From: "Luck, Tony" <tony.luck@intel.com>
To: Reinette Chatre <reinette.chatre@intel.com>
Cc: Borislav Petkov <bp@alien8.de>, "x86@kernel.org" <x86@kernel.org>,
"Fenghua Yu" <fenghuay@nvidia.com>,
"Wieczor-Retman, Maciej" <maciej.wieczor-retman@intel.com>,
Peter Newman <peternewman@google.com>,
James Morse <james.morse@arm.com>,
Babu Moger <babu.moger@amd.com>,
"Drew Fustini" <dfustini@baylibre.com>,
Dave Martin <Dave.Martin@arm.com>,
"Chen, Yu C" <yu.c.chen@intel.com>,
"linux-kernel@vger.kernel.org" <linux-kernel@vger.kernel.org>,
"patches@lists.linux.dev" <patches@lists.linux.dev>
Subject: Re: [PATCH] fs/resctrl: Fix use-after-free in resctrl_offline_mon_domain()
Date: Thu, 7 May 2026 08:12:17 -0700 [thread overview]
Message-ID: <afyr0ZjZvvw2lWTn@agluck-desk3> (raw)
In-Reply-To: <528caf7e-b548-4e80-9ec2-70697073a14d@intel.com>
On Wed, May 06, 2026 at 08:42:09PM -0700, Reinette Chatre wrote:
> Hi Tony,
>
> On 5/6/26 4:14 PM, Luck, Tony wrote:
> >>>> Unrelated to this question but may be worth a mention in the fix is that this work focuses
> >>>> and fixes resctrl to not access freed memory from the worker self. To complement this it may
> >>>> be worthwhile to highlight that it is safe for the work_struct self to be deleted while the
> >>>> work is running (but blocked on cpus_read_lock()) based on the following comment from
> >>>> kernel/workqueue.c:process_one_work():
> >>>> "It is permissible to free the struct work_struct from inside the function that is called
> >>>> from it ..."
> >>>
> >>> Scope increased from just the use-after-free when the domain was deleted. The case
> >>> for taking the current worker CPU offline doesn't involve a use-after-free. It just results
> >>> in running the workier on the wrong CPU for one iteration.
> >>>
> >>> Deleting the work_struct inside the called function is different from some agent deleting
> >>> the work_struct while the worker is running.
> >>
> >> Right. I interpret this to mean that judging the safety of work_struct removal should consider not
> >> only the workqueue API itself but also external agents that may access the work_struct after its
> >> removal. The current fix addresses access to removed work_struct from within worker itself while I
> >> interpret the workqueue API to guarantee that there will be no access to work_struct during or
> >> after worker execution. The fix under development thus makes it possible to safely remove the
> >> domain even if a worker belonging to it is executing and blocked on cpus_read_lock(). Do you
> >> see any remaining issues here?
> >
> > OK. I'll add something to the commit message.
> >
> > I asked my original AI about this fix. It claimed to find problems relating to kernel using the work_struct
> > after return from the function. Pasting in that comment you gave me from process_one_work() about
> > it being OK to free the work_struct made it reconsider and retract.
> >
> > Another AI (using a copy of the sashiko rules) has found an issue with our reliance on is_percpu_thread()
> >
> > The problem is the ordering of hotplug callbacks.
> >
> > resctrl_arch_offline_cpu() runs early because it is in the CPUHP_AP_ONLINE_DYN class. AI claims
> > that cpus_write_lock() is released after running this, but before running workqueue_offline_cpu() in the
> > CPUHP_AP_WORKQUEUE_ONLINE class.
> >
> > So our worker may obtain cpus_read_lock() and not yet lost its_percpu_thread() status.
>
> Your message is not clear to me. Do you agree with AI here and thus claim that there remains an issue?
I was suspicious about the AI claim, but I should have dug into this
before bothering you. Your analysis and tracing experiments below make
it clear that this AI hallucinated this issue.
> Are you suggesting that the original race explained in
> https://lore.kernel.org/lkml/afoesuWB8RezVLrN@agluck-desk3/ is not accurate?
>
> I am not able to see how CPU hotplug write lock is released in the middle of all the AP cleanup
> handlers. When looking at _cpu_down() I see:
>
> _cpu_down()
> {
> ...
> cpus_write_lock();
>
> /*
> * Run all the AP handlers on CPU going down - this includes
> * everything > CPUHP_TEARDOWN_CPU that includes CPUHP_AP_WORKQUEUE_ONLINE
> * and CPUHP_AP_ONLINE_DYN.
> */
>
> /*
> * Run rest of cleanups on other CPU
> */
>
> cpus_write_unlock();
> }
>
> You claim that cpus_write_lock() is dropped in this flow.
>
> To test this I enabled tracing and see the following when offlining CPU #38 running the
> overflow handler:
>
> offline triggered on CPU#1 and it takes CPU hotplug write lock
> 1) | _cpu_down() {
> 1) | percpu_down_write() { <<<<<<<<<<======== CPU hotplug write lock acquired here
> 1) # 9155.999 us | }
> 1) | /* cpuhp_enter: cpu: 0038 target: 144 step: 236 (cpuhp_kick_ap_work) */
>
> ...
> executing moves to CPU being offlined (#38) from where the different AP offline callbacks are called:
> 38) | cpuhp_thread_fun() {
> 38) | /* cpuhp_enter: cpu: 0038 target: 144 step: 235 (sched_cpu_deactivate) */
> 38) | /* cpuhp_exit: cpu: 0038 state: 234 step: 235 ret: 0 */
> 38) * 20632.54 us | }
> 38) | cpuhp_thread_fun() {
> 38) | /* cpuhp_enter: cpu: 0038 target: 144 step: 214 (rapl_cpu_down_prep [intel_rapl_msr]) */
> 38) | /* cpuhp_exit: cpu: 0038 state: 213 step: 214 ret: 0 */
> 38) 3.171 us | }
> 38) | cpuhp_thread_fun() {
> 38) | /* cpuhp_enter: cpu: 0038 target: 144 step: 213 (pkg_thermal_cpu_offline [x86_pkg_temp_thermal]) */
> 38) | /* cpuhp_exit: cpu: 0038 state: 212 step: 213 ret: 0 */
> 38) 2.378 us | }
>
> ... this includes resctrl ...
> 38) | cpuhp_thread_fun() {
> 38) | /* cpuhp_enter: cpu: 0038 target: 144 step: 209 (resctrl_arch_offline_cpu) */
> 38) | resctrl_arch_offline_cpu() {
> 38) | resctrl_offline_cpu() {
> 38) | /* workqueue_queue_work: work struct=00000000ed014eff function=mbm_handle_overflow workqueue=events req_cpu=39 cpu=39 */
> 38) # 5920.866 us | }
> 38) # 5927.396 us | }
> 38) | /* cpuhp_exit: cpu: 0038 state: 208 step: 209 ret: 0 */
> 38) # 5929.182 us | }
>
> ... and the workqueues ...
> 38) | cpuhp_thread_fun() {
> 38) | /* cpuhp_enter: cpu: 0038 target: 144 step: 187 (workqueue_offline_cpu) */
> 38) | workqueue_offline_cpu() {
> 38) 3.724 us | unbind_worker();
> 38) 2.312 us | unbind_worker();
> 38) 1.701 us | unbind_worker();
> 38) 1.681 us | unbind_worker();
> 38) ! 226.852 us | }
> 38) | /* cpuhp_exit: cpu: 0038 state: 186 step: 187 ret: 0 */
> 38) ! 229.393 us | }
>
> ....
> eventually this all finishes and _cpu_down() completes, releasing the CPU hotplug write lock:
>
> 73) | /* cpuhp_exit: cpu: 0038 state: 6 step: 7 ret: 0 */
> 73) | /* cpuhp_enter: cpu: 0038 target: 0 step: 2 (x86_pmu_dead_cpu) */
> 73) | /* cpuhp_exit: cpu: 0038 state: 1 step: 2 ret: 0 */
> 73) 5.038 us | percpu_up_write(); <<<<<<<<<<======== CPU hotplug write lock released here
> 73) | cpus_read_lock() {
> 73) 0.474 us | __percpu_down_read();
> 73) 1.420 us | }
> 73) * 62023.47 us | } /* _cpu_down */
>
> In the trace that included all CPUs I only see one instance of percpu_down_write() called when
> _cpu_down() starts and one instance of percpu_up_write() when _cpu_down() exits.
>
> You claim that CPU hotplug write lock is released before workqueue_offline_cpu() is called.
> I am not able to verify this by looking at the code nor the traces generated when offlining a CPU.
> Could you please help me understand your claim?
As above - AI hallucination. I need to be less trusting of AI pronouncements. My
experience so far has been that AI is right often enough to instill a false
sense of confidence in content produced by AI. I need to set expectations
much lower and spend more time checking.
>
> Reinette
I'll finish tidying up and post next version. I've got it set with you
as author (with a commented out Signed-off-by). I've applied a
Co-developed-by tag for myself.
If there are just minor issues with commit message, then perhaps you
should just fix and post a "final" version for upstream consideration
since you provided all the key components of this patch?
-Tony
next prev parent reply other threads:[~2026-05-07 15:12 UTC|newest]
Thread overview: 19+ messages / expand[flat|nested] mbox.gz Atom feed top
[not found] <20260501213611.25600-1-tony.luck@intel.com>
2026-05-04 15:11 ` [PATCH] fs/resctrl: Fix use-after-free in resctrl_offline_mon_domain() Reinette Chatre
2026-05-04 22:50 ` Luck, Tony
2026-05-05 4:39 ` Reinette Chatre
2026-05-05 16:45 ` Luck, Tony
2026-05-05 21:26 ` Reinette Chatre
2026-05-05 23:07 ` Luck, Tony
2026-05-06 18:24 ` Reinette Chatre
2026-05-06 19:48 ` Luck, Tony
2026-05-06 21:45 ` Reinette Chatre
2026-05-06 22:11 ` Luck, Tony
2026-05-06 22:28 ` Reinette Chatre
2026-05-06 23:14 ` Luck, Tony
2026-05-07 3:42 ` Reinette Chatre
2026-05-07 15:12 ` Luck, Tony [this message]
2026-05-06 20:02 ` Luck, Tony
2026-05-06 20:33 ` Reinette Chatre
2026-05-06 20:52 ` Luck, Tony
2026-05-07 15:48 ` Luck, Tony
2026-05-07 17:06 ` Reinette Chatre
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=afyr0ZjZvvw2lWTn@agluck-desk3 \
--to=tony.luck@intel.com \
--cc=Dave.Martin@arm.com \
--cc=babu.moger@amd.com \
--cc=bp@alien8.de \
--cc=dfustini@baylibre.com \
--cc=fenghuay@nvidia.com \
--cc=james.morse@arm.com \
--cc=linux-kernel@vger.kernel.org \
--cc=maciej.wieczor-retman@intel.com \
--cc=patches@lists.linux.dev \
--cc=peternewman@google.com \
--cc=reinette.chatre@intel.com \
--cc=x86@kernel.org \
--cc=yu.c.chen@intel.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox