Received: by 2002:a05:6358:3188:b0:123:57c1:9b43 with SMTP id q8csp3711226rwd; Mon, 22 May 2023 19:20:14 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ48j/gRjqs9odreje6MCQ0Ike3NiUerMtznkPCnt39Oir47s0F4pHbpUDAxg499et3FY5nI X-Received: by 2002:a17:90a:ce8a:b0:253:25c3:7a95 with SMTP id g10-20020a17090ace8a00b0025325c37a95mr17322456pju.14.1684808414157; Mon, 22 May 2023 19:20:14 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1684808414; cv=none; d=google.com; s=arc-20160816; b=p4IntwKP9PUKFkwyoMAJhbIN5VjKtBNEC2c2KmN+KR5+roGeqj8ILAelfAqVHNHvRQ HXkS3Gd8HR6OcEWY3dI8DeUPm6uzF4rKR20nCPTyxK+jj9F6H398Qj35ef27Hb2EG8x9 DChp0UBN0AXGmlTubklHSimTnZU86V1Vpo91JU3zKj0VkxlqqvHyOLs3h2umIPZUThOc CahBAvx9ZcS7+F1Kmzjk15MDEdXUaVXo3BpjNBTRfN3U/x6D/T++J7r3SUA1a7NFWg2R olYjIeTpbORu1Rh7bZp3ZWGD0ECwOSGh5SB/2lfTM2S7Le1FnVxR7o/0xaB5WK9FAUlz +CNQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:to:content-language:subject:mime-version:date :dkim-signature:message-id; bh=UtSrFNA5Z/qTKiavsU/dFyTb0TEeHD1OhiqAl2mf7tc=; b=x8m+VwLor2IVXvirX/pGoO0x3Kt6Gue7GunM8Q+yWpxg05mCpY/4sacmpSwoCzzqjF vZyO0GSLearG8nKyiHUIZXI6MBpC85++QEFxEFZ//mx9siQmrcRInqKI7A1qhwWkbRgD S250yyMYgfQc6y7uUt3X7Fuop5MlZ9EuSDqNr7apcdJMgK7aFToc9U9hL7uFSo0ke31P YRlyqsQf9BRR1SZ82tRd2c4HZNLcT2PBph5Nl1QTdSj8cn8NQ1wUMB7IIzMAH92oTD6i ccEWnZ7v5npxjHGQHqxJtaYqWXWksTyb9NEOkr0GxXgl2th+9OU/4U9gDcEkzJcZ0ru9 JfDA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linux.dev header.s=key1 header.b="WHmAu/42"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.dev Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id mt5-20020a17090b230500b00250c9a70af9si1483986pjb.63.2023.05.22.19.20.01; Mon, 22 May 2023 19:20:14 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linux.dev header.s=key1 header.b="WHmAu/42"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.dev Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232127AbjEWCIB (ORCPT + 99 others); Mon, 22 May 2023 22:08:01 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:60536 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229509AbjEWCH7 (ORCPT ); Mon, 22 May 2023 22:07:59 -0400 Received: from out-54.mta0.migadu.com (out-54.mta0.migadu.com [IPv6:2001:41d0:1004:224b::36]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 47D67CA for ; Mon, 22 May 2023 19:07:57 -0700 (PDT) Message-ID: <0f3f5941-0a95-723e-11e1-6fad8e2133b0@linux.dev> DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linux.dev; s=key1; t=1684807675; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=UtSrFNA5Z/qTKiavsU/dFyTb0TEeHD1OhiqAl2mf7tc=; b=WHmAu/4228kuKvEzWkxACDIvlTfhlX5NqrIc4ZPyPzRQJWZles/F9Ckw57YvfB1g06D6+5 VV/AN42e0ZGacGUsCdGRRwdkJ4urGd0MEXGPCmoxVwwtXJWTCsYLAxYUYHccD+TkEu4Cje DlH+zlOkVuLFhxHWib4jvaLaHvxsk9w= Date: Tue, 23 May 2023 10:07:51 +0800 MIME-Version: 1.0 Subject: Re: [syzbot] [rdma?] INFO: trying to register non-static key in skb_dequeue (2) Content-Language: en-US To: syzbot , jgg@ziepe.ca, leon@kernel.org, linux-kernel@vger.kernel.org, linux-rdma@vger.kernel.org, netdev@vger.kernel.org, syzkaller-bugs@googlegroups.com, zyjzyj2000@gmail.com References: <00000000000063657005fbf44fb2@google.com> X-Report-Abuse: Please report any abuse attempt to abuse@migadu.com and include these headers. From: Guoqing Jiang In-Reply-To: <00000000000063657005fbf44fb2@google.com> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit X-Migadu-Flow: FLOW_OUT X-Spam-Status: No, score=0.4 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,SORTED_RECIPS,SPF_HELO_NONE, SPF_PASS,T_SCC_BODY_TEXT_LINE,URIBL_BLOCKED autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 5/18/23 17:20, syzbot wrote: > syzbot has found a reproducer for the following issue on: > > HEAD commit: ab87603b2511 net: wwan: t7xx: Ensure init is completed bef.. > git tree: net > console output: https://syzkaller.appspot.com/x/log.txt?x=1157266a280000 > kernel config: https://syzkaller.appspot.com/x/.config?x=eb92acf166a5d2cd > dashboard link: https://syzkaller.appspot.com/bug?extid=eba589d8f49c73d356da > compiler: gcc (Debian 10.2.1-6) 10.2.1 20210110, GNU ld (GNU Binutils for Debian) 2.35.2 > syz repro: https://syzkaller.appspot.com/x/repro.syz?x=124d5da6280000 > > Downloadable assets: > disk image: https://storage.googleapis.com/syzbot-assets/ac3ed2228400/disk-ab87603b.raw.xz > vmlinux: https://storage.googleapis.com/syzbot-assets/c51b74034116/vmlinux-ab87603b.xz > kernel image: https://storage.googleapis.com/syzbot-assets/98ab9d7ee1ee/bzImage-ab87603b.xz > > IMPORTANT: if you fix the issue, please add the following tag to the commit: > Reported-by: syzbot+eba589d8f49c73d356da@syzkaller.appspotmail.com > > infiniband syz2: set active > infiniband syz2: added team0 > INFO: trying to register non-static key. > The code is fine but needs lockdep annotation, or maybe > you didn't initialize this object before use? > turning off the locking correctness validator. > CPU: 0 PID: 5133 Comm: syz-executor.3 Not tainted 6.4.0-rc1-syzkaller-00136-gab87603b2511 #0 > Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/28/2023 > Call Trace: > > __dump_stack lib/dump_stack.c:88 [inline] > dump_stack_lvl+0xd9/0x150 lib/dump_stack.c:106 > assign_lock_key kernel/locking/lockdep.c:982 [inline] > register_lock_class+0xdb6/0x1120 kernel/locking/lockdep.c:1295 > __lock_acquire+0x10a/0x5df0 kernel/locking/lockdep.c:4951 > lock_acquire kernel/locking/lockdep.c:5691 [inline] > lock_acquire+0x1b1/0x520 kernel/locking/lockdep.c:5656 > __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline] > _raw_spin_lock_irqsave+0x3d/0x60 kernel/locking/spinlock.c:162 > skb_dequeue+0x20/0x180 net/core/skbuff.c:3639 > drain_resp_pkts drivers/infiniband/sw/rxe/rxe_comp.c:555 [inline] > rxe_completer+0x250d/0x3cc0 drivers/infiniband/sw/rxe/rxe_comp.c:652 > rxe_qp_do_cleanup+0x1be/0x820 drivers/infiniband/sw/rxe/rxe_qp.c:761 > execute_in_process_context+0x3b/0x150 kernel/workqueue.c:3473 > __rxe_cleanup+0x21e/0x370 drivers/infiniband/sw/rxe/rxe_pool.c:233 > rxe_create_qp+0x3f6/0x5f0 drivers/infiniband/sw/rxe/rxe_verbs.c:583 > create_qp+0x5ac/0x970 drivers/infiniband/core/verbs.c:1235 > ib_create_qp_kernel+0xa1/0x310 drivers/infiniband/core/verbs.c:1346 > ib_create_qp include/rdma/ib_verbs.h:3743 [inline] > create_mad_qp+0x177/0x380 drivers/infiniband/core/mad.c:2905 > ib_mad_port_open drivers/infiniband/core/mad.c:2986 [inline] > ib_mad_init_device+0xf40/0x1a90 drivers/infiniband/core/mad.c:3077 > add_client_context+0x405/0x5e0 drivers/infiniband/core/device.c:721 > enable_device_and_get+0x1cd/0x3b0 drivers/infiniband/core/device.c:1332 > ib_register_device drivers/infiniband/core/device.c:1420 [inline] > ib_register_device+0x8b1/0xbc0 drivers/infiniband/core/device.c:1366 > rxe_register_device+0x302/0x3e0 drivers/infiniband/sw/rxe/rxe_verbs.c:1485 > rxe_net_add+0x90/0xf0 drivers/infiniband/sw/rxe/rxe_net.c:527 > rxe_newlink+0xf0/0x1b0 drivers/infiniband/sw/rxe/rxe.c:197 > nldev_newlink+0x332/0x5e0 drivers/infiniband/core/nldev.c:1731 > rdma_nl_rcv_msg+0x371/0x6a0 drivers/infiniband/core/netlink.c:195 > rdma_nl_rcv_skb.constprop.0.isra.0+0x2fc/0x440 drivers/infiniband/core/netlink.c:239 > netlink_unicast_kernel net/netlink/af_netlink.c:1339 [inline] > netlink_unicast+0x547/0x7f0 net/netlink/af_netlink.c:1365 > netlink_sendmsg+0x925/0xe30 net/netlink/af_netlink.c:1913 > sock_sendmsg_nosec net/socket.c:724 [inline] > sock_sendmsg+0xde/0x190 net/socket.c:747 > ____sys_sendmsg+0x71c/0x900 net/socket.c:2503 > ___sys_sendmsg+0x110/0x1b0 net/socket.c:2557 > __sys_sendmsg+0xf7/0x1c0 net/socket.c:2586 > do_syscall_x64 arch/x86/entry/common.c:50 [inline] > do_syscall_64+0x39/0xb0 arch/x86/entry/common.c:80 > entry_SYSCALL_64_after_hwframe+0x63/0xcd > RIP: 0033:0x7f7a1ee8c169 > Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 > RSP: 002b:00007f7a1fc76168 EFLAGS: 00000246 > ORIG_RAX: 000000000000002e > RAX: ffffffffffffffda RBX: 00007f7a1efabf80 RCX: 00007f7a1ee8c169 > RDX: 0000000000000040 RSI: 0000000020000200 RDI: 0000000000000003 > RBP: 00007f7a1eee7ca1 R08: 0000000000000000 R09: 0000000000000000 > R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 > R13: 00007fffc46ccb6f R14: 00007f7a1fc76300 R15: 0000000000022000 > > general protection fault, probably for non-canonical address 0xdffffc0000000006: 0000 [#1] PREEMPT SMP KASAN > KASAN: null-ptr-deref in range [0x0000000000000030-0x0000000000000037] > CPU: 0 PID: 5133 Comm: syz-executor.3 Not tainted 6.4.0-rc1-syzkaller-00136-gab87603b2511 #0 > Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/28/2023 > RIP: 0010:flush_send_queue drivers/infiniband/sw/rxe/rxe_comp.c:597 [inline] > RIP: 0010:rxe_completer+0x255c/0x3cc0 drivers/infiniband/sw/rxe/rxe_comp.c:653 > Code: 80 3c 02 00 0f 85 81 10 00 00 49 8b af 88 03 00 00 48 8d 45 30 48 89 c2 48 89 04 24 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e 83 11 00 00 48 8d 45 2c 44 8b > RSP: 0018:ffffc9000419e938 EFLAGS: 00010206 > RAX: dffffc0000000000 RBX: ffffed100f5fb800 RCX: 0000000000000000 > RDX: 0000000000000006 RSI: ffffffff877f3bea RDI: ffff88807afdc388 > RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 > R10: fffffbfff1cf4e42 R11: 205d313330355420 R12: ffff88807afdc1a0 > R13: 0000000000000000 R14: 0000000000000000 R15: ffff88807afdc000 > FS: 00007f7a1fc76700(0000) GS:ffff8880b9800000(0000) knlGS:0000000000000000 > CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 > CR2: 000000c001136000 CR3: 00000000206d3000 CR4: 00000000003506f0 > DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 > DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 > Call Trace: > > rxe_qp_do_cleanup+0x1be/0x820 drivers/infiniband/sw/rxe/rxe_qp.c:761 > execute_in_process_context+0x3b/0x150 kernel/workqueue.c:3473 > __rxe_cleanup+0x21e/0x370 drivers/infiniband/sw/rxe/rxe_pool.c:233 > rxe_create_qp+0x3f6/0x5f0 drivers/infiniband/sw/rxe/rxe_verbs.c:583 > create_qp+0x5ac/0x970 drivers/infiniband/core/verbs.c:1235 > ib_create_qp_kernel+0xa1/0x310 drivers/infiniband/core/verbs.c:1346 > ib_create_qp include/rdma/ib_verbs.h:3743 [inline] > create_mad_qp+0x177/0x380 drivers/infiniband/core/mad.c:2905 > ib_mad_port_open drivers/infiniband/core/mad.c:2986 [inline] > ib_mad_init_device+0xf40/0x1a90 drivers/infiniband/core/mad.c:3077 > add_client_context+0x405/0x5e0 drivers/infiniband/core/device.c:721 > enable_device_and_get+0x1cd/0x3b0 drivers/infiniband/core/device.c:1332 > ib_register_device drivers/infiniband/core/device.c:1420 [inline] > ib_register_device+0x8b1/0xbc0 drivers/infiniband/core/device.c:1366 > rxe_register_device+0x302/0x3e0 drivers/infiniband/sw/rxe/rxe_verbs.c:1485 > rxe_net_add+0x90/0xf0 drivers/infiniband/sw/rxe/rxe_net.c:527 > rxe_newlink+0xf0/0x1b0 drivers/infiniband/sw/rxe/rxe.c:197 > nldev_newlink+0x332/0x5e0 drivers/infiniband/core/nldev.c:1731 > rdma_nl_rcv_msg+0x371/0x6a0 drivers/infiniband/core/netlink.c:195 > rdma_nl_rcv_skb.constprop.0.isra.0+0x2fc/0x440 drivers/infiniband/core/netlink.c:239 > netlink_unicast_kernel net/netlink/af_netlink.c:1339 [inline] > netlink_unicast+0x547/0x7f0 net/netlink/af_netlink.c:1365 > netlink_sendmsg+0x925/0xe30 net/netlink/af_netlink.c:1913 > sock_sendmsg_nosec net/socket.c:724 [inline] > sock_sendmsg+0xde/0x190 net/socket.c:747 > ____sys_sendmsg+0x71c/0x900 net/socket.c:2503 > ___sys_sendmsg+0x110/0x1b0 net/socket.c:2557 > __sys_sendmsg+0xf7/0x1c0 net/socket.c:2586 > do_syscall_x64 arch/x86/entry/common.c:50 [inline] > do_syscall_64+0x39/0xb0 arch/x86/entry/common.c:80 > entry_SYSCALL_64_after_hwframe+0x63/0xcd > RIP: 0033:0x7f7a1ee8c169 > Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 > RSP: 002b:00007f7a1fc76168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e > RAX: ffffffffffffffda RBX: 00007f7a1efabf80 RCX: 00007f7a1ee8c169 > RDX: 0000000000000040 RSI: 0000000020000200 RDI: 0000000000000003 > RBP: 00007f7a1eee7ca1 R08: 0000000000000000 R09: 0000000000000000 > R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 > R13: 00007fffc46ccb6f R14: 00007f7a1fc76300 R15: 0000000000022000 > > Modules linked in: > ---[ end trace 0000000000000000 ]--- > RIP: 0010:flush_send_queue drivers/infiniband/sw/rxe/rxe_comp.c:597 [inline] > RIP: 0010:rxe_completer+0x255c/0x3cc0 drivers/infiniband/sw/rxe/rxe_comp.c:653 Looks if rxe_qp_from_init returns failure, qp->sq.queue is NULL but rxe still de-reference it during cleanup. And it is the same for sk_buff_head. #syz test: git://git.kernel.org/pub/scm/linux/kernel/git/rdma/rdma.git for-rc diff --git a/drivers/infiniband/sw/rxe/rxe_qp.c b/drivers/infiniband/sw/rxe/rxe_qp.c index 61a2eb77d999..17ed41309756 100644 --- a/drivers/infiniband/sw/rxe/rxe_qp.c +++ b/drivers/infiniband/sw/rxe/rxe_qp.c @@ -758,19 +758,21 @@ static void rxe_qp_do_cleanup(struct work_struct *work)                 del_timer_sync(&qp->rnr_nak_timer);         } -       if (qp->resp.task.func) +       /* flush out any receive wr's or pending requests */ +       if (qp->resp.task.func) {                 rxe_cleanup_task(&qp->resp.task); +               rxe_responder(qp); +       } -       if (qp->req.task.func) +       if (qp->req.task.func) {                 rxe_cleanup_task(&qp->req.task); +               rxe_requester(qp); +       } -       if (qp->comp.task.func) +       if (qp->comp.task.func) {                 rxe_cleanup_task(&qp->comp.task); - -       /* flush out any receive wr's or pending requests */ -       rxe_requester(qp); -       rxe_completer(qp); -       rxe_responder(qp); +               rxe_completer(qp); +       }         if (qp->sq.queue)                 rxe_queue_cleanup(qp->sq.queue);