Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp742483ybt; Fri, 26 Jun 2020 10:25:00 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxz8TMz2csXfdAG0phP/BB11zt8Ttd7an+9aozEzZjgaOl6zDD14xiiyCza4l4dlI0Nz4Nj X-Received: by 2002:a17:906:add3:: with SMTP id lb19mr3456072ejb.308.1593192300269; Fri, 26 Jun 2020 10:25:00 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1593192300; cv=none; d=google.com; s=arc-20160816; b=Ps8DsMP/smP9r106AwH8eB8tDs7vz+SQK8PA3foPbQqi+5sa+vPBeiWY/L1lF5Oo8X 84WpVbjY2QKDVig++avndwgks6S0GoCSHAre3HAbSZaXs1oqkDauP4N03XW2pIz3KnRr 7okQSiAN1LsOPh9dtG64UopT+0vopvwjx0vzNKZXeMIESC2T0Jz7XQZdeSaFrP05gvG5 NzpjdEQ16mVSRA7GfgoWyHuyu3C9V/Y3POsJP4/BK931AGi2GCCxW3Uy0YQwnWGc5Uq4 Yj9e1JIjIld8vNrKh1SqC/W2VM97SWPzyNsFSTzNMzDXCtGDKeoQNnIhqGLr6GYzP/Dw tOEw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:to:from:subject:message-id:date :mime-version; bh=PBbQ7cEucEY6CoFv1tPjVkpwYW+FAyD/Jgb/7La4UR0=; b=n9wGkvomgTOxWc+3LIp9ffVNvmscFVjeI36m21d8JsizrIY++aJHfFsVUG5k2EemYv W9YKkjFLu9TaRgsN8BJStiBgkm4KZ5BLXZQ6XWCrDPBlU4n8j96S8ew6wql8FbSah5X/ hyAxdrYw+HNUP1So7Uw33P6H9UdTOt5iqCdIaZpu4uAlUAZ3V2vRNAkeM8NSVPZWWB+w Qd2yy8kwmRK+DRdSCHmT4OTCVKG+LeuK497ljnauOmS3xaP+UekUAHcHmpUwr0zSAjm1 mqzPMt9zSLiGtHFHoQsgigAgGy3bIrehEhhsJpcNifldcJWkWxM9fKmvhE4KeFCx+9hx MBmA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=appspotmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id oh22si15800113ejb.667.2020.06.26.10.24.36; Fri, 26 Jun 2020 10:25:00 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=appspotmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728286AbgFZRJT (ORCPT + 99 others); Fri, 26 Jun 2020 13:09:19 -0400 Received: from mail-il1-f199.google.com ([209.85.166.199]:54537 "EHLO mail-il1-f199.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728214AbgFZRJR (ORCPT ); Fri, 26 Jun 2020 13:09:17 -0400 Received: by mail-il1-f199.google.com with SMTP id d18so6885252ill.21 for ; Fri, 26 Jun 2020 10:09:16 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:date:message-id:subject:from:to; bh=PBbQ7cEucEY6CoFv1tPjVkpwYW+FAyD/Jgb/7La4UR0=; b=MRKGiXjaqemqtDM7aUZTJzOUW1zBISAHH2tpVZqiBbxbD2F/eA4PqjcIgvuLBtXAx/ cEMvgF+c3avZR7RKtFohBMjLJi8TPTSMVlhPsjIwJvHWkpqLNuW8erXp29nwZfrjqZRG e8UXLkdi0EJaSoB+XPB8NlEjnwBpXuZMKXkKHpf5Z0Z/7dXq2VF4z5dLbVOC6GBiDz5X ToHeEdvQxtPaLe5n7KlKYP8MAjZoUtFLiGhujTv9dC8WGi3PlXmOK1JYD2ulQez3TRS1 oYq/RGC4a5fI4EGTym9rMGLS9z+daYkHF3Yyb9sT7PJSA+et8c77wtzHN2Q9MktC4nXb kbyg== X-Gm-Message-State: AOAM5323/2Q0J7B82jX+1ol1GpDXZuCes2IQ3Zc3DuFl03MyfqA6odJ+ Eld2NWaX6XZm23CFCof26+IwVKh74QCITjfByS2vHFkGKUFX MIME-Version: 1.0 X-Received: by 2002:a05:6602:2f0f:: with SMTP id q15mr4553270iow.23.1593191355911; Fri, 26 Jun 2020 10:09:15 -0700 (PDT) Date: Fri, 26 Jun 2020 10:09:15 -0700 X-Google-Appengine-App-Id: s~syzkaller X-Google-Appengine-App-Id-Alias: syzkaller Message-ID: <000000000000d411cf05a8ffc4a6@google.com> Subject: WARNING: suspicious RCU usage in tipc_l2_send_msg From: syzbot To: davem@davemloft.net, jmaloy@redhat.com, kuba@kernel.org, linux-kernel@vger.kernel.org, netdev@vger.kernel.org, syzkaller-bugs@googlegroups.com, tipc-discussion@lists.sourceforge.net, ying.xue@windriver.com Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hello, syzbot found the following crash on: HEAD commit: b835a71e usbnet: smsc95xx: Fix use-after-free after removal git tree: net console output: https://syzkaller.appspot.com/x/log.txt?x=1095a51d100000 kernel config: https://syzkaller.appspot.com/x/.config?x=dcc6334acae363d4 dashboard link: https://syzkaller.appspot.com/bug?extid=47bbc6b678d317cccbe0 compiler: gcc (GCC) 10.1.0-syz 20200507 Unfortunately, I don't have any reproducer for this crash yet. IMPORTANT: if you fix the bug, please add the following tag to the commit: Reported-by: syzbot+47bbc6b678d317cccbe0@syzkaller.appspotmail.com ============================= WARNING: suspicious RCU usage 5.8.0-rc1-syzkaller #0 Not tainted ----------------------------- net/tipc/bearer.c:466 suspicious rcu_dereference_check() usage! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 2 locks held by kworker/0:16/19143: #0: ffff8880a6901d38 ((wq_completion)cryptd){+.+.}-{0:0}, at: arch_atomic64_set arch/x86/include/asm/atomic64_64.h:34 [inline] #0: ffff8880a6901d38 ((wq_completion)cryptd){+.+.}-{0:0}, at: atomic64_set include/asm-generic/atomic-instrumented.h:856 [inline] #0: ffff8880a6901d38 ((wq_completion)cryptd){+.+.}-{0:0}, at: atomic_long_set include/asm-generic/atomic-long.h:41 [inline] #0: ffff8880a6901d38 ((wq_completion)cryptd){+.+.}-{0:0}, at: set_work_data kernel/workqueue.c:616 [inline] #0: ffff8880a6901d38 ((wq_completion)cryptd){+.+.}-{0:0}, at: set_work_pool_and_clear_pending kernel/workqueue.c:643 [inline] #0: ffff8880a6901d38 ((wq_completion)cryptd){+.+.}-{0:0}, at: process_one_work+0x82b/0x1670 kernel/workqueue.c:2240 #1: ffffc90006f9fda8 ((work_completion)(&cpu_queue->work)){+.+.}-{0:0}, at: process_one_work+0x85f/0x1670 kernel/workqueue.c:2244 stack backtrace: CPU: 0 PID: 19143 Comm: kworker/0:16 Not tainted 5.8.0-rc1-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Workqueue: cryptd cryptd_queue_worker Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x18f/0x20d lib/dump_stack.c:118 tipc_l2_send_msg+0x354/0x420 net/tipc/bearer.c:466 tipc_aead_encrypt_done+0x204/0x3a0 net/tipc/crypto.c:761 cryptd_aead_crypt+0xe8/0x1d0 crypto/cryptd.c:739 cryptd_queue_worker+0x118/0x1b0 crypto/cryptd.c:181 process_one_work+0x94c/0x1670 kernel/workqueue.c:2269 worker_thread+0x64c/0x1120 kernel/workqueue.c:2415 kthread+0x3b5/0x4a0 kernel/kthread.c:291 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:293 --- This bug is generated by a bot. It may contain errors. See https://goo.gl/tpsmEJ for more information about syzbot. syzbot engineers can be reached at syzkaller@googlegroups.com. syzbot will keep track of this bug report. See: https://goo.gl/tpsmEJ#status for how to communicate with syzbot.