lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20211018161814.GS880162@paulmck-ThinkPad-P17-Gen-1>
Date:   Mon, 18 Oct 2021 09:18:14 -0700
From:   "Paul E. McKenney" <paulmck@...nel.org>
To:     Frederic Weisbecker <frederic@...nel.org>
Cc:     LKML <linux-kernel@...r.kernel.org>,
        Uladzislau Rezki <urezki@...il.com>,
        Boqun Feng <boqun.feng@...il.com>,
        Neeraj Upadhyay <neeraju@...eaurora.org>,
        Josh Triplett <josh@...htriplett.org>,
        Joel Fernandes <joel@...lfernandes.org>, rcu@...r.kernel.org
Subject: Re: [PATCH] rcu/nocb: Fix misordered rcu_barrier() while
 (de-)offloading

On Mon, Oct 18, 2021 at 01:32:59PM +0200, Frederic Weisbecker wrote:
> When an rdp is in the process of (de-)offloading, rcu_core() and the
> nocb kthreads can process callbacks at the same time. This leaves many
> possible scenarios leading to an rcu barrier to execute before
> the preceding callbacks. Here is one such example:
> 
>             CPU 0                                  CPU 1
>        --------------                         ---------------
>      call_rcu(callbacks1)
>      call_rcu(callbacks2)
>      // move callbacks1 and callbacks2 on the done list
>      rcu_advance_callbacks()
>      call_rcu(callbacks3)
>      rcu_barrier_func()
>          rcu_segcblist_entrain(...)
>                                             nocb_cb_wait()
>                                                 rcu_do_batch()
>                                                     callbacks1()
>                                                     cond_resched_tasks_rcu_qs()
>      // move callbacks3 and rcu_barrier_callback()
>      // on the done list
>      rcu_advance_callbacks()
>      rcu_core()
>          rcu_do_batch()
>              callbacks3()
>              rcu_barrier_callback()
>                                                     //MISORDERING
>                                                     callbacks2()
> 
> Fix this with preventing two concurrent rcu_do_batch() on a  same rdp
> as long as an rcu barrier callback is pending somewhere.
> 
> Reported-by: Paul E. McKenney <paulmck@...nel.org>
> Signed-off-by: Frederic Weisbecker <frederic@...nel.org>
> Cc: Josh Triplett <josh@...htriplett.org>
> Cc: Joel Fernandes <joel@...lfernandes.org>
> Cc: Boqun Feng <boqun.feng@...il.com>
> Cc: Neeraj Upadhyay <neeraju@...eaurora.org>
> Cc: Uladzislau Rezki <urezki@...il.com>

Yow!

But how does the (de-)offloading procedure's acquisition of
rcu_state.barrier_mutex play into this?  In theory, that mutex was
supposed to prevent these sorts of scenarios.  In practice, it sounds
like the shortcomings in this theory should be fully explained so that
we don't get similar bugs in the future.  ;-)

							Thanx, Paul

> ---
>  kernel/rcu/tree.c      | 27 +++++++++++++++++++++++++--
>  kernel/rcu/tree.h      |  1 +
>  kernel/rcu/tree_nocb.h | 10 +++++++++-
>  3 files changed, 35 insertions(+), 3 deletions(-)
> 
> diff --git a/kernel/rcu/tree.c b/kernel/rcu/tree.c
> index 7a655d93a28a..e5b28e05c9f2 100644
> --- a/kernel/rcu/tree.c
> +++ b/kernel/rcu/tree.c
> @@ -2465,11 +2465,12 @@ int rcutree_dead_cpu(unsigned int cpu)
>   * Invoke any RCU callbacks that have made it to the end of their grace
>   * period.  Throttle as specified by rdp->blimit.
>   */
> -static void rcu_do_batch(struct rcu_data *rdp)
> +static bool rcu_do_batch(struct rcu_data *rdp)
>  {
>  	int div;
>  	bool __maybe_unused empty;
>  	unsigned long flags;
> +	int doing_batch;
>  	const bool offloaded = rcu_rdp_is_offloaded(rdp);
>  	struct rcu_head *rhp;
>  	struct rcu_cblist rcl = RCU_CBLIST_INITIALIZER(rcl);
> @@ -2484,7 +2485,7 @@ static void rcu_do_batch(struct rcu_data *rdp)
>  				    !rcu_segcblist_empty(&rdp->cblist),
>  				    need_resched(), is_idle_task(current),
>  				    rcu_is_callbacks_kthread());
> -		return;
> +		return true;
>  	}
>  
>  	/*
> @@ -2494,6 +2495,23 @@ static void rcu_do_batch(struct rcu_data *rdp)
>  	 */
>  	rcu_nocb_lock_irqsave(rdp, flags);
>  	WARN_ON_ONCE(cpu_is_offline(smp_processor_id()));
> +
> +	doing_batch = READ_ONCE(rdp->doing_batch);
> +
> +	/*
> +	 * If this rdp is already running callbacks somewhere and an RCU
> +	 * barrier is pending, we might run it before its preceding callbacks.
> +	 * Prevent that from happening. In the worst case we can have false
> +	 * positive on barrier_cpu_count (pending on another rdp or recently
> +	 * decremented by a concurrent batch processing) but not false negative.
> +	 */
> +	if (doing_batch && atomic_read(&rcu_state.barrier_cpu_count)) {
> +		rcu_nocb_unlock_irqrestore(rdp, flags);
> +		return false;
> +	}
> +
> +	WRITE_ONCE(rdp->doing_batch, doing_batch + 1);
> +
>  	pending = rcu_segcblist_n_cbs(&rdp->cblist);
>  	div = READ_ONCE(rcu_divisor);
>  	div = div < 0 ? 7 : div > sizeof(long) * 8 - 2 ? sizeof(long) * 8 - 2 : div;
> @@ -2591,12 +2609,17 @@ static void rcu_do_batch(struct rcu_data *rdp)
>  	WARN_ON_ONCE(count == 0 && rcu_segcblist_n_segment_cbs(&rdp->cblist) != 0);
>  	WARN_ON_ONCE(!empty && rcu_segcblist_n_segment_cbs(&rdp->cblist) == 0);
>  
> +	doing_batch = READ_ONCE(rdp->doing_batch);
> +	WRITE_ONCE(rdp->doing_batch, doing_batch - 1);
> +
>  	rcu_nocb_unlock_irqrestore(rdp, flags);
>  
>  	/* Re-invoke RCU core processing if there are callbacks remaining. */
>  	if (!offloaded && rcu_segcblist_ready_cbs(&rdp->cblist))
>  		invoke_rcu_core();
>  	tick_dep_clear_task(current, TICK_DEP_BIT_RCU);
> +
> +	return true;
>  }
>  
>  /*
> diff --git a/kernel/rcu/tree.h b/kernel/rcu/tree.h
> index deeaf2fee714..4cea596103a5 100644
> --- a/kernel/rcu/tree.h
> +++ b/kernel/rcu/tree.h
> @@ -191,6 +191,7 @@ struct rcu_data {
>  
>  	/* 4) rcu_barrier(), OOM callbacks, and expediting. */
>  	struct rcu_head barrier_head;
> +	int doing_batch;
>  	int exp_dynticks_snap;		/* Double-check need for IPI. */
>  
>  	/* 5) Callback offloading. */
> diff --git a/kernel/rcu/tree_nocb.h b/kernel/rcu/tree_nocb.h
> index 3b470113ae38..bf052251c7ab 100644
> --- a/kernel/rcu/tree_nocb.h
> +++ b/kernel/rcu/tree_nocb.h
> @@ -787,6 +787,7 @@ static void nocb_cb_wait(struct rcu_data *rdp)
>  	bool needwake_state = false;
>  	bool needwake_gp = false;
>  	bool can_sleep = true;
> +	bool did_batch;
>  	struct rcu_node *rnp = rdp->mynode;
>  
>  	local_irq_save(flags);
> @@ -799,7 +800,7 @@ static void nocb_cb_wait(struct rcu_data *rdp)
>  	 * instances of this callback would execute concurrently.
>  	 */
>  	local_bh_disable();
> -	rcu_do_batch(rdp);
> +	did_batch = rcu_do_batch(rdp);
>  	local_bh_enable();
>  	lockdep_assert_irqs_enabled();
>  	rcu_nocb_lock_irqsave(rdp, flags);
> @@ -842,6 +843,13 @@ static void nocb_cb_wait(struct rcu_data *rdp)
>  	if (needwake_state)
>  		swake_up_one(&rdp->nocb_state_wq);
>  
> +	/*
> +	 * If rcu_core() is running concurrently and an rcu barrier
> +	 * callback is pending, leave it some time to process because
> +	 * we can't run concurrently and guarantee callbacks ordering.
> +	 */
> +	if (!did_batch && !can_sleep && nocb_cb_can_run(rdp))
> +		schedule_timeout_idle(1);
>  	do {
>  		swait_event_interruptible_exclusive(rdp->nocb_cb_wq,
>  						    nocb_cb_wait_cond(rdp));
> -- 
> 2.25.1
> 

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ