lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <ZKN6CdkKyxBShPHi@xsang-OptiPlex-9020>
Date:   Tue, 4 Jul 2023 09:46:49 +0800
From:   Oliver Sang <oliver.sang@...el.com>
To:     Linus Torvalds <torvalds@...ux-foundation.org>
CC:     "Liam R. Howlett" <Liam.Howlett@...cle.com>,
        LKML <linux-kernel@...r.kernel.org>, <lkp@...ts.01.org>,
        <lkp@...el.com>, <oliver.sang@...el.com>
Subject: Re: [mm] 408579cd62: WARNING:suspicious_RCU_usage

hi, Linus,

On Sun, Jul 02, 2023 at 09:34:35PM -0700, Linus Torvalds wrote:
> On Sun, 2 Jul 2023 at 19:04, kernel test robot <oliver.sang@...el.com> wrote:
> >
> > commit: 408579cd627a15bd703fe3eeb8485fd02726e9d3 ("mm: Update do_vmi_align_munmap() return semantics")
> > https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git master
> >
> > in testcase: boot
> >
> > on test machine: qemu-system-x86_64 -enable-kvm -cpu SandyBridge -smp 2 -m 16G
> >
> > caused below changes (please refer to attached dmesg/kmsg for entire log/backtrace):
> >
> >
> >
> > If you fix the issue, kindly add following tag
> > Reported-by: kernel test robot <oliver.sang@...el.com>
> >
> >
> > [  215.088258][    T1] WARNING: suspicious RCU usage
> 
> I think the
> 
>         validate_mm(mm);
> 
> call (mm/mmap.c:2561) needs to be moved up to before the
> 
>         if (unlock)
>                 mmap_read_unlock(mm);
> 
> that is just a couple of lines earlier.
> 
> Can you verify that that fixes the warning?

by patch [1], we found the warning is not fixed.


we also found there are some changes in stack backtrace. now it's as below:
(detail dmesg is attached)

[   26.412372][    T1] stack backtrace:
[   26.412846][    T1] CPU: 0 PID: 1 Comm: systemd Not tainted 6.4.0-09908-gcb226fb1fb7a #1
[   26.413506][    T1] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014
[   26.414326][    T1] Call Trace:
[   26.414605][    T1]  <TASK>
[   26.414847][    T1]  dump_stack_lvl+0x73/0xc0
[   26.415225][    T1]  lockdep_rcu_suspicious+0x1b7/0x280
[   26.415669][    T1]  mas_start+0x280/0x400
[   26.416037][    T1]  mas_find+0x27a/0x400
[   26.416391][    T1]  validate_mm+0x8b/0x2c0
[   26.416757][    T1]  __se_sys_brk+0xa35/0xc00
[   26.417141][    T1]  ? vtime_user_exit+0x1a6/0x280
[   26.417563][    T1]  do_syscall_64+0x2b/0x80
[   26.417935][    T1]  entry_SYSCALL_64_after_hwframe+0x5e/0xc8
[   26.418410][    T1] RIP: 0033:0x7f8a92160bb7

as a contrast, for commit 408579cd62:

[  215.095989][    T1] stack backtrace:
[  215.097067][    T1] CPU: 0 PID: 1 Comm: init Not tainted 6.4.0-09907-g408579cd627a #1
[  215.098372][    T1] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014
[  215.099963][    T1] Call Trace:
[  215.100474][    T1]  <TASK>
[  215.101027][    T1]  dump_stack_lvl+0x73/0xc0
[  215.101807][    T1]  lockdep_rcu_suspicious+0x1b7/0x280
[  215.102688][    T1]  mas_start+0x280/0x400
[  215.103355][    T1]  mas_find+0x27a/0x400
[  215.104024][    T1]  validate_mm+0x8b/0x2c0
[  215.104777][    T1]  do_vmi_align_munmap+0xf92/0x1180
[  215.105691][    T1]  do_vmi_munmap+0x1a4/0x240
[  215.106384][    T1]  __vm_munmap+0x19f/0x300
[  215.107145][    T1]  __x64_sys_munmap+0x60/0x80
[  215.107962][    T1]  do_syscall_64+0x2b/0x80
[  215.108784][    T1]  entry_SYSCALL_64_after_hwframe+0x5e/0xc8
[  215.109733][    T1] RIP: 0033:0x7f5ef4577e07



[1]
--- a/mm/mmap.c
+++ b/mm/mmap.c
@@ -2554,11 +2554,12 @@ do_vmi_align_munmap(struct vma_iterator *vmi, struct vm_area_struct *vma,
        mas_set(&mas_detach, start);
        remove_mt(mm, &mas_detach);
        __mt_destroy(&mt_detach);
+
+       validate_mm(mm);
+
        if (unlock)
                mmap_read_unlock(mm);

-
-       validate_mm(mm);
        return 0;

 clear_tree_failed:


> 
>                  Linus

Download attachment "dmesg.xz" of type "application/x-xz" (15224 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ