Received: by 2002:ac0:a581:0:0:0:0:0 with SMTP id m1-v6csp1226009imm; Wed, 4 Jul 2018 14:25:59 -0700 (PDT) X-Google-Smtp-Source: AAOMgpdvBfTI8HetO0j1asyZH92uRLh4D9vlpMtudEreHEuz/ma/8Da0JwVuE15Czi+JCQrT4wHe X-Received: by 2002:a63:3dcc:: with SMTP id k195-v6mr3239921pga.254.1530739559680; Wed, 04 Jul 2018 14:25:59 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1530739559; cv=none; d=google.com; s=arc-20160816; b=pL57BbCU8rlQC15yU0l4FSihh0/4IABfdHKFribMo08t9dJ9+A8EJzrCo3cs6bZEsG hIdC4oAMjMdS3UXWECpdm3piIVXzgtm/+PjmefOEVOaMIlLfU1SYFpxGGuV9cY5ezF6u L8WLRG7BmOCPtwJ66w5OKpendaVNBpbmrUf9LQ93V3QE7Ljc2sO97A6KV2ffVJf3gk5A dPR1tVpQx3gTFL1Yw6xtaoTdmFBe6xsCs1eQ8BP/tI59fqS/4v1SRJLRXIdpIO98FYI5 elw/VcxnK+qDQGTXjo4po/BRNJKdMnL+n/ju9Gwf2wSaJ9huu0jffy+pPHctRE1YxXii WaBQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature:arc-authentication-results; bh=ciqMw2xm929vxIr6CAkgJjttzf7OdEf+QxCKh8fV+xE=; b=j3hiYljTVmSdHQ7lbACH1ufMRtc7qTfnxMJmnrM3HtgWyA4ogn+WKA+NQrRFyBvgw8 pbMj8k5gIqMpdXmbG2Ut/wso8nz+pJQsMgJk9YNyTNBmvsva9us2ekzWJrsghC3yabxt X7KKHe9rCNOPo0QjqPR+wBoMcvm4G43nHzzFpR9QQTzdT8UmhocFcxWksbhIp9jdzJkF yyk2AcD2c6zpVfph3nfGZd9kQZZf6jiBCIPxa8RV4WRI5GMmbNk9nCBM8XWvIQZRas3t gzkulAk3eEl+gNrvu1ELA/az/nHKbzX+FanY+8SYyoRuMcSpSfb8pY6nmTAk4ikidjxz WXdw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=f6MmXAa8; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id m193-v6si4681934pfc.312.2018.07.04.14.25.44; Wed, 04 Jul 2018 14:25:59 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=f6MmXAa8; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753147AbeGDVYM (ORCPT + 99 others); Wed, 4 Jul 2018 17:24:12 -0400 Received: from mail-pl0-f65.google.com ([209.85.160.65]:39694 "EHLO mail-pl0-f65.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752882AbeGDVYK (ORCPT ); Wed, 4 Jul 2018 17:24:10 -0400 Received: by mail-pl0-f65.google.com with SMTP id s24-v6so251485plq.6; Wed, 04 Jul 2018 14:24:10 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to:user-agent; bh=ciqMw2xm929vxIr6CAkgJjttzf7OdEf+QxCKh8fV+xE=; b=f6MmXAa8PXw46NLTTm4qLYNGj2wRFhHlb6fT6R4EqUwkfzq+KeV+O6xFW4vF8VUOEF ZcHHBwW0Ns5cDuGl2N39mc7lk4gSZ2aVTe785pvaAbJplIDOqd+cVTlYxMon6bOWzDGx EYobWRg2ZcDj14FkUHX5YDfjFje9wuZO1GLntaQzJ7LYKaNXyF0P5JqBnzgXSgTmtPIj 9eJ6Y1tunUGRRMJnFBxYNDEsmlkYK78yD6Txn91BfBg0+i5OpRyxmG2Cy4ZfPRoQEVvO EpgfUnLPFnz8wDQSatRqpAaX0qV/zubVB9VdHhreQFNf6A4SESqO1kG7Qy9onICHgBfu DPlQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to:user-agent; bh=ciqMw2xm929vxIr6CAkgJjttzf7OdEf+QxCKh8fV+xE=; b=VfmmddPHj1sBRkbW9PM/o6O7aGravyi+eN4ZA+CkdqEr+D9lye5CvYZmP5eRH+DW8S Dysv0yNgi7VaXX2Rn72MBA4WeccNSjgMfxXCDNqgkQWn46CUA8zuIyQd0yzLTSQXWIuo pR4dpgBSCQbrOavBXMtyApRkl2qpsROKyNiYefHHd6BbyXHO/wFPOHZzYvX6UGvVLbws iwuibitBNi0PRBOILqt5cs7LDaIjMTEbQOwf05GRL+kBumQjPA8I59qSjMXtfw73uWc6 QcNq927BtopbyYPKURXcC9PCrp/yh37rrXzJuMmw3iHcj2HO56kJjuyazKKogjt/7Xpv PZoA== X-Gm-Message-State: APt69E2yDjKKyLnboXtvjx26oxZq3xuw86cFOvFb7LtIxXndYZn0Jh0z CNxsoIXUFLgVXa2NdqIGvGXK4PC5 X-Received: by 2002:a17:902:a508:: with SMTP id s8-v6mr3565306plq.223.1530739450232; Wed, 04 Jul 2018 14:24:10 -0700 (PDT) Received: from sol.localdomain (c-67-185-97-198.hsd1.wa.comcast.net. [67.185.97.198]) by smtp.gmail.com with ESMTPSA id h26-v6sm8992681pfj.77.2018.07.04.14.24.09 (version=TLS1_2 cipher=ECDHE-RSA-CHACHA20-POLY1305 bits=256/256); Wed, 04 Jul 2018 14:24:09 -0700 (PDT) Date: Wed, 4 Jul 2018 14:24:08 -0700 From: Eric Biggers To: syzbot Cc: coreteam@netfilter.org, davem@davemloft.net, fw@strlen.de, kadlec@blackhole.kfki.hu, linux-kernel@vger.kernel.org, netdev@vger.kernel.org, netfilter-devel@vger.kernel.org, pablo@netfilter.org, syzkaller-bugs@googlegroups.com Subject: Re: WARNING: ODEBUG bug in do_arpt_get_ctl Message-ID: <20180704212408.GG725@sol.localdomain> References: <94eb2c0efc1e7e42b20565bf3254@google.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <94eb2c0efc1e7e42b20565bf3254@google.com> User-Agent: Mutt/1.10.0 (2018-05-17) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Feb 21, 2018 at 12:59:03PM -0800, syzbot wrote: > Hello, > > syzbot hit the following crash on upstream commit > 91ab883eb21325ad80f3473633f794c78ac87f51 (Mon Feb 19 01:29:42 2018 +0000) > Linux 4.16-rc2 > > syzkaller reproducer is attached. > Raw console output is attached. > compiler: gcc (GCC) 7.1.1 20170620 > .config is attached. > > IMPORTANT: if you fix the bug, please add the following tag to the commit: > Reported-by: syzbot+9d1c0d941336dbc741a1@syzkaller.appspotmail.com > It will help syzbot understand when the bug is fixed. See footer for > details. > If you forward the report, please keep this part and the footer. > > IPVS: ftp: loaded support on port[0] = 21 > IPVS: ftp: loaded support on port[0] = 21 > IPVS: ftp: loaded support on port[0] = 21 > ------------[ cut here ]------------ > ODEBUG: free active (active state 0) object type: work_struct hint: > htable_gc+0x0/0xc0 net/netfilter/xt_hashlimit.c:376 > WARNING: CPU: 1 PID: 4165 at lib/debugobjects.c:291 > debug_print_object+0x166/0x220 lib/debugobjects.c:288 > Kernel panic - not syncing: panic_on_warn set ... > > CPU: 1 PID: 4165 Comm: syz-executor3 Not tainted 4.16.0-rc2+ #320 > Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS > Google 01/01/2011 > Call Trace: > __dump_stack lib/dump_stack.c:17 [inline] > dump_stack+0x194/0x257 lib/dump_stack.c:53 > panic+0x1e4/0x41c kernel/panic.c:183 > __warn+0x1dc/0x200 kernel/panic.c:547 > report_bug+0x211/0x2d0 lib/bug.c:184 > fixup_bug.part.11+0x37/0x80 arch/x86/kernel/traps.c:178 > fixup_bug arch/x86/kernel/traps.c:247 [inline] > do_error_trap+0x2d7/0x3e0 arch/x86/kernel/traps.c:296 > do_invalid_op+0x1b/0x20 arch/x86/kernel/traps.c:315 > invalid_op+0x58/0x80 arch/x86/entry/entry_64.S:957 > RIP: 0010:debug_print_object+0x166/0x220 lib/debugobjects.c:288 > RSP: 0018:ffff8801b3d8f790 EFLAGS: 00010082 > RAX: dffffc0000000008 RBX: 0000000000000003 RCX: ffffffff815abdbe > RDX: 0000000000000000 RSI: 1ffff100367b1ea2 RDI: 1ffff100367b1e77 > RBP: ffff8801b3d8f7d0 R08: 0000000000000000 R09: 1ffff100367b1e49 > R10: ffffed00367b1f21 R11: ffffffff86b394b8 R12: 0000000000000001 > R13: ffffffff86b14d80 R14: ffffffff86007de0 R15: ffffffff8147ac00 > __debug_check_no_obj_freed lib/debugobjects.c:745 [inline] > debug_check_no_obj_freed+0x662/0xf1f lib/debugobjects.c:774 > __vunmap+0x112/0x380 mm/vmalloc.c:1530 > vfree+0x50/0xe0 mm/vmalloc.c:1606 > copy_entries_to_user net/ipv4/netfilter/arp_tables.c:714 [inline] > get_entries net/ipv4/netfilter/arp_tables.c:867 [inline] > do_arpt_get_ctl+0x7c4/0xa00 net/ipv4/netfilter/arp_tables.c:1485 > nf_sockopt net/netfilter/nf_sockopt.c:104 [inline] > nf_getsockopt+0x6a/0xc0 net/netfilter/nf_sockopt.c:122 > ip_getsockopt+0x15c/0x220 net/ipv4/ip_sockglue.c:1571 > tcp_getsockopt+0x82/0xd0 net/ipv4/tcp.c:3359 > sock_common_getsockopt+0x95/0xd0 net/core/sock.c:2934 > SYSC_getsockopt net/socket.c:1880 [inline] > SyS_getsockopt+0x178/0x340 net/socket.c:1862 > do_syscall_64+0x280/0x940 arch/x86/entry/common.c:287 > entry_SYSCALL_64_after_hwframe+0x42/0xb7 > RIP: 0033:0x45687a > RSP: 002b:0000000000a3eb48 EFLAGS: 00000212 ORIG_RAX: 0000000000000037 > RAX: ffffffffffffffda RBX: 0000000000000027 RCX: 000000000045687a > RDX: 0000000000000061 RSI: 0000000000000000 RDI: 0000000000000000 > RBP: 0000000000a3f200 R08: 0000000000a3eb7c R09: 0000000000000001 > R10: 0000000000a3f200 R11: 0000000000000212 R12: 0000000000a3eb80 > R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000001380 > Like the similar bug report "WARNING: ODEBUG bug in do_ipt_get_ctl" [1], this report doesn't make sense as there is no work_struct in the array being freed. And this last occurred 4 months ago. So I am invalidating this one too as it probably was a weird bug elsewhere in the kernel that has since been fixed: #syz invalid [1] https://groups.google.com/forum/#!msg/syzkaller-bugs/A_gWpsvtxKc/5YSSVpImDQAJ - Eric