Received: by 2002:a5b:505:0:0:0:0:0 with SMTP id o5csp5044290ybp; Mon, 7 Oct 2019 18:50:36 -0700 (PDT) X-Google-Smtp-Source: APXvYqzx/8CAEcBQjSXw9U1zGTMPeIXMCMcHT0pWzKhOI6fClUATRLO7qY8g2bIOWZd4D9+aijuW X-Received: by 2002:a50:f616:: with SMTP id c22mr31157174edn.235.1570499436025; Mon, 07 Oct 2019 18:50:36 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1570499436; cv=none; d=google.com; s=arc-20160816; b=s5Ks4pyJ5jHgZETTDRF0fWLXbSMM/CZY1c2kU4n3CrV5zHZEoTqVUKg59sIp3uIatk 2C5t3d0JuDaLYPcIUZYfsG1n9/g0R8jE5tNxvpXoVUUboHAAtG1eSzMn4fs4+6kRbP0w jZgq2VcQCq3/3c2vwpm19FO+tWsMIXDaOQCe5uFOXFO2Pg2bfRyxWW7ra7rOtMlPB4iK 9fakuIBwuRImSNNectTP0JcMtFiLDlzCubf5C94HzRbmkPStviZhiqwCduEuu0izjfNt gKX7EgBwqFU6CLzO+w0LXjq/YxV7skf9vUL2F/OpHMFHR3CArFwV9EqBXNXqW4dMxp9M sqxg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:reply-to:message-id :subject:cc:to:from:date:dkim-signature; bh=VdW9iVM1CoyPioCKaFn8jteyOpE24pi00vh8b1WLuKk=; b=1E6cGVXdLV6W8hevhXzB7wwToiCrWlK+UiYMV0aJtiauIXByyGD3bE5RuQG81ec0+A FP0c7/X08nLLxbSTp9uba4GcRg5N5ltzO0R2F3Y+u///Y2xeI+UXU4o+J1hzWnq9h6ZG IWnBHr3HqoGTxiR8nFPQuX2JMr9mKe9nR9HWO5RKUvBsncsCRBui9gAQLECRptvRADpg m+GrI8J1xotJlZcdWqwHQDiVtTRrhLPIZJKc0URmz7iizLWLGRb0yWK0xbxFZdiiygfW jq5L+mlgHaf8fAe8nmRzkZAv1AfsV0ux2M9K9kkXScHvt9WiJF2L/QAsIo2V85sHtE4f /JJw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=hYt86vBA; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id n19si7860383ejk.264.2019.10.07.18.50.11; Mon, 07 Oct 2019 18:50:36 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=hYt86vBA; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729693AbfJHBrr (ORCPT + 99 others); Mon, 7 Oct 2019 21:47:47 -0400 Received: from mail.kernel.org ([198.145.29.99]:53336 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726917AbfJHBrr (ORCPT ); Mon, 7 Oct 2019 21:47:47 -0400 Received: from paulmck-ThinkPad-P72 (unknown [12.12.162.101]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 9460C20835; Tue, 8 Oct 2019 01:47:45 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1570499266; bh=y6LapkP6z+QfC5hn9MqLrOtIxecK9qmQFoKnEgikv20=; h=Date:From:To:Cc:Subject:Reply-To:References:In-Reply-To:From; b=hYt86vBA/erPMb3+zfEvzLkJ7hxiY943+jF81tal2eYovVDvTkiQXVo7iKTc/p6c4 FNrh7jmsaw+Pf8+c4cRe0PmYbN9ARWYxds7DXSP+t2V8fu1+qfnmwSZnihKlGIKRML 2tygwoeq8WPTV7Zk2pIRCSBsJ4vmVNCapPj6Sr+Q= Date: Mon, 7 Oct 2019 18:47:43 -0700 From: "Paul E. McKenney" To: Marco Elver Cc: syzbot , josh@joshtriplett.org, rostedt@goodmis.org, mathieu.desnoyers@efficios.com, jiangshanlai@gmail.com, Joel Fernandes , rcu@vger.kernel.org, a@unstable.cc, b.a.t.m.a.n@lists.open-mesh.org, davem@davemloft.net, LKML , mareklindner@neomailbox.ch, netdev@vger.kernel.org, sw@simonwunderlich.de, syzkaller-bugs@googlegroups.com Subject: Re: KCSAN: data-race in find_next_bit / rcu_report_exp_cpu_mult Message-ID: <20191008014743.GA2689@paulmck-ThinkPad-P72> Reply-To: paulmck@kernel.org References: <000000000000604e8905944f211f@google.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.9.4 (2018-02-28) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Oct 07, 2019 at 12:04:16PM +0200, Marco Elver wrote: > +RCU maintainers > This might be a data-race in RCU itself. > > On Mon, 7 Oct 2019 at 12:01, syzbot > wrote: > > > > Hello, > > > > syzbot found the following crash on: > > > > HEAD commit: b4bd9343 x86, kcsan: Enable KCSAN for x86 > > git tree: https://github.com/google/ktsan.git kcsan > > console output: https://syzkaller.appspot.com/x/log.txt?x=11edb20d600000 > > kernel config: https://syzkaller.appspot.com/x/.config?x=c0906aa620713d80 > > dashboard link: https://syzkaller.appspot.com/bug?extid=134336b86f728d6e55a0 > > compiler: gcc (GCC) 9.0.0 20181231 (experimental) > > > > Unfortunately, I don't have any reproducer for this crash yet. > > > > IMPORTANT: if you fix the bug, please add the following tag to the commit: > > Reported-by: syzbot+134336b86f728d6e55a0@syzkaller.appspotmail.com > > > > ================================================================== > > BUG: KCSAN: data-race in find_next_bit / rcu_report_exp_cpu_mult > > > > write to 0xffffffff85a7f140 of 8 bytes by task 7 on cpu 0: > > rcu_report_exp_cpu_mult+0x4f/0xa0 kernel/rcu/tree_exp.h:244 > > rcu_report_exp_rdp+0x6c/0x90 kernel/rcu/tree_exp.h:254 > > rcu_preempt_deferred_qs_irqrestore+0x3bb/0x580 kernel/rcu/tree_plugin.h:475 > > rcu_read_unlock_special+0xec/0x370 kernel/rcu/tree_plugin.h:659 > > __rcu_read_unlock+0xcf/0xe0 kernel/rcu/tree_plugin.h:394 > > rcu_read_unlock include/linux/rcupdate.h:645 [inline] > > batadv_nc_purge_orig_hash net/batman-adv/network-coding.c:411 [inline] > > batadv_nc_worker+0x13a/0x390 net/batman-adv/network-coding.c:718 > > process_one_work+0x3d4/0x890 kernel/workqueue.c:2269 > > worker_thread+0xa0/0x800 kernel/workqueue.c:2415 > > kthread+0x1d4/0x200 drivers/block/aoe/aoecmd.c:1253 > > ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:352 > > > > read to 0xffffffff85a7f140 of 8 bytes by task 7251 on cpu 1: > > _find_next_bit lib/find_bit.c:39 [inline] > > find_next_bit+0x57/0xe0 lib/find_bit.c:70 > > sync_rcu_exp_select_node_cpus+0x28e/0x510 kernel/rcu/tree_exp.h:375 > > sync_rcu_exp_select_cpus+0x30c/0x590 kernel/rcu/tree_exp.h:439 > > rcu_exp_sel_wait_wake kernel/rcu/tree_exp.h:575 [inline] > > wait_rcu_exp_gp+0x25/0x40 kernel/rcu/tree_exp.h:589 > > process_one_work+0x3d4/0x890 kernel/workqueue.c:2269 > > worker_thread+0xa0/0x800 kernel/workqueue.c:2415 > > kthread+0x1d4/0x200 drivers/block/aoe/aoecmd.c:1253 > > ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:352 > > > > Reported by Kernel Concurrency Sanitizer on: > > CPU: 1 PID: 7251 Comm: kworker/1:4 Not tainted 5.3.0+ #0 > > Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS > > Google 01/01/2011 > > Workqueue: rcu_gp wait_rcu_exp_gp > > ================================================================== > > > > > > --- > > This bug is generated by a bot. It may contain errors. > > See https://goo.gl/tpsmEJ for more information about syzbot. > > syzbot engineers can be reached at syzkaller@googlegroups.com. > > > > syzbot will keep track of this bug report. See: > > https://goo.gl/tpsmEJ#status for how to communicate with syzbot. And yes, ->expmask is accessed locklessly in a few places without READ_ONCE(). So does the following (untested) patch help? Thanx, Paul ------------------------------------------------------------------------ diff --git a/kernel/rcu/tree_exp.h b/kernel/rcu/tree_exp.h index d632cd0..bcd2a79 100644 --- a/kernel/rcu/tree_exp.h +++ b/kernel/rcu/tree_exp.h @@ -134,7 +134,7 @@ static void __maybe_unused sync_exp_reset_tree(void) rcu_for_each_node_breadth_first(rnp) { raw_spin_lock_irqsave_rcu_node(rnp, flags); WARN_ON_ONCE(rnp->expmask); - rnp->expmask = rnp->expmaskinit; + WRITE_ONCE(rnp->expmask, rnp->expmaskinit); raw_spin_unlock_irqrestore_rcu_node(rnp, flags); } } @@ -211,7 +211,7 @@ static void __rcu_report_exp_rnp(struct rcu_node *rnp, rnp = rnp->parent; raw_spin_lock_rcu_node(rnp); /* irqs already disabled */ WARN_ON_ONCE(!(rnp->expmask & mask)); - rnp->expmask &= ~mask; + WRITE_ONCE(rnp->expmask, rnp->expmask & ~mask); } } @@ -241,7 +241,7 @@ static void rcu_report_exp_cpu_mult(struct rcu_node *rnp, raw_spin_unlock_irqrestore_rcu_node(rnp, flags); return; } - rnp->expmask &= ~mask; + WRITE_ONCE(rnp->expmask, rnp->expmask & ~mask); __rcu_report_exp_rnp(rnp, wake, flags); /* Releases rnp->lock. */ } @@ -332,6 +332,7 @@ static bool exp_funnel_lock(unsigned long s) static void sync_rcu_exp_select_node_cpus(struct work_struct *wp) { int cpu; + unsigned long expmask_snap; unsigned long flags; unsigned long mask_ofl_test; unsigned long mask_ofl_ipi; @@ -369,10 +370,11 @@ static void sync_rcu_exp_select_node_cpus(struct work_struct *wp) */ if (rcu_preempt_has_tasks(rnp)) rnp->exp_tasks = rnp->blkd_tasks.next; + expmask_snap = rnp->expmask; raw_spin_unlock_irqrestore_rcu_node(rnp, flags); /* IPI the remaining CPUs for expedited quiescent state. */ - for_each_leaf_node_cpu_mask(rnp, cpu, rnp->expmask) { + for_each_leaf_node_cpu_mask(rnp, cpu, expmask_snap) { unsigned long mask = leaf_node_cpu_bit(rnp, cpu); struct rcu_data *rdp = per_cpu_ptr(&rcu_data, cpu); @@ -491,7 +493,7 @@ static void synchronize_sched_expedited_wait(void) struct rcu_data *rdp; mask = leaf_node_cpu_bit(rnp, cpu); - if (!(rnp->expmask & mask)) + if (!(READ_ONCE(rnp->expmask) & mask)) continue; ndetected++; rdp = per_cpu_ptr(&rcu_data, cpu); @@ -503,7 +505,8 @@ static void synchronize_sched_expedited_wait(void) } pr_cont(" } %lu jiffies s: %lu root: %#lx/%c\n", jiffies - jiffies_start, rcu_state.expedited_sequence, - rnp_root->expmask, ".T"[!!rnp_root->exp_tasks]); + READ_ONCE(rnp_root->expmask), + ".T"[!!rnp_root->exp_tasks]); if (ndetected) { pr_err("blocking rcu_node structures:"); rcu_for_each_node_breadth_first(rnp) { @@ -513,7 +516,7 @@ static void synchronize_sched_expedited_wait(void) continue; pr_cont(" l=%u:%d-%d:%#lx/%c", rnp->level, rnp->grplo, rnp->grphi, - rnp->expmask, + READ_ONCE(rnp->expmask), ".T"[!!rnp->exp_tasks]); } pr_cont("\n"); @@ -521,7 +524,7 @@ static void synchronize_sched_expedited_wait(void) rcu_for_each_leaf_node(rnp) { for_each_leaf_node_possible_cpu(rnp, cpu) { mask = leaf_node_cpu_bit(rnp, cpu); - if (!(rnp->expmask & mask)) + if (!(READ_ONCE(rnp->expmask) & mask)) continue; dump_cpu_task(cpu); }