From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 37030C3A5A7 for ; Thu, 8 Dec 2022 11:40:36 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229957AbiLHLke (ORCPT ); Thu, 8 Dec 2022 06:40:34 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:35014 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229928AbiLHLk0 (ORCPT ); Thu, 8 Dec 2022 06:40:26 -0500 Received: from mail-il1-f197.google.com (mail-il1-f197.google.com [209.85.166.197]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id AB98276143 for ; Thu, 8 Dec 2022 03:40:20 -0800 (PST) Received: by mail-il1-f197.google.com with SMTP id i7-20020a056e021b0700b003033a763270so873563ilv.19 for ; Thu, 08 Dec 2022 03:40:20 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=to:from:subject:message-id:in-reply-to:date:mime-version :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=abeeYvwaa0eJSWH0bG3SlhrASZqocAsgg3TqFjZTpDA=; b=wwodml1mvVvMQo476kpfnul8I0hlT5DkoPVDEopqbOSoA7xKfwBBP0qZa+uNwNpqIR T3lNfv59sFYVb4O26NR/OvCZO5X9bOfZ06ICZi+ODdlxJSUqkukYY6EqmCnD6XDUc2ga 3jf5LXlsw7lYirE2sze9YHJ9M5iOBqQKDdLT1aWh8sTLPJ2FqdzKnSN5caSqu4kvutH2 Sa2FFyyG8bea7pltfx0icLTNfdAO1zJaKO8us733e/nBE7/t6imu/0Slzxgps0b6DZJT d3ICpZ94JDFDOLn05u5ekaufV0YHj2Gq5QPdA+ezPxeFEeczELTB51g0xbj8DZK3sUEs 3NpA== X-Gm-Message-State: ANoB5pnXs4I2wSFGQORedxEFDu2kb6xW2l/cAFzivTPSl6lpXH44+JAd m4+zJsQAwW5gLMmlCR20o9WcJMU+gJST6SH8kkv+bgKe2l3Y X-Google-Smtp-Source: AA0mqf5QF+kGbIt3/x4kONMMoGQw9OioehCHioCaoM/wklpx8LYxc9Z1b6vkr8W8BEDlaxpIQogBLeH4lXSjpDZHlb3vlAxSU9Jz MIME-Version: 1.0 X-Received: by 2002:a92:d1d1:0:b0:302:ae55:c01c with SMTP id u17-20020a92d1d1000000b00302ae55c01cmr37872799ilg.6.1670499620088; Thu, 08 Dec 2022 03:40:20 -0800 (PST) Date: Thu, 08 Dec 2022 03:40:20 -0800 In-Reply-To: <20221208111054.8178-1-hdanton@sina.com> X-Google-Appengine-App-Id: s~syzkaller X-Google-Appengine-App-Id-Alias: syzkaller Message-ID: <00000000000073f1d605ef4f80d5@google.com> Subject: Re: [syzbot] kernel stack overflow in sock_close From: syzbot To: hdanton@sina.com, linux-kernel@vger.kernel.org, syzkaller-bugs@googlegroups.com Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hello, syzbot has tested the proposed patch but the reproducer is still triggering an issue: kernel stack overflow in sock_close x8 : 0000000000040579 x7 : ffff80000b22f58c x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000001 x3 : 0000000000000000 x2 : 0000000000000002 x1 : ffff0000d07b58f8 x0 : ffff0000d07b4ec0 Kernel panic - not syncing: kernel stack overflow CPU: 0 PID: 3678 Comm: syz-executor.0 Not tainted 6.1.0-rc7-syzkaller-00151-ge3cb714fb489-dirty #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/30/2022 Call trace: dump_backtrace+0x1c4/0x1f0 arch/arm64/kernel/stacktrace.c:156 show_stack+0x2c/0x54 arch/arm64/kernel/stacktrace.c:163 __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x104/0x16c lib/dump_stack.c:106 dump_stack+0x1c/0x58 lib/dump_stack.c:113 panic+0x218/0x508 kernel/panic.c:274 nmi_panic+0xbc/0xf0 kernel/panic.c:169 panic_bad_stack+0x134/0x154 arch/arm64/kernel/traps.c:886 handle_bad_stack+0x34/0x48 arch/arm64/kernel/entry-common.c:849 __bad_stack+0x78/0x7c arch/arm64/kernel/entry.S:552 mark_lock+0x4/0x1b4 kernel/locking/lockdep.c:4595 lock_acquire+0x100/0x1f8 kernel/locking/lockdep.c:5668 __raw_spin_lock_bh include/linux/spinlock_api_smp.h:126 [inline] _raw_spin_lock_bh+0x54/0x6c kernel/locking/spinlock.c:178 spin_lock_bh include/linux/spinlock.h:355 [inline] lock_sock_nested+0x88/0xd8 net/core/sock.c:3450 lock_sock include/net/sock.h:1721 [inline] sock_map_close+0x30/0x4bc net/core/sock_map.c:1610 sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc sock_map_close+0x400/0x4bc inet_release+0xc8/0xe4 net/ipv4/af_inet.c:428 inet6_release+0x3c/0x58 net/ipv6/af_inet6.c:488 __sock_release net/socket.c:650 [inline] sock_close+0x50/0xf0 net/socket.c:1365 __fput+0x198/0x3e4 fs/file_table.c:320 ____fput+0x20/0x30 fs/file_table.c:348 task_work_run+0x100/0x148 kernel/task_work.c:179 exit_task_work include/linux/task_work.h:38 [inline] do_exit+0x2dc/0xcac kernel/exit.c:820 __arm64_sys_exit_group+0x0/0x18 kernel/exit.c:950 __do_sys_exit_group kernel/exit.c:961 [inline] __se_sys_exit_group kernel/exit.c:959 [inline] __wake_up_parent+0x0/0x40 kernel/exit.c:959 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall arch/arm64/kernel/syscall.c:52 [inline] el0_svc_common+0x138/0x220 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x48/0x140 arch/arm64/kernel/syscall.c:197 el0_svc+0x58/0x150 arch/arm64/kernel/entry-common.c:637 el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:655 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:584 SMP: stopping secondary CPUs Kernel Offset: disabled CPU features: 0x00000,040e0108,4c017203 Memory Limit: none Tested on: commit: e3cb714f Merge branch 'for-next/core' into for-kernelci git tree: https://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git console output: https://syzkaller.appspot.com/x/log.txt?x=16e5216b880000 kernel config: https://syzkaller.appspot.com/x/.config?x=ec7118319bfb771e dashboard link: https://syzkaller.appspot.com/bug?extid=09329bd987ebca21bced compiler: Debian clang version 13.0.1-++20220126092033+75e33f71c2da-1~exp1~20220126212112.63, GNU ld (GNU Binutils for Debian) 2.35.2 userspace arch: arm64 patch: https://syzkaller.appspot.com/x/patch.diff?x=11f86f5b880000