Received: by 2002:a25:d7c1:0:0:0:0:0 with SMTP id o184csp4785003ybg; Tue, 29 Oct 2019 12:20:37 -0700 (PDT) X-Google-Smtp-Source: APXvYqwMRWy2dxCrNNbjixMwEquvHUJripwcfXOCSg3uD3968ekGZr9COyf6Oiyf03Yk6CMflCuh X-Received: by 2002:a05:6402:60c:: with SMTP id n12mr17253808edv.242.1572376837098; Tue, 29 Oct 2019 12:20:37 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1572376837; cv=none; d=google.com; s=arc-20160816; b=xti67d6IWvY5oZ4/fVWNIeXoq9wE2Ho+e8b6efGu+0lEynvXNDzYROcKxBwFWcGuc3 +R44iyYKwJAeFq8RTyD0F1rJrV6bztsmQwEU5Y/HFPj9FVgzCQW5UL+1ydXaLzEjpE9O 5nGO2VKsiL+dAjp6C3ojSuVC3zjvZ1JlL1gvIP605fKzOC4Nhsov93IMbYbgohAzJmhz 2PVFEaew7MxUvdJBUP7vxC+coujk0dmeRFhl3SooneseK53xE/dpHx/MQK2cBiUdviCi 3kDNJZbXonYYIz9R+DWA7+ZNI+YEBuA6IDxFu3TmVaiE04HNAgnUIz2FdxkYx0HJBj+4 Zryw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=Kd8KdBaTWWYCGSiSX2Hi1YoJKfTLqZTdgxbJDT6peN8=; b=YU4+QHk7nSp8+cTum+EKv0lywKyefkqPTLW2QUqwhjUeI61y7BuAe47wtMptLWe4kU 8HL4nr5UkKr/V7p9xfkfLAt57uOQRCojtqNtARBO05GCl5+vonhKhmkJEYS1SPa0A2nD FW3Ly1o9BvamheKXsmQYK1r5qihHG6cP2NAB0e+hy5c1FQT6l/QE4sn2zbSG/bTqBUc+ OMtO+7azoX503Mpzn0NCC1+XQxgcnyrRaDFgSn5HvujuT8212M4NgxYlVqRe3M48nBo+ 9qYoYRNzeweDNcmJZWGoEAomH97Dw5HzD55oz8Ky61v6/kEGVjaTLMsf4SnxA2+fAjAe 7A7g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=pE6dlCmk; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id i39si9789983eda.88.2019.10.29.12.19.46; Tue, 29 Oct 2019 12:20:37 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=pE6dlCmk; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1733217AbfJ2LuJ (ORCPT + 99 others); Tue, 29 Oct 2019 07:50:09 -0400 Received: from mail-wm1-f65.google.com ([209.85.128.65]:55382 "EHLO mail-wm1-f65.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727799AbfJ2LuJ (ORCPT ); Tue, 29 Oct 2019 07:50:09 -0400 Received: by mail-wm1-f65.google.com with SMTP id g24so2219684wmh.5 for ; Tue, 29 Oct 2019 04:50:06 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to:user-agent; bh=Kd8KdBaTWWYCGSiSX2Hi1YoJKfTLqZTdgxbJDT6peN8=; b=pE6dlCmkPr6YeNj8F0dlfkhzBt/HHIIhk3RN50cwbOPLGkWPqHt/1iODkRlGyHLyFq dK9Q6Ar+3plcJj7JvIq7dvsb3DSLrw5T2HkFAHQhsmFUPm5o57kp69d4EyMGyH2Le2Xw Jdx/CK56+iBVpo0aCK38aMZXSv2kgZHjfqw7eHcroAqkJ9G8mkC6fDHNFlRSEsgEELzZ Bez8pVOdYrspy/rtQ+OtUP2wXowd5LMZluXxH6OcHVE4Wa4NqM7Px4E1GZvfuRZ256bu sdVTZ1C+hweBiMR/1t5X9TgWfC4UoiM6sf/5L8krxnzl6VsosKkGLXZ2rZn+Mvn5HNAb aCCA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to:user-agent; bh=Kd8KdBaTWWYCGSiSX2Hi1YoJKfTLqZTdgxbJDT6peN8=; b=lTDqeyRwJ6Y2MHBGPXbtkxLVWTUtqaszTklKwEyh3bYM9DlzE4RnPRo10q0wdNxqZv Wn+Ajjsyo1MWPS2r9Yj+o/2RhS4MQA3GS/C+bSbl6X4D4WVShYB6nfZ+XfkwojhBYfr1 SsSKkRpnEdsoZv+4u8dyKxnrVRPQEU0LsdX9ZP1GoZg+hsomNosTCzocAokol1/0C+zh P9EQYCqk96m9sIYlg3uru8/0vwkd29yJup8PqKT3Scq829Bxkt7RxO4ij1DrwJLyTcZi soK4HGML2YX+X/Sw6DLyBmXa/dyVtEoF3qCr/71Yj96RdCsau+AuHfqZji5cIvg6IKI9 tUVQ== X-Gm-Message-State: APjAAAX8IWuGkFNFDPxjYzZDjZFPG4CRTtWr1MRPuqsVUISDIsTupcTJ pvesncUrgjMK3N32hqJMnjywdQ== X-Received: by 2002:a7b:c954:: with SMTP id i20mr3818938wml.60.1572349805183; Tue, 29 Oct 2019 04:50:05 -0700 (PDT) Received: from google.com ([2a00:79e0:d:110:d6cc:2030:37c1:9964]) by smtp.gmail.com with ESMTPSA id d16sm3260781wmb.27.2019.10.29.04.50.04 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 29 Oct 2019 04:50:04 -0700 (PDT) Date: Tue, 29 Oct 2019 11:50:00 +0000 From: Quentin Perret To: Peter Zijlstra Cc: linux-kernel@vger.kernel.org, aaron.lwe@gmail.com, valentin.schneider@arm.com, mingo@kernel.org, pauld@redhat.com, jdesfossez@digitalocean.com, naravamudan@digitalocean.com, vincent.guittot@linaro.org, dietmar.eggemann@arm.com, juri.lelli@redhat.com, rostedt@goodmis.org, bsegall@google.com, mgorman@suse.de, kernel-team@android.com, john.stultz@linaro.org Subject: Re: NULL pointer dereference in pick_next_task_fair Message-ID: <20191029115000.GA11194@google.com> References: <20191028174603.GA246917@google.com> <20191029113411.GP4643@worktop.programming.kicks-ass.net> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20191029113411.GP4643@worktop.programming.kicks-ass.net> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tuesday 29 Oct 2019 at 12:34:11 (+0100), Peter Zijlstra wrote: > On Mon, Oct 28, 2019 at 05:46:03PM +0000, Quentin Perret wrote: > > The issue is very transient and relatively hard to reproduce. > > > > After digging a bit, the offending commit seems to be: > > > > 67692435c411 ("sched: Rework pick_next_task() slow-path") > > > > By 'offending' I mean that reverting it makes the issue go away. The > > issue comes from the fact that pick_next_entity() returns a NULL se in > > the 'simple' path of pick_next_task_fair(), which causes obvious > > problems in the subsequent call to set_next_entity(). > > > > I'll dig more, but if anybody understands the issue in the meatime feel > > free to send me a patch to try out :) > > Can you please see if this makes any difference? > > --- > kernel/sched/core.c | 6 ++++-- > kernel/sched/fair.c | 2 +- > kernel/sched/idle.c | 3 +-- > 3 files changed, 6 insertions(+), 5 deletions(-) > > diff --git a/kernel/sched/core.c b/kernel/sched/core.c > index 7880f4f64d0e..abd2d4f80381 100644 > --- a/kernel/sched/core.c > +++ b/kernel/sched/core.c > @@ -3922,8 +3922,10 @@ pick_next_task(struct rq *rq, struct task_struct *prev, struct rq_flags *rf) > goto restart; > > /* Assumes fair_sched_class->next == idle_sched_class */ > - if (unlikely(!p)) > - p = idle_sched_class.pick_next_task(rq, prev, rf); > + if (unlikely(!p)) { > + prev->sched_class->put_prev_task(rq, prev, rf); > + p = idle_sched_class.pick_next_task(rq, NULL, NULL); > + } > > return p; > } > diff --git a/kernel/sched/fair.c b/kernel/sched/fair.c > index 83ab35e2374f..2aad94bb7165 100644 > --- a/kernel/sched/fair.c > +++ b/kernel/sched/fair.c > @@ -6820,7 +6820,7 @@ pick_next_task_fair(struct rq *rq, struct task_struct *prev, struct rq_flags *rf > simple: > #endif > if (prev) > - put_prev_task(rq, prev); > + prev->sched_class->put_prev_task(rq, prev, rf); > > do { > se = pick_next_entity(cfs_rq, NULL); > diff --git a/kernel/sched/idle.c b/kernel/sched/idle.c > index 8dad5aa600ea..e8dfc84f375a 100644 > --- a/kernel/sched/idle.c > +++ b/kernel/sched/idle.c > @@ -390,8 +390,7 @@ pick_next_task_idle(struct rq *rq, struct task_struct *prev, struct rq_flags *rf > { > struct task_struct *next = rq->idle; > > - if (prev) > - put_prev_task(rq, prev); > + WARN_ON_ONCE(prev || rf); > > set_next_task_idle(rq, next); > > Unfortunately the issue went into hiding this morning and I struggle to reproduce it (this is turning bordeline nightmare now TBH). I'll try the patch once my reproducer is fixed :/ Thank you very much for the help, Quentin