| Kernel | Title | Rank 🛈 | Repro | Cause bisect | Fix bisect | Count | Last | Reported | Patched | Status |
|---|---|---|---|---|---|---|---|---|---|---|
| upstream | possible deadlock in ppp_input_error ppp | 4 | 61 | 430d | 443d | 28/29 | fixed on 2024/11/12 23:31 |
syzbot |
sign-in | mailing list | source | docs |
| Kernel | Title | Rank 🛈 | Repro | Cause bisect | Fix bisect | Count | Last | Reported | Patched | Status |
|---|---|---|---|---|---|---|---|---|---|---|
| upstream | possible deadlock in ppp_input_error ppp | 4 | 61 | 430d | 443d | 28/29 | fixed on 2024/11/12 23:31 |
=====================================================
WARNING: SOFTIRQ-READ-safe -> SOFTIRQ-READ-unsafe lock order detected
6.1.112-syzkaller #0 Not tainted
-----------------------------------------------------
syz.0.1493/11005 [HC0[0]:SC0[4]:HE1:SE0] is trying to acquire:
ffff88806583c1e0 (&pch->downl){+.+.}-{2:2}, at: spin_lock include/linux/spinlock.h:351 [inline]
ffff88806583c1e0 (&pch->downl){+.+.}-{2:2}, at: ppp_push+0xf3/0x1310 drivers/net/ppp/ppp_generic.c:1896
and this task is already holding:
ffff88806248ce10 (&ppp->wlock){+...}-{2:2}, at: spin_lock_bh include/linux/spinlock.h:356 [inline]
ffff88806248ce10 (&ppp->wlock){+...}-{2:2}, at: __ppp_xmit_process+0x92/0x19a0 drivers/net/ppp/ppp_generic.c:1653
which would create a new lock dependency:
(&ppp->wlock){+...}-{2:2} -> (&pch->downl){+.+.}-{2:2}
but this new dependency connects a SOFTIRQ-READ-irq-safe lock:
(&pch->upl){++.-}-{2:2}
... which became SOFTIRQ-READ-irq-safe at:
lock_acquire+0x1f8/0x5a0 kernel/locking/lockdep.c:5662
__raw_read_lock_bh include/linux/rwlock_api_smp.h:176 [inline]
_raw_read_lock_bh+0x39/0x50 kernel/locking/spinlock.c:252
ppp_input_error+0x5c/0x1a0 drivers/net/ppp/ppp_generic.c:2344
ppp_sync_process+0x86/0x170 drivers/net/ppp/ppp_synctty.c:495
tasklet_action_common+0x3cb/0x4a0
handle_softirqs+0x2ee/0xa40 kernel/softirq.c:571
run_ksoftirqd+0xc6/0x120 kernel/softirq.c:938
smpboot_thread_fn+0x52c/0xa30 kernel/smpboot.c:164
kthread+0x28d/0x320 kernel/kthread.c:376
ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:295
to a SOFTIRQ-READ-irq-unsafe lock:
(&pch->downl){+.+.}-{2:2}
... which became SOFTIRQ-READ-irq-unsafe at:
...
lock_acquire+0x1f8/0x5a0 kernel/locking/lockdep.c:5662
__raw_spin_lock include/linux/spinlock_api_smp.h:133 [inline]
_raw_spin_lock+0x2a/0x40 kernel/locking/spinlock.c:154
spin_lock include/linux/spinlock.h:351 [inline]
ppp_channel_bridge_input drivers/net/ppp/ppp_generic.c:2272 [inline]
ppp_input+0x185/0xa00 drivers/net/ppp/ppp_generic.c:2304
pppoe_rcv_core+0x112/0x300 drivers/net/ppp/pppoe.c:379
sk_backlog_rcv include/net/sock.h:1117 [inline]
__release_sock+0x198/0x4b0 net/core/sock.c:2936
release_sock+0x5d/0x1c0 net/core/sock.c:3500
pppoe_sendmsg+0xd1/0x740 drivers/net/ppp/pppoe.c:903
sock_sendmsg_nosec net/socket.c:718 [inline]
__sock_sendmsg net/socket.c:730 [inline]
____sys_sendmsg+0x5a5/0x8f0 net/socket.c:2514
___sys_sendmsg net/socket.c:2568 [inline]
__sys_sendmmsg+0x3ab/0x730 net/socket.c:2654
__do_sys_sendmmsg net/socket.c:2683 [inline]
__se_sys_sendmmsg net/socket.c:2680 [inline]
__x64_sys_sendmmsg+0x9c/0xb0 net/socket.c:2680
do_syscall_x64 arch/x86/entry/common.c:51 [inline]
do_syscall_64+0x3b/0xb0 arch/x86/entry/common.c:81
entry_SYSCALL_64_after_hwframe+0x68/0xd2
other info that might help us debug this:
Chain exists of:
&pch->upl --> &ppp->wlock --> &pch->downl
Possible interrupt unsafe locking scenario:
CPU0 CPU1
---- ----
lock(&pch->downl);
local_irq_disable();
lock(&pch->upl);
lock(&ppp->wlock);
<Interrupt>
lock(&pch->upl);
*** DEADLOCK ***
1 lock held by syz.0.1493/11005:
#0: ffff88806248ce10 (&ppp->wlock){+...}-{2:2}, at: spin_lock_bh include/linux/spinlock.h:356 [inline]
#0: ffff88806248ce10 (&ppp->wlock){+...}-{2:2}, at: __ppp_xmit_process+0x92/0x19a0 drivers/net/ppp/ppp_generic.c:1653
the dependencies between SOFTIRQ-READ-irq-safe lock and the holding lock:
-> (&pch->upl){++.-}-{2:2} {
HARDIRQ-ON-W at:
lock_acquire+0x1f8/0x5a0 kernel/locking/lockdep.c:5662
__raw_write_lock_bh include/linux/rwlock_api_smp.h:202 [inline]
_raw_write_lock_bh+0x31/0x40 kernel/locking/spinlock.c:334
ppp_disconnect_channel+0x2f/0x2d0 drivers/net/ppp/ppp_generic.c:3522
ppp_unregister_channel+0xb5/0x2f0 drivers/net/ppp/ppp_generic.c:2996
ppp_asynctty_close+0xed/0x180 drivers/net/ppp/ppp_async.c:237
tty_ldisc_kill+0xa6/0x1a0 drivers/tty/tty_ldisc.c:614
tty_ldisc_release+0x19d/0x200 drivers/tty/tty_ldisc.c:782
tty_release_struct+0x27/0xd0 drivers/tty/tty_io.c:1689
tty_release+0xcfb/0x12a0 drivers/tty/tty_io.c:1860
__fput+0x3f6/0x8d0 fs/file_table.c:320
task_work_run+0x246/0x300 kernel/task_work.c:203
resume_user_mode_work include/linux/resume_user_mode.h:49 [inline]
exit_to_user_mode_loop+0xde/0x100 kernel/entry/common.c:177
exit_to_user_mode_prepare+0xb1/0x140 kernel/entry/common.c:210
__syscall_exit_to_user_mode_work kernel/entry/common.c:292 [inline]
syscall_exit_to_user_mode+0x60/0x270 kernel/entry/common.c:303
do_syscall_64+0x47/0xb0 arch/x86/entry/common.c:87
entry_SYSCALL_64_after_hwframe+0x68/0xd2
HARDIRQ-ON-R at:
lock_acquire+0x1f8/0x5a0 kernel/locking/lockdep.c:5662
__raw_read_lock_bh include/linux/rwlock_api_smp.h:176 [inline]
_raw_read_lock_bh+0x39/0x50 kernel/locking/spinlock.c:252
ppp_input_error+0x5c/0x1a0 drivers/net/ppp/ppp_generic.c:2344
ppp_sync_process+0x86/0x170 drivers/net/ppp/ppp_synctty.c:495
tasklet_action_common+0x3cb/0x4a0
handle_softirqs+0x2ee/0xa40 kernel/softirq.c:571
run_ksoftirqd+0xc6/0x120 kernel/softirq.c:938
smpboot_thread_fn+0x52c/0xa30 kernel/smpboot.c:164
kthread+0x28d/0x320 kernel/kthread.c:376
ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:295
IN-SOFTIRQ-R at:
lock_acquire+0x1f8/0x5a0 kernel/locking/lockdep.c:5662
__raw_read_lock_bh include/linux/rwlock_api_smp.h:176 [inline]
_raw_read_lock_bh+0x39/0x50 kernel/locking/spinlock.c:252
ppp_input_error+0x5c/0x1a0 drivers/net/ppp/ppp_generic.c:2344
ppp_sync_process+0x86/0x170 drivers/net/ppp/ppp_synctty.c:495
tasklet_action_common+0x3cb/0x4a0
handle_softirqs+0x2ee/0xa40 kernel/softirq.c:571
run_ksoftirqd+0xc6/0x120 kernel/softirq.c:938
smpboot_thread_fn+0x52c/0xa30 kernel/smpboot.c:164
kthread+0x28d/0x320 kernel/kthread.c:376
ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:295
INITIAL USE at:
lock_acquire+0x1f8/0x5a0 kernel/locking/lockdep.c:5662
__raw_write_lock_bh include/linux/rwlock_api_smp.h:202 [inline]
_raw_write_lock_bh+0x31/0x40 kernel/locking/spinlock.c:334
ppp_disconnect_channel+0x2f/0x2d0 drivers/net/ppp/ppp_generic.c:3522
ppp_unregister_channel+0xb5/0x2f0 drivers/net/ppp/ppp_generic.c:2996
ppp_asynctty_close+0xed/0x180 drivers/net/ppp/ppp_async.c:237
tty_ldisc_kill+0xa6/0x1a0 drivers/tty/tty_ldisc.c:614
tty_ldisc_release+0x19d/0x200 drivers/tty/tty_ldisc.c:782
tty_release_struct+0x27/0xd0 drivers/tty/tty_io.c:1689
tty_release+0xcfb/0x12a0 drivers/tty/tty_io.c:1860
__fput+0x3f6/0x8d0 fs/file_table.c:320
task_work_run+0x246/0x300 kernel/task_work.c:203
resume_user_mode_work include/linux/resume_user_mode.h:49 [inline]
exit_to_user_mode_loop+0xde/0x100 kernel/entry/common.c:177
exit_to_user_mode_prepare+0xb1/0x140 kernel/entry/common.c:210
__syscall_exit_to_user_mode_work kernel/entry/common.c:292 [inline]
syscall_exit_to_user_mode+0x60/0x270 kernel/entry/common.c:303
do_syscall_64+0x47/0xb0 arch/x86/entry/common.c:87
entry_SYSCALL_64_after_hwframe+0x68/0xd2
INITIAL READ USE at:
lock_acquire+0x1f8/0x5a0 kernel/locking/lockdep.c:5662
__raw_read_lock_bh include/linux/rwlock_api_smp.h:176 [inline]
_raw_read_lock_bh+0x39/0x50 kernel/locking/spinlock.c:252
ppp_input_error+0x5c/0x1a0 drivers/net/ppp/ppp_generic.c:2344
ppp_sync_process+0x86/0x170 drivers/net/ppp/ppp_synctty.c:495
tasklet_action_common+0x3cb/0x4a0
handle_softirqs+0x2ee/0xa40 kernel/softirq.c:571
run_ksoftirqd+0xc6/0x120 kernel/softirq.c:938
smpboot_thread_fn+0x52c/0xa30 kernel/smpboot.c:164
kthread+0x28d/0x320 kernel/kthread.c:376
ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:295
}
... key at: [<ffffffff976dc060>] ppp_register_net_channel.__key.3+0x0/0x20
-> (&ppp->wlock){+...}-{2:2} {
HARDIRQ-ON-W at:
lock_acquire+0x1f8/0x5a0 kernel/locking/lockdep.c:5662
__raw_spin_lock_bh include/linux/spinlock_api_smp.h:126 [inline]
_raw_spin_lock_bh+0x31/0x40 kernel/locking/spinlock.c:178
spin_lock_bh include/linux/spinlock.h:356 [inline]
ppp_get_stats64+0xbf/0x290 drivers/net/ppp/ppp_generic.c:1539
dev_get_stats+0xa7/0x490 net/core/dev.c:10471
rtnl_fill_stats+0x47/0x880 net/core/rtnetlink.c:1244
rtnl_fill_ifinfo+0x18aa/0x2090 net/core/rtnetlink.c:1825
rtmsg_ifinfo_build_skb+0xdc/0x180 net/core/rtnetlink.c:3938
rtmsg_ifinfo_event net/core/rtnetlink.c:3970 [inline]
rtmsg_ifinfo+0x71/0x120 net/core/rtnetlink.c:3979
register_netdevice+0x13dc/0x1720 net/core/dev.c:10146
ppp_unit_register drivers/net/ppp/ppp_generic.c:1217 [inline]
ppp_dev_configure+0x850/0xab0 drivers/net/ppp/ppp_generic.c:1273
ppp_create_interface drivers/net/ppp/ppp_generic.c:3348 [inline]
ppp_unattached_ioctl drivers/net/ppp/ppp_generic.c:1058 [inline]
ppp_ioctl+0x702/0x1c90 drivers/net/ppp/ppp_generic.c:731
vfs_ioctl fs/ioctl.c:51 [inline]
__do_sys_ioctl fs/ioctl.c:870 [inline]
__se_sys_ioctl+0xf1/0x160 fs/ioctl.c:856
do_syscall_x64 arch/x86/entry/common.c:51 [inline]
do_syscall_64+0x3b/0xb0 arch/x86/entry/common.c:81
entry_SYSCALL_64_after_hwframe+0x68/0xd2
INITIAL USE at:
lock_acquire+0x1f8/0x5a0 kernel/locking/lockdep.c:5662
__raw_spin_lock_bh include/linux/spinlock_api_smp.h:126 [inline]
_raw_spin_lock_bh+0x31/0x40 kernel/locking/spinlock.c:178
spin_lock_bh include/linux/spinlock.h:356 [inline]
ppp_get_stats64+0xbf/0x290 drivers/net/ppp/ppp_generic.c:1539
dev_get_stats+0xa7/0x490 net/core/dev.c:10471
rtnl_fill_stats+0x47/0x880 net/core/rtnetlink.c:1244
rtnl_fill_ifinfo+0x18aa/0x2090 net/core/rtnetlink.c:1825
rtmsg_ifinfo_build_skb+0xdc/0x180 net/core/rtnetlink.c:3938
rtmsg_ifinfo_event net/core/rtnetlink.c:3970 [inline]
rtmsg_ifinfo+0x71/0x120 net/core/rtnetlink.c:3979
register_netdevice+0x13dc/0x1720 net/core/dev.c:10146
ppp_unit_register drivers/net/ppp/ppp_generic.c:1217 [inline]
ppp_dev_configure+0x850/0xab0 drivers/net/ppp/ppp_generic.c:1273
ppp_create_interface drivers/net/ppp/ppp_generic.c:3348 [inline]
ppp_unattached_ioctl drivers/net/ppp/ppp_generic.c:1058 [inline]
ppp_ioctl+0x702/0x1c90 drivers/net/ppp/ppp_generic.c:731
vfs_ioctl fs/ioctl.c:51 [inline]
__do_sys_ioctl fs/ioctl.c:870 [inline]
__se_sys_ioctl+0xf1/0x160 fs/ioctl.c:856
do_syscall_x64 arch/x86/entry/common.c:51 [inline]
do_syscall_64+0x3b/0xb0 arch/x86/entry/common.c:81
entry_SYSCALL_64_after_hwframe+0x68/0xd2
}
... key at: [<ffffffff976dc1a0>] ppp_dev_configure.__key.65+0x0/0x20
... acquired at:
lock_acquire+0x1f8/0x5a0 kernel/locking/lockdep.c:5662
__raw_spin_lock_bh include/linux/spinlock_api_smp.h:126 [inline]
_raw_spin_lock_bh+0x31/0x40 kernel/locking/spinlock.c:178
spin_lock_bh include/linux/spinlock.h:356 [inline]
ppp_connect_channel+0x170/0x640 drivers/net/ppp/ppp_generic.c:3484
ppp_ioctl+0xbe5/0x1c90 drivers/net/ppp/ppp_generic.c:759
vfs_ioctl fs/ioctl.c:51 [inline]
__do_sys_ioctl fs/ioctl.c:870 [inline]
__se_sys_ioctl+0xf1/0x160 fs/ioctl.c:856
do_syscall_x64 arch/x86/entry/common.c:51 [inline]
do_syscall_64+0x3b/0xb0 arch/x86/entry/common.c:81
entry_SYSCALL_64_after_hwframe+0x68/0xd2
the dependencies between the lock to be acquired
and SOFTIRQ-READ-irq-unsafe lock:
-> (&pch->downl){+.+.}-{2:2} {
HARDIRQ-ON-W at:
lock_acquire+0x1f8/0x5a0 kernel/locking/lockdep.c:5662
__raw_spin_lock_bh include/linux/spinlock_api_smp.h:126 [inline]
_raw_spin_lock_bh+0x31/0x40 kernel/locking/spinlock.c:178
spin_lock_bh include/linux/spinlock.h:356 [inline]
ppp_unregister_channel+0x78/0x2f0 drivers/net/ppp/ppp_generic.c:2992
ppp_asynctty_close+0xed/0x180 drivers/net/ppp/ppp_async.c:237
tty_ldisc_kill+0xa6/0x1a0 drivers/tty/tty_ldisc.c:614
tty_ldisc_release+0x19d/0x200 drivers/tty/tty_ldisc.c:782
tty_release_struct+0x27/0xd0 drivers/tty/tty_io.c:1689
tty_release+0xcfb/0x12a0 drivers/tty/tty_io.c:1860
__fput+0x3f6/0x8d0 fs/file_table.c:320
task_work_run+0x246/0x300 kernel/task_work.c:203
resume_user_mode_work include/linux/resume_user_mode.h:49 [inline]
exit_to_user_mode_loop+0xde/0x100 kernel/entry/common.c:177
exit_to_user_mode_prepare+0xb1/0x140 kernel/entry/common.c:210
__syscall_exit_to_user_mode_work kernel/entry/common.c:292 [inline]
syscall_exit_to_user_mode+0x60/0x270 kernel/entry/common.c:303
do_syscall_64+0x47/0xb0 arch/x86/entry/common.c:87
entry_SYSCALL_64_after_hwframe+0x68/0xd2
SOFTIRQ-ON-W at:
lock_acquire+0x1f8/0x5a0 kernel/locking/lockdep.c:5662
__raw_spin_lock include/linux/spinlock_api_smp.h:133 [inline]
_raw_spin_lock+0x2a/0x40 kernel/locking/spinlock.c:154
spin_lock include/linux/spinlock.h:351 [inline]
ppp_channel_bridge_input drivers/net/ppp/ppp_generic.c:2272 [inline]
ppp_input+0x185/0xa00 drivers/net/ppp/ppp_generic.c:2304
pppoe_rcv_core+0x112/0x300 drivers/net/ppp/pppoe.c:379
sk_backlog_rcv include/net/sock.h:1117 [inline]
__release_sock+0x198/0x4b0 net/core/sock.c:2936
release_sock+0x5d/0x1c0 net/core/sock.c:3500
pppoe_sendmsg+0xd1/0x740 drivers/net/ppp/pppoe.c:903
sock_sendmsg_nosec net/socket.c:718 [inline]
__sock_sendmsg net/socket.c:730 [inline]
____sys_sendmsg+0x5a5/0x8f0 net/socket.c:2514
___sys_sendmsg net/socket.c:2568 [inline]
__sys_sendmmsg+0x3ab/0x730 net/socket.c:2654
__do_sys_sendmmsg net/socket.c:2683 [inline]
__se_sys_sendmmsg net/socket.c:2680 [inline]
__x64_sys_sendmmsg+0x9c/0xb0 net/socket.c:2680
do_syscall_x64 arch/x86/entry/common.c:51 [inline]
do_syscall_64+0x3b/0xb0 arch/x86/entry/common.c:81
entry_SYSCALL_64_after_hwframe+0x68/0xd2
INITIAL USE at:
lock_acquire+0x1f8/0x5a0 kernel/locking/lockdep.c:5662
__raw_spin_lock_bh include/linux/spinlock_api_smp.h:126 [inline]
_raw_spin_lock_bh+0x31/0x40 kernel/locking/spinlock.c:178
spin_lock_bh include/linux/spinlock.h:356 [inline]
ppp_unregister_channel+0x78/0x2f0 drivers/net/ppp/ppp_generic.c:2992
ppp_asynctty_close+0xed/0x180 drivers/net/ppp/ppp_async.c:237
tty_ldisc_kill+0xa6/0x1a0 drivers/tty/tty_ldisc.c:614
tty_ldisc_release+0x19d/0x200 drivers/tty/tty_ldisc.c:782
tty_release_struct+0x27/0xd0 drivers/tty/tty_io.c:1689
tty_release+0xcfb/0x12a0 drivers/tty/tty_io.c:1860
__fput+0x3f6/0x8d0 fs/file_table.c:320
task_work_run+0x246/0x300 kernel/task_work.c:203
resume_user_mode_work include/linux/resume_user_mode.h:49 [inline]
exit_to_user_mode_loop+0xde/0x100 kernel/entry/common.c:177
exit_to_user_mode_prepare+0xb1/0x140 kernel/entry/common.c:210
__syscall_exit_to_user_mode_work kernel/entry/common.c:292 [inline]
syscall_exit_to_user_mode+0x60/0x270 kernel/entry/common.c:303
do_syscall_64+0x47/0xb0 arch/x86/entry/common.c:87
entry_SYSCALL_64_after_hwframe+0x68/0xd2
}
... key at: [<ffffffff976dc040>] ppp_register_net_channel.__key.1+0x0/0x20
... acquired at:
lock_acquire+0x1f8/0x5a0 kernel/locking/lockdep.c:5662
__raw_spin_lock include/linux/spinlock_api_smp.h:133 [inline]
_raw_spin_lock+0x2a/0x40 kernel/locking/spinlock.c:154
spin_lock include/linux/spinlock.h:351 [inline]
ppp_push+0xf3/0x1310 drivers/net/ppp/ppp_generic.c:1896
ppp_send_frame drivers/net/ppp/ppp_generic.c:1861 [inline]
__ppp_xmit_process+0x846/0x19a0 drivers/net/ppp/ppp_generic.c:1661
ppp_xmit_process+0x14b/0x310 drivers/net/ppp/ppp_generic.c:1682
ppp_write+0x2a9/0x3a0 drivers/net/ppp/ppp_generic.c:534
do_iter_write+0x503/0xc40 fs/read_write.c:863
vfs_writev fs/read_write.c:934 [inline]
do_pwritev+0x216/0x360 fs/read_write.c:1031
do_syscall_x64 arch/x86/entry/common.c:51 [inline]
do_syscall_64+0x3b/0xb0 arch/x86/entry/common.c:81
entry_SYSCALL_64_after_hwframe+0x68/0xd2
stack backtrace:
CPU: 0 PID: 11005 Comm: syz.0.1493 Not tainted 6.1.112-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
Call Trace:
<TASK>
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0x1e3/0x2cb lib/dump_stack.c:106
print_bad_irq_dependency kernel/locking/lockdep.c:2604 [inline]
check_irq_usage kernel/locking/lockdep.c:2843 [inline]
check_prev_add kernel/locking/lockdep.c:3094 [inline]
check_prevs_add kernel/locking/lockdep.c:3209 [inline]
validate_chain+0x4d16/0x5950 kernel/locking/lockdep.c:3825
__lock_acquire+0x125b/0x1f80 kernel/locking/lockdep.c:5049
lock_acquire+0x1f8/0x5a0 kernel/locking/lockdep.c:5662
__raw_spin_lock include/linux/spinlock_api_smp.h:133 [inline]
_raw_spin_lock+0x2a/0x40 kernel/locking/spinlock.c:154
spin_lock include/linux/spinlock.h:351 [inline]
ppp_push+0xf3/0x1310 drivers/net/ppp/ppp_generic.c:1896
ppp_send_frame drivers/net/ppp/ppp_generic.c:1861 [inline]
__ppp_xmit_process+0x846/0x19a0 drivers/net/ppp/ppp_generic.c:1661
ppp_xmit_process+0x14b/0x310 drivers/net/ppp/ppp_generic.c:1682
ppp_write+0x2a9/0x3a0 drivers/net/ppp/ppp_generic.c:534
do_iter_write+0x503/0xc40 fs/read_write.c:863
vfs_writev fs/read_write.c:934 [inline]
do_pwritev+0x216/0x360 fs/read_write.c:1031
do_syscall_x64 arch/x86/entry/common.c:51 [inline]
do_syscall_64+0x3b/0xb0 arch/x86/entry/common.c:81
entry_SYSCALL_64_after_hwframe+0x68/0xd2
RIP: 0033:0x7f61bcd7dff9
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f61bdb27038 EFLAGS: 00000246 ORIG_RAX: 0000000000000128
RAX: ffffffffffffffda RBX: 00007f61bcf35f80 RCX: 00007f61bcd7dff9
RDX: 0000000000000001 RSI: 0000000020000180 RDI: 0000000000000003
RBP: 00007f61bcdf0296 R08: 0000000000000000 R09: 0000000000000000
R10: 00000000fffffffe R11: 0000000000000246 R12: 0000000000000000
R13: 0000000000000000 R14: 00007f61bcf35f80 R15: 00007ffd6396ddd8
</TASK>
| Time | Kernel | Commit | Syzkaller | Config | Log | Report | Syz repro | C repro | VM info | Assets (help?) | Manager | Title |
|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 2024/10/11 12:24 | linux-6.1.y | aa4cd140bba5 | cd942402 | .config | console log | report | info | [disk image] [vmlinux] [kernel image] | ci2-linux-6-1-kasan | possible deadlock in ppp_input_error | ||
| 2024/10/03 21:21 | linux-6.1.y | aa4cd140bba5 | d7906eff | .config | console log | report | info | [disk image] [vmlinux] [kernel image] | ci2-linux-6-1-kasan | possible deadlock in ppp_input_error |