Received: by 2002:a25:b794:0:0:0:0:0 with SMTP id n20csp4263169ybh; Tue, 6 Aug 2019 08:48:33 -0700 (PDT) X-Google-Smtp-Source: APXvYqyK9VnM68z0xqD0cYdVnsun0Gc3pHj5vuMFq21dT3OqDE+dFVCynqwF744fYj+ozQwNtC+R X-Received: by 2002:a62:e71a:: with SMTP id s26mr4191359pfh.89.1565106513371; Tue, 06 Aug 2019 08:48:33 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1565106513; cv=none; d=google.com; s=arc-20160816; b=Ghab9SNm/vlpR0wRVi1SL8+Q+d/hr+y0aHdVKUUlkFdH18vefxNyJOj3Xcwy+NxY/q FZNasKpo9a7kggK6gFDbUks9Ak1hW7dtHSMlrzclqDRJxcHqPZlHPUMOi8DlQtKHcwoK x34IE2g5YvX71NbIPjTi38YkWsbJ7j4oFVMisdWQNsIQWbtuoNQ6Ouj6Mv+yHipHvakS YUeMwaUHFKnL9ZtDzxuZnDe5bHWvfOZ8ASZZ/57Utti6wmQgFi+xKec9oPca1EQpMIP1 omawKuwxS1syoJZc9Z4lN8WwnNalUVjOHj4sNNQZFkPLAt4dtczSJ0au3r8cunVsz7T1 xFqQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=BSRJmjx6gufev2xF27lXg2o6H+C21oZYE5vRmYSyiLU=; b=Vs5NU9KVYS/6TWo5laLr6bbS1BmLmWj44q15bPQmtdEER/vmne8DGANfAuHL2eLzkz IPELDSJN1vlAt2vMgGv8hftPVl/jiBWGm/dJxwzRaYj0D2keQeUJnJw/4UKG17MxDYJZ St3LTfujhglvVUHOw7X4ACz7DWzpXM2H7uR0ZyxNmV4+uZg27Izasp1vqxdaI3zuyYLr W/tqI+W19/2jh51gLj8cZXyGB9IBNLtnB8yaMdw6NmjbeZ5hExoi4mp8W5chyMl9lbbH aOGWR7MtL6evK7FFMNoChx78N/LruUWDlmHoQUsrOvyoH63Izz+OHSltYH8zDa+LTQec n1vQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id j6si51126095pgb.206.2019.08.06.08.48.17; Tue, 06 Aug 2019 08:48:33 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732261AbfHFPpt (ORCPT + 99 others); Tue, 6 Aug 2019 11:45:49 -0400 Received: from mga11.intel.com ([192.55.52.93]:54421 "EHLO mga11.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726373AbfHFPps (ORCPT ); Tue, 6 Aug 2019 11:45:48 -0400 X-Amp-Result: UNKNOWN X-Amp-Original-Verdict: FILE UNKNOWN X-Amp-File-Uploaded: False Received: from orsmga006.jf.intel.com ([10.7.209.51]) by fmsmga102.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 06 Aug 2019 08:45:47 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.64,353,1559545200"; d="scan'208";a="179187981" Received: from unknown (HELO localhost.localdomain) ([10.232.112.69]) by orsmga006.jf.intel.com with ESMTP; 06 Aug 2019 08:45:46 -0700 Date: Tue, 6 Aug 2019 09:43:17 -0600 From: Keith Busch To: syzbot Cc: "axboe@kernel.dk" , "linux-block@vger.kernel.org" , "linux-kernel@vger.kernel.org" , "syzkaller-bugs@googlegroups.com" Subject: Re: WARNING: refcount bug in blk_mq_free_request (2) Message-ID: <20190806154313.GC24030@localhost.localdomain> References: <000000000000d0df7f058f625d13@google.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <000000000000d0df7f058f625d13@google.com> User-Agent: Mutt/1.9.1 (2017-09-22) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Aug 05, 2019 at 10:52:07AM -0700, syzbot wrote: > Hello, > > syzbot found the following crash on: > > HEAD commit: e21a712a Linux 5.3-rc3 > git tree: upstream > console output: https://syzkaller.appspot.com/x/log.txt?x=10cf349a600000 > kernel config: https://syzkaller.appspot.com/x/.config?x=a4c9e9f08e9e8960 > dashboard link: https://syzkaller.appspot.com/bug?extid=f4316dab9d4518b755eb > compiler: gcc (GCC) 9.0.0 20181231 (experimental) > syz repro: https://syzkaller.appspot.com/x/repro.syz?x=117a1906600000 > C reproducer: https://syzkaller.appspot.com/x/repro.c?x=11aa11aa600000 > > IMPORTANT: if you fix the bug, please add the following tag to the commit: > Reported-by: syzbot+f4316dab9d4518b755eb@syzkaller.appspotmail.com > > ------------[ cut here ]------------ > refcount_t: underflow; use-after-free. > WARNING: CPU: 1 PID: 16 at lib/refcount.c:190 refcount_sub_and_test_checked > lib/refcount.c:190 [inline] > WARNING: CPU: 1 PID: 16 at lib/refcount.c:190 > refcount_sub_and_test_checked+0x1d0/0x200 lib/refcount.c:180 > Kernel panic - not syncing: panic_on_warn set ... > CPU: 1 PID: 16 Comm: ksoftirqd/1 Not tainted 5.3.0-rc3 #98 > Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS > Google 01/01/2011 > Call Trace: > __dump_stack lib/dump_stack.c:77 [inline] > dump_stack+0x172/0x1f0 lib/dump_stack.c:113 > panic+0x2dc/0x755 kernel/panic.c:219 > __warn.cold+0x20/0x4c kernel/panic.c:576 > report_bug+0x263/0x2b0 lib/bug.c:186 > fixup_bug arch/x86/kernel/traps.c:179 [inline] > fixup_bug arch/x86/kernel/traps.c:174 [inline] > do_error_trap+0x11b/0x200 arch/x86/kernel/traps.c:272 > do_invalid_op+0x37/0x50 arch/x86/kernel/traps.c:291 > invalid_op+0x23/0x30 arch/x86/entry/entry_64.S:1026 > RIP: 0010:refcount_sub_and_test_checked lib/refcount.c:190 [inline] > RIP: 0010:refcount_sub_and_test_checked+0x1d0/0x200 lib/refcount.c:180 > Code: 1d 7e b3 64 06 31 ff 89 de e8 9c a3 35 fe 84 db 75 94 e8 53 a2 35 fe > 48 c7 c7 80 02 c6 87 c6 05 5e b3 64 06 01 e8 18 15 07 fe <0f> 0b e9 75 ff > ff ff e8 34 a2 35 fe e9 6e ff ff ff 48 89 df e8 b7 > RSP: 0018:ffff8880a990fbb0 EFLAGS: 00010286 > RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 > RDX: 0000000000000100 RSI: ffffffff815c3ba6 RDI: ffffed1015321f68 > RBP: ffff8880a990fc48 R08: ffff8880a9900440 R09: ffffed1015d24101 > R10: ffffed1015d24100 R11: ffff8880ae920807 R12: 00000000ffffffff > R13: 0000000000000001 R14: ffff8880a990fc20 R15: 0000000000000000 > refcount_dec_and_test_checked+0x1b/0x20 lib/refcount.c:220 > blk_mq_free_request+0x3b8/0x580 block/blk-mq.c:524 > __blk_mq_end_request block/blk-mq.c:550 [inline] > blk_mq_end_request+0x456/0x560 block/blk-mq.c:559 > nbd_complete_rq+0x42/0x50 drivers/block/nbd.c:322 > blk_done_softirq+0x2fe/0x4d0 block/blk-softirq.c:37 > __do_softirq+0x262/0x98c kernel/softirq.c:292 > run_ksoftirqd kernel/softirq.c:603 [inline] > run_ksoftirqd+0x8e/0x110 kernel/softirq.c:595 > smpboot_thread_fn+0x6a3/0xa40 kernel/smpboot.c:165 > kthread+0x361/0x430 kernel/kthread.c:255 > ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:352 > Kernel Offset: disabled > Rebooting in 86400 seconds.. It looks like ndb's timeout handler may complete the same request twice: first via ndb_config_put()->ndb_clear_sock(), then again explicitly through a direct call to blk_mq_complete_request().