[v6.1] WARNING in inet_sock_destruct

4 views
Skip to first unread message

syzbot

unread,
Apr 11, 2023, 7:37:48 PM4/11/23
to syzkaller...@googlegroups.com
Hello,

syzbot found the following issue on:

HEAD commit: 543aff194ab6 Linux 6.1.23
git tree: linux-6.1.y
console output: https://syzkaller.appspot.com/x/log.txt?x=10670687c80000
kernel config: https://syzkaller.appspot.com/x/.config?x=9ccbc3d5467efd1
dashboard link: https://syzkaller.appspot.com/bug?extid=c5cee91f2c5d71790061
compiler: Debian clang version 15.0.7, GNU ld (GNU Binutils for Debian) 2.35.2
userspace arch: arm64

Unfortunately, I don't have any reproducer for this issue yet.

Downloadable assets:
disk image: https://storage.googleapis.com/syzbot-assets/7fe538fc87bf/disk-543aff19.raw.xz
vmlinux: https://storage.googleapis.com/syzbot-assets/8df93997601a/vmlinux-543aff19.xz
kernel image: https://storage.googleapis.com/syzbot-assets/03ad7e3bf859/Image-543aff19.gz.xz

IMPORTANT: if you fix the issue, please add the following tag to the commit:
Reported-by: syzbot+c5cee9...@syzkaller.appspotmail.com

------------[ cut here ]------------
WARNING: CPU: 0 PID: 0 at net/ipv4/af_inet.c:154 inet_sock_destruct+0x56c/0x664 net/ipv4/af_inet.c:154
Modules linked in:
CPU: 0 PID: 0 Comm: swapper/0 Not tainted 6.1.23-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023
pstate: 00400005 (nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : inet_sock_destruct+0x56c/0x664 net/ipv4/af_inet.c:154
lr : inet_sock_destruct+0x56c/0x664 net/ipv4/af_inet.c:154
sp : ffff800008007ad0
x29: ffff800008007ad0 x28: 1ffff00002ab4a09 x27: dfff800000000000
x26: 1fffe000182d492c x25: dfff800000000000 x24: 1fffe000182d4902
x23: 1fffe000182d4905 x22: 0000000000000007 x21: 0000000000000000
x20: 00000000ffff9000 x19: ffff0000c16a4800 x18: ffff800008007620
x17: ffff800010ba02ec x16: ffff8000084f40fc x15: 000000000002d92b
x14: 00000000ffffffff x13: dfff800000000000 x12: 0000000000000001
x11: ff80800010cadad4 x10: 0000000000000000 x9 : ffff800010cadad4
x8 : ffff8000155a5040 x7 : 0000000000000000 x6 : 0000000000000000
x5 : 0000000000000020 x4 : 0000000000000000 x3 : ffff800010cad924
x2 : 0000000000000000 x1 : 00000000ffff9000 x0 : 0000000000000000
Call trace:
inet_sock_destruct+0x56c/0x664 net/ipv4/af_inet.c:154
__sk_destruct+0x5c/0x75c net/core/sock.c:2124
sk_destruct net/core/sock.c:2169 [inline]
__sk_free+0x37c/0x4e8 net/core/sock.c:2180
sk_free+0x60/0xc8 net/core/sock.c:2191
sock_put include/net/sock.h:1992 [inline]
tcp_write_timer+0x1c4/0x2e4 net/ipv4/tcp_timer.c:644
call_timer_fn+0x1c0/0xa1c kernel/time/timer.c:1474
expire_timers kernel/time/timer.c:1519 [inline]
__run_timers+0x554/0x718 kernel/time/timer.c:1790
run_timer_softirq+0x7c/0x114 kernel/time/timer.c:1803
__do_softirq+0x30c/0xea0 kernel/softirq.c:571
____do_softirq+0x14/0x20 arch/arm64/kernel/irq.c:79
call_on_irq_stack+0x2c/0x54 arch/arm64/kernel/entry.S:889
do_softirq_own_stack+0x20/0x2c arch/arm64/kernel/irq.c:84
invoke_softirq kernel/softirq.c:452 [inline]
__irq_exit_rcu+0x28c/0x534 kernel/softirq.c:650
irq_exit_rcu+0x14/0x84 kernel/softirq.c:662
__el1_irq arch/arm64/kernel/entry-common.c:472 [inline]
el1_interrupt+0x38/0x68 arch/arm64/kernel/entry-common.c:486
el1h_64_irq_handler+0x18/0x24 arch/arm64/kernel/entry-common.c:491
el1h_64_irq+0x64/0x68 arch/arm64/kernel/entry.S:577
arch_local_irq_enable+0xc/0x18 arch/arm64/include/asm/irqflags.h:35
default_idle_call+0x68/0xdc kernel/sched/idle.c:109
cpuidle_idle_call kernel/sched/idle.c:191 [inline]
do_idle+0x1e0/0x514 kernel/sched/idle.c:303
cpu_startup_entry+0x24/0x28 kernel/sched/idle.c:400
rest_init+0x2d8/0x2f0 init/main.c:729
start_kernel+0x0/0x608 init/main.c:890
start_kernel+0x448/0x608 init/main.c:1145
__primary_switched+0xb8/0xc0 arch/arm64/kernel/head.S:468
irq event stamp: 6047371
hardirqs last enabled at (6047370): [<ffff8000121b9b0c>] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:151 [inline]
hardirqs last enabled at (6047370): [<ffff8000121b9b0c>] _raw_spin_unlock_irqrestore+0x48/0xac kernel/locking/spinlock.c:194
hardirqs last disabled at (6047371): [<ffff8000120d75ac>] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:405
softirqs last enabled at (6047288): [<ffff800008020d74>] softirq_handle_end kernel/softirq.c:414 [inline]
softirqs last enabled at (6047288): [<ffff800008020d74>] __do_softirq+0xc14/0xea0 kernel/softirq.c:600
softirqs last disabled at (6047301): [<ffff80000802a948>] ____do_softirq+0x14/0x20 arch/arm64/kernel/irq.c:79
---[ end trace 0000000000000000 ]---


---
This report is generated by a bot. It may contain errors.
See https://goo.gl/tpsmEJ for more information about syzbot.
syzbot engineers can be reached at syzk...@googlegroups.com.

syzbot will keep track of this issue. See:
https://goo.gl/tpsmEJ#status for how to communicate with syzbot.

syzbot

unread,
May 19, 2023, 9:52:57 AM5/19/23
to syzkaller...@googlegroups.com
syzbot has found a reproducer for the following issue on:

HEAD commit: fa74641fb6b9 Linux 6.1.29
git tree: linux-6.1.y
console output: https://syzkaller.appspot.com/x/log.txt?x=15e896ee280000
kernel config: https://syzkaller.appspot.com/x/.config?x=7454aa89ac475d7b
dashboard link: https://syzkaller.appspot.com/bug?extid=c5cee91f2c5d71790061
compiler: Debian clang version 15.0.7, GNU ld (GNU Binutils for Debian) 2.35.2
userspace arch: arm64
syz repro: https://syzkaller.appspot.com/x/repro.syz?x=17dce309280000
C reproducer: https://syzkaller.appspot.com/x/repro.c?x=17c0eef9280000

Downloadable assets:
disk image: https://storage.googleapis.com/syzbot-assets/53e4da6b145c/disk-fa74641f.raw.xz
vmlinux: https://storage.googleapis.com/syzbot-assets/adeb1a2cfa86/vmlinux-fa74641f.xz
kernel image: https://storage.googleapis.com/syzbot-assets/c976f1155d08/Image-fa74641f.gz.xz

IMPORTANT: if you fix the issue, please add the following tag to the commit:
Reported-by: syzbot+c5cee9...@syzkaller.appspotmail.com

------------[ cut here ]------------
WARNING: CPU: 0 PID: 15007 at net/ipv4/af_inet.c:154 inet_sock_destruct+0x56c/0x664 net/ipv4/af_inet.c:154
Modules linked in:
CPU: 0 PID: 15007 Comm: syz-executor306 Not tainted 6.1.29-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/28/2023
pstate: 00400005 (nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : inet_sock_destruct+0x56c/0x664 net/ipv4/af_inet.c:154
lr : inet_sock_destruct+0x56c/0x664 net/ipv4/af_inet.c:154
sp : ffff800008007cb0
x29: ffff800008007cb0 x28: ffff0000d5f19e70 x27: 0000000000000003
x26: 1fffe0001abe335c x25: dfff800000000000 x24: 1fffe0001abe3332
x23: 1fffe0001abe3335 x22: 0000000000000007 x21: 0000000000000000
x20: 0000000000000d00 x19: ffff0000d5f19980 x18: 1fffe00019ae9087
x17: ffff80019f0c0000 x16: ffff8000084fafa0 x15: 0000000000000000
x14: 1ffff00002ab40b0 x13: dfff800000000000 x12: 0000000000000001
x11: ff80800010cbd160 x10: 0000000000000000 x9 : ffff800010cbd160
x8 : ffff0000cd748000 x7 : ffff8000083b7d00 x6 : 0000000000000000
x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff800010cbcfb0
x2 : 0000000000000000 x1 : 0000000000000d00 x0 : 0000000000000000
Call trace:
inet_sock_destruct+0x56c/0x664 net/ipv4/af_inet.c:154
inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:115
__sk_destruct+0x5c/0x75c net/core/sock.c:2124
rcu_do_batch kernel/rcu/tree.c:2251 [inline]
rcu_core+0x878/0x1c10 kernel/rcu/tree.c:2511
rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2528
__do_softirq+0x30c/0xea0 kernel/softirq.c:571
____do_softirq+0x14/0x20 arch/arm64/kernel/irq.c:79
call_on_irq_stack+0x24/0x4c arch/arm64/kernel/entry.S:889
do_softirq_own_stack+0x20/0x2c arch/arm64/kernel/irq.c:84
invoke_softirq kernel/softirq.c:452 [inline]
__irq_exit_rcu+0x28c/0x534 kernel/softirq.c:650
irq_exit_rcu+0x14/0x84 kernel/softirq.c:662
__el1_irq arch/arm64/kernel/entry-common.c:472 [inline]
el1_interrupt+0x38/0x68 arch/arm64/kernel/entry-common.c:486
el1h_64_irq_handler+0x18/0x24 arch/arm64/kernel/entry-common.c:491
el1h_64_irq+0x64/0x68 arch/arm64/kernel/entry.S:577
local_daif_restore arch/arm64/include/asm/daifflags.h:117 [inline]
el0_svc_common+0xa8/0x258 arch/arm64/kernel/syscall.c:107
do_el0_svc+0x64/0x218 arch/arm64/kernel/syscall.c:206
el0_svc+0x58/0x168 arch/arm64/kernel/entry-common.c:637
el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:655
el0t_64_sync+0x18c/0x190 arch/arm64/kernel/entry.S:581
irq event stamp: 1225
hardirqs last enabled at (1224): [<ffff8000121cc374>] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:151 [inline]
hardirqs last enabled at (1224): [<ffff8000121cc374>] _raw_spin_unlock_irqrestore+0x48/0xac kernel/locking/spinlock.c:194
hardirqs last disabled at (1225): [<ffff8000120e850c>] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:405
softirqs last enabled at (1082): [<ffff800010365954>] spin_unlock_bh include/linux/spinlock.h:395 [inline]
softirqs last enabled at (1082): [<ffff800010365954>] release_sock+0x178/0x1cc net/core/sock.c:3484
softirqs last disabled at (1191): [<ffff80000802a994>] ____do_softirq+0x14/0x20 arch/arm64/kernel/irq.c:79
---[ end trace 0000000000000000 ]---


---
If you want syzbot to run the reproducer, reply with:
#syz test: git://repo/address.git branch-or-commit-hash
If you attach or paste a git patch, syzbot will apply it before testing.
Reply all
Reply to author
Forward
0 new messages