From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 5C8EAC3DA7D for ; Thu, 5 Jan 2023 16:32:29 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233940AbjAEQc1 (ORCPT ); Thu, 5 Jan 2023 11:32:27 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:34636 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231889AbjAEQcW (ORCPT ); Thu, 5 Jan 2023 11:32:22 -0500 Received: from mail-il1-f199.google.com (mail-il1-f199.google.com [209.85.166.199]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id B991718B1F for ; Thu, 5 Jan 2023 08:32:21 -0800 (PST) Received: by mail-il1-f199.google.com with SMTP id z19-20020a921a53000000b0030b90211df1so22853404ill.2 for ; Thu, 05 Jan 2023 08:32:21 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=to:from:subject:message-id:in-reply-to:date:mime-version :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=H9UZRTW63lyBpIsMbIymTiTuR3DtdqS+1wAO4zv1bzA=; b=nSyeAkKDvNDXU94PlNU+hfctAYz+E5ZJsEpppPiysvTRPX5+wQ9LIh9yb3UK2AheCC 6rfZNYd328VthCMCouLOtrq9OkwjSjc12PQwVY3rp6l+ZOac698s9pwX62EG7e0IkpdK 19RNF+y7BrhYt1cc5vrsJdkx2E57ZdhB0s57D0uaE+uKlTfZXacoeoyx4S6SW9q4j3ly yl3f0YYDBwFYw6GPgaske+I3dGsZpZ6+RYGltEUFs+GW87TYWD1toV61cXhijrH4aYFr QaE76v+BEmGcEZoy5inqx/eXMk4wcZ7KBzuqHiS9puNA1PKw+xZu8E++hLb6n8rz5GkP cfIQ== X-Gm-Message-State: AFqh2koaDUql0n6i+bHD94d1kF+tWZ5JuYd1KN6byaUzljMq4+mL8uJv 2fQpUgn+aTO2xPOiVIxEqld1Q2DJQog6QR2AbZR9jFR1OmrO X-Google-Smtp-Source: AMrXdXtlM6VyGycOdbOg1yBWuqAd36l5/buD3Qu67mKOwbzYX00LMjt9rBA8FAKiKO2tQKi11yNFO+ng8L9YtxCkwUfDzFU7Yk1X MIME-Version: 1.0 X-Received: by 2002:a6b:4a06:0:b0:6bf:e923:388b with SMTP id w6-20020a6b4a06000000b006bfe923388bmr4098019iob.105.1672936341080; Thu, 05 Jan 2023 08:32:21 -0800 (PST) Date: Thu, 05 Jan 2023 08:32:21 -0800 In-Reply-To: <594704.1672934598@warthog.procyon.org.uk> X-Google-Appengine-App-Id: s~syzkaller X-Google-Appengine-App-Id-Alias: syzkaller Message-ID: <00000000000057916a05f186d851@google.com> Subject: Re: [syzbot] kernel BUG in rxrpc_put_peer From: syzbot To: davem@davemloft.net, dhowells@redhat.com, edumazet@google.com, kuba@kernel.org, linux-afs@lists.infradead.org, linux-kernel@vger.kernel.org, marc.dionne@auristor.com, netdev@vger.kernel.org, pabeni@redhat.com, syzkaller-bugs@googlegroups.com Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hello, syzbot has tested the proposed patch but the reproducer is still triggering an issue: INFO: rcu detected stall in corrupted rcu: INFO: rcu_preempt detected expedited stalls on CPUs/tasks: { P5529 } 2650 jiffies s: 2809 root: 0x0/T rcu: blocking rcu_node structures (internal RCU debug): Tested on: commit: a5852d90 rxrpc: Move client call connection to the I/O.. git tree: https://git.kernel.org/pub/scm/linux/kernel/git/dhowells/linux-fs.git/ console output: https://syzkaller.appspot.com/x/log.txt?x=13297ee6480000 kernel config: https://syzkaller.appspot.com/x/.config?x=90282e312d5fd612 dashboard link: https://syzkaller.appspot.com/bug?extid=c22650d2844392afdcfd compiler: gcc (Debian 10.2.1-6) 10.2.1 20210110, GNU ld (GNU Binutils for Debian) 2.35.2 Note: no patches were applied.