possible deadlock in ppp_dev_uninit

14 views
Skip to first unread message

syzbot

unread,
Jan 4, 2018, 1:58:02 AM1/4/18
to linux-...@vger.kernel.org, linu...@vger.kernel.org, net...@vger.kernel.org, pau...@samba.org, syzkall...@googlegroups.com
Hello,

syzkaller hit the following crash on
73005e1a35fd67c644b0645c9e4c1efabd0fe62c
git://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/master
compiler: gcc (GCC) 7.1.1 20170620
.config is attached
Raw console output is attached.
C reproducer is attached
syzkaller reproducer is attached. See https://goo.gl/kgGztJ
for information about syzkaller reproducers


IMPORTANT: if you fix the bug, please add the following tag to the commit:
Reported-by: syzbot+367889...@syzkaller.appspotmail.com
It will help syzbot understand when the bug is fixed. See footer for
details.
If you forward the report, please keep this part and the footer.

RBP: 0000000000000004 R08: 0000000000000001 R09: 0000000000000035
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000401f10
R13: 0000000000401fa0 R14: 0000000000000000 R15: 0000000000000000

============================================
WARNING: possible recursive locking detected
4.15.0-rc6-next-20180103+ #87 Not tainted
--------------------------------------------
syzkaller221540/3462 is trying to acquire lock:
(&pn->all_ppp_mutex){+.+.}, at: [<00000000709ea4fe>]
ppp_dev_uninit+0x1be/0x390 drivers/net/ppp/ppp_generic.c:1369

but task is already holding lock:
(&pn->all_ppp_mutex){+.+.}, at: [<00000000752caad5>] ppp_unit_register
drivers/net/ppp/ppp_generic.c:981 [inline]
(&pn->all_ppp_mutex){+.+.}, at: [<00000000752caad5>]
ppp_dev_configure+0x6a4/0xc40 drivers/net/ppp/ppp_generic.c:1066

other info that might help us debug this:
Possible unsafe locking scenario:

CPU0
----
lock(&pn->all_ppp_mutex);
lock(&pn->all_ppp_mutex);

*** DEADLOCK ***

May be due to missing lock nesting notation

3 locks held by syzkaller221540/3462:
#0: (ppp_mutex){+.+.}, at: [<000000000235c4ad>] ppp_ioctl+0x9e/0x2200
drivers/net/ppp/ppp_generic.c:598
#1: (rtnl_mutex){+.+.}, at: [<000000002fbce150>] rtnl_lock+0x17/0x20
net/core/rtnetlink.c:74
#2: (&pn->all_ppp_mutex){+.+.}, at: [<00000000752caad5>]
ppp_unit_register drivers/net/ppp/ppp_generic.c:981 [inline]
#2: (&pn->all_ppp_mutex){+.+.}, at: [<00000000752caad5>]
ppp_dev_configure+0x6a4/0xc40 drivers/net/ppp/ppp_generic.c:1066

stack backtrace:
CPU: 0 PID: 3462 Comm: syzkaller221540 Not tainted
4.15.0-rc6-next-20180103+ #87
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS
Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:17 [inline]
dump_stack+0x137/0x198 lib/dump_stack.c:53
print_deadlock_bug kernel/locking/lockdep.c:1756 [inline]
check_deadlock kernel/locking/lockdep.c:1800 [inline]
validate_chain kernel/locking/lockdep.c:2396 [inline]
__lock_acquire+0xec3/0x3cf0 kernel/locking/lockdep.c:3426
lock_acquire+0x16b/0x420 kernel/locking/lockdep.c:3914
__mutex_lock_common kernel/locking/mutex.c:756 [inline]
__mutex_lock+0xec/0x1550 kernel/locking/mutex.c:893
mutex_lock_nested+0x16/0x20 kernel/locking/mutex.c:908
ppp_dev_uninit+0x1be/0x390 drivers/net/ppp/ppp_generic.c:1369
register_netdevice+0x8bf/0xf30 net/core/dev.c:7835
ppp_unit_register drivers/net/ppp/ppp_generic.c:1009 [inline]
ppp_dev_configure+0x854/0xc40 drivers/net/ppp/ppp_generic.c:1066
ppp_create_interface drivers/net/ppp/ppp_generic.c:3027 [inline]
ppp_unattached_ioctl drivers/net/ppp/ppp_generic.c:866 [inline]
ppp_ioctl+0x1491/0x2200 drivers/net/ppp/ppp_generic.c:602
vfs_ioctl fs/ioctl.c:46 [inline]
do_vfs_ioctl+0x190/0xfe0 fs/ioctl.c:686
SYSC_ioctl fs/ioctl.c:701 [inline]
SyS_ioctl+0x8f/0xc0 fs/ioctl.c:692
entry_SYSCALL_64_fastpath+0x23/0x9a
RIP: 0033:0x440649
RSP: 002b:00007fff8dc7fdc8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 0000000000440649
RDX: 0000000020001000 RSI: 00000000c004743e RDI: 0000000000000003
RBP: 0000000000000004 R08: 0000000000000001 R09: 0000000000000035
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000401f10
R13: 0000000000401fa0 R14: 0000000000000000 R15: 0000000000000000


---
This bug is generated by a dumb bot. It may contain errors.
See https://goo.gl/tpsmEJ for details.
Direct all questions to syzk...@googlegroups.com.

syzbot will keep track of this bug report.
If you forgot to add the Reported-by tag, once the fix for this bug is
merged
into any tree, please reply to this email with:
#syz fix: exact-commit-title
If you want to test a patch for this bug, please reply with:
#syz test: git://repo/address.git branch
and provide the patch inline or as an attachment.
To mark this as a duplicate of another syzbot report, please reply with:
#syz dup: exact-subject-of-another-report
If it's a one-off invalid bug report, please reply with:
#syz invalid
Note: if the crash happens again, it will cause creation of a new bug
report.
Note: all commands must start from beginning of the line in the email body.
config.txt
raw.log
repro.txt
repro.c

Guillaume Nault

unread,
Jan 5, 2018, 1:15:34 PM1/5/18
to syzbot, linux-...@vger.kernel.org, linu...@vger.kernel.org, net...@vger.kernel.org, pau...@samba.org, syzkall...@googlegroups.com
On Wed, Jan 03, 2018 at 10:58:01PM -0800, syzbot wrote:
> Hello,
>
> ============================================
> WARNING: possible recursive locking detected
> 4.15.0-rc6-next-20180103+ #87 Not tainted
> --------------------------------------------
> syzkaller221540/3462 is trying to acquire lock:
> (&pn->all_ppp_mutex){+.+.}, at: [<00000000709ea4fe>]
> ppp_dev_uninit+0x1be/0x390 drivers/net/ppp/ppp_generic.c:1369
>
> but task is already holding lock:
> (&pn->all_ppp_mutex){+.+.}, at: [<00000000752caad5>] ppp_unit_register
> drivers/net/ppp/ppp_generic.c:981 [inline]
> (&pn->all_ppp_mutex){+.+.}, at: [<00000000752caad5>]
> ppp_dev_configure+0x6a4/0xc40 drivers/net/ppp/ppp_generic.c:1066
>
ppp_unit_register() acquires pn->all_ppp_mutex while calling
register_netdevice(). If register_netdevice() fails, it can call
ppp_dev_uninit() which then tries to lock pn->all_ppp_mutex again.

Maybe unlocking pn->all_ppp_mutex before register_netdevice() would be
enough, but that'd make the unit visible while the PPP device isn't yet
registered. I'm going to check if that can be a problem.

That's probably worth a test anyway.

#syz test: git://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git master

-------- 8< --------

diff --git a/drivers/net/ppp/ppp_generic.c b/drivers/net/ppp/ppp_generic.c
index d8e5747ff4e3..264d4af0bf69 100644
--- a/drivers/net/ppp/ppp_generic.c
+++ b/drivers/net/ppp/ppp_generic.c
@@ -1006,17 +1006,18 @@ static int ppp_unit_register(struct ppp *ppp, int unit, bool ifname_is_set)
if (!ifname_is_set)
snprintf(ppp->dev->name, IFNAMSIZ, "ppp%i", ppp->file.index);

+ mutex_unlock(&pn->all_ppp_mutex);
+
ret = register_netdevice(ppp->dev);
if (ret < 0)
goto err_unit;

atomic_inc(&ppp_unit_count);

- mutex_unlock(&pn->all_ppp_mutex);
-
return 0;

err_unit:
+ mutex_lock(&pn->all_ppp_mutex);
unit_put(&pn->units_idr, ppp->file.index);
err:
mutex_unlock(&pn->all_ppp_mutex);

Guillaume Nault

unread,
Jan 5, 2018, 1:27:02 PM1/5/18
to syzbot, linux-...@vger.kernel.org, linu...@vger.kernel.org, net...@vger.kernel.org, pau...@samba.org, syzkall...@googlegroups.com
On Fri, Jan 05, 2018 at 07:15:31PM +0100, Guillaume Nault wrote:
> That's probably worth a test anyway.
>
Copy/paste error :-/

Here's a version that should apply cleanly.

syzbot

unread,
Jan 5, 2018, 1:32:02 PM1/5/18
to g.n...@alphalink.fr, linux-...@vger.kernel.org, linu...@vger.kernel.org, net...@vger.kernel.org, pau...@samba.org, syzkall...@googlegroups.com
Hello,

syzbot has tested the proposed patch and the reproducer did not trigger
crash:

Reported-and-tested-by:
syzbot+367889...@syzkaller.appspotmail.com

Note: the tag will also help syzbot to understand when the bug is fixed.

Tested on commit d1616f07e8f1a4a490d1791316d4a68906b284aa
git://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/master
compiler: gcc (GCC) 7.1.1 20170620
Patch is attached.
Kernel config is attached.


---
There is no WARRANTY for the result, to the extent permitted by applicable
law.
Except when otherwise stated in writing syzbot provides the result "AS IS"
without warranty of any kind, either expressed or implied, but not limited
to,
the implied warranties of merchantability and fittness for a particular
purpose.
The entire risk as to the quality of the result is with you. Should the
result
prove defective, you assume the cost of all necessary servicing, repair or
correction.
config.txt
patch.txt

syzbot

unread,
Jan 5, 2018, 1:41:01 PM1/5/18
to g.n...@alphalink.fr, linux-...@vger.kernel.org, linu...@vger.kernel.org, net...@vger.kernel.org, pau...@samba.org, syzkall...@googlegroups.com
Hello,

syzbot tried to test the proposed patch but build/boot failed:

failed to copy test binary to VM: failed to run /usr/bin/scp [scp -P 22 -i
/syzkaller/jobs/linux/image/key -F /dev/null -o
UserKnownHostsFile=/dev/null -o BatchMode=yes -o IdentitiesOnly=yes -o
StrictHostKeyChecking=no -o ConnectTimeout=10 /tmp/syzkaller180475523
ro...@10.128.0.60:./syzkaller180475523]: exit status 1
ssh: connect to host 10.128.0.60 port 22: Connection timed out
lost connection
config.txt
patch.txt

syzbot

unread,
Jan 5, 2018, 1:53:02 PM1/5/18
to g.n...@alphalink.fr, linux-...@vger.kernel.org, linu...@vger.kernel.org, net...@vger.kernel.org, pau...@samba.org, syzkall...@googlegroups.com
Hello,

syzbot has tested the proposed patch and the reproducer did not trigger
crash:

Reported-and-tested-by:
syzbot+367889...@syzkaller.appspotmail.com

Note: the tag will also help syzbot to understand when the bug is fixed.

Tested on commit d1616f07e8f1a4a490d1791316d4a68906b284aa
git://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/master
compiler: gcc (GCC) 7.1.1 20170620
Patch is attached.
Kernel config is attached.


config.txt
patch.txt

syzbot

unread,
Jan 5, 2018, 2:05:02 PM1/5/18
to g.n...@alphalink.fr, linux-...@vger.kernel.org, linu...@vger.kernel.org, net...@vger.kernel.org, pau...@samba.org, syzkall...@googlegroups.com
config.txt
patch.txt

Dmitry Vyukov

unread,
Jan 16, 2018, 10:53:24 AM1/16/18
to syzbot, syzkall...@googlegroups.com
debugging why testing happened 4 times instead of 2...
> --
> You received this message because you are subscribed to the Google Groups
> "syzkaller-bugs" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to syzkaller-bug...@googlegroups.com.
> To view this discussion on the web visit
> https://groups.google.com/d/msgid/syzkaller-bugs/001a1140bf6021068505620c206f%40google.com.
>
> For more options, visit https://groups.google.com/d/optout.
Reply all
Reply to author
Forward
0 new messages