[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20190401182923.GK3201@mtr-leonro.mtl.com>
Date: Mon, 1 Apr 2019 21:29:23 +0300
From: Leon Romanovsky <leon@...nel.org>
To: Jason Gunthorpe <jgg@...pe.ca>
Cc: syzbot <syzbot+2e3e485d5697ea610460@...kaller.appspotmail.com>,
Matthew Wilcox <willy@...radead.org>, danielj@...lanox.com,
danitg@...lanox.com, dledford@...hat.com,
linux-kernel@...r.kernel.org, linux-rdma@...r.kernel.org,
parav@...lanox.com, swise@...ngridcomputing.com,
syzkaller-bugs@...glegroups.com
Subject: Re: WARNING in cma_exit_net
On Mon, Apr 01, 2019 at 02:45:54PM -0300, Jason Gunthorpe wrote:
> On Mon, Apr 01, 2019 at 10:36:05AM -0700, syzbot wrote:
> > Hello,
> >
> > syzbot found the following crash on:
> >
> > HEAD commit: e3ecb83e Add linux-next specific files for 20190401
> > git tree: linux-next
> > console output: https://syzkaller.appspot.com/x/log.txt?x=13bc36cd200000
> > kernel config: https://syzkaller.appspot.com/x/.config?x=db6c9f2bfeb91a99
> > dashboard link: https://syzkaller.appspot.com/bug?extid=2e3e485d5697ea610460
> > compiler: gcc (GCC) 9.0.0 20181231 (experimental)
> >
> > Unfortunately, I don't have any reproducer for this crash yet.
> >
> > IMPORTANT: if you fix the bug, please add the following tag to the commit:
> > Reported-by: syzbot+2e3e485d5697ea610460@...kaller.appspotmail.com
> >
> > WARNING: CPU: 1 PID: 7 at drivers/infiniband/core/cma.c:4674
> > cma_exit_net+0x327/0x390 drivers/infiniband/core/cma.c:4674
> > Kernel panic - not syncing: panic_on_warn set ...
>
> Matt: This is why the WARN_ON(!xa_empty()) is so valuable. Magically
> syzkaller can find something in this code is buggy.
>
> Mellanox is also showing a different testing failure over the weekend
> (use after free or something) from your 'cma: Convert portspace IDRs
> to XArray'
This is what I see in my environment.
[ 72.725596]
==================================================================
[ 72.726017] BUG: KASAN: use-after-free in cma_check_port+0x86a/0xa20 [rdma_cm]
[ 72.726263] Read of size 8 at addr ffff888069fde998 by task ucmatose/387
[ 72.726460]
[ 72.726550] CPU: 3 PID: 387 Comm: ucmatose Not tainted 5.1.0-rc2+ #253
[ 72.726751] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS
rel-1.11.0-0-g63451fca13-prebuilt.qemu-project.org 04/01/2014
[ 72.727119] Call Trace:
[ 72.727210] dump_stack+0x7c/0xc0
[ 72.727342] print_address_description+0x6c/0x23c
[ 72.727505] ? cma_check_port+0x86a/0xa20 [rdma_cm]
[ 72.727666] kasan_report.cold.3+0x1c/0x35
[ 72.727805] ? cma_check_port+0x86a/0xa20 [rdma_cm]
[ 72.727977] ? cma_check_port+0x86a/0xa20 [rdma_cm]
[ 72.728138] cma_check_port+0x86a/0xa20 [rdma_cm]
[ 72.728306] rdma_bind_addr+0x11bc/0x1b00 [rdma_cm]
[ 72.728465] ? find_held_lock+0x33/0x1c0
[ 72.728597] ? cma_ndev_work_handler+0x180/0x180 [rdma_cm]
[ 72.728756] ? wait_for_completion+0x3d0/0x3d0
[ 72.728928] ucma_bind+0x120/0x160 [rdma_ucm]
[ 72.729089] ? ucma_resolve_addr+0x1a0/0x1a0 [rdma_ucm]
[ 72.729256] ucma_write+0x1f8/0x2b0 [rdma_ucm]
[ 72.729409] ? ucma_open+0x260/0x260 [rdma_ucm]
[ 72.729571] vfs_write+0x157/0x460
[ 72.729688] ksys_write+0xb8/0x170
[ 72.729828] ? __ia32_sys_read+0xb0/0xb0
[ 72.729954] ? trace_hardirqs_off_caller+0x5b/0x160
[ 72.730107] ? do_syscall_64+0x18/0x3c0
[ 72.730243] do_syscall_64+0x95/0x3c0
[ 72.730363] entry_SYSCALL_64_after_hwframe+0x49/0xbe
[ 72.730508] RIP: 0033:0x7f6f1758fff8
[ 72.730624] Code: 89 02 48 c7 c0 ff ff ff ff eb b3 0f 1f 80 00 00 00
00 f3 0f 1e fa 48 8d 05 25 77 0d 00 8b 00 85 c0 75 17 b8 01 00 00 00 0f
05 <48> 3d 00 f0 ff ff 77 58 c3 0f 1f 80 00 00 00 00 41 54 49 89 d4
55
[ 72.731146] RSP: 002b:00007fff99f99088 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[ 72.731365] RAX: ffffffffffffffda RBX: 00007fff99f99090 RCX: 00007f6f1758fff8
[ 72.731579] RDX: 0000000000000090 RSI: 00007fff99f99090 RDI: 0000000000000003
[ 72.731814] RBP: 0000564942bd8ec0 R08: 0000564942bd9180 R09: 0000000000000000
[ 72.732043] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
[ 72.732262] R13: 0000000000000001 R14: 0000000000000000 R15: 00005649413cc470
[ 72.732494]
[ 72.732572] Allocated by task 381:
[ 72.732692] __kasan_kmalloc.constprop.5+0xc1/0xd0
[ 72.732857] cma_alloc_port+0x4d/0x160 [rdma_cm]
[ 72.733006] rdma_bind_addr+0x14e7/0x1b00 [rdma_cm]
[ 72.733153] ucma_bind+0x120/0x160 [rdma_ucm]
[ 72.733299] ucma_write+0x1f8/0x2b0 [rdma_ucm]
[ 72.733452] vfs_write+0x157/0x460
[ 72.733569] ksys_write+0xb8/0x170
[ 72.733675] do_syscall_64+0x95/0x3c0
[ 72.733800] entry_SYSCALL_64_after_hwframe+0x49/0xbe
[ 72.733956]
[ 72.734029] Freed by task 381:
[ 72.734133] __kasan_slab_free+0x12e/0x180
[ 72.734284] kfree+0xed/0x290
[ 72.734399] rdma_destroy_id+0x6b6/0x9e0 [rdma_cm]
[ 72.734559] ucma_close+0x110/0x300 [rdma_ucm]
[ 72.734701] __fput+0x25a/0x740
[ 72.734832] task_work_run+0x10e/0x190
[ 72.734959] do_exit+0x85e/0x29e0
[ 72.735071] do_group_exit+0xf0/0x2e0
[ 72.735182] get_signal+0x2e0/0x17e0
[ 72.735304] do_signal+0x94/0x1570
[ 72.735424] exit_to_usermode_loop+0xfa/0x130
[ 72.735612] do_syscall_64+0x327/0x3c0
[ 72.735756] entry_SYSCALL_64_after_hwframe+0x49/0xbe
[ 72.735941]
[ 72.736033] The buggy address belongs to the object at ffff888069fde990
[ 72.736033] which belongs to the cache kmalloc-32 of size 32
[ 72.736414] The buggy address is located 8 bytes inside of
[ 72.736414] 32-byte region [ffff888069fde990, ffff888069fde9b0)
[ 72.736777] The buggy address belongs to the page:
[ 72.736940] page:ffffea0001a7f780 count:1 mapcount:0 mapping:ffff88806bc03980 index:0x0
[ 72.737171] flags: 0x4000000000000200(slab)
[ 72.737295] raw: 4000000000000200 dead000000000100 dead000000000200 ffff88806bc03980
[ 72.737525] raw: 0000000000000000 0000000000550055 00000001ffffffff 0000000000000000
[ 72.737786] page dumped because: kasan: bad access detected
[ 72.737948]
[ 72.738019] Memory state around the buggy address:
[ 72.738164] ffff888069fde880: fb fb fc fc fb fb fb fb fc fc fb fb fb fb fc fc
[ 72.738396] ffff888069fde900: fb fb fb fb fc fc fb fb fb fb fc fc fb fb fb fb
[ 72.738627] >ffff888069fde980: fc fc fb fb fb fb fc fc fb fb fb fb fc fc fb fb
[ 72.738869] ^
[ 72.738999] ffff888069fdea00: fb fb fc fc fb fb fb fb fc fc fb fb fb fb fc fc
[ 72.739213] ffff888069fdea80: fb fb fb fb fc fc fb fb fb fb fc fc fb fb fb fb
[ 72.739431]
==================================================================
[ 72.739667] Disabling lock debugging due to kernel taint
>
> If you seem something obvious wrong in that patch please speak
> up.. Below is what I applied.
>
> Thanks,
> Jason
>
> diff --git a/drivers/infiniband/core/cma.c b/drivers/infiniband/core/cma.c
> index 68c997be242930..a8b9c66c85252b 100644
> --- a/drivers/infiniband/core/cma.c
> +++ b/drivers/infiniband/core/cma.c
> @@ -39,7 +39,7 @@
> #include <linux/mutex.h>
> #include <linux/random.h>
> #include <linux/igmp.h>
> -#include <linux/idr.h>
> +#include <linux/xarray.h>
> #include <linux/inetdevice.h>
> #include <linux/slab.h>
> #include <linux/module.h>
> @@ -191,10 +191,10 @@ static struct workqueue_struct *cma_wq;
> static unsigned int cma_pernet_id;
>
> struct cma_pernet {
> - struct idr tcp_ps;
> - struct idr udp_ps;
> - struct idr ipoib_ps;
> - struct idr ib_ps;
> + struct xarray tcp_ps;
> + struct xarray udp_ps;
> + struct xarray ipoib_ps;
> + struct xarray ib_ps;
> };
>
> static struct cma_pernet *cma_pernet(struct net *net)
> @@ -202,7 +202,8 @@ static struct cma_pernet *cma_pernet(struct net *net)
> return net_generic(net, cma_pernet_id);
> }
>
> -static struct idr *cma_pernet_idr(struct net *net, enum rdma_ucm_port_space ps)
> +static
> +struct xarray *cma_pernet_xa(struct net *net, enum rdma_ucm_port_space ps)
> {
> struct cma_pernet *pernet = cma_pernet(net);
>
> @@ -247,25 +248,25 @@ struct class_port_info_context {
> static int cma_ps_alloc(struct net *net, enum rdma_ucm_port_space ps,
> struct rdma_bind_list *bind_list, int snum)
> {
> - struct idr *idr = cma_pernet_idr(net, ps);
> + struct xarray *xa = cma_pernet_xa(net, ps);
>
> - return idr_alloc(idr, bind_list, snum, snum + 1, GFP_KERNEL);
> + return xa_insert(xa, snum, bind_list, GFP_KERNEL);
> }
>
> static struct rdma_bind_list *cma_ps_find(struct net *net,
> enum rdma_ucm_port_space ps, int snum)
> {
> - struct idr *idr = cma_pernet_idr(net, ps);
> + struct xarray *xa = cma_pernet_xa(net, ps);
>
> - return idr_find(idr, snum);
> + return xa_load(xa, snum);
> }
>
> static void cma_ps_remove(struct net *net, enum rdma_ucm_port_space ps,
> int snum)
> {
> - struct idr *idr = cma_pernet_idr(net, ps);
> + struct xarray *xa = cma_pernet_xa(net, ps);
>
> - idr_remove(idr, snum);
> + xa_erase(xa, snum);
> }
>
> enum {
> @@ -4655,10 +4656,10 @@ static int cma_init_net(struct net *net)
> {
> struct cma_pernet *pernet = cma_pernet(net);
>
> - idr_init(&pernet->tcp_ps);
> - idr_init(&pernet->udp_ps);
> - idr_init(&pernet->ipoib_ps);
> - idr_init(&pernet->ib_ps);
> + xa_init(&pernet->tcp_ps);
> + xa_init(&pernet->udp_ps);
> + xa_init(&pernet->ipoib_ps);
> + xa_init(&pernet->ib_ps);
>
> return 0;
> }
> @@ -4667,10 +4668,10 @@ static void cma_exit_net(struct net *net)
> {
> struct cma_pernet *pernet = cma_pernet(net);
>
> - idr_destroy(&pernet->tcp_ps);
> - idr_destroy(&pernet->udp_ps);
> - idr_destroy(&pernet->ipoib_ps);
> - idr_destroy(&pernet->ib_ps);
> + WARN_ON(!xa_empty(&pernet->tcp_ps));
> + WARN_ON(!xa_empty(&pernet->udp_ps));
> + WARN_ON(!xa_empty(&pernet->ipoib_ps));
> + WARN_ON(!xa_empty(&pernet->ib_ps));
> }
>
> static struct pernet_operations cma_pernet_operations = {
>
Download attachment "signature.asc" of type "application/pgp-signature" (802 bytes)
Powered by blists - more mailing lists