syzbot


WARNING: suspicious RCU usage in in6_dump_addrs

Status: internal: reported C repro on 2022/06/13 20:34
Reported-by: syzbot+@syzkaller.appspotmail.com
Fix commit: 4e43e64d0f13 ipv6: fix lockdep splat in in6_dump_addrs()
Patched on: [ci-qemu-upstream ci-qemu-upstream-386 ci-qemu2-arm32 ci-qemu2-arm64 ci-qemu2-arm64-compat ci-qemu2-arm64-mte ci-upstream-bpf-kasan-gce ci-upstream-bpf-next-kasan-gce ci-upstream-gce-arm64 ci-upstream-gce-leak ci-upstream-kasan-gce ci-upstream-kasan-gce-386 ci-upstream-kasan-gce-root ci-upstream-kasan-gce-selinux-root ci-upstream-kasan-gce-smack-root ci-upstream-kmsan-gce ci-upstream-kmsan-gce-386 ci-upstream-linux-next-kasan-gce-root ci-upstream-net-kasan-gce ci-upstream-net-this-kasan-gce ci2-upstream-fs ci2-upstream-kcsan-gce ci2-upstream-usb], missing on: [ci-qemu2-riscv64]
First crash: 230d, last: 186d

Cause bisection: introduced by (bisect log) [no-op commit]:
commit b9fc8b4a591811546fec2dbef7e9f809362100c9
Author: Grant Seltzer <grantseltzer@gmail.com>
Date: Mon Feb 22 19:58:46 2021 +0000

  bpf: Add kernel/modules BTF presence checks to bpftool feature command

Crash: WARNING in kvm_wait (log)
Repro: C syz .config

Sample crash report:
=============================
WARNING: suspicious RCU usage
5.19.0-rc2-syzkaller-00147-gf0ec9c65a8d6 #0 Not tainted
-----------------------------
net/ipv6/addrconf.c:5175 suspicious rcu_dereference_check() usage!

other info that might help us debug this:


rcu_scheduler_active = 2, debug_locks = 1
1 lock held by syz-executor825/3609:
 #0: ffffffff8d58dce8 (rtnl_mutex){+.+.}-{3:3}, at: netlink_dump+0xae/0xc20 net/netlink/af_netlink.c:2223

stack backtrace:
CPU: 0 PID: 3609 Comm: syz-executor825 Not tainted 5.19.0-rc2-syzkaller-00147-gf0ec9c65a8d6 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 <TASK>
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106
 in6_dump_addrs+0x12d1/0x1790 net/ipv6/addrconf.c:5175
 inet6_dump_addr+0x9c1/0xb50 net/ipv6/addrconf.c:5300
 netlink_dump+0x541/0xc20 net/netlink/af_netlink.c:2275
 __netlink_dump_start+0x647/0x900 net/netlink/af_netlink.c:2380
 netlink_dump_start include/linux/netlink.h:245 [inline]
 rtnetlink_rcv_msg+0x73e/0xc90 net/core/rtnetlink.c:6046
 netlink_rcv_skb+0x153/0x420 net/netlink/af_netlink.c:2501
 netlink_unicast_kernel net/netlink/af_netlink.c:1319 [inline]
 netlink_unicast+0x543/0x7f0 net/netlink/af_netlink.c:1345
 netlink_sendmsg+0x917/0xe10 net/netlink/af_netlink.c:1921
 sock_sendmsg_nosec net/socket.c:714 [inline]
 sock_sendmsg+0xcf/0x120 net/socket.c:734
 ____sys_sendmsg+0x6eb/0x810 net/socket.c:2492
 ___sys_sendmsg+0xf3/0x170 net/socket.c:2546
 __sys_sendmsg net/socket.c:2575 [inline]
 __do_sys_sendmsg net/socket.c:2584 [inline]
 __se_sys_sendmsg net/socket.c:2582 [inline]
 __x64_sys_sendmsg+0x132/0x220 net/socket.c:2582
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x46/0xb0
RIP: 0033:0x7f0e2e75fdf9
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 b1 14 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007ffd2d875138 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f0e2e75fdf9
RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003
RBP: 0000000000000000 R08: 00007ffd2d8752d8 R09: 00007ffd2d8752d8
R10: 0000000000000010 R11: 0000000000000246 R12: 00007f0e2e723680
R13: 431bde82d7b634db R14: 0000000000000000 R15: 0000000000000000
 </TASK>

=============================
WARNING: suspicious RCU usage
5.19.0-rc2-syzkaller-00147-gf0ec9c65a8d6 #0 Not tainted
-----------------------------
net/ipv6/addrconf.c:5177 suspicious rcu_dereference_check() usage!

other info that might help us debug this:


rcu_scheduler_active = 2, debug_locks = 1
1 lock held by syz-executor825/3609:
 #0: ffffffff8d58dce8 (rtnl_mutex){+.+.}-{3:3}, at: netlink_dump+0xae/0xc20 net/netlink/af_netlink.c:2223

stack backtrace:
CPU: 0 PID: 3609 Comm: syz-executor825 Not tainted 5.19.0-rc2-syzkaller-00147-gf0ec9c65a8d6 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 <TASK>
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106
 in6_dump_addrs+0x11af/0x1790 net/ipv6/addrconf.c:5177
 inet6_dump_addr+0x9c1/0xb50 net/ipv6/addrconf.c:5300
 netlink_dump+0x541/0xc20 net/netlink/af_netlink.c:2275
 __netlink_dump_start+0x647/0x900 net/netlink/af_netlink.c:2380
 netlink_dump_start include/linux/netlink.h:245 [inline]
 rtnetlink_rcv_msg+0x73e/0xc90 net/core/rtnetlink.c:6046
 netlink_rcv_skb+0x153/0x420 net/netlink/af_netlink.c:2501
 netlink_unicast_kernel net/netlink/af_netlink.c:1319 [inline]
 netlink_unicast+0x543/0x7f0 net/netlink/af_netlink.c:1345
 netlink_sendmsg+0x917/0xe10 net/netlink/af_netlink.c:1921
 sock_sendmsg_nosec net/socket.c:714 [inline]
 sock_sendmsg+0xcf/0x120 net/socket.c:734
 ____sys_sendmsg+0x6eb/0x810 net/socket.c:2492
 ___sys_sendmsg+0xf3/0x170 net/socket.c:2546
 __sys_sendmsg net/socket.c:2575 [inline]
 __do_sys_sendmsg net/socket.c:2584 [inline]
 __se_sys_sendmsg net/socket.c:2582 [inline]
 __x64_sys_sendmsg+0x132/0x220 net/socket.c:2582
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x46/0xb0
RIP: 0033:0x7f0e2e75fdf9
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 b1 14 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007ffd2d875138 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f0e2e75fdf9
RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003
RBP: 0000000000000000 R08: 00007ffd2d8752d8 R09: 00007ffd2d8752d8
R10: 0000000000000010 R11: 0000000000000246 R12: 00007f0e2e723680
R13: 431bde82d7b634db R14: 0000000000000000 R15: 0000000000000000
 </TASK>

Crashes (613):
Manager Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets Title
ci-upstream-kasan-gce 2022/06/17 22:24 upstream f0ec9c65a8d6 cb58b3b2 .config strace log report syz C WARNING: suspicious RCU usage in in6_dump_addrs
ci-upstream-kasan-gce 2022/06/17 21:53 upstream f0ec9c65a8d6 cb58b3b2 .config strace log report syz C WARNING: suspicious RCU usage in in6_dump_addrs
ci-upstream-kasan-gce 2022/06/17 21:22 upstream f0ec9c65a8d6 cb58b3b2 .config strace log report syz C WARNING: suspicious RCU usage in in6_dump_addrs
ci-upstream-kasan-gce 2022/06/17 20:51 upstream f0ec9c65a8d6 cb58b3b2 .config strace log report syz C WARNING: suspicious RCU usage in in6_dump_addrs
ci-upstream-kasan-gce 2022/06/17 20:16 upstream f0ec9c65a8d6 cb58b3b2 .config strace log report syz C WARNING: suspicious RCU usage in in6_dump_addrs
ci-upstream-kasan-gce 2022/06/17 19:54 upstream f0ec9c65a8d6 cb58b3b2 .config strace log report syz C WARNING: suspicious RCU usage in in6_dump_addrs
ci-upstream-kasan-gce-smack-root 2022/06/13 21:00 upstream b13baccc3850 0d5abf15 .config console log report syz C WARNING: suspicious RCU usage in in6_dump_addrs
ci-upstream-kasan-gce-root 2022/06/13 20:46 upstream b13baccc3850 0d5abf15 .config strace log report syz C WARNING: suspicious RCU usage in in6_dump_addrs
ci-upstream-kasan-gce-selinux-root 2022/06/13 20:45 upstream b13baccc3850 0d5abf15 .config strace log report syz C WARNING: suspicious RCU usage in in6_dump_addrs
ci-upstream-net-this-kasan-gce 2022/06/14 21:44 net 4b7a632ac4e7 127d1faf .config console log report syz C WARNING: suspicious RCU usage in in6_dump_addrs
ci-upstream-net-this-kasan-gce 2022/06/14 12:25 net 619c010a6539 0f087040 .config console log report syz C WARNING: suspicious RCU usage in in6_dump_addrs
ci-upstream-net-this-kasan-gce 2022/06/14 11:03 net 619c010a6539 0f087040 .config strace log report syz C WARNING: suspicious RCU usage in in6_dump_addrs
ci-upstream-net-kasan-gce 2022/06/15 01:01 net-next 7e5e8ec7dbd8 127d1faf .config console log report syz C WARNING: suspicious RCU usage in in6_dump_addrs
ci-upstream-net-kasan-gce 2022/06/14 13:18 net-next c04245328dd7 0f087040 .config strace log report syz C WARNING: suspicious RCU usage in in6_dump_addrs
ci-upstream-kasan-gce-root 2022/07/01 08:19 upstream 1a0e93df1e10 1434eec0 .config console log report info WARNING: suspicious RCU usage in in6_dump_addrs
ci-upstream-kasan-gce-smack-root 2022/06/30 23:38 upstream 1a0e93df1e10 1434eec0 .config console log report info WARNING: suspicious RCU usage in in6_dump_addrs
ci-qemu-upstream 2022/06/30 22:27 upstream 1a0e93df1e10 1434eec0 .config console log report info WARNING: suspicious RCU usage in in6_dump_addrs
ci-upstream-kasan-gce-selinux-root 2022/06/20 18:24 upstream 78ca55889a54 8d15e28d .config console log report info WARNING: suspicious RCU usage in in6_dump_addrs
ci-upstream-kasan-gce 2022/06/20 05:04 upstream a111daf0c53a 8f633d84 .config console log report info WARNING: suspicious RCU usage in in6_dump_addrs
ci-upstream-kasan-gce-selinux-root 2022/06/13 20:33 upstream b13baccc3850 0d5abf15 .config console log report info WARNING: suspicious RCU usage in in6_dump_addrs
ci-qemu-upstream-386 2022/06/29 23:02 upstream d9b2ba67917c 1434eec0 .config console log report info WARNING: suspicious RCU usage in in6_dump_addrs
ci-upstream-kasan-gce-386 2022/06/13 22:34 upstream b13baccc3850 0d5abf15 .config console log report info WARNING: suspicious RCU usage in in6_dump_addrs
ci-upstream-net-this-kasan-gce 2022/06/30 06:09 net e65af5403e46 1434eec0 .config console log report info WARNING: suspicious RCU usage in in6_dump_addrs
ci-upstream-net-kasan-gce 2022/06/18 21:32 net-next dbca1596bbb0 8f633d84 .config console log report info WARNING: suspicious RCU usage in in6_dump_addrs
ci-upstream-linux-next-kasan-gce-root 2022/07/27 09:44 linux-next cb71b93c2dc3 da9d0366 .config console log report info WARNING: suspicious RCU usage in in6_dump_addrs
ci-upstream-linux-next-kasan-gce-root 2022/07/27 06:48 linux-next cb71b93c2dc3 da9d0366 .config console log report info WARNING: suspicious RCU usage in in6_dump_addrs
ci-upstream-linux-next-kasan-gce-root 2022/07/26 21:09 linux-next cb71b93c2dc3 279b89c2 .config console log report info WARNING: suspicious RCU usage in in6_dump_addrs
ci-upstream-linux-next-kasan-gce-root 2022/07/26 18:11 linux-next cb71b93c2dc3 279b89c2 .config console log report info WARNING: suspicious RCU usage in in6_dump_addrs
ci-upstream-linux-next-kasan-gce-root 2022/07/26 04:44 linux-next cb71b93c2dc3 34795c51 .config console log report info WARNING: suspicious RCU usage in in6_dump_addrs
ci-upstream-linux-next-kasan-gce-root 2022/07/25 14:37 linux-next cb71b93c2dc3 664c519c .config console log report info WARNING: suspicious RCU usage in in6_dump_addrs
ci-upstream-linux-next-kasan-gce-root 2022/07/25 11:29 linux-next cb71b93c2dc3 664c519c .config console log report info WARNING: suspicious RCU usage in in6_dump_addrs
ci-upstream-linux-next-kasan-gce-root 2022/07/24 11:38 linux-next cb71b93c2dc3 22343af4 .config console log report info WARNING: suspicious RCU usage in in6_dump_addrs
ci-upstream-linux-next-kasan-gce-root 2022/07/22 14:41 linux-next cb71b93c2dc3 22343af4 .config console log report info WARNING: suspicious RCU usage in in6_dump_addrs
ci-upstream-linux-next-kasan-gce-root 2022/07/22 12:11 linux-next cb71b93c2dc3 22343af4 .config console log report info WARNING: suspicious RCU usage in in6_dump_addrs
ci-upstream-linux-next-kasan-gce-root 2022/07/22 00:11 linux-next cb71b93c2dc3 5e6028b9 .config console log report info WARNING: suspicious RCU usage in in6_dump_addrs
ci-upstream-linux-next-kasan-gce-root 2022/07/21 22:47 linux-next cb71b93c2dc3 5e6028b9 .config console log report info WARNING: suspicious RCU usage in in6_dump_addrs
ci-upstream-linux-next-kasan-gce-root 2022/07/21 12:01 linux-next cb71b93c2dc3 6e67af9d .config console log report info WARNING: suspicious RCU usage in in6_dump_addrs
ci-upstream-linux-next-kasan-gce-root 2022/07/21 09:53 linux-next cb71b93c2dc3 6e67af9d .config console log report info WARNING: suspicious RCU usage in in6_dump_addrs
ci-upstream-linux-next-kasan-gce-root 2022/07/20 23:47 linux-next cb71b93c2dc3 88cb1383 .config console log report info WARNING: suspicious RCU usage in in6_dump_addrs
ci-upstream-linux-next-kasan-gce-root 2022/07/20 21:19 linux-next cb71b93c2dc3 88cb1383 .config console log report info WARNING: suspicious RCU usage in in6_dump_addrs
ci-upstream-linux-next-kasan-gce-root 2022/07/20 05:42 linux-next cb71b93c2dc3 775344bc .config console log report info WARNING: suspicious RCU usage in in6_dump_addrs
ci-upstream-linux-next-kasan-gce-root 2022/07/20 02:59 linux-next cb71b93c2dc3 775344bc .config console log report info WARNING: suspicious RCU usage in in6_dump_addrs
ci-upstream-linux-next-kasan-gce-root 2022/07/19 16:48 linux-next cb71b93c2dc3 72a3cc0c .config console log report info WARNING: suspicious RCU usage in in6_dump_addrs
ci-upstream-linux-next-kasan-gce-root 2022/07/19 12:39 linux-next cb71b93c2dc3 72a3cc0c .config console log report info WARNING: suspicious RCU usage in in6_dump_addrs
ci-upstream-linux-next-kasan-gce-root 2022/07/18 18:52 linux-next cb71b93c2dc3 ff988920 .config console log report info WARNING: suspicious RCU usage in in6_dump_addrs
ci-upstream-linux-next-kasan-gce-root 2022/07/18 15:20 linux-next cb71b93c2dc3 ff988920 .config console log report info WARNING: suspicious RCU usage in in6_dump_addrs
ci-upstream-linux-next-kasan-gce-root 2022/07/18 01:46 linux-next cb71b93c2dc3 95cb00d1 .config console log report info WARNING: suspicious RCU usage in in6_dump_addrs
ci-upstream-linux-next-kasan-gce-root 2022/07/16 11:12 linux-next cb71b93c2dc3 95cb00d1 .config console log report info WARNING: suspicious RCU usage in in6_dump_addrs
ci-upstream-linux-next-kasan-gce-root 2022/07/16 00:16 linux-next cb71b93c2dc3 95cb00d1 .config console log report info WARNING: suspicious RCU usage in in6_dump_addrs
ci-upstream-linux-next-kasan-gce-root 2022/07/15 18:52 linux-next cb71b93c2dc3 95cb00d1 .config console log report info WARNING: suspicious RCU usage in in6_dump_addrs
ci-upstream-linux-next-kasan-gce-root 2022/07/13 12:19 linux-next cb71b93c2dc3 5d921b08 .config console log report info WARNING: suspicious RCU usage in in6_dump_addrs
ci-upstream-linux-next-kasan-gce-root 2022/07/13 09:41 linux-next cb71b93c2dc3 5d921b08 .config console log report info WARNING: suspicious RCU usage in in6_dump_addrs
ci-upstream-linux-next-kasan-gce-root 2022/07/12 19:46 linux-next cb71b93c2dc3 d91dd8ea .config console log report info WARNING: suspicious RCU usage in in6_dump_addrs
ci-upstream-linux-next-kasan-gce-root 2022/07/12 15:57 linux-next cb71b93c2dc3 d91dd8ea .config console log report info WARNING: suspicious RCU usage in in6_dump_addrs
ci-upstream-linux-next-kasan-gce-root 2022/07/12 01:26 linux-next cb71b93c2dc3 da3d6955 .config console log report info WARNING: suspicious RCU usage in in6_dump_addrs
ci-upstream-linux-next-kasan-gce-root 2022/07/11 15:48 linux-next cb71b93c2dc3 da3d6955 .config console log report info WARNING: suspicious RCU usage in in6_dump_addrs
ci-upstream-linux-next-kasan-gce-root 2022/07/11 14:31 linux-next cb71b93c2dc3 da3d6955 .config console log report info WARNING: suspicious RCU usage in in6_dump_addrs
ci-upstream-linux-next-kasan-gce-root 2022/07/11 03:36 linux-next cb71b93c2dc3 b5765a15 .config console log report info WARNING: suspicious RCU usage in in6_dump_addrs
ci-upstream-linux-next-kasan-gce-root 2022/07/09 11:29 linux-next cb71b93c2dc3 b5765a15 .config console log report info WARNING: suspicious RCU usage in in6_dump_addrs
ci-upstream-linux-next-kasan-gce-root 2022/07/08 18:48 linux-next cb71b93c2dc3 b5765a15 .config console log report info WARNING: suspicious RCU usage in in6_dump_addrs
ci-upstream-linux-next-kasan-gce-root 2022/07/08 14:47 linux-next cb71b93c2dc3 b5765a15 .config console log report info WARNING: suspicious RCU usage in in6_dump_addrs
ci-upstream-linux-next-kasan-gce-root 2022/07/08 04:21 linux-next cb71b93c2dc3 bff65f44 .config console log report info WARNING: suspicious RCU usage in in6_dump_addrs
ci-upstream-linux-next-kasan-gce-root 2022/07/06 00:32 linux-next cb71b93c2dc3 bff65f44 .config console log report info WARNING: suspicious RCU usage in in6_dump_addrs
ci-upstream-linux-next-kasan-gce-root 2022/07/04 17:04 linux-next cb71b93c2dc3 bff65f44 .config console log report info WARNING: suspicious RCU usage in in6_dump_addrs
ci-upstream-linux-next-kasan-gce-root 2022/07/04 15:35 linux-next cb71b93c2dc3 bff65f44 .config console log report info WARNING: suspicious RCU usage in in6_dump_addrs
ci-upstream-linux-next-kasan-gce-root 2022/07/04 01:25 linux-next cb71b93c2dc3 1434eec0 .config console log report info WARNING: suspicious RCU usage in in6_dump_addrs
ci-upstream-linux-next-kasan-gce-root 2022/07/02 21:11 linux-next cb71b93c2dc3 1434eec0 .config console log report info WARNING: suspicious RCU usage in in6_dump_addrs
ci-upstream-linux-next-kasan-gce-root 2022/07/02 00:34 linux-next cb71b93c2dc3 1434eec0 .config console log report info WARNING: suspicious RCU usage in in6_dump_addrs
* Struck through repros no longer work on HEAD.