6 : 0000000000000000
x5 : 0000000000000000 x4 : 0000000000000001 x3 : ffff80008b0885f8
x2 : 0000000000000000 x1 : 0000000000000001 x0 : 0000000000000001
Call trace:
__cmpwait_case_8 arch/arm64/include/asm/cmpxchg.h:229 [inline] (P)
__cmpwait arch/arm64/include/asm/cmpxchg.h:257 [inline] (P)
queued_spin_lock_slowpath+0x138/0xaec kernel/locking/qspinlock.c:197 (P)
queued_spin_lock include/asm-generic/qspinlock.h:114 [inline]
do_raw_spin_lock+0x2a8/0x2cc kernel/locking/spinlock_debug.c:116
__raw_spin_lock_bh include/linux/spinlock_api_smp.h:127 [inline]
_raw_spin_lock_bh+0x50/0x60 kernel/locking/spinlock.c:178
spin_lock_bh include/linux/spinlock.h:356 [inline]
lock_sock_nested+0x70/0x118 net/core/sock.c:3714
lock_sock include/net/sock.h:1669 [inline]
tipc_sendstream+0x50/0x84 net/tipc/socket.c:1545
sock_sendmsg_nosec net/socket.c:714 [inline]
__sock_sendmsg net/socket.c:729 [inline]
____sys_sendmsg+0x490/0x7b8 net/socket.c:2614
___sys_sendmsg+0x204/0x278 net/socket.c:2668
__sys_sendmsg net/socket.c:2700 [inline]
__do_sys_sendmsg net/socket.c:2705 [inline]
__se_sys_sendmsg net/socket.c:2703 [inline]
__arm64_sys_sendmsg+0x184/0x238 net/socket.c:2703
__invoke_syscall arch/arm64/kernel/syscall.c:35 [inline]
invoke_syscall+0x98/0x254 arch/arm64/kernel/syscall.c:49
el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132
do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151
el0_svc+0x5c/0x254 arch/arm64/kernel/entry-common.c:744
el0t_64_sync_handler+0x84/0x12c arch/arm64/kernel/entry-common.c:763
el0t_64_sync+0x198/0x19c arch/arm64/kernel/entry.S:596
Sending NMI from CPU 0 to CPUs 1:
NMI backtrace for cpu 1
CPU: 1 UID: 0 PID: 6895 Comm: syz.0.76 Not tainted syzkaller #0 PREEMPT
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025
pstate: 83400005 (Nzcv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--)
pc : should_resched arch/arm64/include/asm/preempt.h:78 [inline]
pc : __local_bh_enable_ip+0x1f0/0x35c kernel/softirq.c:414
lr : __local_bh_enable_ip+0x1ec/0x35c kernel/softirq.c:412
sp : ffff8000a1806210
x29: ffff8000a1806220 x28: 0000000040613361 x27: ffff8000a18063e0
x26: ffff0000f25e3b60 x25: dfff800000000000 x24: 0000000000000001
x23: dfff800000000000 x22: 1fffe000196c63d1 x21: ffff80008ab3e7b8
x20: 0000000000000201 x19: ffff0000cb631e88 x18: 00000000ffffffff
x17: ffff800093605000 x16: ffff80008052bc24 x15: 0000000000000001
x14: 1fffe0001b9124c0 x13: 0000000000000000 x12: 0000000000000000
x11: ffff800093404c28 x10: 0000000000000003 x9 : 0000000000000000
x8 : 000000000382547a x7 : ffff80008ab4aee0 x6 : 0000000000000000
x5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000010
x2 : 0000000000000002 x1 : ffff80008ee54d8e x0 : ffff80010c40c000
Call trace:
__daif_local_irq_enable arch/arm64/include/asm/irqflags.h:26 [inline] (P)
arch_local_irq_enable arch/arm64/include/asm/irqflags.h:48 [inline] (P)
__local_bh_enable_ip+0x1f0/0x35c kernel/softirq.c:412 (P)
__raw_spin_trylock_bh include/linux/spinlock_api_smp.h:177 [inline]
_raw_spin_trylock_bh+0x68/0x80 kernel/locking/spinlock.c:146
spin_trylock_bh include/linux/spinlock.h:411 [inline]
tipc_sk_rcv+0x2f4/0x2294 net/tipc/socket.c:2494
tipc_node_xmit+0x18c/0xc9c net/tipc/node.c:1701
tipc_node_xmit_skb net/tipc/node.c:1766 [inline]
tipc_node_distr_xmit+0x248/0x33c net/tipc/node.c:1781
tipc_sk_rcv+0x1df0/0x2294 net/tipc/socket.c:2499
tipc_node_xmit+0x18c/0xc9c net/tipc/node.c:1701
tipc_sk_push_backlog+0x398/0x744 net/tipc/socket.c:1312
tipc_sk_conn_proto_rcv net/tipc/socket.c:1366 [inline]
tipc_sk_proto_rcv+0x704/0x12ec net/tipc/socket.c:2156
tipc_sk_filter_rcv+0x2524/0x277c net/tipc/socket.c:2350
tipc_sk_enqueue net/tipc/socket.c:2443 [inline]
tipc_sk_rcv+0x628/0x2294 net/tipc/socket.c:2495
tipc_node_xmit+0x18c/0xc9c net/tipc/node.c:1701
tipc_node_xmit_skb net/tipc/node.c:1766 [inline]
tipc_node_distr_xmit+0x248/0x33c net/tipc/node.c:1781
tipc_sk_backlog_rcv+0x164/0x214 net/tipc/socket.c:2410
sk_backlog_rcv include/net/sock.h:1150 [inline]
__release_sock+0x19c/0x39c net/core/sock.c:3172
release_sock+0x60/0x1ac net/core/sock.c:3726
sockopt_release_sock net/core/sock.c:1155 [inline]
sk_setsockopt+0x2354/0x28ec net/core/sock.c:1668
sock_setsockopt+0x68/0x80 net/core/sock.c:1675
do_sock_setsockopt+0x19c/0x328 net/socket.c:2340
__sys_setsockopt net/socket.c:2369 [inline]
__do_sys_setsockopt net/socket.c:2375 [inline]
__se_sys_setsockopt net/socket.c:2372 [inline]
__arm64_sys_setsockopt+0x170/0x1e0 net/socket.c:2372
__invoke_syscall arch/arm64/kernel/syscall.c:35 [inline]
invoke_syscall+0x98/0x254 arch/arm64/kernel/syscall.c:49
el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132
do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151
el0_svc+0x5c/0x254 arch/arm64/kernel/entry-common.c:744
el0t_64_sync_handler+0x84/0x12c arch/arm64/kernel/entry-common.c:763
el0t_64_sync+0x198/0x19c arch/arm64/kernel/entry.S:596
---
If you want syzbot to run the reproducer, reply with:
#syz test: git://repo/address.git branch-or-commit-hash
If you attach or paste a git patch, syzbot will apply it before testing.
Powered by blists - more mailing lists