Received: by 2002:a25:e74b:0:0:0:0:0 with SMTP id e72csp1784361ybh; Tue, 14 Jul 2020 07:18:22 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzfhIazWw/NJXD7wtLiUYyJ9m/vfXs23h7ojGmAugroTLjyPeZmfYvLEPbxaFz2u68RhX8q X-Received: by 2002:a17:907:4240:: with SMTP id oi24mr4611085ejb.23.1594736301721; Tue, 14 Jul 2020 07:18:21 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1594736301; cv=none; d=google.com; s=arc-20160816; b=s4s5qM/rRY7XeveGlbGM/6UlqEuhL2oxvF1HCCJbOewDyOImCKh7QveeUe+nlgCSou HXoHJBeFsWBt5ysjiDRJZN6qxsvi9KNcPxfUSx4yn800izqFiyTgiZxle6isJ6xucxrP hoLEIbI5PVHtmqFXf0Dw9rxmFyIDITrLQ/o8TegeGhmdvHLzvzzn/yeFYlbfkpqfoOe2 QpB5j+CmeK6ZABgTsUT4ZW4RcFloFZUOW/wSzImllKoUHyb0zye7fMNypX32Ry8xKnlm vTc4jkfuo0Ay90mQaUy8mHeu0bwdlriqq/vIiQM3cKVUmh94CvJQyfjhvabj74fLXHjj TFDw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:dkim-signature; bh=DAio3TnNTOjPe9yDwDItXd0o7RC8Gehby5x/FyQbpyQ=; b=RRuCWnNPjHw/KHRVjywIwizzYGhvPa3XzqNOX18VXtSLC1adIpuKrzrcaYLnUotI2y HWVGupASGjxdd6sIs2NvsjaUaCC3Chn+49dJ6e64dfRovmJI6Gjjhg1R2nqv+V8eRtmg c463/oTDEShCy7P89R3UDlXGghKtIOEt2m4h5u6anFFIFiDXJuypMlWK8ac1LbrBjDvD CKIJCfFAnsqA95Gdbczx9bBejQbiJ2HJi8rlRDM9qBPJCGXA9U/pguiPXfbz1XqRgbe8 f8HcWPhCoOsNczZ619Sr9yZQMi+2Lw0iXU+1AYqWi3gTX4oOQCAhVgti7IQkERm8Q83k sPAA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=rOAffERf; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id c5si11704827edy.429.2020.07.14.07.17.58; Tue, 14 Jul 2020 07:18:21 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=rOAffERf; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726974AbgGNOPu (ORCPT + 99 others); Tue, 14 Jul 2020 10:15:50 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:51898 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725803AbgGNOPt (ORCPT ); Tue, 14 Jul 2020 10:15:49 -0400 Received: from mail-pf1-x441.google.com (mail-pf1-x441.google.com [IPv6:2607:f8b0:4864:20::441]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 85D6AC061755; Tue, 14 Jul 2020 07:15:49 -0700 (PDT) Received: by mail-pf1-x441.google.com with SMTP id a24so2024611pfc.10; Tue, 14 Jul 2020 07:15:49 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=subject:to:cc:references:from:message-id:date:user-agent :mime-version:in-reply-to:content-language:content-transfer-encoding; bh=DAio3TnNTOjPe9yDwDItXd0o7RC8Gehby5x/FyQbpyQ=; b=rOAffERfaz2UrV/aTpHlw3LE+qz20urqxX+6me5hpwJ2HDvmNztB9cRc0EXprWkEdM Jlj3whEQl2yiERo84RsgSSoBDw8op80X+CguyWpDzcdtdPIoJNgCQjYSkBQf+pi/RwIG 8BfylvHePmpveogaOzrmzbJLa5JX1tKimMPPJHh5X9manHtwJ4pFy7Gr8P0Zv4CMKjJo o49vk16JtSQP8TshZDf7MIOorbkkALU6B6J54U8BPnXpLHclWDfDB3WWQk+W6w4JJuQM /oedkiRJAu+TBuyAIFvy+4DmQcSp0C5gGWc2sGILREgdr3J7Gs53S6OkLm0ifNPALVlL kcJQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:cc:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=DAio3TnNTOjPe9yDwDItXd0o7RC8Gehby5x/FyQbpyQ=; b=djmKuisxoltQoD/a/qWrXWGvjNjQ2vjSQO5ny18gi8VQzXzI/T//ddfFFZmVcgF3GW 4oVuxd/D48LmXAC23Zp61xY+LCsV5LjycbATky23wHtpL8jet1dt6/OxSGA1hxu4lNpK 0/jsPTDDVAVmAnUl6DZWrikvxmLyV1fw+ejj4nVUq6cPSCHhu+LzALci7CXyLbT1s0co HwMsIymQ19WxG5SPl10TyUQIkEFbWUuhMKZP/KRrsluV/K865w3TvAHj8DKOsp/SrxKX jiKY1HGImlXepOqoVK596JRhffjcH2Jt8ICwoqTN51b0Beb15m8dj4ozzSaBkc9T6CuJ c9jg== X-Gm-Message-State: AOAM531xur5WeyDUGGAuEBOfiU+q6qd4HN8YMWiifS3s4US+HLAniRI+ lEu2AxW4+dBuY7Hx6cpcilLnniyQ X-Received: by 2002:a05:6a00:2bb:: with SMTP id q27mr4723037pfs.176.1594736148707; Tue, 14 Jul 2020 07:15:48 -0700 (PDT) Received: from [10.1.10.11] (c-73-241-150-58.hsd1.ca.comcast.net. [73.241.150.58]) by smtp.gmail.com with ESMTPSA id p5sm16337570pgi.83.2020.07.14.07.15.47 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Tue, 14 Jul 2020 07:15:47 -0700 (PDT) Subject: Re: [PATCH v2] tipc: Don't using smp_processor_id() in preemptible code To: qiang.zhang@windriver.com, jmaloy@redhat.com, davem@davemloft.net, kuba@kernel.org, tuong.t.lien@dektech.com.au, eric.dumazet@gmail.com, ying.xue@windriver.com Cc: netdev@vger.kernel.org, tipc-discussion@lists.sourceforge.net, linux-kernel@vger.kernel.org References: <20200714080559.9617-1-qiang.zhang@windriver.com> From: Eric Dumazet Message-ID: Date: Tue, 14 Jul 2020 07:15:46 -0700 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.9.0 MIME-Version: 1.0 In-Reply-To: <20200714080559.9617-1-qiang.zhang@windriver.com> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 7/14/20 1:05 AM, qiang.zhang@windriver.com wrote: > From: Zhang Qiang > > CPU: 0 PID: 6801 Comm: syz-executor201 Not tainted 5.8.0-rc4-syzkaller #0 > Hardware name: Google Google Compute Engine/Google Compute Engine, > BIOS Google 01/01/2011 > > Fixes: fc1b6d6de2208 ("tipc: introduce TIPC encryption & authentication") > Reported-by: syzbot+263f8c0d007dc09b2dda@syzkaller.appspotmail.com > Signed-off-by: Zhang Qiang > --- > v1->v2: > add fixes tags. > > net/tipc/crypto.c | 3 ++- > 1 file changed, 2 insertions(+), 1 deletion(-) > > diff --git a/net/tipc/crypto.c b/net/tipc/crypto.c > index 8c47ded2edb6..520af0afe1b3 100644 > --- a/net/tipc/crypto.c > +++ b/net/tipc/crypto.c > @@ -399,9 +399,10 @@ static void tipc_aead_users_set(struct tipc_aead __rcu *aead, int val) > */ > static struct crypto_aead *tipc_aead_tfm_next(struct tipc_aead *aead) > { > - struct tipc_tfm **tfm_entry = this_cpu_ptr(aead->tfm_entry); > + struct tipc_tfm **tfm_entry = get_cpu_ptr(aead->tfm_entry); > > *tfm_entry = list_next_entry(*tfm_entry, list); > + put_cpu_ptr(tfm_entry); > return (*tfm_entry)->tfm; > } > > You have not explained why this was safe. This seems to hide a real bug. Presumably callers of this function should have disable preemption, and maybe interrupts as well. Right after put_cpu_ptr(tfm_entry), this thread could migrate to another cpu, and still access data owned by the old cpu.