INFO: rcu detected stall in pppoe_sendmsg

5 views
Skip to first unread message

syzbot

unread,
Sep 6, 2019, 12:16:10 PM9/6/19
to syzkaller...@googlegroups.com
Hello,

syzbot found the following crash on:

HEAD commit: 0fed55c2 Linux 4.19.70
git tree: linux-4.19.y
console output: https://syzkaller.appspot.com/x/log.txt?x=1613d1fa600000
kernel config: https://syzkaller.appspot.com/x/.config?x=2964bf2f89c3f203
dashboard link: https://syzkaller.appspot.com/bug?extid=64f4a3bbf8046592f28b
compiler: gcc (GCC) 9.0.0 20181231 (experimental)

Unfortunately, I don't have any reproducer for this crash yet.

IMPORTANT: if you fix the bug, please add the following tag to the commit:
Reported-by: syzbot+64f4a3...@syzkaller.appspotmail.com

protocol 88fb is buggy, dev hsr_slave_1
protocol 88fb is buggy, dev hsr_slave_0
protocol 88fb is buggy, dev hsr_slave_1
protocol 88fb is buggy, dev hsr_slave_0
protocol 88fb is buggy, dev hsr_slave_1
rcu: INFO: rcu_preempt self-detected stall on CPU
rcu: 1-....: (1 GPs behind) idle=55a/1/0x4000000000000002
softirq=66115/66116 fqs=5223
rcu: (t=10502 jiffies g=88937 q=3316)
NMI backtrace for cpu 1
CPU: 1 PID: 24221 Comm: syz-executor.3 Not tainted 4.19.70 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS
Google 01/01/2011
Call Trace:
<IRQ>
__dump_stack lib/dump_stack.c:77 [inline]
dump_stack+0x172/0x1f0 lib/dump_stack.c:113
nmi_cpu_backtrace.cold+0x63/0xa4 lib/nmi_backtrace.c:101
nmi_trigger_cpumask_backtrace+0x1b0/0x1f8 lib/nmi_backtrace.c:62
arch_trigger_cpumask_backtrace+0x14/0x20 arch/x86/kernel/apic/hw_nmi.c:38
trigger_single_cpu_backtrace include/linux/nmi.h:164 [inline]
rcu_dump_cpu_stacks+0x189/0x1d5 kernel/rcu/tree.c:1340
print_cpu_stall kernel/rcu/tree.c:1478 [inline]
check_cpu_stall kernel/rcu/tree.c:1550 [inline]
__rcu_pending kernel/rcu/tree.c:3293 [inline]
rcu_pending kernel/rcu/tree.c:3336 [inline]
rcu_check_callbacks.cold+0x5e3/0xd90 kernel/rcu/tree.c:2682
update_process_times+0x32/0x80 kernel/time/timer.c:1636
tick_sched_handle+0xa2/0x190 kernel/time/tick-sched.c:164
tick_sched_timer+0x47/0x130 kernel/time/tick-sched.c:1274
__run_hrtimer kernel/time/hrtimer.c:1398 [inline]
__hrtimer_run_queues+0x33b/0xdc0 kernel/time/hrtimer.c:1460
hrtimer_interrupt+0x314/0x770 kernel/time/hrtimer.c:1518
local_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1067 [inline]
smp_apic_timer_interrupt+0x111/0x550 arch/x86/kernel/apic/apic.c:1092
apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:893
</IRQ>
RIP: 0010:__list_del include/linux/list.h:105 [inline]
RIP: 0010:__list_del_entry include/linux/list.h:120 [inline]
RIP: 0010:__list_del_entry include/linux/list.h:115 [inline]
RIP: 0010:list_move_tail include/linux/list.h:182 [inline]
RIP: 0010:hhf_dequeue+0x5fa/0xa00 net/sched/sch_hhf.c:438
Code: 00 00 48 8d 7b 08 4c 8b 3b 48 89 fa 48 c1 ea 03 42 80 3c 22 00 0f 85
c3 03 00 00 49 8d 7f 08 4c 8b 73 08 48 89 fa 48 c1 ea 03 <42> 80 3c 22 00
0f 85 9f 03 00 00 4c 89 f2 4d 89 77 08 48 c1 ea 03
RSP: 0018:ffff88806917f058 EFLAGS: 00000a06 ORIG_RAX: ffffffffffffff13
RAX: 1ffff110115118ef RBX: ffff88808a88c778 RCX: ffffc9000c4aa000
RDX: 1ffff11011511903 RSI: ffffffff858e8990 RDI: ffff88808a88c818
RBP: ffff88806917f0a8 R08: ffff8880609f6440 R09: 0000000000000005
R10: ffff8880609f6d88 R11: 000000006de63711 R12: dffffc0000000000
R13: ffff88808a88c4c0 R14: ffff88808a88c810 R15: ffff88808a88c810
dequeue_skb net/sched/sch_generic.c:277 [inline]
qdisc_restart net/sched/sch_generic.c:380 [inline]
__qdisc_run+0x1e7/0x1960 net/sched/sch_generic.c:398
__dev_xmit_skb net/core/dev.c:3501 [inline]
__dev_queue_xmit+0x165c/0x2fe0 net/core/dev.c:3811
dev_queue_xmit+0x18/0x20 net/core/dev.c:3876
br_dev_queue_push_xmit+0x405/0x5d0 net/bridge/br_forward.c:56
NF_HOOK include/linux/netfilter.h:289 [inline]
NF_HOOK include/linux/netfilter.h:283 [inline]
br_forward_finish+0xfa/0x400 net/bridge/br_forward.c:69
NF_HOOK include/linux/netfilter.h:289 [inline]
NF_HOOK include/linux/netfilter.h:283 [inline]
__br_forward+0x647/0xb30 net/bridge/br_forward.c:113
deliver_clone+0x61/0xc0 net/bridge/br_forward.c:129
maybe_deliver net/bridge/br_forward.c:184 [inline]
maybe_deliver net/bridge/br_forward.c:172 [inline]
br_flood+0x4da/0x710 net/bridge/br_forward.c:226
br_dev_xmit+0xeeb/0x1490 net/bridge/br_device.c:103
__netdev_start_xmit include/linux/netdevice.h:4303 [inline]
netdev_start_xmit include/linux/netdevice.h:4312 [inline]
xmit_one net/core/dev.c:3257 [inline]
dev_hard_start_xmit+0x1a5/0x980 net/core/dev.c:3273
__dev_queue_xmit+0x2704/0x2fe0 net/core/dev.c:3843
dev_queue_xmit+0x18/0x20 net/core/dev.c:3876
pppoe_sendmsg+0x654/0x7e0 drivers/net/ppp/pppoe.c:904
sock_sendmsg_nosec net/socket.c:622 [inline]
sock_sendmsg+0xd7/0x130 net/socket.c:632
___sys_sendmsg+0x3e2/0x920 net/socket.c:2115
__sys_sendmmsg+0x1bf/0x4e0 net/socket.c:2210
__do_sys_sendmmsg net/socket.c:2239 [inline]
__se_sys_sendmmsg net/socket.c:2236 [inline]
__x64_sys_sendmmsg+0x9d/0x100 net/socket.c:2236
do_syscall_64+0xfd/0x620 arch/x86/entry/common.c:293
entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x459879
Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7
48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff
ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00
RSP: 002b:00007f16344f5c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133
RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000459879
RDX: 04000000000000eb RSI: 000000002000d180 RDI: 0000000000000004
RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 00007f16344f66d4
R13: 00000000004c706e R14: 00000000004dc6e8 R15: 00000000ffffffff
rcu: INFO: rcu_bh detected stalls on CPUs/tasks:
rcu: 1-....: (12533 ticks this GP) idle=55a/1/0x4000000000000000
softirq=62960/66116 fqs=5198
rcu: (detected by 0, t=10502 jiffies, g=-671, q=4)
Sending NMI from CPU 0 to CPUs 1:
NMI backtrace for cpu 1
CPU: 1 PID: 24221 Comm: syz-executor.3 Not tainted 4.19.70 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS
Google 01/01/2011
RIP: 0010:__list_del_entry_valid+0xa/0xf5 lib/list_debug.c:39
Code: 89 75 e8 e8 38 28 7c fe 48 8b 75 e8 eb 9f 48 89 f7 48 89 75 e8 e8 26
28 7c fe 48 8b 75 e8 eb b2 48 b8 00 00 00 00 00 fc ff df <55> 48 89 e5 41
56 49 89 fe 48 83 c7 08 48 89 fa 41 55 48 c1 ea 03
RSP: 0018:ffff88806917f050 EFLAGS: 00000246
RAX: dffffc0000000000 RBX: ffff88808a88c778 RCX: ffffc9000c4aa000
RDX: 0000000000000000 RSI: ffffffff858e893b RDI: ffff88808a88c778
RBP: ffff88806917f0a8 R08: ffff8880609f6440 R09: 0000000000000005
R10: ffff8880609f6d88 R11: 000000006de63711 R12: dffffc0000000000
R13: ffff88808a88c4c0 R14: 0000000000000000 R15: 0000000000000000
FS: 00007f16344f6700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000001b2da21000 CR3: 000000006aff4000 CR4: 00000000001426e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
dequeue_skb net/sched/sch_generic.c:277 [inline]
qdisc_restart net/sched/sch_generic.c:380 [inline]
__qdisc_run+0x1e7/0x1960 net/sched/sch_generic.c:398
__dev_xmit_skb net/core/dev.c:3501 [inline]
__dev_queue_xmit+0x165c/0x2fe0 net/core/dev.c:3811
dev_queue_xmit+0x18/0x20 net/core/dev.c:3876
br_dev_queue_push_xmit+0x405/0x5d0 net/bridge/br_forward.c:56
NF_HOOK include/linux/netfilter.h:289 [inline]
NF_HOOK include/linux/netfilter.h:283 [inline]
br_forward_finish+0xfa/0x400 net/bridge/br_forward.c:69
NF_HOOK include/linux/netfilter.h:289 [inline]
NF_HOOK include/linux/netfilter.h:283 [inline]
__br_forward+0x647/0xb30 net/bridge/br_forward.c:113
deliver_clone+0x61/0xc0 net/bridge/br_forward.c:129
maybe_deliver net/bridge/br_forward.c:184 [inline]
maybe_deliver net/bridge/br_forward.c:172 [inline]
br_flood+0x4da/0x710 net/bridge/br_forward.c:226
br_dev_xmit+0xeeb/0x1490 net/bridge/br_device.c:103
__netdev_start_xmit include/linux/netdevice.h:4303 [inline]
netdev_start_xmit include/linux/netdevice.h:4312 [inline]
xmit_one net/core/dev.c:3257 [inline]
dev_hard_start_xmit+0x1a5/0x980 net/core/dev.c:3273
__dev_queue_xmit+0x2704/0x2fe0 net/core/dev.c:3843
dev_queue_xmit+0x18/0x20 net/core/dev.c:3876
pppoe_sendmsg+0x654/0x7e0 drivers/net/ppp/pppoe.c:904
sock_sendmsg_nosec net/socket.c:622 [inline]
sock_sendmsg+0xd7/0x130 net/socket.c:632
___sys_sendmsg+0x3e2/0x920 net/socket.c:2115
__sys_sendmmsg+0x1bf/0x4e0 net/socket.c:2210
__do_sys_sendmmsg net/socket.c:2239 [inline]
__se_sys_sendmmsg net/socket.c:2236 [inline]
__x64_sys_sendmmsg+0x9d/0x100 net/socket.c:2236
do_syscall_64+0xfd/0x620 arch/x86/entry/common.c:293
entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x459879
Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7
48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff
ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00
RSP: 002b:00007f16344f5c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133
RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000459879
RDX: 04000000000000eb RSI: 000000002000d180 RDI: 0000000000000004
RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 00007f16344f66d4
R13: 00000000004c706e R14: 00000000004dc6e8 R15: 00000000ffffffff
protocol 88fb is buggy, dev hsr_slave_0
protocol 88fb is buggy, dev hsr_slave_1
protocol 88fb is buggy, dev hsr_slave_0
protocol 88fb is buggy, dev hsr_slave_1
protocol 88fb is buggy, dev hsr_slave_0
protocol 88fb is buggy, dev hsr_slave_1
protocol 88fb is buggy, dev hsr_slave_0
protocol 88fb is buggy, dev hsr_slave_1


---
This bug is generated by a bot. It may contain errors.
See https://goo.gl/tpsmEJ for more information about syzbot.
syzbot engineers can be reached at syzk...@googlegroups.com.

syzbot will keep track of this bug report. See:
https://goo.gl/tpsmEJ#status for how to communicate with syzbot.

syzbot

unread,
Jan 5, 2020, 9:21:06 PM1/5/20
to syzkaller...@googlegroups.com
Auto-closing this bug as obsolete.
Crashes did not happen for a while, no reproducer and no activity.
Reply all
Reply to author
Forward
0 new messages