From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mail-ot1-f70.google.com (mail-ot1-f70.google.com [209.85.210.70]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 24A54391835 for ; Wed, 22 Apr 2026 02:51:07 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.210.70 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1776826273; cv=none; b=upnsY8KBEFtbYEf7daUrJTeJRI4VHmWUUu34sviXH2heRJU1l26G/kqIHdjKRzmZyTZJG4eF5F1HZ5kK/oYUwYC+uccgP9CwmC6GR2/kJpNutxJK080BHG3n8nmBZ73fU1Y9u4wcAbzfTjRGVf8KFT7TXH65LosrDedVi7rynLs= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1776826273; c=relaxed/simple; bh=fNodHXczowuVsini3GWhGFHV9si3W/Jihu3CNiLw0CI=; h=MIME-Version:Date:In-Reply-To:Message-ID:Subject:From:To: Content-Type; b=lnznsrFaVtaUKnIWB145iS/5/PLmpcq8Qk8UHYGcIyWza3Imqo3fGV9kcg1tCd2COym7cz1NxhFD5/q/bEtZlk8GwWVJIk9pHyWjAW7iRUR+WsaFv0I90ngAKGxz7NQTStQGSzwqjRecGbBJy2kbCi0LCS58dE0dQJJNdv1FjfQ= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=fail (p=none dis=none) header.from=syzkaller.appspotmail.com; spf=pass smtp.mailfrom=M3KW2WVRGUFZ5GODRSRYTGD7.apphosting.bounces.google.com; arc=none smtp.client-ip=209.85.210.70 Authentication-Results: smtp.subspace.kernel.org; dmarc=fail (p=none dis=none) header.from=syzkaller.appspotmail.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=M3KW2WVRGUFZ5GODRSRYTGD7.apphosting.bounces.google.com Received: by mail-ot1-f70.google.com with SMTP id 46e09a7af769-7dcdeac07b1so3068559a34.3 for ; Tue, 21 Apr 2026 19:51:06 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776826263; x=1777431063; h=to:from:subject:message-id:in-reply-to:date:mime-version :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=NIk1HY2Wyoc0omxu7CFmqmTI+OfS2q0WGM/N7IPoOtw=; b=S9pqMen40u06qn5sEhBCPwkMLHXYN04s2ZV6qobGHe3K9VSGzSiBjNllxPS30k2cop 92Ka+u1nxcrPl0busG8fZqMMRC3QKr0ll1Eo3STgamWrKErp9hETRdrKx+WkEVxHlfZP d9qaWgBuOSEQ759ybmtkhTdcosRXod5Opq0YzyN4k+1yACuo+yg9oPYx2LQMfhTGO+vh fJGC5/SXCFyOpo4+IwqFTqFmeM7weJFNnr2ErAhcTB/2quCNKxmqb1oAoM6pL0D8HfjD w042bypLoaO+WRWv7jT3nQbKP41uumUbsORDUE1zfbD1qVjkowuzevOSvG4QKtuTDX4r hgqQ== X-Forwarded-Encrypted: i=1; AFNElJ8KltmrtwX6ifZKTbWy5CwDphoIo+pVjIzndoB7jVji/NACrjYOv3uwziCrv13Utps3YjEDX3+3pjacRV0=@vger.kernel.org X-Gm-Message-State: AOJu0YyrKqEcoYF2bEh8Is++AA0WvJSV7mr/hF4wd0N60339IJiAuR9I cL3hmgZSdulZuNWURw5fQNzBnKDEHcTVfyxsjwPJkFU8yOqnbzB2/g5Y1PKU4zjCYc+53xgFO1+ eZT65B8SA/bhQjXCXsQsI4JpDrGQ7+C6JryFKTaX0cw4zy1d19ZEkD19WTag= Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-Received: by 2002:a05:6820:4df0:b0:694:89e2:74fd with SMTP id 006d021491bc7-69489e27603mr5856555eaf.50.1776826263429; Tue, 21 Apr 2026 19:51:03 -0700 (PDT) Date: Tue, 21 Apr 2026 19:51:03 -0700 In-Reply-To: <20260422021207.16887-1-kartikey406@gmail.com> X-Google-Appengine-App-Id: s~syzkaller X-Google-Appengine-App-Id-Alias: syzkaller Message-ID: <69e83797.050a0220.24bfd3.0038.GAE@google.com> Subject: Re: [syzbot] [net?] kernel BUG in pn_socket_sendmsg From: syzbot To: kartikey406@gmail.com, linux-kernel@vger.kernel.org, syzkaller-bugs@googlegroups.com Content-Type: text/plain; charset="UTF-8" Hello, syzbot has tested the proposed patch but the reproducer is still triggering an issue: possible deadlock in __sk_receive_skb ====================================================== WARNING: possible circular locking dependency detected syzkaller #0 Not tainted ------------------------------------------------------ syz-executor220/8545 is trying to acquire lock: ffff88803ef5ae60 (slock-AF_PHONET/1){+.+.}-{3:3}, at: __sk_receive_skb+0x1bf/0x9e0 net/core/sock.c:563 but task is already holding lock: ffff88801ebde2e0 (slock-AF_PHONET){+...}-{3:3}, at: spin_lock include/linux/spinlock_rt.h:45 [inline] ffff88801ebde2e0 (slock-AF_PHONET){+...}-{3:3}, at: __sk_receive_skb+0x1f1/0x9e0 net/core/sock.c:565 which lock already depends on the new lock. the existing dependency chain (in reverse order) is: -> #1 (slock-AF_PHONET){+...}-{3:3}: rt_spin_lock+0x83/0x400 kernel/locking/spinlock_rt.c:56 spin_lock include/linux/spinlock_rt.h:45 [inline] __sk_receive_skb+0x1f1/0x9e0 net/core/sock.c:565 sk_receive_skb include/net/sock.h:2022 [inline] phonet_rcv+0x781/0xc40 net/phonet/af_phonet.c:-1 __netif_receive_skb_one_core net/core/dev.c:6210 [inline] __netif_receive_skb net/core/dev.c:6323 [inline] process_backlog+0x5e1/0xc60 net/core/dev.c:6674 __napi_poll+0xab/0x550 net/core/dev.c:7738 napi_poll net/core/dev.c:7801 [inline] net_rx_action+0x696/0xe00 net/core/dev.c:7958 handle_softirqs+0x1de/0x6d0 kernel/softirq.c:626 __do_softirq kernel/softirq.c:660 [inline] __local_bh_enable_ip+0x170/0x2b0 kernel/softirq.c:302 local_bh_enable include/linux/bottom_half.h:33 [inline] netif_rx+0xb9/0xf0 net/core/dev.c:5776 pn_send+0x62a/0x8e0 net/phonet/af_phonet.c:188 pn_skb_send+0x218/0x530 net/phonet/af_phonet.c:275 pep_indicate net/phonet/pep.c:123 [inline] pipe_snd_status+0x1f1/0x320 net/phonet/pep.c:221 pipe_grant_credits net/phonet/pep.c:244 [inline] pipe_do_rcv+0xf15/0x16a0 net/phonet/pep.c:433 sk_backlog_rcv include/net/sock.h:1190 [inline] __sk_receive_skb+0x962/0x9e0 net/core/sock.c:572 sk_receive_skb include/net/sock.h:2022 [inline] pep_do_rcv+0x685/0xaa0 net/phonet/pep.c:675 sk_backlog_rcv include/net/sock.h:1190 [inline] __release_sock+0x2a9/0x3d0 net/core/sock.c:3216 release_sock+0x1be/0x290 net/core/sock.c:3815 pep_sock_accept+0xd47/0x11e0 net/phonet/pep.c:879 pn_socket_accept+0xc1/0x310 net/phonet/socket.c:303 do_accept+0x6ca/0x930 net/socket.c:2062 __sys_accept4_file net/socket.c:2096 [inline] __sys_accept4+0x139/0x230 net/socket.c:2118 __do_sys_accept4 net/socket.c:2125 [inline] __se_sys_accept4 net/socket.c:2122 [inline] __x64_sys_accept4+0x9a/0xb0 net/socket.c:2122 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0x15f/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f -> #0 (slock-AF_PHONET/1){+.+.}-{3:3}: check_prev_add kernel/locking/lockdep.c:3167 [inline] check_prevs_add kernel/locking/lockdep.c:3286 [inline] validate_chain kernel/locking/lockdep.c:3910 [inline] __lock_acquire+0x15a5/0x2cf0 kernel/locking/lockdep.c:5239 lock_acquire+0x106/0x350 kernel/locking/lockdep.c:5870 rt_spin_lock_nested+0x81/0x3f0 kernel/locking/spinlock_rt.c:64 __sk_receive_skb+0x1bf/0x9e0 net/core/sock.c:563 sk_receive_skb include/net/sock.h:2022 [inline] pep_do_rcv+0x685/0xaa0 net/phonet/pep.c:675 sk_backlog_rcv include/net/sock.h:1190 [inline] __sk_receive_skb+0x962/0x9e0 net/core/sock.c:572 sk_receive_skb include/net/sock.h:2022 [inline] phonet_rcv+0x781/0xc40 net/phonet/af_phonet.c:-1 __netif_receive_skb_one_core net/core/dev.c:6210 [inline] __netif_receive_skb net/core/dev.c:6323 [inline] process_backlog+0x5e1/0xc60 net/core/dev.c:6674 __napi_poll+0xab/0x550 net/core/dev.c:7738 napi_poll net/core/dev.c:7801 [inline] net_rx_action+0x696/0xe00 net/core/dev.c:7958 handle_softirqs+0x1de/0x6d0 kernel/softirq.c:626 __do_softirq kernel/softirq.c:660 [inline] __local_bh_enable_ip+0x170/0x2b0 kernel/softirq.c:302 local_bh_enable include/linux/bottom_half.h:33 [inline] netif_rx+0xb9/0xf0 net/core/dev.c:5776 pn_send+0x62a/0x8e0 net/phonet/af_phonet.c:188 pn_skb_send+0x218/0x530 net/phonet/af_phonet.c:275 pep_sock_close+0x2c1/0x5b0 include/linux/skbuff.h:-1 pn_socket_release+0x9b/0xc0 net/phonet/socket.c:34 __sock_release+0xb9/0x250 net/socket.c:726 sock_close+0x1c/0x30 net/socket.c:1529 __fput+0x461/0xa70 fs/file_table.c:510 fput_close_sync+0x11f/0x240 fs/file_table.c:615 __do_sys_close fs/open.c:1507 [inline] __se_sys_close fs/open.c:1492 [inline] __x64_sys_close+0x7e/0x110 fs/open.c:1492 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0x15f/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f other info that might help us debug this: Possible unsafe locking scenario: CPU0 CPU1 ---- ---- lock(slock-AF_PHONET); lock(slock-AF_PHONET/1); lock(slock-AF_PHONET); lock(slock-AF_PHONET/1); *** DEADLOCK *** 7 locks held by syz-executor220/8545: #0: ffff88804d147578 (&sb->s_type->i_mutex_key#13){+.+.}-{4:4}, at: inode_lock include/linux/fs.h:1029 [inline] #0: ffff88804d147578 (&sb->s_type->i_mutex_key#13){+.+.}-{4:4}, at: __sock_release+0x89/0x250 net/socket.c:725 #1: ffff88801ebd8c18 (sk_lock-AF_PHONET){+.+.}-{0:0}, at: lock_sock include/net/sock.h:1713 [inline] #1: ffff88801ebd8c18 (sk_lock-AF_PHONET){+.+.}-{0:0}, at: pep_sock_close+0x86/0x5b0 net/phonet/pep.c:742 #2: ffffffff8e3c8140 (rcu_read_lock){....}-{1:3}, at: __local_bh_disable_ip+0x3c/0x420 kernel/softirq.c:163 #3: ffffffff8e3c8140 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire include/linux/rcupdate.h:300 [inline] #3: ffffffff8e3c8140 (rcu_read_lock){....}-{1:3}, at: rcu_read_lock include/linux/rcupdate.h:838 [inline] #3: ffffffff8e3c8140 (rcu_read_lock){....}-{1:3}, at: process_backlog+0x271/0xc60 net/core/dev.c:6673 #4: ffff88801ebde2e0 (slock-AF_PHONET){+...}-{3:3}, at: spin_lock include/linux/spinlock_rt.h:45 [inline] #4: ffff88801ebde2e0 (slock-AF_PHONET){+...}-{3:3}, at: __sk_receive_skb+0x1f1/0x9e0 net/core/sock.c:565 #5: ffffffff8e3c8140 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire include/linux/rcupdate.h:300 [inline] #5: ffffffff8e3c8140 (rcu_read_lock){....}-{1:3}, at: rcu_read_lock include/linux/rcupdate.h:838 [inline] #5: ffffffff8e3c8140 (rcu_read_lock){....}-{1:3}, at: __rt_spin_lock kernel/locking/spinlock_rt.c:50 [inline] #5: ffffffff8e3c8140 (rcu_read_lock){....}-{1:3}, at: rt_spin_lock+0x1e0/0x400 kernel/locking/spinlock_rt.c:57 #6: ffff88801ebde398 (sk_lock-AF_PHONET){+.+.}-{0:0}, at: sk_receive_skb include/net/sock.h:2022 [inline] #6: ffff88801ebde398 (sk_lock-AF_PHONET){+.+.}-{0:0}, at: phonet_rcv+0x781/0xc40 net/phonet/af_phonet.c:-1 stack backtrace: CPU: 1 UID: 0 PID: 8545 Comm: syz-executor220 Not tainted syzkaller #0 PREEMPT_{RT,(full)} Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 Call Trace: dump_stack_lvl+0xe8/0x150 lib/dump_stack.c:120 print_circular_bug+0x2e1/0x300 kernel/locking/lockdep.c:2045 check_noncircular+0x12e/0x150 kernel/locking/lockdep.c:2177 check_prev_add kernel/locking/lockdep.c:3167 [inline] check_prevs_add kernel/locking/lockdep.c:3286 [inline] validate_chain kernel/locking/lockdep.c:3910 [inline] __lock_acquire+0x15a5/0x2cf0 kernel/locking/lockdep.c:5239 lock_acquire+0x106/0x350 kernel/locking/lockdep.c:5870 rt_spin_lock_nested+0x81/0x3f0 kernel/locking/spinlock_rt.c:64 __sk_receive_skb+0x1bf/0x9e0 net/core/sock.c:563 sk_receive_skb include/net/sock.h:2022 [inline] pep_do_rcv+0x685/0xaa0 net/phonet/pep.c:675 sk_backlog_rcv include/net/sock.h:1190 [inline] __sk_receive_skb+0x962/0x9e0 net/core/sock.c:572 sk_receive_skb include/net/sock.h:2022 [inline] phonet_rcv+0x781/0xc40 net/phonet/af_phonet.c:-1 __netif_receive_skb_one_core net/core/dev.c:6210 [inline] __netif_receive_skb net/core/dev.c:6323 [inline] process_backlog+0x5e1/0xc60 net/core/dev.c:6674 __napi_poll+0xab/0x550 net/core/dev.c:7738 napi_poll net/core/dev.c:7801 [inline] net_rx_action+0x696/0xe00 net/core/dev.c:7958 handle_softirqs+0x1de/0x6d0 kernel/softirq.c:626 __do_softirq kernel/softirq.c:660 [inline] __local_bh_enable_ip+0x170/0x2b0 kernel/softirq.c:302 local_bh_enable include/linux/bottom_half.h:33 [inline] netif_rx+0xb9/0xf0 net/core/dev.c:5776 pn_send+0x62a/0x8e0 net/phonet/af_phonet.c:188 pn_skb_send+0x218/0x530 net/phonet/af_phonet.c:275 pep_sock_close+0x2c1/0x5b0 include/linux/skbuff.h:-1 pn_socket_release+0x9b/0xc0 net/phonet/socket.c:34 __sock_release+0xb9/0x250 net/socket.c:726 sock_close+0x1c/0x30 net/socket.c:1529 __fput+0x461/0xa70 fs/file_table.c:510 fput_close_sync+0x11f/0x240 fs/file_table.c:615 __do_sys_close fs/open.c:1507 [inline] __se_sys_close fs/open.c:1492 [inline] __x64_sys_close+0x7e/0x110 fs/open.c:1492 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0x15f/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f1251e9b98e Code: 08 0f 85 65 e1 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 90 41 57 41 56 4d 89 c6 41 55 4d 89 cd 41 54 55 53 48 83 ec 08 RSP: 002b:00007ffdde912fb8 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 RAX: ffffffffffffffda RBX: 0000555572330400 RCX: 00007f1251e9b98e RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000005 RBP: 0000000000000008 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 000000000007870a R13: 000000000007873c R14: 00007f1251f36b7c R15: 00007f1251f36b60 Tested on: commit: bee6ea30 Add linux-next specific files for 20260421 git tree: https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git master console output: https://syzkaller.appspot.com/x/log.txt?x=16d8a2d2580000 kernel config: https://syzkaller.appspot.com/x/.config?x=354b135d724a721f dashboard link: https://syzkaller.appspot.com/bug?extid=706f5eb79044e686c794 compiler: Debian clang version 21.1.8 (++20251221033036+2078da43e25a-1~exp1~20251221153213.50), Debian LLD 21.1.8 patch: https://syzkaller.appspot.com/x/patch.diff?x=11c45f16580000