From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 001D0C61CE7 for ; Mon, 9 Jun 2025 00:25:09 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 73C546B0089; Sun, 8 Jun 2025 20:25:09 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 7145B6B008C; Sun, 8 Jun 2025 20:25:09 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 62BF16B0092; Sun, 8 Jun 2025 20:25:09 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0015.hostedemail.com [216.40.44.15]) by kanga.kvack.org (Postfix) with ESMTP id 43CBA6B0089 for ; Sun, 8 Jun 2025 20:25:09 -0400 (EDT) Received: from smtpin15.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay01.hostedemail.com (Postfix) with ESMTP id BBAF11D3BC1 for ; Mon, 9 Jun 2025 00:25:08 +0000 (UTC) X-FDA: 83533967496.15.E27B47A Received: from tor.source.kernel.org (tor.source.kernel.org [172.105.4.254]) by imf23.hostedemail.com (Postfix) with ESMTP id 01D83140002 for ; Mon, 9 Jun 2025 00:25:06 +0000 (UTC) Authentication-Results: imf23.hostedemail.com; dkim=pass header.d=kernel.org header.s=k20201202 header.b=G6qPZPUv; dmarc=pass (policy=quarantine) header.from=kernel.org; spf=pass (imf23.hostedemail.com: domain of "SRS0=kYjE=YY=paulmck-ThinkPad-P17-Gen-1.home=paulmck@kernel.org" designates 172.105.4.254 as permitted sender) smtp.mailfrom="SRS0=kYjE=YY=paulmck-ThinkPad-P17-Gen-1.home=paulmck@kernel.org" ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1749428707; h=from:from:sender:reply-to:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=sVzhH5l3HL8iJxOU6elbPtFwyuloTio8DQxvlGYGZeA=; b=fnBAPm1LT5pB4qSpi20SKZCQYtuYZkZr7kgEnQApnicShusSW11pMMAN0hkgRTMm3hq08w P+N7WYBdYPVMxURBGQsVi15oWqD5XZVk1/O+7gKZqA156ftZ92HvzTGE3USwk08U2BHOjL 9FdAINFRFe024apYAsQIXdlMNcG2FyY= ARC-Authentication-Results: i=1; imf23.hostedemail.com; dkim=pass header.d=kernel.org header.s=k20201202 header.b=G6qPZPUv; dmarc=pass (policy=quarantine) header.from=kernel.org; spf=pass (imf23.hostedemail.com: domain of "SRS0=kYjE=YY=paulmck-ThinkPad-P17-Gen-1.home=paulmck@kernel.org" designates 172.105.4.254 as permitted sender) smtp.mailfrom="SRS0=kYjE=YY=paulmck-ThinkPad-P17-Gen-1.home=paulmck@kernel.org" ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1749428707; a=rsa-sha256; cv=none; b=mYkcLnxU0uoD8StruqBjpKJtDHD+HY+Y9psfAirp5441RZ8E5CyrW9Ki75JHxtQvlJNmex pHGxZOGyMzaD7WvleTAHbbfcIgudNc+TRMM1crFaXyXQRPAGeIljAZIEqChrd6mMM6pCLv ue09IeDOl+AEiN464HlV4Y3ykHUd5i4= Received: from smtp.kernel.org (transwarp.subspace.kernel.org [100.75.92.58]) by tor.source.kernel.org (Postfix) with ESMTP id 419F561126; Mon, 9 Jun 2025 00:25:06 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id E94C8C4CEEE; Mon, 9 Jun 2025 00:25:05 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1749428706; bh=gMYMf2pEhqHvFN/ICXYXBnP6/t1/UAIGsfYzQ/L/t+k=; h=Date:From:To:Cc:Subject:Reply-To:References:In-Reply-To:From; b=G6qPZPUvBSd8SkR7McReWyDpQltFuRVfT5EC59/T62t0kuBBRvYRzS3PUCK4nCwUW XVEXNuUKvTRwC1qrDj7iD1bPlcb0e+ahwwk6eckA1t9cTTGcL/KE34kxxUXoEe1G/0 dMmVO1EC7dDJC5NvIUvzUOnm7lUblM/yzDQOI2Y6lxm6kpNVSp4+rWostidvOBR4+j blxM+1+DZuql4SzG/ZRC83Id3WkAn8qtcLb4dwQZ7+7xm92f0iFqAo0S3qfG3tRWDU iObNVV2L4qftie9pZPXBp/Cy6387r7c9iNdWxbGotn7CPd7j3dj3FiSxdoC+1yF5Mg R0/GKjaNh+tHg== Received: by paulmck-ThinkPad-P17-Gen-1.home (Postfix, from userid 1000) id 7407ACE0889; Sun, 8 Jun 2025 17:25:05 -0700 (PDT) Date: Sun, 8 Jun 2025 17:25:05 -0700 From: "Paul E. McKenney" To: Uladzislau Rezki Cc: Kent Overstreet , syzbot , akpm@linux-foundation.org, josh@joshtriplett.org, linux-bcachefs@vger.kernel.org, linux-kernel@vger.kernel.org, linux-mm@kvack.org, rcu@vger.kernel.org, syzkaller-bugs@googlegroups.com Subject: Re: [syzbot] [rcu?] [bcachefs?] BUG: unable to handle kernel NULL pointer dereference in rcu_core (3) Message-ID: <602bb1be-f4a4-4194-803f-856e95711870@paulmck-laptop> Reply-To: paulmck@kernel.org References: <67a2b20a.050a0220.50516.0003.GAE@google.com> <9694d40a-072e-47c2-a950-3b258bbe04f5@paulmck-laptop> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: X-Rspamd-Server: rspam05 X-Rspamd-Queue-Id: 01D83140002 X-Stat-Signature: jbybqxi4gch6pksya5ksqsr4ih3yjnjb X-Rspam-User: X-HE-Tag: 1749428706-438326 X-HE-Meta: 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 2aWnXiaR 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 MZlFyfiN P+Ik4D/m6qOeulR/+6Hr86wWXa/I0y6IMP0IdxVikuBYaApBYv4ASyZGY0toXHsdbHOTLwHelrfoPqIAlTJP0YP5i3d8fHrPXKHCATPBS5E8gbTNk0menFUHt8PEsUB91uEHhnyN1noll8jjEL7pFwFiCBVmP1vFMBvGuKwKVGvdrO65TDpN1VB/iIjSzpT3brBNig48mqm9avPgg4nzz8O7HuZD7UoesgqjA3QdrHeC+eY+6dM32/ZZfmMC2FYggvY5ZGIoTOT67gHUJLTXCzO2JQAzrxJ8a+niw8B5Ui1Wa+E3/CUHIsyHnjXvbP4CwPH1n9+oLMVq8Sg+eeEvEclzXvrzbuVL X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: On Sun, Jun 08, 2025 at 08:23:36PM +0200, Uladzislau Rezki wrote: > On Sun, Jun 08, 2025 at 11:26:28AM -0400, Kent Overstreet wrote: > > On Wed, Feb 05, 2025 at 06:56:19AM -0800, Paul E. McKenney wrote: > > > On Tue, Feb 04, 2025 at 04:34:18PM -0800, syzbot wrote: > > > > Hello, > > > > > > > > syzbot found the following issue on: > > > > > > > > HEAD commit: 0de63bb7d919 Merge tag 'pull-fix' of git://git.kernel.org/.. > > > > git tree: upstream > > > > console output: https://syzkaller.appspot.com/x/log.txt?x=10faf5f8580000 > > > > kernel config: https://syzkaller.appspot.com/x/.config?x=1909f2f0d8e641ce > > > > dashboard link: https://syzkaller.appspot.com/bug?extid=80e5d6f453f14a53383a > > > > compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 > > > > syz repro: https://syzkaller.appspot.com/x/repro.syz?x=16b69d18580000 > > > > > > > > Downloadable assets: > > > > disk image (non-bootable): https://storage.googleapis.com/syzbot-assets/7feb34a89c2a/non_bootable_disk-0de63bb7.raw.xz > > > > vmlinux: https://storage.googleapis.com/syzbot-assets/1142009a30a7/vmlinux-0de63bb7.xz > > > > kernel image: https://storage.googleapis.com/syzbot-assets/5d9e46a8998d/bzImage-0de63bb7.xz > > > > mounted in repro: https://storage.googleapis.com/syzbot-assets/526692501242/mount_0.gz > > > > > > > > IMPORTANT: if you fix the issue, please add the following tag to the commit: > > > > Reported-by: syzbot+80e5d6f453f14a53383a@syzkaller.appspotmail.com > > > > > > > > slab radix_tree_node start ffff88803bf382c0 pointer offset 24 size 576 > > > > BUG: kernel NULL pointer dereference, address: 0000000000000000 > > > > #PF: supervisor instruction fetch in kernel mode > > > > #PF: error_code(0x0010) - not-present page > > > > PGD 0 P4D 0 > > > > Oops: Oops: 0010 [#1] PREEMPT SMP KASAN NOPTI > > > > CPU: 0 UID: 0 PID: 5705 Comm: syz-executor Not tainted 6.14.0-rc1-syzkaller-00020-g0de63bb7d919 #0 > > > > Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014 > > > > RIP: 0010:0x0 > > > > Code: Unable to access opcode bytes at 0xffffffffffffffd6. > > > > RSP: 0018:ffffc90000007bd8 EFLAGS: 00010246 > > > > RAX: dffffc0000000000 RBX: 1ffff110077e705c RCX: 23438dd059a4b100 > > > > RDX: 0000000000000100 RSI: 0000000000000000 RDI: ffff88803bf382d8 > > > > RBP: ffffc90000007e10 R08: ffffffff819f146c R09: 1ffff11003f8519a > > > > R10: dffffc0000000000 R11: 0000000000000000 R12: ffffffff81a6d507 > > > > R13: ffff88803bf382e0 R14: 0000000000000000 R15: ffff88803bf382d8 > > > > FS: 0000555567992500(0000) GS:ffff88801fc00000(0000) knlGS:0000000000000000 > > > > CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 > > > > CR2: ffffffffffffffd6 CR3: 000000004da38000 CR4: 0000000000352ef0 > > > > DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 > > > > DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 > > > > Call Trace: > > > > > > > > rcu_do_batch kernel/rcu/tree.c:2546 [inline] > > > > > > The usual way that this happens is that someone clobbers the rcu_head > > > structure of something that has been passed to call_rcu(). The most > > > popular way of clobbering this structure is to pass the same something to > > > call_rcu() twice in a row, but other creative arrangements are possible. > > > > > > Building your kernel with CONFIG_DEBUG_OBJECTS_RCU_HEAD=y can usually > > > spot invoking call_rcu() twice in a row. > > > > I don't think it's that - syzbot's .config already has that enabled. > > KASAN, too. > > > > And the only place we do call_rcu() is from rcu_pending.c, where we've > > got a rearming rcu callback - but we track whether it's outstanding, and > > we do all relevant operations with a lock held. > > > > And we only use rcu_pending.c with SRCU, not regular RCU. > > > > We do use kfree_rcu() in a few places (all boring, I expect), but that > > doesn't (generally?) use the rcu callback list. > > > Right, kvfree_rcu() does not intersect with regular callbacks, it has > its own path. > > It looks like the problem is here: > > > f = rhp->func; > debug_rcu_head_callback(rhp); > WRITE_ONCE(rhp->func, (rcu_callback_t)0L); > f(rhp); > > > we do not check if callback, "f", is a NULL. If it is, the kernel bug > is triggered right away. For example: > > call_rcu(&rh, NULL); > > @Paul, do you think it makes sense to narrow callers which apparently > pass NULL as a callback? To me it seems the case of this bug. But we > do not know the source. > > It would give at least a stack-trace of caller which passes a NULL. Adding a check for NULL func passed to __call_rcu_common(), you mean? That wouldn't hurt, and would either (as you say) catch the culprit or show that the problem is elsewhere. Thanx, Paul