Received: by 10.223.185.116 with SMTP id b49csp3779604wrg; Mon, 19 Feb 2018 05:58:53 -0800 (PST) X-Google-Smtp-Source: AH8x225mk1EyFA7/XoBlnXHncIpTPPM4TDgksxTuKulEWpMOm+LtfWBbT+vbAe0ooamZOsdp8t00 X-Received: by 10.101.98.85 with SMTP id q21mr12118414pgv.182.1519048733374; Mon, 19 Feb 2018 05:58:53 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1519048733; cv=none; d=google.com; s=arc-20160816; b=C4AJVLq5RtFhw378B5il8eWMpm3U46L0J5y0SIpcBjlc/q0BjnP3e8ISwSz0sIupLz 3P9/1fM07wEKqt2wmnWifB2hMDz+Wuy5pvgCYAUDgBCpVigJhj/s3fOU6XezIl/8YIOs 7GryDZckb38pMoVzksv7N5Vh5E+7yqKTXEbJeWOYFo52HiEYX5I+fVAccwU6DC8kEnfs XVYFa6kz+PCBf8gKPQIAKCs340x+6Y/K/MmsoXWyZlbZ85Pd3rhQGbqzIKzqhhtTE6bC rRMvFGgGlDNo1M64rM4mMsYZvBhyvAhSaTV6faQJMPPd5D1NWlvDHC7fhizmVLUaQR8m NiaA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:date:cc:to:from:subject:message-id :arc-authentication-results; bh=bORc73qXKu28kJBP7UPDG7WYyKScun8+fhdOVeDsklI=; b=n4tWJF/3BD+Cbjc373J8W0nKjITFoyeMRZ5JJ6mQmXRSq/Vypf8fuPLHr4Uq6+ANgf PcXGWOyRzQxUUVj1uVRE4U8QaNy6Cq9QD3N7qX/DYs2IHpp+1HDbw7cTkXSCP59PzUYV 3k7koQqb3GeZiqaE4IXrXuYOhwL6BQFDM4RgnOneQgqE62Vg25VfdwEgmmmEFtNzYsp9 XliEB1r+6faIGMcyOizVUfAu8wWF9b7zcZkxzJ7mZkGWWLCBw4Vwq/PwCxtPUPQW7YFS eKPHcqZRdxrSatD/hXQUVrkRUBE+rpfRKsqsvsVyOOtAI5n3lXWZcbWhK8aLNKtCG0dc dIpw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id b2si3879149pgc.37.2018.02.19.05.58.38; Mon, 19 Feb 2018 05:58:53 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752306AbeBSN5T (ORCPT + 99 others); Mon, 19 Feb 2018 08:57:19 -0500 Received: from mx3-rdu2.redhat.com ([66.187.233.73]:47884 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1751528AbeBSN5R (ORCPT ); Mon, 19 Feb 2018 08:57:17 -0500 Received: from smtp.corp.redhat.com (int-mx06.intmail.prod.int.rdu2.redhat.com [10.11.54.6]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id EB737EB70C; Mon, 19 Feb 2018 13:57:16 +0000 (UTC) Received: from localhost.localdomain (unknown [10.32.181.70]) by smtp.corp.redhat.com (Postfix) with ESMTP id 941202166BAE; Mon, 19 Feb 2018 13:57:12 +0000 (UTC) Message-ID: <1519048631.2870.25.camel@redhat.com> Subject: Re: BUG: sleeping function called from invalid context at net/core/sock.c:LINE (3) From: Paolo Abeni To: Jon Maloy , Kirill Tkhai , Dmitry Vyukov , syzbot , Ying Xue Cc: Andrei Vagin , David Miller , "Eric W. Biederman" , Florian Westphal , LKML , netdev , Nicolas Dichtel , "roman.kapl@sysgo.com" , "syzkaller-bugs@googlegroups.com" , "tipc-discussion@lists.sourceforge.net" Date: Mon, 19 Feb 2018 14:57:11 +0100 In-Reply-To: References: <001a1143e44e58485f05655fa8ae@google.com> Content-Type: text/plain; charset="UTF-8" Mime-Version: 1.0 Content-Transfer-Encoding: 7bit X-Scanned-By: MIMEDefang 2.78 on 10.11.54.6 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.1]); Mon, 19 Feb 2018 13:57:17 +0000 (UTC) X-Greylist: inspected by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.1]); Mon, 19 Feb 2018 13:57:17 +0000 (UTC) for IP:'10.11.54.6' DOMAIN:'int-mx06.intmail.prod.int.rdu2.redhat.com' HELO:'smtp.corp.redhat.com' FROM:'pabeni@redhat.com' RCPT:'' Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, 2018-02-19 at 13:23 +0000, Jon Maloy wrote: > I don't understand this one. tipc_topsrv_stop() can only be trigged > from a user doing rmmod(), and I double checked that this is running > in user mode. > How does the call chain you are reporting occur? tipc_topsrv_stop() is called also at net namespace destruction time: static void __net_exit tipc_exit_net(struct net *net) { tipc_topsrv_stop(net); #... I *think* the following should fix the issue, but I'm unsure if it's safe. #syz test: git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-next.git master --- diff --git a/net/tipc/topsrv.c b/net/tipc/topsrv.c index 02013e00f287..63f35eae7236 100644 --- a/net/tipc/topsrv.c +++ b/net/tipc/topsrv.c @@ -693,9 +693,9 @@ void tipc_topsrv_stop(struct net *net) } __module_get(lsock->ops->owner); __module_get(lsock->sk->sk_prot_creator->owner); - sock_release(lsock); srv->listener = NULL; spin_unlock_bh(&srv->idr_lock); + sock_release(lsock); tipc_topsrv_work_stop(srv); idr_destroy(&srv->conn_idr); kfree(srv);