* general protection fault in io_poll_double_wake @ 2020-08-15 17:00 syzbot 2020-08-15 18:16 ` Jens Axboe 0 siblings, 1 reply; 3+ messages in thread From: syzbot @ 2020-08-15 17:00 UTC (permalink / raw) To: axboe, io-uring, linux-fsdevel, linux-kernel, syzkaller-bugs, viro Hello, syzbot found the following issue on: HEAD commit: 7fca4dee Merge tag 'powerpc-5.9-2' of git://git.kernel.org.. git tree: upstream console output: https://syzkaller.appspot.com/x/log.txt?x=1264d116900000 kernel config: https://syzkaller.appspot.com/x/.config?x=21f0d1d2df6d5fc dashboard link: https://syzkaller.appspot.com/bug?extid=7f617d4a9369028b8a2c compiler: clang version 10.0.0 (https://github.com/llvm/llvm-project/ c2443155a0fb245c8f17f2c1c72b6ea391e86e81) syz repro: https://syzkaller.appspot.com/x/repro.syz?x=10f211d2900000 C reproducer: https://syzkaller.appspot.com/x/repro.c?x=1721b0ce900000 The issue was bisected to: commit 18bceab101adde8f38de76016bc77f3f25cf22f4 Author: Jens Axboe <[email protected]> Date: Fri May 15 17:56:54 2020 +0000 io_uring: allow POLL_ADD with double poll_wait() users bisection log: https://syzkaller.appspot.com/x/bisect.txt?x=1498125e900000 final oops: https://syzkaller.appspot.com/x/report.txt?x=1698125e900000 console output: https://syzkaller.appspot.com/x/log.txt?x=1298125e900000 IMPORTANT: if you fix the issue, please add the following tag to the commit: Reported-by: [email protected] Fixes: 18bceab101ad ("io_uring: allow POLL_ADD with double poll_wait() users") general protection fault, probably for non-canonical address 0xdffffc0000000008: 0000 [#1] PREEMPT SMP KASAN KASAN: null-ptr-deref in range [0x0000000000000040-0x0000000000000047] CPU: 0 PID: 6842 Comm: syz-executor006 Not tainted 5.8.0-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:io_poll_double_wake+0x6b/0x360 fs/io_uring.c:4589 Code: 8d 9d b8 00 00 00 48 89 d8 48 c1 e8 03 42 80 3c 20 00 74 08 48 89 df e8 53 64 de ff 48 8b 1b 48 83 c3 40 48 89 d8 48 c1 e8 03 <42> 80 3c 20 00 74 08 48 89 df e8 36 64 de ff 4c 8b 33 31 ff 44 89 RSP: 0018:ffffc90001717b20 EFLAGS: 00010002 RAX: 0000000000000008 RBX: 0000000000000040 RCX: ffff88809e0fe4c0 RDX: 0000000000000000 RSI: 0000000000000001 RDI: ffff8880a2e7dc98 RBP: ffff8880a2e7dc98 R08: 0000000000000000 R09: ffffc90001717be8 R10: fffff520002e2f70 R11: 0000000000000000 R12: dffffc0000000000 R13: ffff88809a429e40 R14: 0000000000000000 R15: 0000000000000000 FS: 0000000002640880(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f2629c956c0 CR3: 000000009e4e7000 CR4: 00000000001506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: __wake_up_common+0x30a/0x4e0 kernel/sched/wait.c:93 __wake_up_common_lock kernel/sched/wait.c:123 [inline] __wake_up+0xd4/0x150 kernel/sched/wait.c:142 n_tty_set_termios+0xa60/0x1080 drivers/tty/n_tty.c:1874 tty_set_termios+0xcac/0x1510 drivers/tty/tty_ioctl.c:341 set_termios+0x4a1/0x580 drivers/tty/tty_ioctl.c:414 tty_mode_ioctl+0x7b2/0xa80 drivers/tty/tty_ioctl.c:770 tty_ioctl+0xf81/0x15c0 drivers/tty/tty_io.c:2665 vfs_ioctl fs/ioctl.c:48 [inline] __do_sys_ioctl fs/ioctl.c:753 [inline] __se_sys_ioctl+0xfb/0x170 fs/ioctl.c:739 do_syscall_64+0x31/0x70 arch/x86/entry/common.c:46 entry_SYSCALL_64_after_hwframe+0x44/0xa9 RIP: 0033:0x4405d9 Code: 18 89 d0 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db 13 fc ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007ffe5f581ef8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 0000000000401ed0 RCX: 00000000004405d9 RDX: 0000000020000080 RSI: 0000000000005404 RDI: 0000000000000004 RBP: 00000000006ca018 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000003e69 R11: 0000000000000246 R12: 0000000000401e40 R13: 0000000000401ed0 R14: 0000000000000000 R15: 0000000000000000 Modules linked in: ---[ end trace 9d629bc7ccf35892 ]--- RIP: 0010:io_poll_double_wake+0x6b/0x360 fs/io_uring.c:4589 Code: 8d 9d b8 00 00 00 48 89 d8 48 c1 e8 03 42 80 3c 20 00 74 08 48 89 df e8 53 64 de ff 48 8b 1b 48 83 c3 40 48 89 d8 48 c1 e8 03 <42> 80 3c 20 00 74 08 48 89 df e8 36 64 de ff 4c 8b 33 31 ff 44 89 RSP: 0018:ffffc90001717b20 EFLAGS: 00010002 RAX: 0000000000000008 RBX: 0000000000000040 RCX: ffff88809e0fe4c0 RDX: 0000000000000000 RSI: 0000000000000001 RDI: ffff8880a2e7dc98 RBP: ffff8880a2e7dc98 R08: 0000000000000000 R09: ffffc90001717be8 R10: fffff520002e2f70 R11: 0000000000000000 R12: dffffc0000000000 R13: ffff88809a429e40 R14: 0000000000000000 R15: 0000000000000000 FS: 0000000002640880(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f2629c956c0 CR3: 000000009e4e7000 CR4: 00000000001506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 --- This report is generated by a bot. It may contain errors. See https://goo.gl/tpsmEJ for more information about syzbot. syzbot engineers can be reached at [email protected]. syzbot will keep track of this issue. See: https://goo.gl/tpsmEJ#status for how to communicate with syzbot. For information about bisection process see: https://goo.gl/tpsmEJ#bisection syzbot can test patches for this issue, for details see: https://goo.gl/tpsmEJ#testing-patches ^ permalink raw reply [flat|nested] 3+ messages in thread
* Re: general protection fault in io_poll_double_wake 2020-08-15 17:00 general protection fault in io_poll_double_wake syzbot @ 2020-08-15 18:16 ` Jens Axboe 2020-08-15 18:48 ` Jens Axboe 0 siblings, 1 reply; 3+ messages in thread From: Jens Axboe @ 2020-08-15 18:16 UTC (permalink / raw) To: syzbot, io-uring, linux-fsdevel, linux-kernel, syzkaller-bugs, viro On 8/15/20 10:00 AM, syzbot wrote: > Hello, > > syzbot found the following issue on: > > HEAD commit: 7fca4dee Merge tag 'powerpc-5.9-2' of git://git.kernel.org.. > git tree: upstream > console output: https://syzkaller.appspot.com/x/log.txt?x=1264d116900000 > kernel config: https://syzkaller.appspot.com/x/.config?x=21f0d1d2df6d5fc > dashboard link: https://syzkaller.appspot.com/bug?extid=7f617d4a9369028b8a2c > compiler: clang version 10.0.0 (https://github.com/llvm/llvm-project/ c2443155a0fb245c8f17f2c1c72b6ea391e86e81) > syz repro: https://syzkaller.appspot.com/x/repro.syz?x=10f211d2900000 > C reproducer: https://syzkaller.appspot.com/x/repro.c?x=1721b0ce900000 > > The issue was bisected to: > > commit 18bceab101adde8f38de76016bc77f3f25cf22f4 > Author: Jens Axboe <[email protected]> > Date: Fri May 15 17:56:54 2020 +0000 > > io_uring: allow POLL_ADD with double poll_wait() users I can reproduce this, I'll fix it up. Thanks! -- Jens Axboe ^ permalink raw reply [flat|nested] 3+ messages in thread
* Re: general protection fault in io_poll_double_wake 2020-08-15 18:16 ` Jens Axboe @ 2020-08-15 18:48 ` Jens Axboe 0 siblings, 0 replies; 3+ messages in thread From: Jens Axboe @ 2020-08-15 18:48 UTC (permalink / raw) To: syzbot, io-uring, linux-fsdevel, linux-kernel, syzkaller-bugs, viro On 8/15/20 11:16 AM, Jens Axboe wrote: > On 8/15/20 10:00 AM, syzbot wrote: >> Hello, >> >> syzbot found the following issue on: >> >> HEAD commit: 7fca4dee Merge tag 'powerpc-5.9-2' of git://git.kernel.org.. >> git tree: upstream >> console output: https://syzkaller.appspot.com/x/log.txt?x=1264d116900000 >> kernel config: https://syzkaller.appspot.com/x/.config?x=21f0d1d2df6d5fc >> dashboard link: https://syzkaller.appspot.com/bug?extid=7f617d4a9369028b8a2c >> compiler: clang version 10.0.0 (https://github.com/llvm/llvm-project/ c2443155a0fb245c8f17f2c1c72b6ea391e86e81) >> syz repro: https://syzkaller.appspot.com/x/repro.syz?x=10f211d2900000 >> C reproducer: https://syzkaller.appspot.com/x/repro.c?x=1721b0ce900000 >> >> The issue was bisected to: >> >> commit 18bceab101adde8f38de76016bc77f3f25cf22f4 >> Author: Jens Axboe <[email protected]> >> Date: Fri May 15 17:56:54 2020 +0000 >> >> io_uring: allow POLL_ADD with double poll_wait() users > > I can reproduce this, I'll fix it up. Thanks! This should fix it: From 34fc8d0b76572c9fb184ab589d682dccfeb5c039 Mon Sep 17 00:00:00 2001 From: Jens Axboe <[email protected]> Date: Sat, 15 Aug 2020 11:44:50 -0700 Subject: [PATCH] io_uring: sanitize double poll handling There's a bit of confusion on the matching pairs of poll vs double poll, depending on if the request is a pure poll (IORING_OP_POLL_ADD) or poll driven retry. Add io_poll_get_double() that returns the double poll waitqueue, if any, and io_poll_get_single() that returns the original poll waitqueue. With that, remove the argument to io_poll_remove_double(). Finally ensure that wait->private is cleared once the double poll handler has run, so that remove knows it's already been seen. Cc: [email protected] # v5.8 Reported-by: [email protected] Fixes: 18bceab101ad ("io_uring: allow POLL_ADD with double poll_wait() users") Signed-off-by: Jens Axboe <[email protected]> --- fs/io_uring.c | 34 +++++++++++++++++++++++++--------- 1 file changed, 25 insertions(+), 9 deletions(-) diff --git a/fs/io_uring.c b/fs/io_uring.c index 7dd6df15bc49..cb030912bf5e 100644 --- a/fs/io_uring.c +++ b/fs/io_uring.c @@ -4649,9 +4649,24 @@ static bool io_poll_rewait(struct io_kiocb *req, struct io_poll_iocb *poll) return false; } -static void io_poll_remove_double(struct io_kiocb *req, void *data) +static struct io_poll_iocb *io_poll_get_double(struct io_kiocb *req) { - struct io_poll_iocb *poll = data; + /* pure poll stashes this in ->io, poll driven retry elsewhere */ + if (req->opcode == IORING_OP_POLL_ADD) + return (struct io_poll_iocb *) req->io; + return req->apoll->double_poll; +} + +static struct io_poll_iocb *io_poll_get_single(struct io_kiocb *req) +{ + if (req->opcode == IORING_OP_POLL_ADD) + return &req->poll; + return &req->apoll->poll; +} + +static void io_poll_remove_double(struct io_kiocb *req) +{ + struct io_poll_iocb *poll = io_poll_get_double(req); lockdep_assert_held(&req->ctx->completion_lock); @@ -4671,7 +4686,7 @@ static void io_poll_complete(struct io_kiocb *req, __poll_t mask, int error) { struct io_ring_ctx *ctx = req->ctx; - io_poll_remove_double(req, req->io); + io_poll_remove_double(req); req->poll.done = true; io_cqring_fill_event(req, error ? error : mangle_poll(mask)); io_commit_cqring(ctx); @@ -4711,7 +4726,7 @@ static int io_poll_double_wake(struct wait_queue_entry *wait, unsigned mode, int sync, void *key) { struct io_kiocb *req = wait->private; - struct io_poll_iocb *poll = req->apoll->double_poll; + struct io_poll_iocb *poll = io_poll_get_single(req); __poll_t mask = key_to_poll(key); /* for instances that support it check for an event match first: */ @@ -4725,6 +4740,8 @@ static int io_poll_double_wake(struct wait_queue_entry *wait, unsigned mode, done = list_empty(&poll->wait.entry); if (!done) list_del_init(&poll->wait.entry); + /* make sure double remove sees this as being gone */ + wait->private = NULL; spin_unlock(&poll->head->lock); if (!done) __io_async_wake(req, poll, mask, io_poll_task_func); @@ -4808,7 +4825,7 @@ static void io_async_task_func(struct callback_head *cb) if (hash_hashed(&req->hash_node)) hash_del(&req->hash_node); - io_poll_remove_double(req, apoll->double_poll); + io_poll_remove_double(req); spin_unlock_irq(&ctx->completion_lock); if (!READ_ONCE(apoll->poll.canceled)) @@ -4919,7 +4936,7 @@ static bool io_arm_poll_handler(struct io_kiocb *req) ret = __io_arm_poll_handler(req, &apoll->poll, &ipt, mask, io_async_wake); if (ret || ipt.error) { - io_poll_remove_double(req, apoll->double_poll); + io_poll_remove_double(req); spin_unlock_irq(&ctx->completion_lock); kfree(apoll->double_poll); kfree(apoll); @@ -4951,14 +4968,13 @@ static bool io_poll_remove_one(struct io_kiocb *req) { bool do_complete; + io_poll_remove_double(req); + if (req->opcode == IORING_OP_POLL_ADD) { - io_poll_remove_double(req, req->io); do_complete = __io_poll_remove_one(req, &req->poll); } else { struct async_poll *apoll = req->apoll; - io_poll_remove_double(req, apoll->double_poll); - /* non-poll requests have submit ref still */ do_complete = __io_poll_remove_one(req, &apoll->poll); if (do_complete) { -- 2.28.0 -- Jens Axboe ^ permalink raw reply related [flat|nested] 3+ messages in thread
end of thread, other threads:[~2020-08-15 21:59 UTC | newest] Thread overview: 3+ messages (download: mbox.gz follow: Atom feed -- links below jump to the message on this page -- 2020-08-15 17:00 general protection fault in io_poll_double_wake syzbot 2020-08-15 18:16 ` Jens Axboe 2020-08-15 18:48 ` Jens Axboe
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox