syzbot


KCSAN: data-race in virtqueue_get_buf_ctx / vring_interrupt (2)

Status: auto-closed as invalid on 2020/04/19 05:34
Reported-by: syzbot+@syzkaller.appspotmail.com
First crash: 1121d, last: 1096d
similar bugs (4):
Kernel Title Repro Cause bisect Fix bisect Count Last Reported Patched Status
upstream KCSAN: data-race in virtqueue_get_buf_ctx / vring_interrupt 3 1192d 1202d 0/24 closed as invalid on 2019/11/19 13:44
upstream KCSAN: data-race in virtqueue_get_buf_ctx / vring_interrupt (5) 1 214d 214d 0/24 auto-closed as invalid on 2022/08/13 10:50
upstream KCSAN: data-race in virtqueue_get_buf_ctx / vring_interrupt (3) 1 478d 478d 0/24 auto-closed as invalid on 2021/11/23 01:54
upstream KCSAN: data-race in virtqueue_get_buf_ctx / vring_interrupt (4) 1 293d 293d 0/24 auto-closed as invalid on 2022/05/27 01:16

Sample crash report:
==================================================================
BUG: KCSAN: data-race in virtqueue_get_buf_ctx / vring_interrupt

write to 0xffff88812979c348 of 2 bytes by interrupt on cpu 0:
 virtqueue_get_buf_ctx_split drivers/virtio/virtio_ring.c:721 [inline]
 virtqueue_get_buf_ctx+0x4cc/0x5c0 drivers/virtio/virtio_ring.c:1900
 virtqueue_get_buf+0x29/0x40 drivers/virtio/virtio_ring.c:1906
 free_old_xmit_skbs+0x9e/0x170 drivers/net/virtio_net.c:1359
 start_xmit+0xd3/0xbe0 drivers/net/virtio_net.c:1562
 __netdev_start_xmit include/linux/netdevice.h:4447 [inline]
 netdev_start_xmit include/linux/netdevice.h:4461 [inline]
 xmit_one net/core/dev.c:3420 [inline]
 dev_hard_start_xmit+0xef/0x430 net/core/dev.c:3436
 sch_direct_xmit+0x2b3/0x900 net/sched/sch_generic.c:313
 __dev_xmit_skb net/core/dev.c:3621 [inline]
 __dev_queue_xmit+0x13e2/0x1ba0 net/core/dev.c:3982
 dev_queue_xmit+0x21/0x30 net/core/dev.c:4046
 neigh_hh_output include/net/neighbour.h:500 [inline]
 neigh_output include/net/neighbour.h:509 [inline]
 ip_finish_output2+0x89b/0xea0 net/ipv4/ip_output.c:228
 __ip_finish_output net/ipv4/ip_output.c:308 [inline]
 __ip_finish_output+0x23a/0x490 net/ipv4/ip_output.c:290
 ip_finish_output+0x41/0x160 net/ipv4/ip_output.c:318
 NF_HOOK_COND include/linux/netfilter.h:296 [inline]
 ip_output+0xfe/0x230 net/ipv4/ip_output.c:432
 dst_output include/net/dst.h:436 [inline]
 ip_local_out+0x74/0x90 net/ipv4/ip_output.c:125
 __ip_queue_xmit+0x3a8/0xa40 net/ipv4/ip_output.c:532
 ip_queue_xmit+0x45/0x60 include/net/ip.h:237
 __tcp_transmit_skb+0xea3/0x1df0 net/ipv4/tcp_output.c:1170
 __tcp_send_ack+0x246/0x300 net/ipv4/tcp_output.c:3697
 tcp_send_ack+0x34/0x40 net/ipv4/tcp_output.c:3703
 __tcp_ack_snd_check+0xd9/0x580 net/ipv4/tcp_input.c:5243
 tcp_rcv_established+0xce9/0xf50 net/ipv4/tcp_input.c:5674
 tcp_v4_do_rcv+0x3b5/0x520 net/ipv4/tcp_ipv4.c:1562
 tcp_v4_rcv+0x1b2a/0x1d20 net/ipv4/tcp_ipv4.c:1943
 ip_protocol_deliver_rcu+0x4d/0x420 net/ipv4/ip_input.c:204
 ip_local_deliver_finish+0x110/0x140 net/ipv4/ip_input.c:231
 NF_HOOK include/linux/netfilter.h:307 [inline]
 NF_HOOK include/linux/netfilter.h:301 [inline]
 ip_local_deliver+0x133/0x210 net/ipv4/ip_input.c:252
 dst_input include/net/dst.h:442 [inline]
 ip_sublist_rcv_finish+0xf8/0x140 net/ipv4/ip_input.c:549
 ip_list_rcv_finish net/ipv4/ip_input.c:599 [inline]
 ip_sublist_rcv+0x418/0x550 net/ipv4/ip_input.c:607
 ip_list_rcv+0x2f5/0x322 net/ipv4/ip_input.c:642
 __netif_receive_skb_list_ptype net/core/dev.c:5193 [inline]
 __netif_receive_skb_list_ptype net/core/dev.c:5182 [inline]
 __netif_receive_skb_list_core+0x350/0x5c0 net/core/dev.c:5241
 __netif_receive_skb_list net/core/dev.c:5293 [inline]
 netif_receive_skb_list_internal+0x5d8/0x830 net/core/dev.c:5388
 gro_normal_list.part.0+0x3a/0xb0 net/core/dev.c:5810
 gro_normal_list net/core/dev.c:5823 [inline]
 gro_normal_one+0x162/0x170 net/core/dev.c:5822
 napi_skb_finish net/core/dev.c:5838 [inline]
 napi_gro_receive+0x288/0x300 net/core/dev.c:5870
 receive_buf+0x284/0x30b0 drivers/net/virtio_net.c:1061
 virtnet_receive drivers/net/virtio_net.c:1323 [inline]
 virtnet_poll+0x436/0x7d0 drivers/net/virtio_net.c:1428
 napi_poll net/core/dev.c:6532 [inline]
 net_rx_action+0x3ae/0xa90 net/core/dev.c:6600
 __do_softirq+0x115/0x33f kernel/softirq.c:292
 invoke_softirq kernel/softirq.c:373 [inline]
 irq_exit+0xbb/0xe0 kernel/softirq.c:413
 exiting_irq arch/x86/include/asm/apic.h:536 [inline]
 do_IRQ+0x81/0x130 arch/x86/kernel/irq.c:263
 ret_from_intr+0x0/0x21
 arch_local_irq_restore arch/x86/include/asm/paravirt.h:752 [inline]
 kcsan_setup_watchpoint+0x211/0x380 kernel/kcsan/core.c:492
 check_access kernel/kcsan/core.c:529 [inline]
 __tsan_read8+0xc6/0x100 kernel/kcsan/core.c:659
 batadv_nc_purge_orig_hash net/batman-adv/network-coding.c:408 [inline]
 batadv_nc_worker+0xbc/0x390 net/batman-adv/network-coding.c:718
 process_one_work+0x40b/0x8d0 kernel/workqueue.c:2264
 worker_thread+0xa0/0x800 kernel/workqueue.c:2410
 kthread+0x1d4/0x200 drivers/block/aoe/aoecmd.c:1253
 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:352

read to 0xffff88812979c348 of 2 bytes by interrupt on cpu 1:
 more_used drivers/virtio/virtio_ring.c:2029 [inline]
 vring_interrupt+0x36/0x1c0 drivers/virtio/virtio_ring.c:2036
 __handle_irq_event_percpu+0x9a/0x430 kernel/irq/handle.c:149
 handle_irq_event_percpu+0x4b/0xe0 kernel/irq/handle.c:189
 handle_irq_event+0x85/0xca kernel/irq/handle.c:206
 handle_edge_irq+0x1a4/0x4a0 kernel/irq/chip.c:830
 generic_handle_irq_desc include/linux/irqdesc.h:156 [inline]
 do_IRQ+0x7c/0x130 arch/x86/kernel/irq.c:250
 ret_from_intr+0x0/0x21
 arch_local_irq_enable arch/x86/include/asm/paravirt.h:762 [inline]
 preempt_schedule_irq+0x4d/0x90 kernel/sched/core.c:4337
 restore_regs_and_return_to_kernel+0x0/0x25
 check_kcov_mode kernel/kcov.c:153 [inline]
 __sanitizer_cov_trace_pc+0x20/0x50 kernel/kcov.c:187
 d_instantiate+0x1e/0x90 fs/dcache.c:1952
 alloc_file_pseudo+0x10d/0x1b0 fs/file_table.c:231
 sock_alloc_file+0x69/0x130 net/socket.c:398
 sock_map_fd net/socket.c:422 [inline]
 __sys_socket+0xe8/0x170 net/socket.c:1517
 __do_sys_socket net/socket.c:1522 [inline]
 __se_sys_socket net/socket.c:1520 [inline]
 __x64_sys_socket+0x4c/0x60 net/socket.c:1520
 do_syscall_64+0xcc/0x3a0 arch/x86/entry/common.c:294
 entry_SYSCALL_64_after_hwframe+0x44/0xa9

Reported by Kernel Concurrency Sanitizer on:
CPU: 1 PID: 17694 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
==================================================================

Crashes (4):
Manager Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets Title
ci2-upstream-kcsan-gce 2020/02/09 05:25 https://github.com/google/ktsan.git kcsan f60f0f543333 06150bf1 .config console log report
ci2-upstream-kcsan-gce 2020/01/28 18:53 https://github.com/google/ktsan.git kcsan 245a43005292 c8e81ce4 .config console log report
ci2-upstream-kcsan-gce 2020/01/20 10:44 https://github.com/google/ktsan.git kcsan 245a43005292 c40da18c .config console log report
ci2-upstream-kcsan-gce 2020/01/14 19:30 https://github.com/google/ktsan.git kcsan 245a43005292 fa12bd3c .config console log report
* Struck through repros no longer work on HEAD.