syzbot


BUG: please report to dccp@vger.kernel.org => prev = 5, last = 5 at net/dccp/ccids/lib/packet_history.c:LINE/tfrc_rx_his

Status: closed as dup on 2019/02/27 00:44
Subsystems: dccp
[Documentation on labels]
Reported-by: syzbot+e326127852f785c44347@syzkaller.appspotmail.com
First crash: 2013d, last: 1020d
Duplicate of
Title Repro Cause bisect Fix bisect Count Last Reported
BUG: please report to dccp@vger.kernel.org => prev = 0, last = 0 at net/dccp/ccids/lib/packet_history.c:LINE/tfrc_rx_hist_sample_rtt() dccp C done error 281 1194d 2353d
Discussions (1)
Title Replies (including bot) Last reply
BUG: please report to dccp@vger.kernel.org => prev = 5, last = 5 at net/dccp/ccids/lib/packet_history.c:LINE/tfrc_rx_his 1 (2) 2019/02/27 00:44
Similar bugs (2)
Kernel Title Repro Cause bisect Fix bisect Count Last Reported Patched Status
upstream BUG: please report to dccp@vger.kernel.org => prev = 2, last = 2 at net/dccp/ccids/lib/packet_history.c:LINE/tfrc_rx_his dccp 1 2002d 2001d 0/26 closed as dup on 2019/02/27 00:42
upstream BUG: please report to dccp@vger.kernel.org => prev = 0, last = 0 at net/dccp/ccids/lib/packet_history.c:LINE/tfrc_rx_his dccp C 7456 983d 2172d 0/26 closed as dup on 2018/05/09 05:39

Sample crash report:
BUG: please report to dccp@vger.kernel.org => prev = 5, last = 5 at net/dccp/ccids/lib/packet_history.c:414/tfrc_rx_hist_sample_rtt()
CPU: 1 PID: 29657 Comm: syz-executor.3 Not tainted 5.13.0-rc6-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 <IRQ>
 __dump_stack lib/dump_stack.c:79 [inline]
 dump_stack+0x141/0x1d7 lib/dump_stack.c:120
 tfrc_rx_hist_sample_rtt+0x4a5/0x4b0 net/dccp/ccids/lib/packet_history.c:414
 ccid3_hc_rx_packet_recv+0x5b8/0xe90 net/dccp/ccids/ccid3.c:760
 ccid_hc_rx_packet_recv net/dccp/ccid.h:182 [inline]
 dccp_deliver_input_to_ccids+0xe1/0x260 net/dccp/input.c:176
 dccp_rcv_established net/dccp/input.c:374 [inline]
 dccp_rcv_established+0x107/0x160 net/dccp/input.c:364
 dccp_v4_do_rcv+0x130/0x190 net/dccp/ipv4.c:667
 sk_backlog_rcv include/net/sock.h:1020 [inline]
 __sk_receive_skb+0x29d/0x830 net/core/sock.c:509
 dccp_v4_rcv+0xea5/0x19d0 net/dccp/ipv4.c:890
 ip_protocol_deliver_rcu+0x5c/0xa20 net/ipv4/ip_input.c:204
 ip_local_deliver_finish+0x20a/0x370 net/ipv4/ip_input.c:231
 NF_HOOK include/linux/netfilter.h:301 [inline]
 NF_HOOK include/linux/netfilter.h:295 [inline]
 ip_local_deliver+0x1b3/0x200 net/ipv4/ip_input.c:252
 dst_input include/net/dst.h:458 [inline]
 ip_rcv_finish+0x1da/0x2f0 net/ipv4/ip_input.c:429
 NF_HOOK include/linux/netfilter.h:301 [inline]
 NF_HOOK include/linux/netfilter.h:295 [inline]
 ip_rcv+0xaa/0xd0 net/ipv4/ip_input.c:540
 __netif_receive_skb_one_core+0x114/0x180 net/core/dev.c:5459
 __netif_receive_skb+0x27/0x1c0 net/core/dev.c:5573
 process_backlog+0x232/0x6c0 net/core/dev.c:6437
 __napi_poll+0xaf/0x440 net/core/dev.c:6985
 napi_poll net/core/dev.c:7052 [inline]
 net_rx_action+0x801/0xb40 net/core/dev.c:7139
 __do_softirq+0x29b/0x9f6 kernel/softirq.c:559
 invoke_softirq kernel/softirq.c:433 [inline]
 __irq_exit_rcu+0x136/0x200 kernel/softirq.c:637
 irq_exit_rcu+0x5/0x20 kernel/softirq.c:649
 sysvec_apic_timer_interrupt+0x93/0xc0 arch/x86/kernel/apic/apic.c:1100
 </IRQ>
 asm_sysvec_apic_timer_interrupt+0x12/0x20 arch/x86/include/asm/idtentry.h:647
RIP: 0010:cmpxchg_double_slab mm/slub.c:414 [inline]
RIP: 0010:__slab_free+0xd8/0x650 mm/slub.c:3044
Code: 89 44 24 48 0f b6 44 24 4c 74 07 45 31 f6 84 c0 74 0e 45 31 f6 80 7c 24 48 00 0f 84 8d 01 00 00 41 f6 45 0b 40 48 8b 4c 24 78 <0f> 84 c2 00 00 00 48 83 7c 24 10 00 0f 85 d4 02 00 00 48 8b 7c 24
RSP: 0018:ffffc900013df4f0 EFLAGS: 00000202
RAX: 0000000000000001 RBX: ffff88806edc2000 RCX: 0000000080040003
RDX: 0000000000040004 RSI: 0000000000000000 RDI: ffff88806edc2000
RBP: ffffc900013df5b8 R08: 0000000000000001 R09: ffffffff81ba0595
R10: ffffffff81340f4a R11: 000000000000003f R12: 0000000000040003
R13: ffff888011042140 R14: 0000000000000000 R15: ffffea0001bb7000
 qlink_free mm/kasan/quarantine.c:146 [inline]
 qlist_free_all+0x5a/0xc0 mm/kasan/quarantine.c:165
 kasan_quarantine_reduce+0x180/0x200 mm/kasan/quarantine.c:272
 __kasan_slab_alloc+0x8e/0xa0 mm/kasan/common.c:438
 kasan_slab_alloc include/linux/kasan.h:236 [inline]
 slab_post_alloc_hook mm/slab.h:524 [inline]
 slab_alloc_node mm/slub.c:2914 [inline]
 kmem_cache_alloc_node+0x269/0x3e0 mm/slub.c:2950
 __alloc_skb+0x20b/0x340 net/core/skbuff.c:413
 alloc_skb include/linux/skbuff.h:1107 [inline]
 alloc_skb_with_frags+0x93/0x5d0 net/core/skbuff.c:5992
 sock_alloc_send_pskb+0x793/0x920 net/core/sock.c:2364
 dccp_sendmsg+0x2c9/0xc90 net/dccp/proto.c:768
 inet_sendmsg+0x99/0xe0 net/ipv4/af_inet.c:821
 sock_sendmsg_nosec net/socket.c:654 [inline]
 sock_sendmsg+0xcf/0x120 net/socket.c:674
 ____sys_sendmsg+0x331/0x810 net/socket.c:2337
 ___sys_sendmsg+0xf3/0x170 net/socket.c:2391
 __sys_sendmmsg+0x195/0x470 net/socket.c:2477
 __do_sys_sendmmsg net/socket.c:2506 [inline]
 __se_sys_sendmmsg net/socket.c:2503 [inline]
 __x64_sys_sendmmsg+0x99/0x100 net/socket.c:2503
 do_syscall_64+0x3a/0xb0 arch/x86/entry/common.c:47
 entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x4665d9
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f3c1e690188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133
RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9
RDX: 00000000000003a6 RSI: 0000000020005700 RDI: 0000000000000004
RBP: 00000000004bfcb9 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf80
R13: 00007ffd83ae6fdf R14: 00007f3c1e690300 R15: 0000000000022000
ccid3_first_li: No RTT estimate available, using fallback RTT
ccid3_first_li: No RTT estimate available, using fallback RTT

Crashes (2):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2021/06/30 06:48 net-old a118ff661889 a4fccb01 .config console log report info ci-upstream-net-this-kasan-gce BUG: please report to dccp@vger.kernel.org => prev = 5, last = 5 at net/dccp/ccids/lib/packet_history.c:LINE/tfrc_rx_his
2018/10/11 18:24 linux-next 771b65e89c8a ba6ddb43 .config console log report ci-upstream-linux-next-kasan-gce-root
* Struck through repros no longer work on HEAD.