Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp4631672pxj; Tue, 25 May 2021 12:27:01 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxZvLM7sUVChwUCLrdlXTmqq69O0bmB4C+cIOZkU0AtQQRBTVfxoIy8ugvXlC0nMWpM9Pkf X-Received: by 2002:a17:907:204b:: with SMTP id pg11mr31454378ejb.433.1621970820930; Tue, 25 May 2021 12:27:00 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1621970820; cv=none; d=google.com; s=arc-20160816; b=WPmcn2q1RwVQlcsPHimgFKXqIyj0dxTGigotquFH07Kgaks+27AStaZiTazn0iikMF F6sJ46XG2ar4A/2dLKRP35uqGvIgNQE/ZUALRjaEJYj/kZRIC+t1XsevFAFpOwqL2qG0 bgRknBPYHGezeQ4/9oQ1pwKKvDjeWtIC/VnlauCimgune3xrVBiKkec0S6a484HeDIf4 u9UfZbIjQhzslysV1lloUNf84c6wx2wK6VsQ1Did16UknD2SdUXkRM0O5YdiQPuRW8p4 ja5aujKc6s87o8WUlSJLG3nK+21XS14inrfaZQ/B4XU0NjjOT8f43gF5f6es3c00gGbk eW0A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-transfer-encoding :content-disposition:mime-version:references:reply-to:message-id :subject:cc:to:from:date:dkim-signature; bh=z1lKZnShg+idGRGFFyjWGVCsaFtxOe12tNBYK0M+hds=; b=qXGiXUdIla78f65dZxYtYWkT3q8MUQ8O12EoYlt/zLeIA0wp89s9QaqqoBFfxx+WHE q9EJ/bpfkpKnjuhk2Remu5y5qu+d6SwhFtL1T4XYtDFfMl1izXyfwBnLgrQUen4hUBFT uZTM4fNzn/RNn1McKtkSSJNqx6fsn0owcdmjF6crh9uS1MQSfHTcHDPLLydyc2LlsdGq NcpB4E4pBRCCtirdoHZEf7WIu1BsoG/wwHjTJUOGexDw2/8nzZb9tHsq3ZlOtW+33mF1 TgKprPtxyc0+x77bfwsmh8x5jtJRi9KF0JaVtb3Of72UOstcwG5o8VyUaDHWyqmGm3Lb LWfA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=IGkkkQnl; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id bt8si16544938ejb.153.2021.05.25.12.26.38; Tue, 25 May 2021 12:27:00 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=IGkkkQnl; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234121AbhEYOjA (ORCPT + 99 others); Tue, 25 May 2021 10:39:00 -0400 Received: from mail.kernel.org ([198.145.29.99]:45518 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234105AbhEYOiK (ORCPT ); Tue, 25 May 2021 10:38:10 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 85EFF61401; Tue, 25 May 2021 14:36:32 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1621953392; bh=cEe5ScQzy5z7+XHVG5DLL2Ps9gSI7vLv6dB1pBoh0XA=; h=Date:From:To:Cc:Subject:Reply-To:References:In-Reply-To:From; b=IGkkkQnlspJu2gHZCn2FBM6qdy9GGfhuguSVRFfHUhavCSMkP0avrR9NiCPVbwwIY 1Wk86sVZg1usShc1pXiZ/9+HiX2qa78xxDx/psxctCef6l2mczXpzAv5A2uXdWfFxG xrYtQklBN747VMis2oxmD0iiy+sTUZGqr9479qgkH42naRStiMtDDLp988f3nfqns9 Ge0YRD3g9+eUr4esS2mLhxX6A5kIWdvxoWMbVh4M4FJA3UTtgebUV5u5jbrmgUigLS p8/P0fj39+kuf3bY4bJ2/qyu9k18M+h1N1cwhAuL4ZZLnz7nD4AkUJ85XA1Yyih+ml ntj6OduzZPFMA== Received: by paulmck-ThinkPad-P17-Gen-1.home (Postfix, from userid 1000) id 54A245C02A7; Tue, 25 May 2021 07:36:32 -0700 (PDT) Date: Tue, 25 May 2021 07:36:32 -0700 From: "Paul E. McKenney" To: Dmitry Vyukov Cc: "Xu, Yanfei" , syzbot , rcu@vger.kernel.org, Andrew Morton , Andrii Nakryiko , Alexei Starovoitov , Jens Axboe , bpf , Christian Brauner , Daniel Borkmann , John Fastabend , Martin KaFai Lau , KP Singh , LKML , netdev , Shakeel Butt , Song Liu , syzkaller-bugs , Yonghong Song Subject: Re: [syzbot] KASAN: use-after-free Read in check_all_holdout_tasks_trace Message-ID: <20210525143632.GP4441@paulmck-ThinkPad-P17-Gen-1> Reply-To: paulmck@kernel.org References: <000000000000f034fc05c2da6617@google.com> <20210524041350.GJ4441@paulmck-ThinkPad-P17-Gen-1> <20210524224602.GA1963972@paulmck-ThinkPad-P17-Gen-1> <24f352fc-c01e-daa8-5138-1f89f75c7c16@windriver.com> <20210525033355.GN4441@paulmck-ThinkPad-P17-Gen-1> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, May 25, 2021 at 10:33:27AM +0200, Dmitry Vyukov wrote: > On Tue, May 25, 2021 at 5:33 AM Paul E. McKenney wrote: > > > > On Tue, May 25, 2021 at 10:31:55AM +0800, Xu, Yanfei wrote: > > > > > > > > > On 5/25/21 6:46 AM, Paul E. McKenney wrote: > > > > [Please note: This e-mail is from an EXTERNAL e-mail address] > > > > > > > > On Sun, May 23, 2021 at 09:13:50PM -0700, Paul E. McKenney wrote: > > > > > On Sun, May 23, 2021 at 08:51:56AM +0200, Dmitry Vyukov wrote: > > > > > > On Fri, May 21, 2021 at 7:29 PM syzbot > > > > > > wrote: > > > > > > > > > > > > > > Hello, > > > > > > > > > > > > > > syzbot found the following issue on: > > > > > > > > > > > > > > HEAD commit: f18ba26d libbpf: Add selftests for TC-BPF management API > > > > > > > git tree: bpf-next > > > > > > > console output: https://syzkaller.appspot.com/x/log.txt?x=17f50d1ed00000 > > > > > > > kernel config: https://syzkaller.appspot.com/x/.config?x=8ff54addde0afb5d > > > > > > > dashboard link: https://syzkaller.appspot.com/bug?extid=7b2b13f4943374609532 > > > > > > > > > > > > > > Unfortunately, I don't have any reproducer for this issue yet. > > > > > > > > > > > > > > IMPORTANT: if you fix the issue, please add the following tag to the commit: > > > > > > > Reported-by: syzbot+7b2b13f4943374609532@syzkaller.appspotmail.com > > > > > > > > > > > > This looks rcu-related. +rcu mailing list > > > > > > > > > > I think I see a possible cause for this, and will say more after some > > > > > testing and after becoming more awake Monday morning, Pacific time. > > > > > > > > No joy. From what I can see, within RCU Tasks Trace, the calls to > > > > get_task_struct() are properly protected (either by RCU or by an earlier > > > > get_task_struct()), and the calls to put_task_struct() are balanced by > > > > those to get_task_struct(). > > > > > > > > I could of course have missed something, but at this point I am suspecting > > > > an unbalanced put_task_struct() has been added elsewhere. > > > > > > > > As always, extra eyes on this code would be a good thing. > > > > > > > > If it were reproducible, I would of course suggest bisection. :-/ > > > > > > > > Thanx, Paul > > > > > > > Hi Paul, > > > > > > Could it be? > > > > > > CPU1 CPU2 > > > trc_add_holdout(t, bhp) > > > //t->usage==2 > > > release_task > > > put_task_struct_rcu_user > > > delayed_put_task_struct > > > ...... > > > put_task_struct(t) > > > //t->usage==1 > > > > > > check_all_holdout_tasks_trace > > > ->trc_wait_for_one_reader > > > ->trc_del_holdout > > > ->put_task_struct(t) > > > //t->usage==0 and task_struct freed > > > READ_ONCE(t->trc_reader_checked) > > > //ops, t had been freed. > > > > > > So, after excuting trc_wait_for_one_reader(), task might had been removed > > > from holdout list and the corresponding task_struct was freed. > > > And we shouldn't do READ_ONCE(t->trc_reader_checked). > > > > I was suspicious of that call to trc_del_holdout() from within > > trc_wait_for_one_reader(), but the only time it executes is in the > > context of the current running task, which means that CPU 2 had better > > not be invoking release_task() on it just yet. > > > > Or am I missing your point? > > > > Of course, if you can reproduce it, the following patch might be > > an interesting thing to try, my doubts notwithstanding. But more > > important, please check the patch to make sure that we are both > > talking about the same call to trc_del_holdout()! > > > > If we are talking about the same call to trc_del_holdout(), are you > > actually seeing that code execute except when rcu_tasks_trace_pertask() > > calls trc_wait_for_one_reader()? > > > > > I investigate the trc_wait_for_one_reader() and found before we excute > > > trc_del_holdout, there is always set t->trc_reader_checked=true. How about > > > we just set the checked flag and unified excute trc_del_holdout() > > > in check_all_holdout_tasks_trace with checking the flag? > > > > The problem is that we cannot execute trc_del_holdout() except in > > the context of the RCU Tasks Trace grace-period kthread. So it is > > necessary to manipulate ->trc_reader_checked separately from the list > > in order to safely synchronize with IPIs and with the exit code path > > for any reader tasks, see for example trc_read_check_handler() and > > exit_tasks_rcu_finish_trace(). > > > > Or are you thinking of some other approach? > > This could be caused by a buggy extra put_pid somewhere else, right? > If so, I suspect that's what may be happening. We've 2 very similar > use-after-free reports on an internal kernel, but it also has a number > of other use-after-free reports in pid-related functions > (pid_task/pid_nr_ns/attach_pid). One of them is happening relatively > frequently (150 crashes) and is caused by something in the tty > subsystem. Presumably it may be causing one off use-after-free's in > other random places of the kernel as well. Unfortunately these crashes > don't happen on the upstream kernel (at least not yet). > So if you don't see any obvious smoking gun in rcu, I think we can > assume for now that it's due to tty. Good to hear! On the other hand, it looks like Yanfei might have found a real problem, whether or not it was actually being triggered. Tough to prove either way, of course! Thanx, Paul > > ------------------------------------------------------------------------ > > > > diff --git a/kernel/rcu/tasks.h b/kernel/rcu/tasks.h > > index efb8127f3a36..2a0d4bdd619a 100644 > > --- a/kernel/rcu/tasks.h > > +++ b/kernel/rcu/tasks.h > > @@ -987,7 +987,6 @@ static void trc_wait_for_one_reader(struct task_struct *t, > > // The current task had better be in a quiescent state. > > if (t == current) { > > t->trc_reader_checked = true; > > - trc_del_holdout(t); > > WARN_ON_ONCE(READ_ONCE(t->trc_reader_nesting)); > > return; > > } > > > > -- > > You received this message because you are subscribed to the Google Groups "syzkaller-bugs" group. > > To unsubscribe from this group and stop receiving emails from it, send an email to syzkaller-bugs+unsubscribe@googlegroups.com. > > To view this discussion on the web visit https://groups.google.com/d/msgid/syzkaller-bugs/20210525033355.GN4441%40paulmck-ThinkPad-P17-Gen-1.