From: Oleg Nesterov <oleg@redhat.com>
To: Peter Zijlstra <peterz@infradead.org>
Cc: Hillf Danton <hdanton@sina.com>, Song Liu <songliubraving@fb.com>,
Namhyung Kim <namhyung@kernel.org>,
syzbot <syzbot+b804f902bbb6bcf290cb@syzkaller.appspotmail.com>,
Srikar Dronamraju <srikar@linux.vnet.ibm.com>,
Greg KH <gregkh@linuxfoundation.org>,
linux-kernel@vger.kernel.org, syzkaller-bugs@googlegroups.com
Subject: Re: perf_buffer.event_list is not RCU-safe?
Date: Wed, 7 Apr 2021 14:30:38 +0200 [thread overview]
Message-ID: <20210407123038.GA22407@redhat.com> (raw)
In-Reply-To: <YG1kXApqMm/XOcDR@hirez.programming.kicks-ass.net>
On 04/07, Peter Zijlstra wrote:
>
> On Tue, Apr 06, 2021 at 07:43:53PM +0200, Oleg Nesterov wrote:
> > On 04/06, Oleg Nesterov wrote:
> > >
> > > perf_mmap_close() was added by 9bb5d40cd93c9 ("perf: Fix mmap() accounting hole")
> >
> > I meant perf_mmap_close() -> put_event()
> >
> > > and this commit doesn't look right anyway
> >
> > It seems there is another problem or I am totally confused. I do not
> > understand why can we use list_for_each_entry_rcu(event, rb->event_list)
> > if this can race with perf_event_set_output(event) which can move "event"
> > to another list, in this case list_for_each_entry_rcu() can loop forever.
> >
> > perf_mmap_close() even mentions this race and restarts the iteration to
> > avoid it but I don't think this is enough,
> >
> > rcu_read_lock();
> > list_for_each_entry_rcu(event, &rb->event_list, rb_entry) {
> > if (!atomic_long_inc_not_zero(&event->refcount)) {
> > /*
> > * This event is en-route to free_event() which will
> > * detach it and remove it from the list.
> > */
> > continue;
> > }
> >
> > just suppose that "this event" is moved to another list first and after
> > that it goes away so that atomic_long_inc_not_zero() fails; in this case
> > the next iteration will play with event->rb_entry.next, and this is not
> > necessarily "struct perf_event", it can can be "list_head event_list".
>
> We observe an RCU GP in ring_buffer_attach(), between detach and attach,
> no?
Aaah yes, I didn't notice cond_synchronize_rcu() in ring_buffer_attach().
Thanks!
Oleg.
prev parent reply other threads:[~2021-04-07 12:30 UTC|newest]
Thread overview: 9+ messages / expand[flat|nested] mbox.gz Atom feed top
2021-03-26 10:29 [syzbot] possible deadlock in register_for_each_vma syzbot
[not found] ` <20210327042150.7460-1-hdanton@sina.com>
2021-03-27 17:53 ` Oleg Nesterov
[not found] ` <20210328025217.7312-1-hdanton@sina.com>
2021-03-31 16:59 ` Oleg Nesterov
2021-03-31 20:18 ` Song Liu
[not found] ` <20210401092907.1098-1-hdanton@sina.com>
2021-04-01 10:53 ` Oleg Nesterov
[not found] ` <20210402074636.1270-1-hdanton@sina.com>
2021-04-06 17:23 ` perf_mmap_close() -> put_event() -> event.destroy() can deadlock Oleg Nesterov
2021-04-06 17:43 ` perf_buffer.event_list is not RCU-safe? Oleg Nesterov
2021-04-07 7:50 ` Peter Zijlstra
2021-04-07 12:30 ` Oleg Nesterov [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20210407123038.GA22407@redhat.com \
--to=oleg@redhat.com \
--cc=gregkh@linuxfoundation.org \
--cc=hdanton@sina.com \
--cc=linux-kernel@vger.kernel.org \
--cc=namhyung@kernel.org \
--cc=peterz@infradead.org \
--cc=songliubraving@fb.com \
--cc=srikar@linux.vnet.ibm.com \
--cc=syzbot+b804f902bbb6bcf290cb@syzkaller.appspotmail.com \
--cc=syzkaller-bugs@googlegroups.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox