Received: by 2002:a05:6358:11c7:b0:104:8066:f915 with SMTP id i7csp2850872rwl; Thu, 13 Apr 2023 11:43:50 -0700 (PDT) X-Google-Smtp-Source: AKy350abZ7TEergptew6yaDWpF/ngvmG6O75ZgJTxCwJUaLsqyZp0AVSxp5bmprF0dZLTVZDl0aa X-Received: by 2002:a17:903:138c:b0:1a6:6bcb:b4e8 with SMTP id jx12-20020a170903138c00b001a66bcbb4e8mr34379plb.9.1681411429998; Thu, 13 Apr 2023 11:43:49 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1681411429; cv=none; d=google.com; s=arc-20160816; b=qHuiLDxqXGnhEU/dmM0zV0WorWsUHAMarTDFZPnT5GwWRbAtS42l5WY+vDz9loXWvl K4L/HJHi88JLjlklLd5Y1LH7YufnakmmkaSw+Fh2pp1Nu9O9+XlZm0fQjUBr2CA5/1XB B2/ha9vzUh1Asu2kd0EfQAt2X/nrQwaYHJfN766EuVEpBz94NnIDLiv0j1fjFTRqPyFo BYcWb0gy+Iu7MVmT3QxQuhtARLp7EvvKs9sB7/0JXeq7Ekbu0lCEQJjznp02ge0Nn8DM Alij9hwuQOnvelQDQT615xBa92uerXGtYqz5XX6hDssBoZjx+Tqcu7xq2uiRvdEw+W/N 0dWw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :to:subject:dkim-signature; bh=LtpX/2uYYhcqwsIzp51HwOUZ9fsD18rPx6IZajzQMVQ=; b=szZmKmyOzu/M7EJ1zpeRiFRbXYLVkDOCRxQN29vvLLn1S7ssbZP7cQWcJc1WwWfRda uu4kq0oSiaRDT98hPWYjQvs3bpriYeJ9yUdupCmDtkpwONNsk88zoSsk2Ik7cfqBZqTi aNmqkpNu5CbTDdY1dDUVLfRMzw1q2SKa2BZCAsSaHLwqD1wA5VxGpyDRjfYvibuHJ+du 5lkHO+DPENNeBEVWR+RcLx4YGOSprUMt31sPzUjcvS6aKBSct5ps+bTPKZthH2GqLN4+ 9MS8dgdDrjJ2Rb7fYeP7kgtt2D5iQX8VVPyPx1X7wPQyyyAgIevkub1i+7alU68xib5L 3GYQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@iogearbox.net header.s=default2302 header.b=aOqaWV7f; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=NONE dis=NONE) header.from=iogearbox.net Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id t184-20020a6381c1000000b00513776b1d31si2571265pgd.74.2023.04.13.11.43.36; Thu, 13 Apr 2023 11:43:49 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@iogearbox.net header.s=default2302 header.b=aOqaWV7f; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=NONE dis=NONE) header.from=iogearbox.net Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230153AbjDMSnS (ORCPT + 99 others); Thu, 13 Apr 2023 14:43:18 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:33110 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230142AbjDMSnM (ORCPT ); Thu, 13 Apr 2023 14:43:12 -0400 Received: from www62.your-server.de (www62.your-server.de [213.133.104.62]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id CF46B8698; Thu, 13 Apr 2023 11:42:52 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=iogearbox.net; s=default2302; h=Content-Transfer-Encoding:Content-Type: In-Reply-To:MIME-Version:Date:Message-ID:From:References:To:Subject:Sender: Reply-To:Cc:Content-ID:Content-Description:Resent-Date:Resent-From: Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID; bh=LtpX/2uYYhcqwsIzp51HwOUZ9fsD18rPx6IZajzQMVQ=; b=aOqaWV7fKse3+ve/I7Hvi19ln6 38EaB5cWSXAPX4410XQeKrwTf9awU5I1aaaURaBJwg24mZ4jczEwO4PZK2UqWh0r/cErQ7YjrGyj7 RdUpf7YITkztOVdCpMKR0VuqMeyfuY7FeX9XMMR+k0AsY3dp7RQP91H0tLBDT+UjI1e3mBaCLKzCC QHv5wlTyuM1YrvM1DIhOuBXYfnH80aYRQksgUPp/Goa9YF7KYkFDnqLa6gpXFanakPm6UcYMyED7I NmB6lvXhPSeJemW4CiZV/ItDhhNx6R4YTqCAi/CqAV2dLerKtBWyccJgo9s1B0oOAMs1EA1VJ/4Rk LTOTi74Q==; Received: from sslproxy02.your-server.de ([78.47.166.47]) by www62.your-server.de with esmtpsa (TLS1.3) tls TLS_AES_256_GCM_SHA384 (Exim 4.94.2) (envelope-from ) id 1pn1u9-000CN8-Fo; Thu, 13 Apr 2023 20:42:45 +0200 Received: from [85.1.206.226] (helo=linux.home) by sslproxy02.your-server.de with esmtpsa (TLSv1.3:TLS_AES_256_GCM_SHA384:256) (Exim 4.92) (envelope-from ) id 1pn1u9-000VfT-0T; Thu, 13 Apr 2023 20:42:45 +0200 Subject: Re: [syzbot] [bpf?] [net?] WARNING in sock_map_del_link To: syzbot , andrii@kernel.org, ast@kernel.org, bpf@vger.kernel.org, davem@davemloft.net, edumazet@google.com, jakub@cloudflare.com, john.fastabend@gmail.com, kuba@kernel.org, linux-kernel@vger.kernel.org, netdev@vger.kernel.org, pabeni@redhat.com, syzkaller-bugs@googlegroups.com, Xin Liu , Hsin-Wei Hung , John Fastabend References: <000000000000f1db9605f939720e@google.com> From: Daniel Borkmann Message-ID: <67f98e03-79ae-a290-b97a-2f6e11ab1251@iogearbox.net> Date: Thu, 13 Apr 2023 20:42:44 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.7.2 MIME-Version: 1.0 In-Reply-To: <000000000000f1db9605f939720e@google.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit X-Authenticated-Sender: daniel@iogearbox.net X-Virus-Scanned: Clear (ClamAV 0.103.8/26874/Thu Apr 13 09:30:39 2023) X-Spam-Status: No, score=-3.2 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,NICE_REPLY_A,SPF_HELO_NONE, SPF_PASS,URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 4/13/23 5:33 PM, syzbot wrote: > Hello, > > syzbot found the following issue on: > > HEAD commit: d319f344561d mm: Fix copy_from_user_nofault(). > git tree: bpf-next > console output: https://syzkaller.appspot.com/x/log.txt?x=15930c9dc80000 > kernel config: https://syzkaller.appspot.com/x/.config?x=78c9d875f0a80d33 > dashboard link: https://syzkaller.appspot.com/bug?extid=49f6cef45247ff249498 > compiler: gcc (Debian 10.2.1-6) 10.2.1 20210110, GNU ld (GNU Binutils for Debian) 2.35.2 > > Unfortunately, I don't have any reproducer for this issue yet. > > Downloadable assets: > disk image: https://storage.googleapis.com/syzbot-assets/229f3623b7df/disk-d319f344.raw.xz > vmlinux: https://storage.googleapis.com/syzbot-assets/6da0db75c9aa/vmlinux-d319f344.xz > kernel image: https://storage.googleapis.com/syzbot-assets/01f022fb9a13/bzImage-d319f344.xz > > IMPORTANT: if you fix the issue, please add the following tag to the commit: > Reported-by: syzbot+49f6cef45247ff249498@syzkaller.appspotmail.com Xin, fyi, given we're currently prepping bpf-next pr we unfortunately had to revert commit ed17aa92dc56 ("bpf, sockmap: fix deadlocks in the sockhash and sockmap") which is causing this new syzkaller splat. There's another one in the syzkaller queue we've been made aware of which bisected to earlier mentioned commit. https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=8c5c2a4898e3d6bad86e29d471e023c8a19ba799 > ------------[ cut here ]------------ > WARNING: CPU: 1 PID: 7921 at kernel/softirq.c:376 __local_bh_enable_ip+0xbe/0x130 kernel/softirq.c:376 > Modules linked in: > CPU: 1 PID: 7921 Comm: syz-executor.4 Not tainted 6.2.0-syzkaller-13249-gd319f344561d #0 > Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/30/2023 > RIP: 0010:__local_bh_enable_ip+0xbe/0x130 kernel/softirq.c:376 > Code: 45 bf 01 00 00 00 e8 b1 44 0a 00 e8 9c 41 3d 00 fb 65 8b 05 2c 61 b5 7e 85 c0 74 58 5b 5d c3 65 8b 05 12 2f b4 7e 85 c0 75 a2 <0f> 0b eb 9e e8 e9 41 3d 00 eb 9f 48 89 ef e8 ff 30 18 00 eb a8 0f > RSP: 0018:ffffc90007bffbe8 EFLAGS: 00010046 > RAX: 0000000000000000 RBX: 0000000000000201 RCX: 1ffffffff1cf0736 > RDX: 0000000000000000 RSI: 0000000000000201 RDI: ffffffff882bf40a > RBP: ffffffff882bf40a R08: 0000000000000000 R09: ffff88801cc6327b > R10: ffffed100398c64f R11: 1ffffffff21917f0 R12: ffff88801cc63268 > R13: ffff88801cc63268 R14: ffff8880188ef500 R15: 0000000000000000 > FS: 00007f378f724700(0000) GS:ffff8880b9900000(0000) knlGS:0000000000000000 > CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 > CR2: 00007fbbc57831b8 CR3: 00000000210ad000 CR4: 00000000003506e0 > DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 > DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 > Call Trace: > > spin_unlock_bh include/linux/spinlock.h:395 [inline] > sock_map_del_link+0x2ea/0x510 net/core/sock_map.c:165 > sock_map_unref+0xb0/0x1d0 net/core/sock_map.c:184 > sock_hash_delete_elem+0x1ec/0x2a0 net/core/sock_map.c:945 > map_delete_elem kernel/bpf/syscall.c:1536 [inline] > __sys_bpf+0x2edc/0x53e0 kernel/bpf/syscall.c:5053 > __do_sys_bpf kernel/bpf/syscall.c:5166 [inline] > __se_sys_bpf kernel/bpf/syscall.c:5164 [inline] > __x64_sys_bpf+0x79/0xc0 kernel/bpf/syscall.c:5164 > do_syscall_x64 arch/x86/entry/common.c:50 [inline] > do_syscall_64+0x39/0xb0 arch/x86/entry/common.c:80 > entry_SYSCALL_64_after_hwframe+0x63/0xcd > RIP: 0033:0x7f378ea8c169 > Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 > RSP: 002b:00007f378f724168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 > RAX: ffffffffffffffda RBX: 00007f378ebabf80 RCX: 00007f378ea8c169 > RDX: 0000000000000020 RSI: 0000000020000140 RDI: 0000000000000003 > RBP: 00007f378eae7ca1 R08: 0000000000000000 R09: 0000000000000000 > R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 > R13: 00007ffe9737aebf R14: 00007f378f724300 R15: 0000000000022000 > > > > --- > This report is generated by a bot. It may contain errors. > See https://goo.gl/tpsmEJ for more information about syzbot. > syzbot engineers can be reached at syzkaller@googlegroups.com. > > syzbot will keep track of this issue. See: > https://goo.gl/tpsmEJ#status for how to communicate with syzbot. >