Kernel | Title | Repro | Cause bisect | Fix bisect | Count | Last | Reported | Patched | Status |
---|---|---|---|---|---|---|---|---|---|
upstream | possible deadlock in ppp_input_error ppp | 61 | 96d | 109d | 28/28 | fixed on 2024/11/12 23:31 |
syzbot |
sign-in | mailing list | source | docs |
Kernel | Title | Repro | Cause bisect | Fix bisect | Count | Last | Reported | Patched | Status |
---|---|---|---|---|---|---|---|---|---|
upstream | possible deadlock in ppp_input_error ppp | 61 | 96d | 109d | 28/28 | fixed on 2024/11/12 23:31 |
===================================================== WARNING: SOFTIRQ-READ-safe -> SOFTIRQ-READ-unsafe lock order detected 6.1.112-syzkaller #0 Not tainted ----------------------------------------------------- syz.0.1493/11005 [HC0[0]:SC0[4]:HE1:SE0] is trying to acquire: ffff88806583c1e0 (&pch->downl){+.+.}-{2:2}, at: spin_lock include/linux/spinlock.h:351 [inline] ffff88806583c1e0 (&pch->downl){+.+.}-{2:2}, at: ppp_push+0xf3/0x1310 drivers/net/ppp/ppp_generic.c:1896 and this task is already holding: ffff88806248ce10 (&ppp->wlock){+...}-{2:2}, at: spin_lock_bh include/linux/spinlock.h:356 [inline] ffff88806248ce10 (&ppp->wlock){+...}-{2:2}, at: __ppp_xmit_process+0x92/0x19a0 drivers/net/ppp/ppp_generic.c:1653 which would create a new lock dependency: (&ppp->wlock){+...}-{2:2} -> (&pch->downl){+.+.}-{2:2} but this new dependency connects a SOFTIRQ-READ-irq-safe lock: (&pch->upl){++.-}-{2:2} ... which became SOFTIRQ-READ-irq-safe at: lock_acquire+0x1f8/0x5a0 kernel/locking/lockdep.c:5662 __raw_read_lock_bh include/linux/rwlock_api_smp.h:176 [inline] _raw_read_lock_bh+0x39/0x50 kernel/locking/spinlock.c:252 ppp_input_error+0x5c/0x1a0 drivers/net/ppp/ppp_generic.c:2344 ppp_sync_process+0x86/0x170 drivers/net/ppp/ppp_synctty.c:495 tasklet_action_common+0x3cb/0x4a0 handle_softirqs+0x2ee/0xa40 kernel/softirq.c:571 run_ksoftirqd+0xc6/0x120 kernel/softirq.c:938 smpboot_thread_fn+0x52c/0xa30 kernel/smpboot.c:164 kthread+0x28d/0x320 kernel/kthread.c:376 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:295 to a SOFTIRQ-READ-irq-unsafe lock: (&pch->downl){+.+.}-{2:2} ... which became SOFTIRQ-READ-irq-unsafe at: ... lock_acquire+0x1f8/0x5a0 kernel/locking/lockdep.c:5662 __raw_spin_lock include/linux/spinlock_api_smp.h:133 [inline] _raw_spin_lock+0x2a/0x40 kernel/locking/spinlock.c:154 spin_lock include/linux/spinlock.h:351 [inline] ppp_channel_bridge_input drivers/net/ppp/ppp_generic.c:2272 [inline] ppp_input+0x185/0xa00 drivers/net/ppp/ppp_generic.c:2304 pppoe_rcv_core+0x112/0x300 drivers/net/ppp/pppoe.c:379 sk_backlog_rcv include/net/sock.h:1117 [inline] __release_sock+0x198/0x4b0 net/core/sock.c:2936 release_sock+0x5d/0x1c0 net/core/sock.c:3500 pppoe_sendmsg+0xd1/0x740 drivers/net/ppp/pppoe.c:903 sock_sendmsg_nosec net/socket.c:718 [inline] __sock_sendmsg net/socket.c:730 [inline] ____sys_sendmsg+0x5a5/0x8f0 net/socket.c:2514 ___sys_sendmsg net/socket.c:2568 [inline] __sys_sendmmsg+0x3ab/0x730 net/socket.c:2654 __do_sys_sendmmsg net/socket.c:2683 [inline] __se_sys_sendmmsg net/socket.c:2680 [inline] __x64_sys_sendmmsg+0x9c/0xb0 net/socket.c:2680 do_syscall_x64 arch/x86/entry/common.c:51 [inline] do_syscall_64+0x3b/0xb0 arch/x86/entry/common.c:81 entry_SYSCALL_64_after_hwframe+0x68/0xd2 other info that might help us debug this: Chain exists of: &pch->upl --> &ppp->wlock --> &pch->downl Possible interrupt unsafe locking scenario: CPU0 CPU1 ---- ---- lock(&pch->downl); local_irq_disable(); lock(&pch->upl); lock(&ppp->wlock); <Interrupt> lock(&pch->upl); *** DEADLOCK *** 1 lock held by syz.0.1493/11005: #0: ffff88806248ce10 (&ppp->wlock){+...}-{2:2}, at: spin_lock_bh include/linux/spinlock.h:356 [inline] #0: ffff88806248ce10 (&ppp->wlock){+...}-{2:2}, at: __ppp_xmit_process+0x92/0x19a0 drivers/net/ppp/ppp_generic.c:1653 the dependencies between SOFTIRQ-READ-irq-safe lock and the holding lock: -> (&pch->upl){++.-}-{2:2} { HARDIRQ-ON-W at: lock_acquire+0x1f8/0x5a0 kernel/locking/lockdep.c:5662 __raw_write_lock_bh include/linux/rwlock_api_smp.h:202 [inline] _raw_write_lock_bh+0x31/0x40 kernel/locking/spinlock.c:334 ppp_disconnect_channel+0x2f/0x2d0 drivers/net/ppp/ppp_generic.c:3522 ppp_unregister_channel+0xb5/0x2f0 drivers/net/ppp/ppp_generic.c:2996 ppp_asynctty_close+0xed/0x180 drivers/net/ppp/ppp_async.c:237 tty_ldisc_kill+0xa6/0x1a0 drivers/tty/tty_ldisc.c:614 tty_ldisc_release+0x19d/0x200 drivers/tty/tty_ldisc.c:782 tty_release_struct+0x27/0xd0 drivers/tty/tty_io.c:1689 tty_release+0xcfb/0x12a0 drivers/tty/tty_io.c:1860 __fput+0x3f6/0x8d0 fs/file_table.c:320 task_work_run+0x246/0x300 kernel/task_work.c:203 resume_user_mode_work include/linux/resume_user_mode.h:49 [inline] exit_to_user_mode_loop+0xde/0x100 kernel/entry/common.c:177 exit_to_user_mode_prepare+0xb1/0x140 kernel/entry/common.c:210 __syscall_exit_to_user_mode_work kernel/entry/common.c:292 [inline] syscall_exit_to_user_mode+0x60/0x270 kernel/entry/common.c:303 do_syscall_64+0x47/0xb0 arch/x86/entry/common.c:87 entry_SYSCALL_64_after_hwframe+0x68/0xd2 HARDIRQ-ON-R at: lock_acquire+0x1f8/0x5a0 kernel/locking/lockdep.c:5662 __raw_read_lock_bh include/linux/rwlock_api_smp.h:176 [inline] _raw_read_lock_bh+0x39/0x50 kernel/locking/spinlock.c:252 ppp_input_error+0x5c/0x1a0 drivers/net/ppp/ppp_generic.c:2344 ppp_sync_process+0x86/0x170 drivers/net/ppp/ppp_synctty.c:495 tasklet_action_common+0x3cb/0x4a0 handle_softirqs+0x2ee/0xa40 kernel/softirq.c:571 run_ksoftirqd+0xc6/0x120 kernel/softirq.c:938 smpboot_thread_fn+0x52c/0xa30 kernel/smpboot.c:164 kthread+0x28d/0x320 kernel/kthread.c:376 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:295 IN-SOFTIRQ-R at: lock_acquire+0x1f8/0x5a0 kernel/locking/lockdep.c:5662 __raw_read_lock_bh include/linux/rwlock_api_smp.h:176 [inline] _raw_read_lock_bh+0x39/0x50 kernel/locking/spinlock.c:252 ppp_input_error+0x5c/0x1a0 drivers/net/ppp/ppp_generic.c:2344 ppp_sync_process+0x86/0x170 drivers/net/ppp/ppp_synctty.c:495 tasklet_action_common+0x3cb/0x4a0 handle_softirqs+0x2ee/0xa40 kernel/softirq.c:571 run_ksoftirqd+0xc6/0x120 kernel/softirq.c:938 smpboot_thread_fn+0x52c/0xa30 kernel/smpboot.c:164 kthread+0x28d/0x320 kernel/kthread.c:376 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:295 INITIAL USE at: lock_acquire+0x1f8/0x5a0 kernel/locking/lockdep.c:5662 __raw_write_lock_bh include/linux/rwlock_api_smp.h:202 [inline] _raw_write_lock_bh+0x31/0x40 kernel/locking/spinlock.c:334 ppp_disconnect_channel+0x2f/0x2d0 drivers/net/ppp/ppp_generic.c:3522 ppp_unregister_channel+0xb5/0x2f0 drivers/net/ppp/ppp_generic.c:2996 ppp_asynctty_close+0xed/0x180 drivers/net/ppp/ppp_async.c:237 tty_ldisc_kill+0xa6/0x1a0 drivers/tty/tty_ldisc.c:614 tty_ldisc_release+0x19d/0x200 drivers/tty/tty_ldisc.c:782 tty_release_struct+0x27/0xd0 drivers/tty/tty_io.c:1689 tty_release+0xcfb/0x12a0 drivers/tty/tty_io.c:1860 __fput+0x3f6/0x8d0 fs/file_table.c:320 task_work_run+0x246/0x300 kernel/task_work.c:203 resume_user_mode_work include/linux/resume_user_mode.h:49 [inline] exit_to_user_mode_loop+0xde/0x100 kernel/entry/common.c:177 exit_to_user_mode_prepare+0xb1/0x140 kernel/entry/common.c:210 __syscall_exit_to_user_mode_work kernel/entry/common.c:292 [inline] syscall_exit_to_user_mode+0x60/0x270 kernel/entry/common.c:303 do_syscall_64+0x47/0xb0 arch/x86/entry/common.c:87 entry_SYSCALL_64_after_hwframe+0x68/0xd2 INITIAL READ USE at: lock_acquire+0x1f8/0x5a0 kernel/locking/lockdep.c:5662 __raw_read_lock_bh include/linux/rwlock_api_smp.h:176 [inline] _raw_read_lock_bh+0x39/0x50 kernel/locking/spinlock.c:252 ppp_input_error+0x5c/0x1a0 drivers/net/ppp/ppp_generic.c:2344 ppp_sync_process+0x86/0x170 drivers/net/ppp/ppp_synctty.c:495 tasklet_action_common+0x3cb/0x4a0 handle_softirqs+0x2ee/0xa40 kernel/softirq.c:571 run_ksoftirqd+0xc6/0x120 kernel/softirq.c:938 smpboot_thread_fn+0x52c/0xa30 kernel/smpboot.c:164 kthread+0x28d/0x320 kernel/kthread.c:376 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:295 } ... key at: [<ffffffff976dc060>] ppp_register_net_channel.__key.3+0x0/0x20 -> (&ppp->wlock){+...}-{2:2} { HARDIRQ-ON-W at: lock_acquire+0x1f8/0x5a0 kernel/locking/lockdep.c:5662 __raw_spin_lock_bh include/linux/spinlock_api_smp.h:126 [inline] _raw_spin_lock_bh+0x31/0x40 kernel/locking/spinlock.c:178 spin_lock_bh include/linux/spinlock.h:356 [inline] ppp_get_stats64+0xbf/0x290 drivers/net/ppp/ppp_generic.c:1539 dev_get_stats+0xa7/0x490 net/core/dev.c:10471 rtnl_fill_stats+0x47/0x880 net/core/rtnetlink.c:1244 rtnl_fill_ifinfo+0x18aa/0x2090 net/core/rtnetlink.c:1825 rtmsg_ifinfo_build_skb+0xdc/0x180 net/core/rtnetlink.c:3938 rtmsg_ifinfo_event net/core/rtnetlink.c:3970 [inline] rtmsg_ifinfo+0x71/0x120 net/core/rtnetlink.c:3979 register_netdevice+0x13dc/0x1720 net/core/dev.c:10146 ppp_unit_register drivers/net/ppp/ppp_generic.c:1217 [inline] ppp_dev_configure+0x850/0xab0 drivers/net/ppp/ppp_generic.c:1273 ppp_create_interface drivers/net/ppp/ppp_generic.c:3348 [inline] ppp_unattached_ioctl drivers/net/ppp/ppp_generic.c:1058 [inline] ppp_ioctl+0x702/0x1c90 drivers/net/ppp/ppp_generic.c:731 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:870 [inline] __se_sys_ioctl+0xf1/0x160 fs/ioctl.c:856 do_syscall_x64 arch/x86/entry/common.c:51 [inline] do_syscall_64+0x3b/0xb0 arch/x86/entry/common.c:81 entry_SYSCALL_64_after_hwframe+0x68/0xd2 INITIAL USE at: lock_acquire+0x1f8/0x5a0 kernel/locking/lockdep.c:5662 __raw_spin_lock_bh include/linux/spinlock_api_smp.h:126 [inline] _raw_spin_lock_bh+0x31/0x40 kernel/locking/spinlock.c:178 spin_lock_bh include/linux/spinlock.h:356 [inline] ppp_get_stats64+0xbf/0x290 drivers/net/ppp/ppp_generic.c:1539 dev_get_stats+0xa7/0x490 net/core/dev.c:10471 rtnl_fill_stats+0x47/0x880 net/core/rtnetlink.c:1244 rtnl_fill_ifinfo+0x18aa/0x2090 net/core/rtnetlink.c:1825 rtmsg_ifinfo_build_skb+0xdc/0x180 net/core/rtnetlink.c:3938 rtmsg_ifinfo_event net/core/rtnetlink.c:3970 [inline] rtmsg_ifinfo+0x71/0x120 net/core/rtnetlink.c:3979 register_netdevice+0x13dc/0x1720 net/core/dev.c:10146 ppp_unit_register drivers/net/ppp/ppp_generic.c:1217 [inline] ppp_dev_configure+0x850/0xab0 drivers/net/ppp/ppp_generic.c:1273 ppp_create_interface drivers/net/ppp/ppp_generic.c:3348 [inline] ppp_unattached_ioctl drivers/net/ppp/ppp_generic.c:1058 [inline] ppp_ioctl+0x702/0x1c90 drivers/net/ppp/ppp_generic.c:731 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:870 [inline] __se_sys_ioctl+0xf1/0x160 fs/ioctl.c:856 do_syscall_x64 arch/x86/entry/common.c:51 [inline] do_syscall_64+0x3b/0xb0 arch/x86/entry/common.c:81 entry_SYSCALL_64_after_hwframe+0x68/0xd2 } ... key at: [<ffffffff976dc1a0>] ppp_dev_configure.__key.65+0x0/0x20 ... acquired at: lock_acquire+0x1f8/0x5a0 kernel/locking/lockdep.c:5662 __raw_spin_lock_bh include/linux/spinlock_api_smp.h:126 [inline] _raw_spin_lock_bh+0x31/0x40 kernel/locking/spinlock.c:178 spin_lock_bh include/linux/spinlock.h:356 [inline] ppp_connect_channel+0x170/0x640 drivers/net/ppp/ppp_generic.c:3484 ppp_ioctl+0xbe5/0x1c90 drivers/net/ppp/ppp_generic.c:759 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:870 [inline] __se_sys_ioctl+0xf1/0x160 fs/ioctl.c:856 do_syscall_x64 arch/x86/entry/common.c:51 [inline] do_syscall_64+0x3b/0xb0 arch/x86/entry/common.c:81 entry_SYSCALL_64_after_hwframe+0x68/0xd2 the dependencies between the lock to be acquired and SOFTIRQ-READ-irq-unsafe lock: -> (&pch->downl){+.+.}-{2:2} { HARDIRQ-ON-W at: lock_acquire+0x1f8/0x5a0 kernel/locking/lockdep.c:5662 __raw_spin_lock_bh include/linux/spinlock_api_smp.h:126 [inline] _raw_spin_lock_bh+0x31/0x40 kernel/locking/spinlock.c:178 spin_lock_bh include/linux/spinlock.h:356 [inline] ppp_unregister_channel+0x78/0x2f0 drivers/net/ppp/ppp_generic.c:2992 ppp_asynctty_close+0xed/0x180 drivers/net/ppp/ppp_async.c:237 tty_ldisc_kill+0xa6/0x1a0 drivers/tty/tty_ldisc.c:614 tty_ldisc_release+0x19d/0x200 drivers/tty/tty_ldisc.c:782 tty_release_struct+0x27/0xd0 drivers/tty/tty_io.c:1689 tty_release+0xcfb/0x12a0 drivers/tty/tty_io.c:1860 __fput+0x3f6/0x8d0 fs/file_table.c:320 task_work_run+0x246/0x300 kernel/task_work.c:203 resume_user_mode_work include/linux/resume_user_mode.h:49 [inline] exit_to_user_mode_loop+0xde/0x100 kernel/entry/common.c:177 exit_to_user_mode_prepare+0xb1/0x140 kernel/entry/common.c:210 __syscall_exit_to_user_mode_work kernel/entry/common.c:292 [inline] syscall_exit_to_user_mode+0x60/0x270 kernel/entry/common.c:303 do_syscall_64+0x47/0xb0 arch/x86/entry/common.c:87 entry_SYSCALL_64_after_hwframe+0x68/0xd2 SOFTIRQ-ON-W at: lock_acquire+0x1f8/0x5a0 kernel/locking/lockdep.c:5662 __raw_spin_lock include/linux/spinlock_api_smp.h:133 [inline] _raw_spin_lock+0x2a/0x40 kernel/locking/spinlock.c:154 spin_lock include/linux/spinlock.h:351 [inline] ppp_channel_bridge_input drivers/net/ppp/ppp_generic.c:2272 [inline] ppp_input+0x185/0xa00 drivers/net/ppp/ppp_generic.c:2304 pppoe_rcv_core+0x112/0x300 drivers/net/ppp/pppoe.c:379 sk_backlog_rcv include/net/sock.h:1117 [inline] __release_sock+0x198/0x4b0 net/core/sock.c:2936 release_sock+0x5d/0x1c0 net/core/sock.c:3500 pppoe_sendmsg+0xd1/0x740 drivers/net/ppp/pppoe.c:903 sock_sendmsg_nosec net/socket.c:718 [inline] __sock_sendmsg net/socket.c:730 [inline] ____sys_sendmsg+0x5a5/0x8f0 net/socket.c:2514 ___sys_sendmsg net/socket.c:2568 [inline] __sys_sendmmsg+0x3ab/0x730 net/socket.c:2654 __do_sys_sendmmsg net/socket.c:2683 [inline] __se_sys_sendmmsg net/socket.c:2680 [inline] __x64_sys_sendmmsg+0x9c/0xb0 net/socket.c:2680 do_syscall_x64 arch/x86/entry/common.c:51 [inline] do_syscall_64+0x3b/0xb0 arch/x86/entry/common.c:81 entry_SYSCALL_64_after_hwframe+0x68/0xd2 INITIAL USE at: lock_acquire+0x1f8/0x5a0 kernel/locking/lockdep.c:5662 __raw_spin_lock_bh include/linux/spinlock_api_smp.h:126 [inline] _raw_spin_lock_bh+0x31/0x40 kernel/locking/spinlock.c:178 spin_lock_bh include/linux/spinlock.h:356 [inline] ppp_unregister_channel+0x78/0x2f0 drivers/net/ppp/ppp_generic.c:2992 ppp_asynctty_close+0xed/0x180 drivers/net/ppp/ppp_async.c:237 tty_ldisc_kill+0xa6/0x1a0 drivers/tty/tty_ldisc.c:614 tty_ldisc_release+0x19d/0x200 drivers/tty/tty_ldisc.c:782 tty_release_struct+0x27/0xd0 drivers/tty/tty_io.c:1689 tty_release+0xcfb/0x12a0 drivers/tty/tty_io.c:1860 __fput+0x3f6/0x8d0 fs/file_table.c:320 task_work_run+0x246/0x300 kernel/task_work.c:203 resume_user_mode_work include/linux/resume_user_mode.h:49 [inline] exit_to_user_mode_loop+0xde/0x100 kernel/entry/common.c:177 exit_to_user_mode_prepare+0xb1/0x140 kernel/entry/common.c:210 __syscall_exit_to_user_mode_work kernel/entry/common.c:292 [inline] syscall_exit_to_user_mode+0x60/0x270 kernel/entry/common.c:303 do_syscall_64+0x47/0xb0 arch/x86/entry/common.c:87 entry_SYSCALL_64_after_hwframe+0x68/0xd2 } ... key at: [<ffffffff976dc040>] ppp_register_net_channel.__key.1+0x0/0x20 ... acquired at: lock_acquire+0x1f8/0x5a0 kernel/locking/lockdep.c:5662 __raw_spin_lock include/linux/spinlock_api_smp.h:133 [inline] _raw_spin_lock+0x2a/0x40 kernel/locking/spinlock.c:154 spin_lock include/linux/spinlock.h:351 [inline] ppp_push+0xf3/0x1310 drivers/net/ppp/ppp_generic.c:1896 ppp_send_frame drivers/net/ppp/ppp_generic.c:1861 [inline] __ppp_xmit_process+0x846/0x19a0 drivers/net/ppp/ppp_generic.c:1661 ppp_xmit_process+0x14b/0x310 drivers/net/ppp/ppp_generic.c:1682 ppp_write+0x2a9/0x3a0 drivers/net/ppp/ppp_generic.c:534 do_iter_write+0x503/0xc40 fs/read_write.c:863 vfs_writev fs/read_write.c:934 [inline] do_pwritev+0x216/0x360 fs/read_write.c:1031 do_syscall_x64 arch/x86/entry/common.c:51 [inline] do_syscall_64+0x3b/0xb0 arch/x86/entry/common.c:81 entry_SYSCALL_64_after_hwframe+0x68/0xd2 stack backtrace: CPU: 0 PID: 11005 Comm: syz.0.1493 Not tainted 6.1.112-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Call Trace: <TASK> __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x1e3/0x2cb lib/dump_stack.c:106 print_bad_irq_dependency kernel/locking/lockdep.c:2604 [inline] check_irq_usage kernel/locking/lockdep.c:2843 [inline] check_prev_add kernel/locking/lockdep.c:3094 [inline] check_prevs_add kernel/locking/lockdep.c:3209 [inline] validate_chain+0x4d16/0x5950 kernel/locking/lockdep.c:3825 __lock_acquire+0x125b/0x1f80 kernel/locking/lockdep.c:5049 lock_acquire+0x1f8/0x5a0 kernel/locking/lockdep.c:5662 __raw_spin_lock include/linux/spinlock_api_smp.h:133 [inline] _raw_spin_lock+0x2a/0x40 kernel/locking/spinlock.c:154 spin_lock include/linux/spinlock.h:351 [inline] ppp_push+0xf3/0x1310 drivers/net/ppp/ppp_generic.c:1896 ppp_send_frame drivers/net/ppp/ppp_generic.c:1861 [inline] __ppp_xmit_process+0x846/0x19a0 drivers/net/ppp/ppp_generic.c:1661 ppp_xmit_process+0x14b/0x310 drivers/net/ppp/ppp_generic.c:1682 ppp_write+0x2a9/0x3a0 drivers/net/ppp/ppp_generic.c:534 do_iter_write+0x503/0xc40 fs/read_write.c:863 vfs_writev fs/read_write.c:934 [inline] do_pwritev+0x216/0x360 fs/read_write.c:1031 do_syscall_x64 arch/x86/entry/common.c:51 [inline] do_syscall_64+0x3b/0xb0 arch/x86/entry/common.c:81 entry_SYSCALL_64_after_hwframe+0x68/0xd2 RIP: 0033:0x7f61bcd7dff9 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f61bdb27038 EFLAGS: 00000246 ORIG_RAX: 0000000000000128 RAX: ffffffffffffffda RBX: 00007f61bcf35f80 RCX: 00007f61bcd7dff9 RDX: 0000000000000001 RSI: 0000000020000180 RDI: 0000000000000003 RBP: 00007f61bcdf0296 R08: 0000000000000000 R09: 0000000000000000 R10: 00000000fffffffe R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000000 R14: 00007f61bcf35f80 R15: 00007ffd6396ddd8 </TASK>
Time | Kernel | Commit | Syzkaller | Config | Log | Report | Syz repro | C repro | VM info | Assets (help?) | Manager | Title |
---|---|---|---|---|---|---|---|---|---|---|---|---|
2024/10/11 12:24 | linux-6.1.y | aa4cd140bba5 | cd942402 | .config | console log | report | info | [disk image] [vmlinux] [kernel image] | ci2-linux-6-1-kasan | possible deadlock in ppp_input_error | ||
2024/10/03 21:21 | linux-6.1.y | aa4cd140bba5 | d7906eff | .config | console log | report | info | [disk image] [vmlinux] [kernel image] | ci2-linux-6-1-kasan | possible deadlock in ppp_input_error |