syzbot


WARNING in inet_csk_get_port (3)

Status: upstream: reported C repro on 2024/05/06 08:37
Subsystems: net
[Documentation on labels]
Reported-by: syzbot+2459c1b9fcd39be822b1@syzkaller.appspotmail.com
First crash: 78d, last: 35d
Cause bisection: introduced by (bisect log) :
commit 3505cb9fa26cfec9512744466e754a8cbc2365b0
Author: Jiri Olsa <jolsa@kernel.org>
Date: Wed Aug 9 08:34:14 2023 +0000

  bpf: Add attach_type checks under bpf_prog_attach_check_attach_type

Crash: WARNING in inet_csk_get_port (log)
Repro: C syz .config
  
Discussions (1)
Title Replies (including bot) Last reply
[syzbot] [net?] WARNING in inet_csk_get_port (3) 3 (7) 2024/05/27 21:06
Similar bugs (3)
Kernel Title Repro Cause bisect Fix bisect Count Last Reported Patched Status
upstream WARNING in inet_csk_get_port (2) net C done 88 249d 279d 25/27 fixed on 2023/12/21 01:43
upstream WARNING in inet_csk_get_port net C done 1166 536d 764d 22/27 fixed on 2023/02/24 13:50
linux-6.1 WARNING in inet_csk_get_port origin:upstream C done 11 251d 280d 3/3 fixed on 2023/11/20 11:42
Last patch testing requests (4)
Created Duration User Patch Repo Result
2024/06/05 03:37 24m retest repro upstream OK log
2024/05/27 10:45 3h33m hdanton@sina.com patch https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git 977b1ef51866 report log
2024/05/26 23:28 50m hdanton@sina.com patch https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git 977b1ef51866 report log
2024/05/22 00:07 19m retest repro git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci report log

Sample crash report:
------------[ cut here ]------------
WARNING: CPU: 0 PID: 6262 at net/ipv4/inet_connection_sock.c:595 inet_csk_get_port+0x1170/0x1364
Modules linked in:
CPU: 0 PID: 6262 Comm: syz-executor227 Not tainted 6.9.0-rc4-syzkaller-g6a71d2909427 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024
pstate: 80401005 (Nzcv daif +PAN -UAO -TCO -DIT +SSBS BTYPE=--)
pc : inet_csk_get_port+0x1170/0x1364
lr : inet_csk_get_port+0x116c/0x1364 net/ipv4/inet_connection_sock.c:595
sp : ffff800097d57b40
x29: ffff800097d57c20 x28: dfff800000000000 x27: ffff0000d60bc000
x26: 0000000000000000 x25: 0000000000004e20 x24: ffff800093adfd00
x23: ffff0000d2ad0ac0 x22: ffff0000d698f100 x21: ffff0000d37ffe88
x20: ffff0000d2ad1158 x19: 0000000000000000 x18: 0000000000000000
x17: 0000000000000000 x16: ffff80008055219c x15: 0000000000000001
x14: 1fffe0001a55a1d3 x13: 0000000000000000 x12: 0000000000000003
x11: 0000000000000202 x10: 0000000000ff0100 x9 : 0000000000000000
x8 : ffff0000d8941e40 x7 : ffff800088fb4d98 x6 : 0000000000000000
x5 : 0000000000000000 x4 : 0000000000000001 x3 : 0000000000000000
x2 : 0000000000000002 x1 : 0000000000000000 x0 : 0000000000000000
Call trace:
 inet_csk_get_port+0x1170/0x1364
 inet_csk_listen_start+0x104/0x2c8 net/ipv4/inet_connection_sock.c:1281
 inet_dccp_listen+0x190/0x278 net/dccp/proto.c:951
 __sys_listen+0x1b0/0x220 net/socket.c:1881
 __do_sys_listen net/socket.c:1890 [inline]
 __se_sys_listen net/socket.c:1888 [inline]
 __arm64_sys_listen+0x5c/0x74 net/socket.c:1888
 __invoke_syscall arch/arm64/kernel/syscall.c:34 [inline]
 invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:48
 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:133
 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:152
 el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:712
 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:730
 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598
irq event stamp: 517
hardirqs last  enabled at (516): [<ffff8000801e794c>] __local_bh_enable_ip+0x224/0x44c kernel/softirq.c:387
hardirqs last disabled at (517): [<ffff80008ae6da08>] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:470
softirqs last  enabled at (508): [<ffff800088fbad98>] spin_unlock_bh include/linux/spinlock.h:396 [inline]
softirqs last  enabled at (508): [<ffff800088fbad98>] lock_sock_nested+0xcc/0x11c net/core/sock.c:3542
softirqs last disabled at (510): [<ffff8000897dd6f8>] spin_lock_bh include/linux/spinlock.h:356 [inline]
softirqs last disabled at (510): [<ffff8000897dd6f8>] inet_csk_get_port+0x1c8/0x1364 net/ipv4/inet_connection_sock.c:543
---[ end trace 0000000000000000 ]---

Crashes (8):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2024/04/25 00:14 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci 6a71d2909427 8bdc0f22 .config console log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 WARNING in inet_csk_get_port
2024/04/21 11:30 upstream 977b1ef51866 af24b050 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root WARNING in inet_csk_get_port
2024/04/21 20:55 upstream 48cf398f15fc af24b050 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root WARNING in inet_csk_get_port
2024/04/21 09:37 upstream 977b1ef51866 af24b050 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root WARNING in inet_csk_get_port
2024/05/07 10:22 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci 78186bd77b47 c035c6de .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 WARNING in inet_csk_get_port
2024/05/02 01:10 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci 6a71d2909427 3ba885bc .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 WARNING in inet_csk_get_port
2024/05/02 01:10 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci 6a71d2909427 3ba885bc .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 WARNING in inet_csk_get_port
2024/04/08 10:30 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci 707081b61156 ca620dd8 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 WARNING in inet_csk_get_port
* Struck through repros no longer work on HEAD.