syzbot


KCSAN: data-race in ip_tunnel_xmit / ip_tunnel_xmit (3)

Status: auto-closed as invalid on 2021/01/23 09:54
Subsystems: net
[Documentation on labels]
Reported-by: syzbot+8995493b9bd3f666b9ec@syzkaller.appspotmail.com
First crash: 1245d, last: 1216d
Similar bugs (11)
Kernel Title Repro Cause bisect Fix bisect Count Last Reported Patched Status
upstream KCSAN: data-race in ip_tunnel_xmit / ip_tunnel_xmit (6) net 32 853d 1018d 0/26 auto-closed as invalid on 2022/01/21 16:19
upstream KCSAN: data-race in ip_tunnel_xmit / ip_tunnel_xmit net 22 1494d 1626d 0/26 auto-closed as invalid on 2020/05/25 22:33
upstream KCSAN: data-race in ip_tunnel_xmit / ip_tunnel_xmit (11) net 1 493d 493d 0/26 auto-obsoleted due to no activity on 2023/01/17 03:08
upstream KCSAN: data-race in ip_tunnel_xmit / ip_tunnel_xmit (9) net 1 613d 613d 0/26 auto-closed as invalid on 2022/09/18 04:26
upstream KCSAN: data-race in ip_tunnel_xmit / ip_tunnel_xmit (10) net 4 530d 573d 0/26 auto-obsoleted due to no activity on 2022/12/10 01:58
upstream KCSAN: data-race in ip_tunnel_xmit / ip_tunnel_xmit (2) net 11 1290d 1394d 0/26 auto-closed as invalid on 2020/11/10 03:04
upstream KCSAN: data-race in ip_tunnel_xmit / ip_tunnel_xmit (5) net 5 1068d 1032d 0/26 auto-closed as invalid on 2021/07/05 08:43
upstream KCSAN: data-race in ip_tunnel_xmit / ip_tunnel_xmit (8) net 1 656d 656d 0/26 auto-closed as invalid on 2022/08/06 22:00
upstream KCSAN: data-race in ip_tunnel_xmit / ip_tunnel_xmit (4) net 2 1157d 1180d 0/26 auto-closed as invalid on 2021/03/23 07:29
upstream KCSAN: data-race in ip_tunnel_xmit / ip_tunnel_xmit (7) net 10 695d 805d 0/26 auto-closed as invalid on 2022/06/29 00:38
upstream KCSAN: data-race in ip_tunnel_xmit / ip_tunnel_xmit (12) net 3 408d 407d 22/26 fixed on 2023/06/08 14:41

Sample crash report:
==================================================================
BUG: KCSAN: data-race in ip_tunnel_xmit / ip_tunnel_xmit

read-write to 0xffff88802943a130 of 8 bytes by task 14937 on cpu 1:
 ip_tunnel_xmit+0xb38/0x11b0 net/ipv4/ip_tunnel.c:816
 __gre_xmit net/ipv4/ip_gre.c:466 [inline]
 ipgre_xmit+0x4d9/0x530 net/ipv4/ip_gre.c:648
 __netdev_start_xmit include/linux/netdevice.h:4776 [inline]
 netdev_start_xmit include/linux/netdevice.h:4790 [inline]
 xmit_one+0xf9/0x2e0 net/core/dev.c:3574
 dev_hard_start_xmit net/core/dev.c:3590 [inline]
 __dev_queue_xmit+0xecf/0x1500 net/core/dev.c:4151
 dev_queue_xmit+0x13/0x20 net/core/dev.c:4184
 __bpf_tx_skb net/core/filter.c:2116 [inline]
 __bpf_redirect_no_mac net/core/filter.c:2141 [inline]
 __bpf_redirect+0x544/0x750 net/core/filter.c:2164
 ____bpf_clone_redirect net/core/filter.c:2448 [inline]
 bpf_clone_redirect+0x168/0x1c0 net/core/filter.c:2420
 bpf_prog_eb4214e34d195ba1+0x58/0xa38
 bpf_dispatcher_nop_func include/linux/bpf.h:651 [inline]
 bpf_test_run+0x278/0x440 net/bpf/test_run.c:50
 bpf_prog_test_run_skb+0x6f0/0xe70 net/bpf/test_run.c:581
 bpf_prog_test_run kernel/bpf/syscall.c:3121 [inline]
 __do_sys_bpf+0x3a17/0x99c0 kernel/bpf/syscall.c:4399
 __se_sys_bpf kernel/bpf/syscall.c:4339 [inline]
 __x64_sys_bpf+0x3d/0x50 kernel/bpf/syscall.c:4339
 do_syscall_64+0x39/0x80 arch/x86/entry/common.c:46
 entry_SYSCALL_64_after_hwframe+0x44/0xa9

read-write to 0xffff88802943a130 of 8 bytes by task 14914 on cpu 0:
 ip_tunnel_xmit+0xb38/0x11b0 net/ipv4/ip_tunnel.c:816
 __gre_xmit net/ipv4/ip_gre.c:466 [inline]
 ipgre_xmit+0x4d9/0x530 net/ipv4/ip_gre.c:648
 __netdev_start_xmit include/linux/netdevice.h:4776 [inline]
 netdev_start_xmit include/linux/netdevice.h:4790 [inline]
 xmit_one+0xf9/0x2e0 net/core/dev.c:3574
 dev_hard_start_xmit net/core/dev.c:3590 [inline]
 __dev_queue_xmit+0xecf/0x1500 net/core/dev.c:4151
 dev_queue_xmit+0x13/0x20 net/core/dev.c:4184
 __bpf_tx_skb net/core/filter.c:2116 [inline]
 __bpf_redirect_no_mac net/core/filter.c:2141 [inline]
 __bpf_redirect+0x544/0x750 net/core/filter.c:2164
 ____bpf_clone_redirect net/core/filter.c:2448 [inline]
 bpf_clone_redirect+0x168/0x1c0 net/core/filter.c:2420
 bpf_prog_eb4214e34d195ba1+0x58/0x3f0
 bpf_dispatcher_nop_func include/linux/bpf.h:651 [inline]
 bpf_test_run+0x278/0x440 net/bpf/test_run.c:50
 bpf_prog_test_run_skb+0x6f0/0xe70 net/bpf/test_run.c:581
 bpf_prog_test_run kernel/bpf/syscall.c:3121 [inline]
 __do_sys_bpf+0x3a17/0x99c0 kernel/bpf/syscall.c:4399
 __se_sys_bpf kernel/bpf/syscall.c:4339 [inline]
 __x64_sys_bpf+0x3d/0x50 kernel/bpf/syscall.c:4339
 do_syscall_64+0x39/0x80 arch/x86/entry/common.c:46
 entry_SYSCALL_64_after_hwframe+0x44/0xa9

Reported by Kernel Concurrency Sanitizer on:
CPU: 0 PID: 14914 Comm: syz-executor.1 Not tainted 5.10.0-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
==================================================================

Crashes (5):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2020/12/19 09:53 upstream 3644e2d2dda7 04201c06 .config console log report info ci2-upstream-kcsan-gce
2020/12/17 11:45 upstream accefff5b547 04201c06 .config console log report info ci2-upstream-kcsan-gce
2020/12/15 21:38 upstream 148842c98a24 f213e07e .config console log report info ci2-upstream-kcsan-gce
2020/12/12 21:27 upstream 7b1b868e1d91 bca53db9 .config console log report info ci2-upstream-kcsan-gce
2020/11/20 21:07 upstream 4d02da974ea8 68068804 .config console log report info ci2-upstream-kcsan-gce
* Struck through repros no longer work on HEAD.