Hello,
syzbot found the following issue on:
HEAD commit: 0ab06468cbd1 Linux 5.15.114
git tree: linux-5.15.y
console output:
https://syzkaller.appspot.com/x/log.txt?x=1270f095280000
kernel config:
https://syzkaller.appspot.com/x/.config?x=9a2696a271d0eba
dashboard link:
https://syzkaller.appspot.com/bug?extid=510305eb6a4bd79f22df
compiler: Debian clang version 15.0.7, GNU ld (GNU Binutils for Debian) 2.35.2
userspace arch: arm64
syz repro:
https://syzkaller.appspot.com/x/repro.syz?x=12ddb42d280000
C reproducer:
https://syzkaller.appspot.com/x/repro.c?x=120fb659280000
Downloadable assets:
disk image:
https://storage.googleapis.com/syzbot-assets/8ff3613d3f6b/disk-0ab06468.raw.xz
vmlinux:
https://storage.googleapis.com/syzbot-assets/eebe2d8c6813/vmlinux-0ab06468.xz
kernel image:
https://storage.googleapis.com/syzbot-assets/f30284c26197/Image-0ab06468.gz.xz
IMPORTANT: if you fix the issue, please add the following tag to the commit:
Reported-by:
syzbot+510305...@syzkaller.appspotmail.com
watchdog: BUG: soft lockup - CPU#0 stuck for 22s! [syz-executor116:4054]
Modules linked in:
irq event stamp: 5259
hardirqs last enabled at (5258): [<ffff800011947a48>] __exit_to_kernel_mode arch/arm64/kernel/entry-common.c:81 [inline]
hardirqs last enabled at (5258): [<ffff800011947a48>] exit_to_kernel_mode+0x100/0x178 arch/arm64/kernel/entry-common.c:91
hardirqs last disabled at (5259): [<ffff800011947c90>] enter_el1_irq_or_nmi+0x10/0x1c arch/arm64/kernel/entry-common.c:227
softirqs last enabled at (510): [<ffff80000fd894b4>] local_bh_enable+0x10/0x34 include/linux/bottom_half.h:31
softirqs last disabled at (514): [<ffff800010094f44>] fq_pie_change+0x248/0xda8 net/sched/sch_fq_pie.c:293
CPU: 0 PID: 4054 Comm: syz-executor116 Not tainted 5.15.114-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/28/2023
pstate: 00400005 (nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : queued_spin_lock_slowpath+0x160/0x938 kernel/locking/qspinlock.c:382
lr : queued_spin_lock_slowpath+0x16c/0x938 kernel/locking/qspinlock.c:382
sp : ffff80001cd76aa0
x29: ffff80001cd76b40 x28: 1ffff000039aed60 x27: 1fffe0001967b41f
x26: dfff800000000000 x25: ffff7000039aed58 x24: ffff80001cd76ac0
x23: 1fffe0001967b41e x22: ffff80001cd76b00 x21: 0000000000000001
x20: 0000000000000001 x19: ffff0000cb3da0f0 x18: 0000000000000000
x17: ff8080000aae0f20 x16: ffff80000830309c x15: ffff80000aae0f20
x14: 1ffff0000291a06a x13: ffffffffffffffff x12: 0000000000000001
x11: 1fffe0001967b41e x10: 0000000000000000 x9 : 0000000000000000
x8 : 0000000000000101 x7 : ffff800010094f44 x6 : 0000000000000000
x5 : 0000000000000000
x4 : 0000000000000001 x3 : ffff8000083023a8
x2 : 0000000000000000
x1 : 0000000000000004
x0 : 0000000000000001
Call trace:
__cmpwait_case_32 arch/arm64/include/asm/cmpxchg.h:252 [inline]
__cmpwait arch/arm64/include/asm/cmpxchg.h:278 [inline]
queued_spin_lock_slowpath+0x160/0x938 kernel/locking/qspinlock.c:382
queued_spin_lock include/asm-generic/qspinlock.h:85 [inline]
do_raw_spin_lock+0x334/0x35c kernel/locking/spinlock_debug.c:115
__raw_spin_lock_bh include/linux/spinlock_api_smp.h:136 [inline]
_raw_spin_lock_bh+0x12c/0x1c4 kernel/locking/spinlock.c:178
fq_pie_change+0x248/0xda8 net/sched/sch_fq_pie.c:293
fq_pie_init+0x2b0/0x714 net/sched/sch_fq_pie.c:414
qdisc_create+0x61c/0x1300 net/sched/sch_api.c:1259
tc_modify_qdisc+0x8dc/0x126c
rtnetlink_rcv_msg+0xa74/0xdac net/core/rtnetlink.c:5587
netlink_rcv_skb+0x20c/0x3b8 net/netlink/af_netlink.c:2504
rtnetlink_rcv+0x28/0x38 net/core/rtnetlink.c:5605
netlink_unicast_kernel net/netlink/af_netlink.c:1330 [inline]
netlink_unicast+0x664/0x938 net/netlink/af_netlink.c:1356
netlink_sendmsg+0x844/0xb38 net/netlink/af_netlink.c:1923
sock_sendmsg_nosec net/socket.c:704 [inline]
sock_sendmsg net/socket.c:724 [inline]
____sys_sendmsg+0x584/0x870 net/socket.c:2412
___sys_sendmsg+0x214/0x294 net/socket.c:2466
__sys_sendmsg net/socket.c:2495 [inline]
__do_sys_sendmsg net/socket.c:2504 [inline]
__se_sys_sendmsg net/socket.c:2502 [inline]
__arm64_sys_sendmsg+0x1ac/0x25c net/socket.c:2502
__invoke_syscall arch/arm64/kernel/syscall.c:38 [inline]
invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:52
el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142
do_el0_svc+0x58/0x14c arch/arm64/kernel/syscall.c:181
el0_svc+0x7c/0x1f0 arch/arm64/kernel/entry-common.c:596
el0t_64_sync_handler+0x84/0xe4 arch/arm64/kernel/entry-common.c:614
el0t_64_sync+0x1a0/0x1a4 arch/arm64/kernel/entry.S:584
---
This report is generated by a bot. It may contain errors.
See
https://goo.gl/tpsmEJ for more information about syzbot.
syzbot engineers can be reached at
syzk...@googlegroups.com.
syzbot will keep track of this issue. See:
https://goo.gl/tpsmEJ#status for how to communicate with syzbot.
If the bug is already fixed, let syzbot know by replying with:
#syz fix: exact-commit-title
If you want syzbot to run the reproducer, reply with:
#syz test: git://repo/address.git branch-or-commit-hash
If you attach or paste a git patch, syzbot will apply it before testing.
If you want to change bug's subsystems, reply with:
#syz set subsystems: new-subsystem
(See the list of subsystem names on the web dashboard)
If the bug is a duplicate of another bug, reply with:
#syz dup: exact-subject-of-another-report
If you want to undo deduplication, reply with:
#syz undup