lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Mon, 5 Jun 2017 12:21:00 +0800
From:   Wanpeng Li <kernellwp@...il.com>
To:     Paolo Bonzini <pbonzini@...hat.com>
Cc:     "linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>,
        kvm <kvm@...r.kernel.org>, Radim Krcmar <rkrcmar@...hat.com>,
        ross.zwisler@...ux.intel.com,
        "Paul E. McKenney" <paulmck@...ux.vnet.ibm.com>, jack@...e.cz,
        linux-ext4@...r.kernel.org, tytso@....edu,
        Josh Triplett <josh@...htriplett.org>,
        "# v3 . 10+" <stable@...r.kernel.org>
Subject: Re: [PATCH] kvm: async_pf: fix rcu_irq_enter() with irqs enabled

2017-04-26 22:56 GMT+08:00 Paolo Bonzini <pbonzini@...hat.com>:
> native_safe_halt enables interrupts, and you just shouldn't
> call rcu_irq_enter() with interrupts enabled.  Reorder the
> call with the following local_irq_disable() to respect the
> invariant.
>
> Reported-by: Ross Zwisler <ross.zwisler@...ux.intel.com>
> Cc: stable@...r.kernel.org
> Signed-off-by: Paolo Bonzini <pbonzini@...hat.com>

I'm afraid we miss this commit. This commit can fix the below warning
against my testing, so feel free to add:

Tested-by: Wanpeng Li <wanpeng.li@...mail.com>


 =============================
 WARNING: suspicious RCU usage
 4.12.0-rc3+ #23 Tainted: G           O
 -----------------------------
 kernel/rcu/tree.c:1040 rcu_irq_enter() invoked with irqs enabled!!!!

 other info that might help us debug this:


 rcu_scheduler_active = 2, debug_locks = 0
 1 lock held by update-notifier/1661:
  #0:  (&mm->mmap_sem){++++++}, at: [<ffffffff94061bfc>]
__do_page_fault+0x13c/0x5a0

 stack backtrace:
 CPU: 3 PID: 1661 Comm: update-notifier Tainted: G           O
4.12.0-rc3+ #23
 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS
rel-1.10.2-0-g5f4c7b1-prebuilt.qemu-project.org 04/01/2014
 Call Trace:
  dump_stack+0x99/0xce
  lockdep_rcu_suspicious+0xd7/0x110
  rcu_irq_enter+0xa0/0xb0
  kvm_async_pf_task_wait+0x210/0x260
  do_async_page_fault+0x77/0xb0
  ? do_async_page_fault+0x77/0xb0
  async_page_fault+0x28/0x30
 RIP: 0010:copy_page+0x7/0x10
 RSP: 0000:ffffaa3d834d7da0 EFLAGS: 00010286
 RAX: 0000000000000002 RBX: 0000000000eb3f00 RCX: 0000000000000200
 RDX: 0000000000000000 RSI: ffff93f6bf36f000 RDI: ffff93f33acfc000
 RBP: ffffaa3d834d7e58 R08: ffff93f6db998cb0 R09: 0000000000000000
 R10: 00000000fef20a58 R11: b143443d00000000 R12: 0000000000000200
 R13: ffffaa3d834d7dc0 R14: ffff93f6bf36f000 R15: ffff93f6db998000
  ? __handle_mm_fault+0xed1/0x11f0
  handle_mm_fault+0x18a/0x350
  __do_page_fault+0x29f/0x5a0
  trace_do_page_fault+0x6b/0x2f0
  do_async_page_fault+0x53/0xb0
  async_page_fault+0x28/0x30
 RIP: 0033:0x7f7d448b2a84
 RSP: 002b:00007ffc129bead8 EFLAGS: 00010202
 RAX: 00007f7d42a063c0 RBX: 0000000000000003 RCX: 00007f7d42a06400
 RDX: 0000000000000080 RSI: 0000000000000000 RDI: 00007f7d42a063c0
 RBP: 00007ffc129bed80 R08: 00007f7d42a06440 R09: 000000000000b000
 R10: 00007ffc129beb10 R11: 00007f7d42a06440 R12: 00007f7d44a9f500
 R13: 00007ffc129bee68 R14: 0000000000000002 R15: 000000000000fd01

> ---
>  arch/x86/kernel/kvm.c | 2 +-
>  1 file changed, 1 insertion(+), 1 deletion(-)
>
> diff --git a/arch/x86/kernel/kvm.c b/arch/x86/kernel/kvm.c
> index 14f65a5f938e..2a7835932b71 100644
> --- a/arch/x86/kernel/kvm.c
> +++ b/arch/x86/kernel/kvm.c
> @@ -161,8 +161,8 @@ void kvm_async_pf_task_wait(u32 token)
>                          */
>                         rcu_irq_exit();
>                         native_safe_halt();
> -                       rcu_irq_enter();
>                         local_irq_disable();
> +                       rcu_irq_enter();
>                 }
>         }
>         if (!n.halted)
> --
> 2.9.3
>

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ