lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <Z8ZyMaUhXMIxX7WE@tardis>
Date: Mon, 3 Mar 2025 19:23:29 -0800
From: Boqun Feng <boqun.feng@...il.com>
To: Joel Fernandes <joelagnelf@...dia.com>
Cc: "Paul E. McKenney" <paulmck@...nel.org>,
	Uladzislau Rezki <urezki@...il.com>, RCU <rcu@...r.kernel.org>,
	LKML <linux-kernel@...r.kernel.org>,
	Frederic Weisbecker <frederic@...nel.org>,
	Cheung Wall <zzqq0103.hey@...il.com>,
	Neeraj upadhyay <Neeraj.Upadhyay@....com>,
	Joel Fernandes <joel@...lfernandes.org>,
	Oleksiy Avramchenko <oleksiy.avramchenko@...y.com>
Subject: Re: [PATCH v4 3/3] rcu: Use _full() API to debug synchronize_rcu()

On Sun, Mar 02, 2025 at 07:15:07PM -0500, Joel Fernandes wrote:
> On Fri, Feb 28, 2025 at 05:08:49PM -0800, Paul E. McKenney wrote:
> > On Fri, Feb 28, 2025 at 11:59:55AM -0800, Paul E. McKenney wrote:
> > > On Fri, Feb 28, 2025 at 08:12:51PM +0100, Uladzislau Rezki wrote:
> > > > Hello, Paul!
> > > > 
> > > > > > > > > 
> > > > > > > > > Except that I got this from overnight testing of rcu/dev on the shared
> > > > > > > > > RCU tree:
> > > > > > > > > 
> > > > > > > > > WARNING: CPU: 5 PID: 14 at kernel/rcu/tree.c:1636 rcu_sr_normal_complete+0x5c/0x80
> > > > > > > > > 
> > > > > > > > > I see this only on TREE05.  Which should not be too surprising, given
> > > > > > > > > that this is the scenario that tests it.  It happened within five minutes
> > > > > > > > > on all 14 of the TREE05 runs.
> > > > > > > > > 
> > > > > > > > Hm.. This is not fun. I tested this on my system and i did not manage to
> > > > > > > > trigger this whereas you do. Something is wrong.
> > > > > > > 
> > > > > > > If you have a debug patch, I would be happy to give it a go.
> > > > > > > 
> > > > > > I can trigger it. But.
> > > > > > 
> > > > > > Some background. I tested those patches during many hours on the stable
> > > > > > kernel which is 6.13. On that kernel i was not able to trigger it. Running
> > > > > > the rcutorture on the our shared "dev" tree, which i did now, triggers this
> > > > > > right away.
> > > > > 
> > > > > Bisection?  (Hey, you knew that was coming!)
> > > > > 
> > > > Looks like this: rcu: Fix get_state_synchronize_rcu_full() GP-start detection
> > > > 
> > > > After revert in the dev, rcutorture passes TREE05, 16 instances.
> > > 
> > > Huh.  We sure don't get to revert that one...
> > > 
> > > Do we have a problem with the ordering in rcu_gp_init() between the calls
> > > to rcu_seq_start() and portions of rcu_sr_normal_gp_init()?  For example,
> > > do we need to capture the relevant portion of the list before the call
> > > to rcu_seq_start(), and do the grace-period-start work afterwards?
> > 
> > I tried moving the call to rcu_sr_normal_gp_init() before the call to
> > rcu_seq_start() and got no failures in a one-hour run of 200*TREE05.
> > Which does not necessarily mean that this is the correct fix, but I
> > figured that it might at least provide food for thought.
> > 
> >                                           Thanx, Paul
> > 
> > ------------------------------------------------------------------------
> > 
> > diff --git a/kernel/rcu/tree.c b/kernel/rcu/tree.c
> > index 48384fa2eaeb8..d3efeff7740e7 100644
> > --- a/kernel/rcu/tree.c
> > +++ b/kernel/rcu/tree.c
> > @@ -1819,10 +1819,10 @@ static noinline_for_stack bool rcu_gp_init(void)
> >  
> >        /* Advance to a new grace period and initialize state. */
> >        record_gp_stall_check_time();
> > +      start_new_poll = rcu_sr_normal_gp_init();
> >        /* Record GP times before starting GP, hence rcu_seq_start(). */
> >        rcu_seq_start(&rcu_state.gp_seq);
> >        ASSERT_EXCLUSIVE_WRITER(rcu_state.gp_seq);
> > -      start_new_poll = rcu_sr_normal_gp_init();
> >        trace_rcu_grace_period(rcu_state.name, rcu_state.gp_seq, TPS("start"));
> 
> Oh... so the bug is this? Good catch...
> 
> 
> CPU 0                                           CPU 1
> 
>                                                 rcu_gp_init()
>                                                       rcu_seq_start(rcu_state.gp_seq)
> sychronize_rcu_normal()
>       rs.head.func
>       	= (void *) get_state_synchronize_rcu();
>                    // save rcu_state.gp_seq
>       rcu_sr_normal_add_req() ->
>             llist_add(rcu_state.srs_next)
>       (void) start_poll_synchronize_rcu();
> 
> 

This means synchronize_rcu_normal() got the new state of gp_seq, but
its wait request was inserted before the new wait_head, therefore..

>                                                       sr_normal_gp_init()
>                                                             llist_add(wait_head, &rcu_state.srs_next);
> 							    // pick up the
> 							    // injected WH
>                                                             rcu_state.srs_wait_tail = wait_head;
> 
>                                                 rcu_gp_cleanup()
>                                                       rcu_seq_end(&rcu_state.gp_seq);
>                                                       sr_normal_complete()

at rcu_gp_cleanup() time, rcu_sr_normal_complete() complete the
corresponding wait request, however, the sychronize_rcu_normal()
observed the new gp_seq, its poll state will expect the next gp, hence
the WARN_ONCE().

Yes, I believe this is the scenario for the bug.

>                                                             WARN_ONCE(IS_ENABLED(CONFIG_PROVE_RCU) &&
>                                                             !poll_state_synchronize_rcu(oldstate),
> 
> Where as reordering sr_normal_gp_init() prevents this:
> 
>                                                 rcu_gp_init()
> 
>                                                       sr_normal_gp_init()
> 							    // WH has not
> 							    // been injected
> 							    // so nothing to
> 							    // wait on
> 

I don't quite get the comment above, the fix I believe is that wait_head
was inserted with a llist_add() which is a fully ordered cmpxchg(), so
we have:

							  llist_add(wait_head, ..)
							  // ^ provding the ordering againt
							  // the seq change below

, which means if...

>                                                       rcu_seq_start(rcu_state.gp_seq)
> sychronize_rcu_normal()
>       rs.head.func
>       	= (void *) get_state_synchronize_rcu();
>                    // save rcu_state.gp_seq

... the synchronize_rcu_normal() observes the new gp_seq, then...

>       rcu_sr_normal_add_req() ->
>             llist_add(rcu_state.srs_next)

... when its corresponding wait request gets queued, the above wait_head
must be already in the llist...

>       (void) start_poll_synchronize_rcu();
> 
>                                                 rcu_gp_cleanup()
>                                                       rcu_seq_end(&rcu_state.gp_seq);

... hence, as the comment below said, won't do anything.

>                                                       // sr_normal_complete()
> 						      // wont do anything so
> 						      // no warning
> 
> Did I get that right?
> 

Other than I'm unable to follow what do you mean "WH has not been
injected, so nothing to wait on", maybe because I am missing some
terminology from you ;-) I think it's a good analysis, thank you!

> I think this is a real bug AFAICS, hoping all the memory barriers are in
> place to make sure the code reordering also correctly orders the accesses.
> I'll double check that.
> 
> I also feel its 'theoretical', because as long as rcu_gp_init() and
> rcu_gp_cleanup() are properly ordered WRT pre-existing readers, then
> synchronize_rcu_normal() still waits for pre-existing readers even though its
> a bit confused about the value of the cookies.
> 
> For the fix,
> Reviewed-by: Joel Fernandes (Google) <joel@...lfernandes.org>
> 
> (If possible, include a Link: to my (this) post so that the sequence of
> events is further clarified.)
> 

Will add the tag (with the email you really want ;-)) and a link to this
email to the patch. Thanks!

Regards,
Boqun

> thanks,
> 
>  - Joel
> 

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ