All of lore.kernel.org
 help / color / mirror / Atom feed
From: Dmitry Vyukov <dvyukov@google.com>
To: Balbir Singh <bsingharora@gmail.com>
Cc: Marco Elver <elver@google.com>,
	syzbot <syzbot+c5d03165a1bd1dead0c1@syzkaller.appspotmail.com>,
	LKML <linux-kernel@vger.kernel.org>,
	syzkaller-bugs <syzkaller-bugs@googlegroups.com>
Subject: Re: KCSAN: data-race in taskstats_exit / taskstats_exit
Date: Fri, 8 Nov 2019 09:55:04 +0100	[thread overview]
Message-ID: <CACT4Y+Yb93ZFW-SJhN1fza2eDxyrnYVnwdBjYuVP+vY8DhNfJg@mail.gmail.com> (raw)
In-Reply-To: <acd6b0d98a7ebcb4ead9b263ec5c568c5a747166.camel@gmail.com>

On Fri, Nov 8, 2019 at 1:54 AM Balbir Singh <bsingharora@gmail.com> wrote:
>
> On Wed, 2019-11-06 at 11:23 +0100, Marco Elver wrote:
> > On Wed, 6 Nov 2019 at 01:10, Balbir Singh <bsingharora@gmail.com> wrote:
> > >
> > > On Fri, 2019-10-04 at 21:26 -0700, syzbot wrote:
> > > > Hello,
> > > >
> > > > syzbot found the following crash on:
> > > >
> > > > HEAD commit:    b4bd9343 x86, kcsan: Enable KCSAN for x86
> > > > git tree:       https://github.com/google/ktsan.git kcsan
> > > > console output: https://syzkaller.appspot.com/x/log.txt?x=125329db600000
> > > > kernel config:
> > > > https://syzkaller.appspot.com/x/.config?x=c0906aa620713d80
> > > > dashboard link:
> > > > https://syzkaller.appspot.com/bug?extid=c5d03165a1bd1dead0c1
> > > > compiler:       gcc (GCC) 9.0.0 20181231 (experimental)
> > > >
> > > > Unfortunately, I don't have any reproducer for this crash yet.
> > > >
> > > > IMPORTANT: if you fix the bug, please add the following tag to the
> > > > commit:
> > > > Reported-by: syzbot+c5d03165a1bd1dead0c1@syzkaller.appspotmail.com
> > > >
> > > > ==================================================================
> > > > BUG: KCSAN: data-race in taskstats_exit / taskstats_exit
> > > >
> > > > write to 0xffff8881157bbe10 of 8 bytes by task 7951 on cpu 0:
> > > >   taskstats_tgid_alloc kernel/taskstats.c:567 [inline]
> > > >   taskstats_exit+0x6b7/0x717 kernel/taskstats.c:596
> > > >   do_exit+0x2c2/0x18e0 kernel/exit.c:864
> > > >   do_group_exit+0xb4/0x1c0 kernel/exit.c:983
> > > >   get_signal+0x2a2/0x1320 kernel/signal.c:2734
> > > >   do_signal+0x3b/0xc00 arch/x86/kernel/signal.c:815
> > > >   exit_to_usermode_loop+0x250/0x2c0 arch/x86/entry/common.c:159
> > > >   prepare_exit_to_usermode arch/x86/entry/common.c:194 [inline]
> > > >   syscall_return_slowpath arch/x86/entry/common.c:274 [inline]
> > > >   do_syscall_64+0x2d7/0x2f0 arch/x86/entry/common.c:299
> > > >   entry_SYSCALL_64_after_hwframe+0x44/0xa9
> > > >
> > > > read to 0xffff8881157bbe10 of 8 bytes by task 7949 on cpu 1:
> > > >   taskstats_tgid_alloc kernel/taskstats.c:559 [inline]
> > > >   taskstats_exit+0xb2/0x717 kernel/taskstats.c:596
> > > >   do_exit+0x2c2/0x18e0 kernel/exit.c:864
> > > >   do_group_exit+0xb4/0x1c0 kernel/exit.c:983
> > > >   __do_sys_exit_group kernel/exit.c:994 [inline]
> > > >   __se_sys_exit_group kernel/exit.c:992 [inline]
> > > >   __x64_sys_exit_group+0x2e/0x30 kernel/exit.c:992
> > > >   do_syscall_64+0xcf/0x2f0 arch/x86/entry/common.c:296
> > > >   entry_SYSCALL_64_after_hwframe+0x44/0xa9
> > > >
> > >
> > > Sorry I've been away and just catching up with email
> > >
> > > I don't think this is a bug, if I interpret the report correctly it shows
> > > a
> > > race
> > >
> > > static struct taskstats *taskstats_tgid_alloc(struct task_struct *tsk)
> > > {
> > >         struct signal_struct *sig = tsk->signal;
> > >         struct taskstats *stats;
> > >
> > > #1      if (sig->stats || thread_group_empty(tsk)) <- the check of sig-
> > > >stats
> > >                 goto ret;
> > >
> > >         /* No problem if kmem_cache_zalloc() fails */
> > >         stats = kmem_cache_zalloc(taskstats_cache, GFP_KERNEL);
> > >
> > >         spin_lock_irq(&tsk->sighand->siglock);
> > >         if (!sig->stats) {
> > > #2              sig->stats = stats; <- here in setting sig->stats
> > >                 stats = NULL;
> > >         }
> > >         spin_unlock_irq(&tsk->sighand->siglock);
> > >
> > >         if (stats)
> > >                 kmem_cache_free(taskstats_cache, stats);
> > > ret:
> > >         return sig->stats;
> > > }
> > >
> > > The worst case scenario is that we might see sig->stats as being NULL when
> > > two
> > > threads belonging to the same tgid. We do free up stats if we got that
> > > wrong
> > >
> > > Am I misinterpreting the report?
> > >
> > > Balbir Singh.
> >
> > The plain concurrent reads/writes are a data race, which may manifest
> > in various undefined behaviour due to compiler optimizations [1, 2].
> > Note that, "data race" does not necessarily imply "race condition";
> > some data races are race conditions (usually the more interesting
> > bugs) -- but not *all* data races are race conditions (sometimes
> > referred to as "benign races"). KCSAN reports data races according to
> > the LKMM.
> > [1] https://lwn.net/Articles/793253/
> > [2] https://lwn.net/Articles/799218/
> >
> > If there is no race condition here that warrants heavier
> > synchronization (locking etc.), we still have the data race which
> > needs fixing by using marked atomic operations (READ_ONCE, WRITE_ONCE,
> > atomic_t, etc.). We also need to consider memory ordering requirements
> > (do we need smp_*mb(), smp_load_acquire/smp_store_release, ..)?
> >
> > In the case here, the pattern is double-checked locking, which is
> > incorrect without atomic operations and the correct memory ordering.
> > There is a lengthy discussion here:
> >
> https://lore.kernel.org/lkml/20191021113327.22365-1-christian.brauner@ubuntu.com/
> >
> >
>
> I am still not convinced unless someone can prove that unsigned long reads are
> non-atomic,

None of the relevant standards guarantee this. C standard very
explicitly states the opposite - any data race renders behavior of the
program as undefined. LKMM does not give any defined behavior to data
races either. QED ;)

> acquire/release and barriers semantics don't matter because the
> code deals with the race inside of a lock if the read was spurious, The
> assumption is based on the face that sig->stats can be NULL or the kzalloc'ed
> value in all cases.
>
> Balbir Singh.
>
> --
> You received this message because you are subscribed to the Google Groups "syzkaller-bugs" group.
> To unsubscribe from this group and stop receiving emails from it, send an email to syzkaller-bugs+unsubscribe@googlegroups.com.
> To view this discussion on the web visit https://groups.google.com/d/msgid/syzkaller-bugs/acd6b0d98a7ebcb4ead9b263ec5c568c5a747166.camel%40gmail.com.

  reply	other threads:[~2019-11-08  8:55 UTC|newest]

Thread overview: 62+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2019-10-05  4:26 KCSAN: data-race in taskstats_exit / taskstats_exit syzbot
2019-10-05  4:29 ` Dmitry Vyukov
2019-10-05 11:29   ` Christian Brauner
2019-10-05 11:28 ` [PATCH] taskstats: fix data-race Christian Brauner
2019-10-05 13:33   ` Marco Elver
2019-10-05 14:15     ` Christian Brauner
2019-10-05 14:34       ` Marco Elver
2019-10-06 10:00   ` Dmitry Vyukov
2019-10-06 10:59     ` Christian Brauner
2019-10-06 23:52   ` Christian Brauner
2019-10-07  7:31     ` Dmitry Vyukov
2019-10-07  9:29       ` Christian Brauner
2019-10-07 10:40     ` Andrea Parri
2019-10-07 10:50       ` Christian Brauner
2019-10-07 11:01       ` [PATCH v2] " Christian Brauner
2019-10-07 13:18         ` Andrea Parri
2019-10-07 13:28           ` Christian Brauner
2019-10-07 13:50           ` Dmitry Vyukov
2019-10-07 13:55             ` Christian Brauner
2019-10-07 14:08               ` Dmitry Vyukov
2019-10-07 14:10                 ` Christian Brauner
2019-10-07 14:14             ` Andrea Parri
2019-10-07 14:18               ` Dmitry Vyukov
2019-10-08 14:20                 ` Andrea Parri
2019-10-08 14:24                   ` Christian Brauner
2019-10-08 15:26                     ` Andrea Parri
2019-10-08 15:35                       ` Christian Brauner
2019-10-08 15:44                         ` Andrea Parri
2019-10-09 11:31                           ` [PATCH] " Christian Brauner
2019-10-09 11:40                             ` Christian Brauner
2019-10-09 11:48                             ` [PATCH v5] " Christian Brauner
2019-10-09 12:08                               ` Andrea Parri
2019-10-09 13:26                               ` Christian Brauner
2019-10-21 11:33                               ` [PATCH v6] " Christian Brauner
2019-10-21 12:19                                 ` Rasmus Villemoes
2019-10-21 13:04                                   ` Christian Brauner
2019-11-29 17:56                                     ` Will Deacon
2019-11-30 15:08                                       ` Christian Brauner
2019-10-23 12:16                                 ` Andrea Parri
2019-10-23 12:39                                   ` Dmitry Vyukov
2019-10-23 13:11                                     ` Christian Brauner
2019-10-23 13:20                                       ` Dmitry Vyukov
2019-10-24 11:31                                     ` Andrea Parri
2019-10-24 11:51                                       ` Dmitry Vyukov
2019-10-24 13:05                                         ` Andrea Parri
2019-10-24 13:13                                           ` Dmitry Vyukov
2019-10-24 13:21                                             ` Christian Brauner
2019-10-24 13:34                                               ` Dmitry Vyukov
2019-10-24 13:43                                             ` Andrea Parri
2019-10-24 13:58                                               ` Dmitry Vyukov
2019-10-24 14:40                                                 ` Andrea Parri
2019-10-24 14:49                                                   ` Dmitry Vyukov
2019-11-29 17:57                                 ` Will Deacon
2019-10-09 11:48                             ` [PATCH] " Marco Elver
2019-10-09 11:53                               ` Christian Brauner
2019-11-06  0:27   ` Balbir Singh
2019-11-06  0:09 ` KCSAN: data-race in taskstats_exit / taskstats_exit Balbir Singh
2019-11-06 10:23   ` Marco Elver
2019-11-07 10:39     ` Balbir Singh
2019-11-08  0:54     ` Balbir Singh
2019-11-08  8:55       ` Dmitry Vyukov [this message]
2019-11-09  3:42         ` Balbir Singh

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=CACT4Y+Yb93ZFW-SJhN1fza2eDxyrnYVnwdBjYuVP+vY8DhNfJg@mail.gmail.com \
    --to=dvyukov@google.com \
    --cc=bsingharora@gmail.com \
    --cc=elver@google.com \
    --cc=linux-kernel@vger.kernel.org \
    --cc=syzbot+c5d03165a1bd1dead0c1@syzkaller.appspotmail.com \
    --cc=syzkaller-bugs@googlegroups.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.