syzbot


KCSAN: data-race in sock_alloc_send_pskb / unix_release_sock (2)
Status: auto-closed as invalid on 2020/07/30 12:33
Reported-by: syzbot+@syzkaller.appspotmail.com
First crash: 695d, last: 695d
similar bugs (7):
Kernel Title Repro Cause bisect Fix bisect Count Last Reported Patched Status
upstream KCSAN: data-race in sock_alloc_send_pskb / unix_release_sock (6) 1 171d 171d 0/22 auto-closed as invalid on 2022/01/05 01:52
upstream KCSAN: data-race in sock_alloc_send_pskb / unix_release_sock 2 853d 867d 0/22 auto-closed as invalid on 2020/03/29 01:10
upstream KCSAN: data-race in sock_alloc_send_pskb / unix_release_sock (8) 1 71d 71d 0/22 auto-closed as invalid on 2022/04/14 22:36
upstream KCSAN: data-race in sock_alloc_send_pskb / unix_release_sock (4) 20 494d 526d 0/22 auto-closed as invalid on 2021/02/16 06:00
upstream KCSAN: data-race in sock_alloc_send_pskb / unix_release_sock (7) 1 124d 121d 0/22 auto-closed as invalid on 2022/02/21 00:16
upstream KCSAN: data-race in sock_alloc_send_pskb / unix_release_sock (3) 1 657d 657d 0/22 auto-closed as invalid on 2020/09/05 23:08
upstream KCSAN: data-race in sock_alloc_send_pskb / unix_release_sock (5) 47 193d 344d 22/22 fixed on 2021/11/10 00:50

Sample crash report:
==================================================================
BUG: KCSAN: data-race in sock_alloc_send_pskb / unix_release_sock

write to 0xffff8880b3e71630 of 4 bytes by task 14858 on cpu 0:
 unix_release_sock+0x2be/0x650 net/unix/af_unix.c:550
 unix_release+0x2f/0x50 net/unix/af_unix.c:867
 __sock_release net/socket.c:605 [inline]
 sock_close+0x6c/0x150 net/socket.c:1278
 __fput+0x1df/0x460 fs/file_table.c:281
 ____fput+0x11/0x20 fs/file_table.c:314
 task_work_run+0x8e/0x110 kernel/task_work.c:123
 tracehook_notify_resume include/linux/tracehook.h:188 [inline]
 exit_to_usermode_loop arch/x86/entry/common.c:216 [inline]
 __prepare_exit_to_usermode+0x1c8/0x230 arch/x86/entry/common.c:246
 __syscall_return_slowpath arch/x86/entry/common.c:329 [inline]
 do_syscall_64+0xb9/0x120 arch/x86/entry/common.c:368
 entry_SYSCALL_64_after_hwframe+0x44/0xa9

read to 0xffff8880b3e71630 of 4 bytes by task 14862 on cpu 1:
 sock_error include/net/sock.h:2217 [inline]
 sock_alloc_send_pskb+0xe0/0x430 net/core/sock.c:2334
 unix_dgram_sendmsg+0x475/0x14b0 net/unix/af_unix.c:1679
 unix_seqpacket_sendmsg+0xc2/0x100 net/unix/af_unix.c:2063
 sock_sendmsg_nosec net/socket.c:652 [inline]
 sock_sendmsg net/socket.c:672 [inline]
 ____sys_sendmsg+0x360/0x4d0 net/socket.c:2352
 ___sys_sendmsg net/socket.c:2406 [inline]
 __sys_sendmmsg+0x322/0x4b0 net/socket.c:2496
 __do_sys_sendmmsg net/socket.c:2525 [inline]
 __se_sys_sendmmsg net/socket.c:2522 [inline]
 __x64_sys_sendmmsg+0x53/0x60 net/socket.c:2522
 do_syscall_64+0x71/0x120 arch/x86/entry/common.c:359
 entry_SYSCALL_64_after_hwframe+0x44/0xa9

Reported by Kernel Concurrency Sanitizer on:
CPU: 1 PID: 14862 Comm: syz-executor.5 Not tainted 5.8.0-rc2-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
==================================================================

Crashes (1):
Manager Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Title
ci2-upstream-kcsan-gce 2020/06/25 12:24 upstream 8be3a53e18e0 c7b4497a .config log report