Received: by 2002:a05:6359:c8b:b0:c7:702f:21d4 with SMTP id go11csp4737829rwb; Tue, 20 Sep 2022 19:54:15 -0700 (PDT) X-Google-Smtp-Source: AMsMyM6uwAgcMS3Hg1FyjvBf38aYyTeTFMYebyKMfj1jYetACjY3ygH60xSYf0NglSyJ42KRg1EX X-Received: by 2002:a17:906:fe09:b0:73d:90ae:f801 with SMTP id wy9-20020a170906fe0900b0073d90aef801mr18216991ejb.699.1663728855255; Tue, 20 Sep 2022 19:54:15 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1663728855; cv=none; d=google.com; s=arc-20160816; b=MX6Z4PwLRTzu50dQfCvK+jki4g+Xq0Kvv35CNefkhc7mC40Ux8gchkcfavWdkDmMBF FDVdZHSHpvFhLZSg/oLzMo4MFWAdIkYBsBy0yK74guxR15umxlbj4Mwin2bX7dd7KVaD tIg3PktlmtnKBcBEOkfHC7lXm3kDWTvZYWmJcU0kgU2csA9q9ybY4yBctVAaUEb+14HU JSkD+6dqJp11ocCOwYqkxd0/Eac8lHbnD6xT7uEExmEk2tQYJ0VoXPgDUA7qZtYlr1Ev GeZbxwz7FBgempgSMYy3bYUeD0tu/TvC+bfy22aRAbk+dxPD7EmAWI75wSDStzUQYtMk wiHw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:content-language:subject:user-agent:mime-version :date:message-id:dkim-signature; bh=T8z92U/IGj+ZUqd+kdEh7ZCstEse2dOAp4bbOzjG3V0=; b=QOomdggZmd8h64+WgW9c4wTFKCwaw53IdlCnSgegC7YNtsgK7R+T/9kNDcAxnRv+22 qOqAQV9oFhbrKj8blgnA69io4Y6oYZq/uRadFlQ33LB3g/p+YmxpfAfkW8WszDmzftnI H4/8ltvTZ2KFsew/k8lE7uAwt/HnCscg3d2Q1cCxHxl0XoygPaWS0r3mGyOeVSaPKBn1 Wnw7qoCk0y6kyoQ2MO5Lb01ubKuxL1F/gC3meSlgA1SG1M0PPYrwy1l80Es7EM4kK6NN oj7i6J9UzLo96joLJL2ahRdvXHatc7Dr5iBSioKv2M7puM05GOCx40jL4v+7g/K5DEXH yyVw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@bytedance-com.20210112.gappssmtp.com header.s=20210112 header.b=pxTBVawP; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=bytedance.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id f1-20020a17090631c100b00780636887fesi1032668ejf.797.2022.09.20.19.53.50; Tue, 20 Sep 2022 19:54:15 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@bytedance-com.20210112.gappssmtp.com header.s=20210112 header.b=pxTBVawP; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=bytedance.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230441AbiIUCvB (ORCPT + 99 others); Tue, 20 Sep 2022 22:51:01 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:46086 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229540AbiIUCu6 (ORCPT ); Tue, 20 Sep 2022 22:50:58 -0400 Received: from mail-pf1-x42a.google.com (mail-pf1-x42a.google.com [IPv6:2607:f8b0:4864:20::42a]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 67745DF53 for ; Tue, 20 Sep 2022 19:50:56 -0700 (PDT) Received: by mail-pf1-x42a.google.com with SMTP id y136so4574216pfb.3 for ; Tue, 20 Sep 2022 19:50:56 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=bytedance-com.20210112.gappssmtp.com; s=20210112; h=content-transfer-encoding:in-reply-to:from:references:cc:to :content-language:subject:user-agent:mime-version:date:message-id :from:to:cc:subject:date; bh=T8z92U/IGj+ZUqd+kdEh7ZCstEse2dOAp4bbOzjG3V0=; b=pxTBVawPcYsYl+j6ZX0okMfIp0ANp/cScEBXcrLATrlu8yvp22XV4fFOlBLDQu1oXa BKRoARECBe7Rs7oZ+KQiAny0mw9YAAxdH87T3Si2Y7c4TkWVeklwT+N3OF6FRZ1CT8hH tAuv6uLqf6i0EPPEp5Z4hOyiZgLmZgL/ax1Zm9fC52/TAwAttvW7r97QkCYtKukm0Ywd i9+8f/vzW/KWWLUsMsENR2t79mDfIAYrLTKYadTn45w5uWFjiR22mqwt8/CMN5sQ9HE9 dyE0B6PnIjbH7fDZbdYLv9tVXhqTcx5bMVAyaTcFvU6LygfSyUI+elR9fbHqDQkoWrF8 V7GQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=content-transfer-encoding:in-reply-to:from:references:cc:to :content-language:subject:user-agent:mime-version:date:message-id :x-gm-message-state:from:to:cc:subject:date; bh=T8z92U/IGj+ZUqd+kdEh7ZCstEse2dOAp4bbOzjG3V0=; b=FfJ4dyct2A+oTh4x4HymPYkxGj1GsMKNXO7YjyLj+ya/o9mK1JfI8a9FuwARiVfrKM ykVXF1ltdtf71EmFGKTGR+pOhXBIfef+PLaVK1CSNTXheaX3JRlOWs2SbzUmqbZtJqDm 9gx5xEANmcUrhttfuxRy5/rUv9htQEY8g/orttLAJRCNAqUjr7Pe+0mF7TibMgPzBYQL nbJAhhsuay9p3/WB7uRmlMhXsH3BMZaJbxbrgletw6oYm+um8qITfnCMENUBUh+CDMsi IOekXabu2aD3jd5sy7ivgRBqJTnm3KBLBSS24GhbG0WuURhQiVcU+IyDaNla86x8tL2K ugXw== X-Gm-Message-State: ACrzQf3/srN9Ep5eYkP5K7qWt6/0lmQnG3dCexrvu+zvwOjgQpZg1sE/ NcIYQgpUxe5sM6A9NIfiwBX195EurQ+M69O7 X-Received: by 2002:aa7:9e0d:0:b0:540:94a7:9051 with SMTP id y13-20020aa79e0d000000b0054094a79051mr26429987pfq.59.1663728655890; Tue, 20 Sep 2022 19:50:55 -0700 (PDT) Received: from [10.76.15.169] ([61.120.150.74]) by smtp.gmail.com with ESMTPSA id f17-20020a170902ce9100b001786b712bf7sm631098plg.151.2022.09.20.19.50.53 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Tue, 20 Sep 2022 19:50:55 -0700 (PDT) Message-ID: Date: Wed, 21 Sep 2022 10:50:19 +0800 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Thunderbird/91.11.0 Subject: Re: Re: [RESEND for nvme-6.1] nvmet-tcp: Fix NULL pointer dereference during release Content-Language: en-US To: Sagi Grimberg , hch@lst.de Cc: linux-nvme@lists.infradead.org, linux-kernel@vger.kernel.org References: <20220920131617.63540-1-pizhenwei@bytedance.com> <325841d0-16a5-a8dd-fb06-332e7b37721e@grimberg.me> From: zhenwei pi In-Reply-To: <325841d0-16a5-a8dd-fb06-332e7b37721e@grimberg.me> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-4.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,NICE_REPLY_A,RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 9/20/22 23:34, Sagi Grimberg wrote: > > > On 9/20/22 16:16, zhenwei pi wrote: >> nvmet-tcp frees CMD buffers in nvmet_tcp_uninit_data_in_cmds(), >> and waits the inflight IO requests in nvmet_sq_destroy(). During wait >> the inflight IO requests, the callback nvmet_tcp_queue_response() >> is called from backend after IO complete, this leads a typical >> Use-After-Free issue like this: >> >>   BUG: kernel NULL pointer dereference, address: 0000000000000008 >>   #PF: supervisor read access in kernel mode >>   #PF: error_code(0x0000) - not-present page >>   PGD 107f80067 P4D 107f80067 PUD 10789e067 PMD 0 >>   Oops: 0000 [#1] PREEMPT SMP NOPTI >>   CPU: 1 PID: 123 Comm: kworker/1:1H Kdump: loaded Tainted: >> G            E      6.0.0-rc2.bm.1-amd64 #15 >>   Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS >> rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014 >>   Workqueue: nvmet_tcp_wq nvmet_tcp_io_work [nvmet_tcp] >>   RIP: 0010:shash_ahash_digest+0x2b/0x110 >>   Code: 1f 44 00 00 41 57 41 56 41 55 41 54 55 48 89 fd 53 48 89 f3 48 >> 83 ec 08 44 8b 67 30 45 85 e4 74 1c 48 8b 57 38 b8 00 10 00 00 <44> 8b >> 7a 08 44 29 f8 39 42 0c 0f 46 42 0c 41 39 c4 76 43 48 8b 03 >>   RSP: 0018:ffffc9000051bdd8 EFLAGS: 00010206 >>   RAX: 0000000000001000 RBX: ffff888100ab5470 RCX: 0000000000000000 >>   RDX: 0000000000000000 RSI: ffff888100ab5470 RDI: ffff888100ab5420 >>   RBP: ffff888100ab5420 R08: ffff8881024d08c8 R09: ffff888103e1b4b8 >>   R10: 8080808080808080 R11: 0000000000000000 R12: 0000000000001000 >>   R13: 0000000000000000 R14: ffff88813412bd4c R15: ffff8881024d0800 >>   FS:  0000000000000000(0000) GS:ffff88883fa40000(0000) >> knlGS:0000000000000000 >>   CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033 >>   CR2: 0000000000000008 CR3: 0000000104b48000 CR4: 0000000000350ee0 >>   Call Trace: >>    >>    nvmet_tcp_io_work+0xa52/0xb52 [nvmet_tcp] >>    ? __switch_to+0x106/0x420 >>    process_one_work+0x1ae/0x380 >>    ? process_one_work+0x380/0x380 >>    worker_thread+0x30/0x360 >>    ? process_one_work+0x380/0x380 >>    kthread+0xe6/0x110 >>    ? kthread_complete_and_exit+0x20/0x20 >>    ret_from_fork+0x1f/0x30 >> >> Suggested by Sagi, separate nvmet_tcp_uninit_data_in_cmds() into two >> steps: >>    uninit data in cmds                  <- new step 1 >>    nvmet_sq_destroy(); >>    cancel_work_sync(&queue->io_work); >>    free CMD buffers                     <- new step 2 >> >> Signed-off-by: zhenwei pi >> --- >>   drivers/nvme/target/tcp.c | 19 ++++++++++++++++--- >>   1 file changed, 16 insertions(+), 3 deletions(-) >> >> diff --git a/drivers/nvme/target/tcp.c b/drivers/nvme/target/tcp.c >> index c07de4f4f719..70baeab6af30 100644 >> --- a/drivers/nvme/target/tcp.c >> +++ b/drivers/nvme/target/tcp.c >> @@ -1406,14 +1406,26 @@ static void >> nvmet_tcp_uninit_data_in_cmds(struct nvmet_tcp_queue *queue) >>       for (i = 0; i < queue->nr_cmds; i++, cmd++) { >>           if (nvmet_tcp_need_data_in(cmd)) >>               nvmet_req_uninit(&cmd->req); >> - >> -        nvmet_tcp_free_cmd_buffers(cmd); >>       } >>       if (!queue->nr_cmds && nvmet_tcp_need_data_in(&queue->connect)) { >>           /* failed in connect */ >> -        nvmet_tcp_finish_cmd(&queue->connect); > > I think that nvmet_tcp_finish_cmd is now redundant and can be removed > if we fold it to its single remaining call-site. > Hi, Sagi What about letting this patch fix the kernel panic only, and I'll send a followup patch to remove nvmet_tcp_finish_cmd after this patch applies? > Other than that, > Reviewed-by: Sagi Grimberg -- zhenwei pi