syzbot


WARNING in inet_sock_destruct (5)

Status: upstream: reported C repro on 2025/09/09 23:22
Subsystems: net
[Documentation on labels]
Reported-by: syzbot+4cabd1d2fa917a456db8@syzkaller.appspotmail.com
Fix commit: a3967baad4d5 tcp_bpf: Call sk_msg_free() when tcp_bpf_send_verdict() fails to allocate psock->cork.
Patched on: [ci-qemu-gce-upstream-auto ci-qemu-upstream ci-qemu-upstream-386 ci-qemu2-arm32 ci-qemu2-arm64 ci-qemu2-arm64-compat ci-qemu2-arm64-mte ci-snapshot-upstream-root ci-upstream-bpf-kasan-gce ci-upstream-bpf-next-kasan-gce ci-upstream-gce-leak ci-upstream-kasan-badwrites-root ci-upstream-kasan-gce ci-upstream-kasan-gce-386 ci-upstream-kasan-gce-root ci-upstream-kasan-gce-selinux-root ci-upstream-kasan-gce-smack-root ci-upstream-kmsan-gce-386-root ci-upstream-kmsan-gce-root ci-upstream-linux-next-kasan-gce-root ci-upstream-net-kasan-gce ci-upstream-net-this-kasan-gce ci-upstream-rust-kasan-gce ci2-upstream-fs ci2-upstream-kcsan-gce ci2-upstream-usb], missing on: [ci-qemu-native-arm64-kvm ci-qemu2-riscv64 ci-upstream-gce-arm64]
First crash: 7d04h, last: 4d04h
Cause bisection: failed (error log, bisect log)
  
Discussions (2)
Title Replies (including bot) Last reply
[PATCH v1 bpf] tcp_bpf: Call sk_msg_free() when tcp_bpf_send_verdict() fails to allocate psock->cork. 6 (6) 2025/09/10 15:59
[syzbot] [net?] WARNING in inet_sock_destruct (5) 0 (1) 2025/09/09 23:22
Similar bugs (12)
Kernel Title Rank 🛈 Repro Cause bisect Fix bisect Count Last Reported Patched Status
android-49 WARNING in inet_sock_destruct -1 C 728 2574d 2348d 0/3 public: reported C repro on 2019/04/12 00:00
linux-6.1 WARNING in inet_sock_destruct (2) origin:lts-only -1 C inconclusive 16 7d05h 230d 0/3 upstream: reported C repro on 2025/01/28 09:26
android-44 WARNING in inet_sock_destruct -1 12 2582d 2794d 0/2 auto-closed as invalid on 2019/02/22 12:37
upstream WARNING in inet_sock_destruct (4) net -1 C done 6683 13d 815d 29/29 fixed on 2025/09/04 16:57
upstream WARNING in inet_sock_destruct (3) net -1 C 87 834d 936d 22/29 fixed on 2023/06/08 14:41
linux-6.6 WARNING in inet_sock_destruct -1 C 3 9h08m 14h13m 0/2 upstream: reported C repro on 2025/09/15 08:28
linux-5.15 WARNING in inet_sock_destruct origin:upstream -1 C error 2061 14d 861d 0/3 upstream: reported C repro on 2023/05/08 19:19
linux-6.1 WARNING in inet_sock_destruct origin:upstream missing-backport -1 C done 631 274d 887d 3/3 fixed on 2025/01/27 09:36
android-6-12 WARNING in inet_sock_destruct origin:upstream -1 C 58 17d 80d 0/1 premoderation: reported C repro on 2025/06/27 18:32
upstream WARNING in inet_sock_destruct (2) net -1 C unreliable unreliable 1259 1132d 1763d 0/29 closed as invalid on 2022/10/12 18:26
upstream WARNING in inet_sock_destruct net -1 5893 2876d 2871d 0/29 closed as invalid on 2018/01/30 22:53
linux-4.14 WARNING in inet_sock_destruct -1 C inconclusive 1 1932d 1992d 0/1 upstream: reported C repro on 2020/04/02 03:04
Last patch testing requests (1)
Created Duration User Patch Repo Result
2025/09/09 22:15 24m kuniyu@google.com patch linux-next OK log

Sample crash report:
------------[ cut here ]------------
WARNING: net/ipv4/af_inet.c:156 at inet_sock_destruct+0x623/0x730 net/ipv4/af_inet.c:156, CPU#1: syz-executor/5983
Modules linked in:
CPU: 1 UID: 0 PID: 5983 Comm: syz-executor Not tainted syzkaller #0 PREEMPT(full) 
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025
RIP: 0010:inet_sock_destruct+0x623/0x730 net/ipv4/af_inet.c:156
Code: 0f 0b 90 e9 62 fe ff ff e8 7a db b5 f7 90 0f 0b 90 e9 95 fe ff ff e8 6c db b5 f7 90 0f 0b 90 e9 bb fe ff ff e8 5e db b5 f7 90 <0f> 0b 90 e9 e1 fe ff ff 89 f9 80 e1 07 80 c1 03 38 c1 0f 8c 9f fc
RSP: 0018:ffffc90000a08b48 EFLAGS: 00010246
RAX: ffffffff8a09d0b2 RBX: dffffc0000000000 RCX: ffff888024a23c80
RDX: 0000000000000100 RSI: 0000000000000fff RDI: 0000000000000000
RBP: 0000000000000fff R08: ffff88807e07c627 R09: 1ffff1100fc0f8c4
R10: dffffc0000000000 R11: ffffed100fc0f8c5 R12: ffff88807e07c380
R13: dffffc0000000000 R14: ffff88807e07c60c R15: 1ffff1100fc0f872
FS:  00005555604c4500(0000) GS:ffff888125af1000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00005555604df5c8 CR3: 0000000032b06000 CR4: 00000000003526f0
Call Trace:
 <IRQ>
 __sk_destruct+0x86/0x660 net/core/sock.c:2339
 rcu_do_batch kernel/rcu/tree.c:2605 [inline]
 rcu_core+0xca8/0x1770 kernel/rcu/tree.c:2861
 handle_softirqs+0x286/0x870 kernel/softirq.c:579
 __do_softirq kernel/softirq.c:613 [inline]
 invoke_softirq kernel/softirq.c:453 [inline]
 __irq_exit_rcu+0xca/0x1f0 kernel/softirq.c:680
 irq_exit_rcu+0x9/0x30 kernel/softirq.c:696
 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1052 [inline]
 sysvec_apic_timer_interrupt+0xa6/0xc0 arch/x86/kernel/apic/apic.c:1052
 </IRQ>
 <TASK>
 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:697
RIP: 0010:lock_acquire+0x175/0x360 kernel/locking/lockdep.c:5872
Code: 00 00 00 00 9c 8f 44 24 30 f7 44 24 30 00 02 00 00 0f 85 cd 00 00 00 f7 44 24 08 00 02 00 00 74 01 fb 65 48 8b 05 4b a0 25 11 <48> 3b 44 24 58 0f 85 f2 00 00 00 48 83 c4 60 5b 41 5c 41 5d 41 5e
RSP: 0018:ffffc90003bbfc58 EFLAGS: 00000206
RAX: 1b6cca55ab161300 RBX: 0000000000000000 RCX: 1b6cca55ab161300
RDX: 0000000000000001 RSI: ffffffff8ddabb49 RDI: ffffffff8c035e00
RBP: ffffffff81b797f6 R08: 0000000000000000 R09: ffffffff81b797f6
R10: dffffc0000000000 R11: ffffed1004fb251d R12: 0000000000000002
R13: ffffffff8e33c560 R14: 0000000000000000 R15: 0000000000000246
 rcu_lock_acquire include/linux/rcupdate.h:331 [inline]
 rcu_read_lock include/linux/rcupdate.h:841 [inline]
 cgroup_sk_alloc+0x42/0x3c0 kernel/cgroup/cgroup.c:7166
 sk_alloc+0x236/0x370 net/core/sock.c:2319
 inet_create+0x7a0/0x1000 net/ipv4/af_inet.c:326
 __sock_create+0x4b3/0x9f0 net/socket.c:1589
 sock_create net/socket.c:1647 [inline]
 __sys_socket_create net/socket.c:1684 [inline]
 __sys_socket+0xd7/0x1b0 net/socket.c:1731
 __do_sys_socket net/socket.c:1745 [inline]
 __se_sys_socket net/socket.c:1743 [inline]
 __x64_sys_socket+0x7a/0x90 net/socket.c:1743
 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
 do_syscall_64+0xfa/0xfa0 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7fc298d90b07
Code: f0 ff ff 77 06 c3 0f 1f 44 00 00 48 c7 c2 a8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff c3 66 0f 1f 44 00 00 b8 29 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007fffa1cc9538 EFLAGS: 00000202 ORIG_RAX: 0000000000000029
RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007fc298d90b07
RDX: 0000000000000006 RSI: 0000000000000001 RDI: 0000000000000002
RBP: 00007fffa1cc9c2c R08: 0000000000000000 R09: 00007fffa1cc9937
R10: 0000000000000000 R11: 0000000000000202 R12: 000000000000000a
R13: 00000000000927c0 R14: 0000000000015b9e R15: 00007fffa1cc9c80
 </TASK>
----------------
Code disassembly (best guess):
   0:	00 00                	add    %al,(%rax)
   2:	00 00                	add    %al,(%rax)
   4:	9c                   	pushf
   5:	8f 44 24 30          	pop    0x30(%rsp)
   9:	f7 44 24 30 00 02 00 	testl  $0x200,0x30(%rsp)
  10:	00
  11:	0f 85 cd 00 00 00    	jne    0xe4
  17:	f7 44 24 08 00 02 00 	testl  $0x200,0x8(%rsp)
  1e:	00
  1f:	74 01                	je     0x22
  21:	fb                   	sti
  22:	65 48 8b 05 4b a0 25 	mov    %gs:0x1125a04b(%rip),%rax        # 0x1125a075
  29:	11
* 2a:	48 3b 44 24 58       	cmp    0x58(%rsp),%rax <-- trapping instruction
  2f:	0f 85 f2 00 00 00    	jne    0x127
  35:	48 83 c4 60          	add    $0x60,%rsp
  39:	5b                   	pop    %rbx
  3a:	41 5c                	pop    %r12
  3c:	41 5d                	pop    %r13
  3e:	41 5e                	pop    %r14

Crashes (6):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2025/09/09 02:50 linux-next 3e8e5822146b d291dd2d .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root WARNING in inet_sock_destruct
2025/09/11 09:35 upstream 7aac71907bde e2beed91 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream WARNING in inet_sock_destruct
2025/09/11 18:33 net-next 5adf6f2b9972 fdeaa69b .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce WARNING in inet_sock_destruct
2025/09/08 18:30 linux-next 3e8e5822146b d291dd2d .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root WARNING in inet_sock_destruct
2025/09/08 18:22 linux-next 3e8e5822146b d291dd2d .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root WARNING in inet_sock_destruct
2025/09/08 18:03 linux-next 3e8e5822146b d291dd2d .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root WARNING in inet_sock_destruct
* Struck through repros no longer work on HEAD.