syzbot


KCSAN: data-race in tcp_poll / tcp_reset (3)

Status: auto-closed as invalid on 2022/05/06 20:08
Subsystems: net
[Documentation on labels]
First crash: 782d, last: 754d
Similar bugs (3)
Kernel Title Repro Cause bisect Fix bisect Count Last Reported Patched Status
upstream KCSAN: data-race in tcp_poll / tcp_reset (4) net 1 564d 564d 0/26 auto-obsoleted due to no activity on 2022/11/12 09:41
upstream KCSAN: data-race in tcp_poll / tcp_reset net 1 836d 836d 0/26 closed as invalid on 2022/01/14 13:49
upstream KCSAN: data-race in tcp_poll / tcp_reset (2) net 1 818d 818d 0/26 auto-closed as invalid on 2022/03/03 18:58

Sample crash report:
==================================================================
BUG: KCSAN: data-race in tcp_poll / tcp_reset

write to 0xffff888130d3b6e8 of 4 bytes by interrupt on cpu 0:
 tcp_reset+0xaf/0x1b0
 tcp_rcv_synsent_state_process+0x811/0x14e0 net/ipv4/tcp_input.c:6180
 tcp_rcv_state_process+0x16c/0x1250 net/ipv4/tcp_input.c:6444
 tcp_v4_do_rcv+0x431/0x5a0 net/ipv4/tcp_ipv4.c:1683
 tcp_v4_rcv+0x238a/0x2700 net/ipv4/tcp_ipv4.c:2074
 ip_protocol_deliver_rcu+0x25c/0x4d0 net/ipv4/ip_input.c:205
 ip_local_deliver_finish net/ipv4/ip_input.c:233 [inline]
 NF_HOOK include/linux/netfilter.h:307 [inline]
 ip_local_deliver+0x207/0x300 net/ipv4/ip_input.c:254
 dst_input include/net/dst.h:461 [inline]
 ip_rcv_finish net/ipv4/ip_input.c:437 [inline]
 NF_HOOK include/linux/netfilter.h:307 [inline]
 ip_rcv+0x1b1/0x260 net/ipv4/ip_input.c:556
 __netif_receive_skb_one_core net/core/dev.c:5405 [inline]
 __netif_receive_skb+0x8b/0x1b0 net/core/dev.c:5519
 process_backlog+0x23f/0x3c0 net/core/dev.c:5847
 __napi_poll+0x65/0x3f0 net/core/dev.c:6413
 napi_poll net/core/dev.c:6480 [inline]
 net_rx_action+0x29e/0x650 net/core/dev.c:6567
 __do_softirq+0x158/0x2de kernel/softirq.c:558
 run_ksoftirqd+0x1f/0x30 kernel/softirq.c:921
 smpboot_thread_fn+0x308/0x4a0 kernel/smpboot.c:164
 kthread+0x1bf/0x1e0 kernel/kthread.c:376
 ret_from_fork+0x1f/0x30

read to 0xffff888130d3b6e8 of 4 bytes by task 12539 on cpu 1:
 tcp_poll+0x4a6/0x580 net/ipv4/tcp.c:588
 sock_poll+0x23e/0x260 net/socket.c:1306
 vfs_poll include/linux/poll.h:88 [inline]
 io_poll_check_events+0x212/0x450 fs/io_uring.c:5931
 io_apoll_task_func+0x31/0x460 fs/io_uring.c:5991
 handle_tw_list fs/io_uring.c:2479 [inline]
 tctx_task_work+0x7d3/0xab0 fs/io_uring.c:2513
 task_work_run+0x8e/0x110 kernel/task_work.c:164
 get_signal+0x144f/0x15a0 kernel/signal.c:2681
 arch_do_signal_or_restart+0x87/0x2b0 arch/x86/kernel/signal.c:867
 exit_to_user_mode_loop kernel/entry/common.c:180 [inline]
 exit_to_user_mode_prepare+0xc1/0x140 kernel/entry/common.c:215
 __syscall_exit_to_user_mode_work kernel/entry/common.c:297 [inline]
 syscall_exit_to_user_mode+0x20/0x40 kernel/entry/common.c:308
 do_syscall_64+0x37/0x50 arch/x86/entry/common.c:86
 entry_SYSCALL_64_after_hwframe+0x44/0xae

value changed: 0x00000000 -> 0x0000006f

Reported by Kernel Concurrency Sanitizer on:
CPU: 1 PID: 12539 Comm: syz-executor.3 Tainted: G        W         5.17.0-syzkaller-13788-gd0d642a5d365-dirty #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
==================================================================

Crashes (2):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2022/04/01 20:00 upstream d0d642a5d365 79a2a8fc .config console log report info ci2-upstream-kcsan-gce KCSAN: data-race in tcp_poll / tcp_reset
2022/03/04 18:47 upstream 38f80f42147f 45a13a73 .config console log report info ci2-upstream-kcsan-gce KCSAN: data-race in tcp_poll / tcp_reset
* Struck through repros no longer work on HEAD.