Hello,
syzbot found the following issue on:
HEAD commit: e4d90d63d385 Linux 6.1.119
git tree: linux-6.1.y
console output:
https://syzkaller.appspot.com/x/log.txt?x=134c19e8580000
kernel config:
https://syzkaller.appspot.com/x/.config?x=393f8074c5fb7ad6
dashboard link:
https://syzkaller.appspot.com/bug?extid=4e34fd450cb85d672f0f
compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40
userspace arch: arm64
Unfortunately, I don't have any reproducer for this issue yet.
Downloadable assets:
disk image:
https://storage.googleapis.com/syzbot-assets/3986cbf4f35a/disk-e4d90d63.raw.xz
vmlinux:
https://storage.googleapis.com/syzbot-assets/d2963d16cebb/vmlinux-e4d90d63.xz
kernel image:
https://storage.googleapis.com/syzbot-assets/a877a1a23701/Image-e4d90d63.gz.xz
IMPORTANT: if you fix the issue, please add the following tag to the commit:
Reported-by:
syzbot+4e34fd...@syzkaller.appspotmail.com
watchdog: BUG: soft lockup - CPU#0 stuck for 22s! [kworker/0:0:7]
Modules linked in:
irq event stamp: 23177625
hardirqs last enabled at (23177624): [<ffff80000b7da920>] get_random_u16+0x34c/0x658 drivers/char/random.c:512
hardirqs last disabled at (23177625): [<ffff800012320e1c>] __el1_irq arch/arm64/kernel/entry-common.c:468 [inline]
hardirqs last disabled at (23177625): [<ffff800012320e1c>] el1_interrupt+0x24/0x68 arch/arm64/kernel/entry-common.c:486
softirqs last enabled at (100092): [<ffff80000cb742d0>] local_bh_enable+0x10/0x34 include/linux/bottom_half.h:32
softirqs last disabled at (100096): [<ffff80000cb7f768>] wg_socket_send_skb_to_peer+0x64/0x1a8 drivers/net/wireguard/socket.c:173
CPU: 0 PID: 7 Comm: kworker/0:0 Not tainted 6.1.119-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
Workqueue: wg-crypt-wg1 wg_packet_tx_worker
pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : get_random_u16+0x36c/0x658
lr : get_random_u16+0x368/0x658 drivers/char/random.c:512
sp : ffff80001d1b6d20
x29: ffff80001d1b6e60 x28: 0000000000000000 x27: 0000000000000023
x26: dfff800000000000 x25: ffff700003a36da8 x24: 1ffff00003a36dc4
x23: 0000000000009af0 x22: 0000000000000023 x21: 0000000000000000
x20: 0000000000000080 x19: ffff8000159e3620 x18: dfff800000000000
x17: 00000000b59a02d4 x16: ffff800008300db8 x15: 00000000f2ed27dc
x14: 1ffff00002b500b2 x13: dfff800000000000 x12: 0000000000000003
x11: 0000000000ff0100 x10: 0000000000000000 x9 : ffff80000b7da93c
x8 : ffff0000c09a3780 x7 : ffff80000b7da2a4 x6 : 0000000000000000
x5 : 0000000000000080 x4 : 0000000000000001 x3 : 0000000000000000
x2 : 0000000000000002 x1 : 0000000000000080 x0 : 0000000000000000
Call trace:
arch_local_irq_restore arch/arm64/include/asm/irqflags.h:122 [inline]
get_random_u16+0x36c/0x658 drivers/char/random.c:512
cake_dequeue+0x2184/0x3ad0 net/sched/sch_cake.c:2102
dequeue_skb net/sched/sch_generic.c:292 [inline]
qdisc_restart net/sched/sch_generic.c:397 [inline]
__qdisc_run+0x204/0x239c net/sched/sch_generic.c:415
__dev_xmit_skb net/core/dev.c:3925 [inline]
__dev_queue_xmit+0xcac/0x34d0 net/core/dev.c:4267
dev_queue_xmit include/linux/netdevice.h:3021 [inline]
neigh_hh_output include/net/neighbour.h:528 [inline]
neigh_output include/net/neighbour.h:542 [inline]
ip_finish_output2+0xc6c/0x11b8 net/ipv4/ip_output.c:228
__ip_finish_output+0x1b0/0x458
ip_finish_output+0x40/0x268 net/ipv4/ip_output.c:316
NF_HOOK_COND include/linux/netfilter.h:291 [inline]
ip_output+0x330/0x49c net/ipv4/ip_output.c:430
dst_output include/net/dst.h:444 [inline]
ip_local_out+0x120/0x160 net/ipv4/ip_output.c:126
iptunnel_xmit+0x40c/0x8ec net/ipv4/ip_tunnel_core.c:82
udp_tunnel_xmit_skb+0x1b4/0x2c8 net/ipv4/udp_tunnel_core.c:172
send4+0x73c/0xcb0 drivers/net/wireguard/socket.c:85
wg_socket_send_skb_to_peer+0xc8/0x1a8 drivers/net/wireguard/socket.c:175
wg_packet_create_data_done drivers/net/wireguard/send.c:251 [inline]
wg_packet_tx_worker+0x1a8/0x718 drivers/net/wireguard/send.c:276
process_one_work+0x7ac/0x1404 kernel/workqueue.c:2292
worker_thread+0x8e4/0xfec kernel/workqueue.c:2439
kthread+0x250/0x2d8 kernel/kthread.c:376
ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:864
---
This report is generated by a bot. It may contain errors.
See
https://goo.gl/tpsmEJ for more information about syzbot.
syzbot engineers can be reached at
syzk...@googlegroups.com.
syzbot will keep track of this issue. See:
https://goo.gl/tpsmEJ#status for how to communicate with syzbot.
If the report is already addressed, let syzbot know by replying with:
#syz fix: exact-commit-title
If you want to overwrite report's subsystems, reply with:
#syz set subsystems: new-subsystem
(See the list of subsystem names on the web dashboard)
If the report is a duplicate of another one, reply with:
#syz dup: exact-subject-of-another-report
If you want to undo deduplication, reply with:
#syz undup