[syzbot] [virt?] KCSAN: data-race in virtqueue_disable_cb / virtqueue_disable_cb (5)

19 views
Skip to first unread message

syzbot

unread,
Oct 22, 2024, 6:07:31 AM10/22/24
to eper...@redhat.com, jaso...@redhat.com, linux-...@vger.kernel.org, m...@redhat.com, syzkall...@googlegroups.com, virtual...@lists.linux.dev, xuan...@linux.alibaba.com
Hello,

syzbot found the following issue on:

HEAD commit: 3d5ad2d4eca3 Merge tag 'bpf-fixes' of git://git.kernel.org..
git tree: upstream
console output: https://syzkaller.appspot.com/x/log.txt?x=154b7487980000
kernel config: https://syzkaller.appspot.com/x/.config?x=fd83253b74c9c570
dashboard link: https://syzkaller.appspot.com/bug?extid=9d46c74b27b961b244a9
compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40

Unfortunately, I don't have any reproducer for this issue yet.

Downloadable assets:
disk image: https://storage.googleapis.com/syzbot-assets/9d112e37e26b/disk-3d5ad2d4.raw.xz
vmlinux: https://storage.googleapis.com/syzbot-assets/d8f036bdcdb7/vmlinux-3d5ad2d4.xz
kernel image: https://storage.googleapis.com/syzbot-assets/61727d52db48/bzImage-3d5ad2d4.xz

IMPORTANT: if you fix the issue, please add the following tag to the commit:
Reported-by: syzbot+9d46c7...@syzkaller.appspotmail.com

==================================================================
BUG: KCSAN: data-race in virtqueue_disable_cb / virtqueue_disable_cb

read to 0xffff888102c18178 of 2 bytes by interrupt on cpu 1:
virtqueue_disable_cb_split drivers/virtio/virtio_ring.c:885 [inline]
virtqueue_disable_cb+0x63/0x180 drivers/virtio/virtio_ring.c:2446
skb_xmit_done+0x5f/0x140 drivers/net/virtio_net.c:715
vring_interrupt+0x161/0x190 drivers/virtio/virtio_ring.c:2595
__handle_irq_event_percpu+0x95/0x490 kernel/irq/handle.c:158
handle_irq_event_percpu kernel/irq/handle.c:193 [inline]
handle_irq_event+0x64/0xf0 kernel/irq/handle.c:210
handle_edge_irq+0x16d/0x5b0 kernel/irq/chip.c:831
generic_handle_irq_desc include/linux/irqdesc.h:173 [inline]
handle_irq arch/x86/kernel/irq.c:247 [inline]
call_irq_handler arch/x86/kernel/irq.c:259 [inline]
__common_interrupt+0x58/0xe0 arch/x86/kernel/irq.c:285
common_interrupt+0x7c/0x90 arch/x86/kernel/irq.c:278
asm_common_interrupt+0x26/0x40 arch/x86/include/asm/idtentry.h:693
kcsan_setup_watchpoint+0x404/0x410 kernel/kcsan/core.c:705
format_decode+0x1d1/0x8a0 lib/vsprintf.c:2554
vsnprintf+0xc6/0xe30 lib/vsprintf.c:2755
sprintf+0x89/0xb0 lib/vsprintf.c:3007
print_caller kernel/printk/printk.c:1373 [inline]
info_print_prefix+0x142/0x1a0 kernel/printk/printk.c:1390
record_print_text kernel/printk/printk.c:1437 [inline]
printk_get_next_message+0x446/0x6f0 kernel/printk/printk.c:2978
console_emit_next_record kernel/printk/printk.c:3046 [inline]
console_flush_all+0x28a/0x770 kernel/printk/printk.c:3180
__console_flush_and_unlock kernel/printk/printk.c:3239 [inline]
console_unlock+0xab/0x330 kernel/printk/printk.c:3279
vprintk_emit+0x3f4/0x680 kernel/printk/printk.c:2407
vprintk_default+0x26/0x30 kernel/printk/printk.c:2422
vprintk+0x75/0x80 kernel/printk/printk_safe.c:68
_printk+0x7a/0xa0 kernel/printk/printk.c:2432
batadv_check_known_mac_addr+0x153/0x180 net/batman-adv/hard-interface.c:528
batadv_hard_if_event+0x4b0/0x1010 net/batman-adv/hard-interface.c:998
notifier_call_chain kernel/notifier.c:93 [inline]
raw_notifier_call_chain+0x6f/0x1d0 kernel/notifier.c:461
call_netdevice_notifiers_info+0xae/0x100 net/core/dev.c:1996
call_netdevice_notifiers_extack net/core/dev.c:2034 [inline]
call_netdevice_notifiers net/core/dev.c:2048 [inline]
dev_set_mac_address+0x1ff/0x260 net/core/dev.c:9104
dev_set_mac_address_user+0x31/0x50 net/core/dev.c:9118
do_setlink+0x513/0x2490 net/core/rtnetlink.c:2884
__rtnl_newlink net/core/rtnetlink.c:3725 [inline]
rtnl_newlink+0x11a3/0x1690 net/core/rtnetlink.c:3772
rtnetlink_rcv_msg+0x6aa/0x710 net/core/rtnetlink.c:6675
netlink_rcv_skb+0x12c/0x230 net/netlink/af_netlink.c:2551
rtnetlink_rcv+0x1c/0x30 net/core/rtnetlink.c:6693
netlink_unicast_kernel net/netlink/af_netlink.c:1331 [inline]
netlink_unicast+0x599/0x670 net/netlink/af_netlink.c:1357
netlink_sendmsg+0x5cc/0x6e0 net/netlink/af_netlink.c:1901
sock_sendmsg_nosec net/socket.c:729 [inline]
__sock_sendmsg+0x140/0x180 net/socket.c:744
__sys_sendto+0x1d6/0x260 net/socket.c:2214
__do_sys_sendto net/socket.c:2226 [inline]
__se_sys_sendto net/socket.c:2222 [inline]
__x64_sys_sendto+0x78/0x90 net/socket.c:2222
x64_sys_call+0x2959/0x2d60 arch/x86/include/generated/asm/syscalls_64.h:45
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xc9/0x1c0 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f

write to 0xffff888102c18178 of 2 bytes by task 3255 on cpu 0:
virtqueue_disable_cb_split drivers/virtio/virtio_ring.c:886 [inline]
virtqueue_disable_cb+0x85/0x180 drivers/virtio/virtio_ring.c:2446
start_xmit+0x14b/0x1260 drivers/net/virtio_net.c:3067
__netdev_start_xmit include/linux/netdevice.h:4916 [inline]
netdev_start_xmit include/linux/netdevice.h:4925 [inline]
xmit_one net/core/dev.c:3588 [inline]
dev_hard_start_xmit+0x119/0x3f0 net/core/dev.c:3604
sch_direct_xmit+0x1a9/0x580 net/sched/sch_generic.c:343
__dev_xmit_skb net/core/dev.c:3821 [inline]
__dev_queue_xmit+0xf1a/0x2040 net/core/dev.c:4394
dev_queue_xmit include/linux/netdevice.h:3094 [inline]
neigh_hh_output include/net/neighbour.h:526 [inline]
neigh_output include/net/neighbour.h:540 [inline]
ip_finish_output2+0x73d/0x8b0 net/ipv4/ip_output.c:236
ip_finish_output+0x11a/0x2a0 net/ipv4/ip_output.c:324
NF_HOOK_COND include/linux/netfilter.h:303 [inline]
ip_output+0xab/0x170 net/ipv4/ip_output.c:434
dst_output include/net/dst.h:450 [inline]
ip_local_out net/ipv4/ip_output.c:130 [inline]
__ip_queue_xmit+0xbcc/0xbf0 net/ipv4/ip_output.c:536
ip_queue_xmit+0x38/0x50 net/ipv4/ip_output.c:550
__tcp_transmit_skb+0x15b0/0x1970 net/ipv4/tcp_output.c:1466
__tcp_send_ack+0x1de/0x2e0 net/ipv4/tcp_output.c:4268
tcp_send_ack+0x27/0x30 net/ipv4/tcp_output.c:4274
__tcp_cleanup_rbuf+0x149/0x280 net/ipv4/tcp.c:1505
tcp_cleanup_rbuf net/ipv4/tcp.c:1516 [inline]
tcp_recvmsg_locked+0x1be3/0x2100 net/ipv4/tcp.c:2821
tcp_recvmsg+0x13c/0x490 net/ipv4/tcp.c:2851
inet_recvmsg+0xbd/0x290 net/ipv4/af_inet.c:885
sock_recvmsg_nosec net/socket.c:1051 [inline]
sock_recvmsg+0xfe/0x170 net/socket.c:1073
sock_read_iter+0x14c/0x1a0 net/socket.c:1143
new_sync_read fs/read_write.c:488 [inline]
vfs_read+0x5f6/0x720 fs/read_write.c:569
ksys_read+0xeb/0x1b0 fs/read_write.c:712
__do_sys_read fs/read_write.c:722 [inline]
__se_sys_read fs/read_write.c:720 [inline]
__x64_sys_read+0x42/0x50 fs/read_write.c:720
x64_sys_call+0x27d3/0x2d60 arch/x86/include/generated/asm/syscalls_64.h:1
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xc9/0x1c0 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f

value changed: 0x0000 -> 0x0001

Reported by Kernel Concurrency Sanitizer on:
CPU: 0 UID: 0 PID: 3255 Comm: syz-executor Not tainted 6.12.0-rc3-syzkaller-00389-g3d5ad2d4eca3 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
==================================================================


---
This report is generated by a bot. It may contain errors.
See https://goo.gl/tpsmEJ for more information about syzbot.
syzbot engineers can be reached at syzk...@googlegroups.com.

syzbot will keep track of this issue. See:
https://goo.gl/tpsmEJ#status for how to communicate with syzbot.

If the report is already addressed, let syzbot know by replying with:
#syz fix: exact-commit-title

If you want to overwrite report's subsystems, reply with:
#syz set subsystems: new-subsystem
(See the list of subsystem names on the web dashboard)

If the report is a duplicate of another one, reply with:
#syz dup: exact-subject-of-another-report

If you want to undo deduplication, reply with:
#syz undup

Jason Wang

unread,
Oct 22, 2024, 11:31:37 PM10/22/24
to syzbot, eper...@redhat.com, linux-...@vger.kernel.org, m...@redhat.com, syzkall...@googlegroups.com, virtual...@lists.linux.dev, xuan...@linux.alibaba.com
On Tue, Oct 22, 2024 at 6:07 PM syzbot
<syzbot+9d46c7...@syzkaller.appspotmail.com> wrote:
>
> Hello,
>
> syzbot found the following issue on:
>
> HEAD commit: 3d5ad2d4eca3 Merge tag 'bpf-fixes' of git://git.kernel.org..
> git tree: upstream
> console output: https://syzkaller.appspot.com/x/log.txt?x=154b7487980000
> kernel config: https://syzkaller.appspot.com/x/.config?x=fd83253b74c9c570
> dashboard link: https://syzkaller.appspot.com/bug?extid=9d46c74b27b961b244a9
> compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40
>
> Unfortunately, I don't have any reproducer for this issue yet.
>
> Downloadable assets:
> disk image: https://storage.googleapis.com/syzbot-assets/9d112e37e26b/disk-3d5ad2d4.raw.xz
> vmlinux: https://storage.googleapis.com/syzbot-assets/d8f036bdcdb7/vmlinux-3d5ad2d4.xz
> kernel image: https://storage.googleapis.com/syzbot-assets/61727d52db48/bzImage-3d5ad2d4.xz
>
> IMPORTANT: if you fix the issue, please add the following tag to the commit:
> Reported-by: syzbot+9d46c7...@syzkaller.appspotmail.com
>
> ==================================================================
> BUG: KCSAN: data-race in virtqueue_disable_cb / virtqueue_disable_cb
>
> read to 0xffff888102c18178 of 2 bytes by interrupt on cpu 1:
> virtqueue_disable_cb_split drivers/virtio/virtio_ring.c:885 [inline]

static void virtqueue_disable_cb_split(struct virtqueue *_vq)
{
struct vring_virtqueue *vq = to_vvq(_vq);

if (!(vq->split.avail_flags_shadow & VRING_AVAIL_F_NO_INTERRUPT)) {
vq->split.avail_flags_shadow |= VRING_AVAIL_F_NO_INTERRUPT;

Seems indeed racy as it could write notification callbacks directly
without any protection.

It looks to me we can only fix this by using atomic operation,
Michael, do you have other idea?

Thanks
Reply all
Reply to author
Forward
0 new messages