lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20251006181835.1919496-16-sashal@kernel.org>
Date: Mon,  6 Oct 2025 14:17:48 -0400
From: Sasha Levin <sashal@...nel.org>
To: patches@...ts.linux.dev,
	stable@...r.kernel.org
Cc: Steven Rostedt <rostedt@...dmis.org>,
	"Peter Zijlstra (Intel)" <peterz@...radead.org>,
	Sasha Levin <sashal@...nel.org>,
	mingo@...hat.com,
	acme@...nel.org,
	namhyung@...nel.org,
	linux-perf-users@...r.kernel.org,
	linux-kernel@...r.kernel.org
Subject: [PATCH AUTOSEL 6.17-6.6] perf: Use current->flags & PF_KTHREAD|PF_USER_WORKER instead of current->mm == NULL

From: Steven Rostedt <rostedt@...dmis.org>

[ Upstream commit 90942f9fac05702065ff82ed0bade0d08168d4ea ]

To determine if a task is a kernel thread or not, it is more reliable to
use (current->flags & (PF_KTHREAD|PF_USER_WORKERi)) than to rely on
current->mm being NULL.  That is because some kernel tasks (io_uring
helpers) may have a mm field.

Signed-off-by: Steven Rostedt (Google) <rostedt@...dmis.org>
Signed-off-by: Peter Zijlstra (Intel) <peterz@...radead.org>
Link: https://lore.kernel.org/r/20250820180428.592367294@kernel.org
Signed-off-by: Sasha Levin <sashal@...nel.org>
---

LLM Generated explanations, may be completely bogus:

Based on my comprehensive analysis, here is my determination:

## **Backport Status: YES**

### Extensive Analysis:

#### **Context and Problem Being Fixed:**

This commit addresses a **correctness bug** in how the perf subsystem
identifies kernel threads. The issue is that the code was using
`current->mm == NULL` to determine if a task is a kernel thread, but
this assumption is incorrect for **io_uring helper threads and other
PF_USER_WORKER threads**, which have a non-NULL mm field despite being
kernel-side workers.

#### **Evidence from Code Investigation:**

1. **This is part of a fix series**: I found three related commits in
   upstream:
   - `16ed389227651`: "perf: Skip user unwind if the task is a kernel
     thread" (already being backported to stable as `823d7b9ec8616`)
   - `d77e3319e3109`: "perf: Simplify get_perf_callchain() user logic"
     (already in stable as `96681d3b99282`)
   - `90942f9fac057`: **This commit** - completes the fix by updating
     remaining locations

2. **Historical context**: PF_USER_WORKER was introduced in commit
   `54e6842d0775b` (March 2023) to handle io_uring and vhost workers
   that behave differently from regular kernel threads. These threads
   have mm contexts but shouldn't be treated as user threads for
   operations like register sampling.

3. **Real-world impact**: PowerPC already experienced crashes (commit
   `01849382373b8`) when trying to access pt_regs for PF_IO_WORKER tasks
   during coredump generation, demonstrating this class of bugs is real.

#### **Specific Code Changes Analysis:**

1. **kernel/events/callchain.c:247-250** (currently at line 245 in
   autosel-6.17):
   - **OLD**: `if (current->mm)` then use `task_pt_regs(current)`
   - **NEW**: `if (current->flags & (PF_KTHREAD | PF_USER_WORKER))` then
     skip user unwinding
   - **Impact**: Prevents perf from attempting to unwind user stack for
     io_uring helpers

2. **kernel/events/core.c:7455** (currently at line 7443 in
   autosel-6.17):
   - **OLD**: `!(current->flags & PF_KTHREAD)`
   - **NEW**: `!(current->flags & (PF_KTHREAD | PF_USER_WORKER))`
   - **Impact**: Correctly excludes user worker threads from user
     register sampling

3. **kernel/events/core.c:8095** (currently at line 8083 in
   autosel-6.17):
   - **OLD**: `if (current->mm != NULL)`
   - **NEW**: `if (!(current->flags & (PF_KTHREAD | PF_USER_WORKER)))`
   - **Impact**: Prevents incorrect page table walks for user worker
     threads in `perf_virt_to_phys()`

#### **Why This Qualifies for Backporting:**

1. **Fixes a real bug**: Perf incorrectly handles io_uring helper
   threads, leading to:
   - Incorrect callchain collection
   - Wrong register samples
   - Potential crashes or data corruption when walking page tables

2. **Affects widely-used functionality**: io_uring is heavily used in
   modern applications (databases, proxies, async I/O workloads), and
   perf profiling of these workloads would hit this bug

3. **Small and contained**: Only 3 conditional checks changed across 2
   files - minimal risk

4. **Part of an upstream series already being backported**: The first
   commit in the series (`16ed389227651`) is already marked for stable
   backport, making this a natural follow-up

5. **No architectural changes**: Pure bug fix with no API changes or
   feature additions

6. **Low regression risk**: The new flag-based check is more correct
   than the mm-based check; any behavioral changes would be fixing
   incorrect behavior

#### **Verification in Current Tree:**

I confirmed that linux-autosel-6.17 still has the old buggy code:
- Line 7443: Missing PF_USER_WORKER in the check
- Line 8083: Still uses `current->mm != NULL`
- callchain.c:245: Still uses `if (current->mm)`

This confirms the fix is needed and not yet applied.

#### **Conclusion:**

This is a **clear YES for backporting**. It's a well-understood
correctness fix for a real bug affecting perf profiling of io_uring
workloads, with minimal risk and part of an ongoing stable backport
series.

 kernel/events/callchain.c | 6 +++---
 kernel/events/core.c      | 4 ++--
 2 files changed, 5 insertions(+), 5 deletions(-)

diff --git a/kernel/events/callchain.c b/kernel/events/callchain.c
index 6c83ad674d010..decff7266cfbd 100644
--- a/kernel/events/callchain.c
+++ b/kernel/events/callchain.c
@@ -242,10 +242,10 @@ get_perf_callchain(struct pt_regs *regs, u32 init_nr, bool kernel, bool user,
 
 	if (user) {
 		if (!user_mode(regs)) {
-			if  (current->mm)
-				regs = task_pt_regs(current);
-			else
+			if (current->flags & (PF_KTHREAD | PF_USER_WORKER))
 				regs = NULL;
+			else
+				regs = task_pt_regs(current);
 		}
 
 		if (regs) {
diff --git a/kernel/events/core.c b/kernel/events/core.c
index 820127536e62b..ea9ff856770be 100644
--- a/kernel/events/core.c
+++ b/kernel/events/core.c
@@ -7440,7 +7440,7 @@ static void perf_sample_regs_user(struct perf_regs *regs_user,
 	if (user_mode(regs)) {
 		regs_user->abi = perf_reg_abi(current);
 		regs_user->regs = regs;
-	} else if (!(current->flags & PF_KTHREAD)) {
+	} else if (!(current->flags & (PF_KTHREAD | PF_USER_WORKER))) {
 		perf_get_regs_user(regs_user, regs);
 	} else {
 		regs_user->abi = PERF_SAMPLE_REGS_ABI_NONE;
@@ -8080,7 +8080,7 @@ static u64 perf_virt_to_phys(u64 virt)
 		 * Try IRQ-safe get_user_page_fast_only first.
 		 * If failed, leave phys_addr as 0.
 		 */
-		if (current->mm != NULL) {
+		if (!(current->flags & (PF_KTHREAD | PF_USER_WORKER))) {
 			struct page *p;
 
 			pagefault_disable();
-- 
2.51.0


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ