Hello,
syzbot found the following issue on:
HEAD commit: c27210688955 Linux 6.1.173
git tree: linux-6.1.y
console output:
https://syzkaller.appspot.com/x/log.txt?x=11b838ec580000
kernel config:
https://syzkaller.appspot.com/x/.config?x=b1adc0bfde2d8a4a
dashboard link:
https://syzkaller.appspot.com/bug?extid=ba6a08608c55c5ae4480
compiler: Debian clang version 21.1.8 (++20251221033036+2078da43e25a-1~exp1~20251221153213.50), Debian LLD 21.1.8
userspace arch: arm64
Unfortunately, I don't have any reproducer for this issue yet.
Downloadable assets:
disk image:
https://storage.googleapis.com/syzbot-assets/4cb5bf5356f0/disk-c2721068.raw.xz
vmlinux:
https://storage.googleapis.com/syzbot-assets/b3e6413ae0e6/vmlinux-c2721068.xz
kernel image:
https://storage.googleapis.com/syzbot-assets/6903bc5d334e/Image-c2721068.gz.xz
IMPORTANT: if you fix the issue, please add the following tag to the commit:
Reported-by:
syzbot+ba6a08...@syzkaller.appspotmail.com
wlan1: authenticate with 50:50:50:50:50:50
wlan1: No basic rates, using min rate instead
wlan1: 80 MHz not supported, disabling VHT
------------[ cut here ]------------
WARNING: CPU: 0 PID: 4561 at net/mac80211/mlme.c:455 ieee80211_determine_chantype+0xc34/0x1028 net/mac80211/mlme.c:455
Modules linked in:
CPU: 0 PID: 4561 Comm: syz.4.25 Not tainted syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026
pstate: 82400005 (Nzcv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
pc : ieee80211_determine_chantype+0xc34/0x1028 net/mac80211/mlme.c:455
lr : ieee80211_determine_chantype+0xc34/0x1028 net/mac80211/mlme.c:455
sp : ffff800021bb6460
x29: ffff800021bb6620 x28: dfff800000000000 x27: 0000000000000065
x26: 0000000000000001 x25: 1fffe0001ef9aab5 x24: 1fffe000196896e3
x23: 0000000000000000 x22: ffff0000f7cd55a8 x21: ffff800021bb67f8
x20: ffff800021bb67f0 x19: 0000000000000003 x18: ffff800011b9bf60
x17: 0000000000000000 x16: ffff8000082d93d8 x15: 0000000000000002
x14: 000000000000000d x13: 0000000000ff0100 x12: 0000000000080000
x11: 0000000000004fb2 x10: ffff80002b787000 x9 : ffff8000113d2b50
x8 : 0000000000004fb3 x7 : 0000098500000000 x6 : ffff0000cb44b718
x5 : ffff800021bb6540 x4 : ffff800021bb6810 x3 : ffff8000113d27c0
x2 : 0000000000000001 x1 : 0000000000000000 x0 : 0000000000000000
Call trace:
ieee80211_determine_chantype+0xc34/0x1028 net/mac80211/mlme.c:455
ieee80211_prep_channel+0x1ebc/0x31ac net/mac80211/mlme.c:4879
ieee80211_prep_connection+0xc8c/0x1164 net/mac80211/mlme.c:6713
ieee80211_mgd_auth+0x974/0xe24 net/mac80211/mlme.c:6893
ieee80211_auth+0x28/0x38 net/mac80211/cfg.c:2817
rdev_auth net/wireless/rdev-ops.h:473 [inline]
cfg80211_mlme_auth+0x498/0x910 net/wireless/mlme.c:285
cfg80211_conn_do_work+0x400/0x9fc net/wireless/sme.c:182
cfg80211_sme_connect net/wireless/sme.c:624 [inline]
cfg80211_connect+0x1114/0x19d8 net/wireless/sme.c:1507
nl80211_connect+0x1178/0x162c net/wireless/nl80211.c:11955
genl_family_rcv_msg_doit+0x204/0x308 net/netlink/genetlink.c:756
genl_family_rcv_msg net/netlink/genetlink.c:833 [inline]
genl_rcv_msg+0x44c/0x640 net/netlink/genetlink.c:850
netlink_rcv_skb+0x218/0x3e8 net/netlink/af_netlink.c:2511
genl_rcv+0x38/0x50 net/netlink/genetlink.c:861
netlink_unicast_kernel net/netlink/af_netlink.c:1318 [inline]
netlink_unicast+0x60c/0x814 net/netlink/af_netlink.c:1344
netlink_sendmsg+0x6f4/0x9c0 net/netlink/af_netlink.c:1872
sock_sendmsg_nosec net/socket.c:718 [inline]
__sock_sendmsg net/socket.c:730 [inline]
____sys_sendmsg+0x5c8/0x938 net/socket.c:2518
___sys_sendmsg net/socket.c:2572 [inline]
__sys_sendmsg+0x288/0x374 net/socket.c:2601
__do_sys_sendmsg net/socket.c:2610 [inline]
__se_sys_sendmsg net/socket.c:2608 [inline]
__arm64_sys_sendmsg+0x80/0x94 net/socket.c:2608
__invoke_syscall arch/arm64/kernel/syscall.c:38 [inline]
invoke_syscall+0x98/0x2b4 arch/arm64/kernel/syscall.c:52
el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:140
do_el0_svc+0x58/0x130 arch/arm64/kernel/syscall.c:204
el0_svc+0x58/0x128 arch/arm64/kernel/entry-common.c:637
el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:655
el0t_64_sync+0x18c/0x190 arch/arm64/kernel/entry.S:585
irq event stamp: 142
hardirqs last enabled at (141): [<ffff80000830fbe0>] __up_console_sem+0xb4/0xfc kernel/printk/printk.c:261
hardirqs last disabled at (142): [<ffff800011a38ab4>] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:405
softirqs last enabled at (88): [<ffff8000110ea6fc>] spin_unlock_bh include/linux/spinlock.h:396 [inline]
softirqs last enabled at (88): [<ffff8000110ea6fc>] cfg80211_get_bss+0x5dc/0x84c net/wireless/scan.c:1558
softirqs last disabled at (86): [<ffff8000110ea25c>] spin_lock_bh include/linux/spinlock.h:356 [inline]
softirqs last disabled at (86): [<ffff8000110ea25c>] cfg80211_get_bss+0x13c/0x84c net/wireless/scan.c:1532
---[ end trace 0000000000000000 ]---
wlan1: send auth to 50:50:50:50:50:50 (try 1/3)
---
This report is generated by a bot. It may contain errors.
See
https://goo.gl/tpsmEJ for more information about syzbot.
syzbot engineers can be reached at
syzk...@googlegroups.com.
syzbot will keep track of this issue. See:
https://goo.gl/tpsmEJ#status for how to communicate with syzbot.
If the report is already addressed, let syzbot know by replying with:
#syz fix: exact-commit-title
If you want to overwrite report's subsystems, reply with:
#syz set subsystems: new-subsystem
(See the list of subsystem names on the web dashboard)
If the report is a duplicate of another one, reply with:
#syz dup: exact-subject-of-another-report
If you want to undo deduplication, reply with:
#syz undup