syzbot


KCSAN: data-race in ip_tunnel_xmit / ip_tunnel_xmit (8)

Status: auto-closed as invalid on 2022/08/06 22:00
Reported-by: syzbot+@syzkaller.appspotmail.com
First crash: 146d, last: 146d
similar bugs (8):
Kernel Title Repro Cause bisect Fix bisect Count Last Reported Patched Status
upstream KCSAN: data-race in ip_tunnel_xmit / ip_tunnel_xmit (6) 32 344d 509d 0/24 auto-closed as invalid on 2022/01/21 16:19
upstream KCSAN: data-race in ip_tunnel_xmit / ip_tunnel_xmit 22 984d 1117d 0/24 auto-closed as invalid on 2020/05/25 22:33
upstream KCSAN: data-race in ip_tunnel_xmit / ip_tunnel_xmit (9) 1 104d 104d 0/24 auto-closed as invalid on 2022/09/18 04:26
upstream KCSAN: data-race in ip_tunnel_xmit / ip_tunnel_xmit (2) 11 781d 885d 0/24 auto-closed as invalid on 2020/11/10 03:04
upstream KCSAN: data-race in ip_tunnel_xmit / ip_tunnel_xmit (5) 5 558d 523d 0/24 auto-closed as invalid on 2021/07/05 08:43
upstream KCSAN: data-race in ip_tunnel_xmit / ip_tunnel_xmit (4) 2 648d 671d 0/24 auto-closed as invalid on 2021/03/23 07:29
upstream KCSAN: data-race in ip_tunnel_xmit / ip_tunnel_xmit (7) 10 185d 295d 0/24 auto-closed as invalid on 2022/06/29 00:38
upstream KCSAN: data-race in ip_tunnel_xmit / ip_tunnel_xmit (3) 5 707d 715d 0/24 auto-closed as invalid on 2021/01/23 09:54

Sample crash report:
==================================================================
BUG: KCSAN: data-race in ip_tunnel_xmit / ip_tunnel_xmit

read-write to 0xffff8881373b51b8 of 8 bytes by task 31922 on cpu 0:
 ip_tunnel_xmit+0x602/0x11c0 net/ipv4/ip_tunnel.c:750
 ipip_tunnel_xmit+0x252/0x2b0 net/ipv4/ipip.c:307
 __netdev_start_xmit include/linux/netdevice.h:4805 [inline]
 netdev_start_xmit include/linux/netdevice.h:4819 [inline]
 xmit_one+0xc0/0x2a0 net/core/dev.c:3590
 dev_hard_start_xmit+0x72/0x120 net/core/dev.c:3606
 __dev_queue_xmit+0x84c/0xfe0 net/core/dev.c:4255
 dev_queue_xmit include/linux/netdevice.h:2994 [inline]
 neigh_connected_output+0x266/0x2a0 net/core/neighbour.c:1557
 neigh_output include/net/neighbour.h:549 [inline]
 ip_finish_output2+0x74d/0x850 net/ipv4/ip_output.c:228
 ip_finish_output+0xf3/0x250 net/ipv4/ip_output.c:316
 NF_HOOK_COND include/linux/netfilter.h:296 [inline]
 ip_output+0xf3/0x1a0 net/ipv4/ip_output.c:430
 dst_output include/net/dst.h:451 [inline]
 ip_local_out net/ipv4/ip_output.c:126 [inline]
 ip_send_skb+0x6e/0xe0 net/ipv4/ip_output.c:1571
 udp_send_skb+0x626/0x860 net/ipv4/udp.c:967
 udp_sendmsg+0x114b/0x1200 net/ipv4/udp.c:1254
 udpv6_sendmsg+0x64e/0x14a0
 inet6_sendmsg+0x5f/0x80 net/ipv6/af_inet6.c:652
 sock_sendmsg_nosec net/socket.c:714 [inline]
 sock_sendmsg net/socket.c:734 [inline]
 ____sys_sendmsg+0x38f/0x500 net/socket.c:2488
 ___sys_sendmsg net/socket.c:2542 [inline]
 __sys_sendmmsg+0x5c3/0x6a0 net/socket.c:2628
 __do_sys_sendmmsg net/socket.c:2657 [inline]
 __se_sys_sendmmsg net/socket.c:2654 [inline]
 __x64_sys_sendmmsg+0x53/0x60 net/socket.c:2654
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x2b/0x70 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x46/0xb0

read-write to 0xffff8881373b51b8 of 8 bytes by task 31935 on cpu 1:
 ip_tunnel_xmit+0x602/0x11c0 net/ipv4/ip_tunnel.c:750
 ipip_tunnel_xmit+0x252/0x2b0 net/ipv4/ipip.c:307
 __netdev_start_xmit include/linux/netdevice.h:4805 [inline]
 netdev_start_xmit include/linux/netdevice.h:4819 [inline]
 xmit_one+0xc0/0x2a0 net/core/dev.c:3590
 dev_hard_start_xmit+0x72/0x120 net/core/dev.c:3606
 __dev_queue_xmit+0x84c/0xfe0 net/core/dev.c:4255
 dev_queue_xmit include/linux/netdevice.h:2994 [inline]
 neigh_connected_output+0x266/0x2a0 net/core/neighbour.c:1557
 neigh_output include/net/neighbour.h:549 [inline]
 ip_finish_output2+0x74d/0x850 net/ipv4/ip_output.c:228
 ip_finish_output+0xf3/0x250 net/ipv4/ip_output.c:316
 NF_HOOK_COND include/linux/netfilter.h:296 [inline]
 ip_output+0xf3/0x1a0 net/ipv4/ip_output.c:430
 dst_output include/net/dst.h:451 [inline]
 ip_local_out net/ipv4/ip_output.c:126 [inline]
 ip_send_skb+0x6e/0xe0 net/ipv4/ip_output.c:1571
 udp_send_skb+0x626/0x860 net/ipv4/udp.c:967
 udp_sendmsg+0x114b/0x1200 net/ipv4/udp.c:1254
 udpv6_sendmsg+0x64e/0x14a0
 inet6_sendmsg+0x5f/0x80 net/ipv6/af_inet6.c:652
 sock_sendmsg_nosec net/socket.c:714 [inline]
 sock_sendmsg net/socket.c:734 [inline]
 ____sys_sendmsg+0x38f/0x500 net/socket.c:2488
 ___sys_sendmsg net/socket.c:2542 [inline]
 __sys_sendmmsg+0x5c3/0x6a0 net/socket.c:2628
 __do_sys_sendmmsg net/socket.c:2657 [inline]
 __se_sys_sendmmsg net/socket.c:2654 [inline]
 __x64_sys_sendmmsg+0x53/0x60 net/socket.c:2654
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x2b/0x70 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x46/0xb0

value changed: 0x0000000000005f43 -> 0x0000000000005f44

Reported by Kernel Concurrency Sanitizer on:
CPU: 1 PID: 31935 Comm: syz-executor.3 Not tainted 5.19.0-rc4-syzkaller-00187-g089866061428-dirty #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022
==================================================================

Crashes (1):
Manager Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Title
ci2-upstream-kcsan-gce 2022/07/02 21:52 upstream 089866061428 1434eec0 .config log report info KCSAN: data-race in ip_tunnel_xmit / ip_tunnel_xmit
* Struck through repros no longer work on HEAD.