On 10/5/21 8:11 AM, Zhu Yanjun wrote: > On Tue, Oct 5, 2021 at 1:56 AM Haakon Bugge <haakon.bugge@xxxxxxxxxx> wrote: >> >> >> >>> On 4 Oct 2021, at 15:22, Dmitry Vyukov <dvyukov@xxxxxxxxxx> wrote: >>> >>> On Mon, 4 Oct 2021 at 15:15, Jason Gunthorpe <jgg@xxxxxxxx> wrote: >>>> >>>> On Mon, Oct 04, 2021 at 02:42:11PM +0200, Dmitry Vyukov wrote: >>>>> On Mon, 4 Oct 2021 at 12:45, syzbot >>>>> <syzbot+3a992c9e4fd9f0e6fd0e@xxxxxxxxxxxxxxxxxxxxxxxxx> wrote: >>>>>> >>>>>> Hello, >>>>>> >>>>>> syzbot found the following issue on: >>>>>> >>>>>> HEAD commit: c7b4d0e56a1d Add linux-next specific files for 20210930 >>>>>> git tree: linux-next >>>>>> console output: https://syzkaller.appspot.com/x/log.txt?x=104be6cb300000 >>>>>> kernel config: https://syzkaller.appspot.com/x/.config?x=c9a1f6685aeb48bd >>>>>> dashboard link: https://syzkaller.appspot.com/bug?extid=3a992c9e4fd9f0e6fd0e >>>>>> compiler: gcc (Debian 10.2.1-6) 10.2.1 20210110, GNU ld (GNU Binutils for Debian) 2.35.2 >>>>>> >>>>>> Unfortunately, I don't have any reproducer for this issue yet. >>>>>> >>>>>> IMPORTANT: if you fix the issue, please add the following tag to the commit: >>>>>> Reported-by: syzbot+3a992c9e4fd9f0e6fd0e@xxxxxxxxxxxxxxxxxxxxxxxxx >>>>> >>>>> +RESTRACK maintainers >>>>> >>>>> (it would also be good if RESTRACK would print a more standard oops >>>>> with stack/filenames, so that testing systems can attribute issues to >>>>> files/maintainers). >>>> >>>> restrack certainly should trigger a WARN_ON to stop the kernel.. But I >>>> don't know what stack track would be useful here. The culprit is >>>> always the underlying driver, not the core code.. >>> >>> There seems to be a significant overlap between >>> drivers/infiniband/core/restrack.c and drivers/infiniband/sw/rxe/rxe.c >>> maintainers, so perhaps restrack.c is good enough approximation to >>> extract relevant people (definitely better then no CC at all :)) >> >> Looks to me as this is rxe: >> >> [ 1892.778632][ T8958] BUG: KASAN: use-after-free in __rxe_drop_index_locked+0xb5/0x100 >> [snip] >> [ 1892.822375][ T8958] Call Trace: >> [ 1892.825655][ T8958] <TASK> >> [ 1892.828594][ T8958] dump_stack_lvl+0xcd/0x134 >> [ 1892.833273][ T8958] print_address_description.constprop.0.cold+0x6c/0x30c >> [ 1892.840316][ T8958] ? __rxe_drop_index_locked+0xb5/0x100 >> [ 1892.845864][ T8958] ? __rxe_drop_index_locked+0xb5/0x100 >> [ 1892.851424][ T8958] kasan_report.cold+0x83/0xdf >> [ 1892.856200][ T8958] ? __rxe_drop_index_locked+0xb5/0x100 >> [ 1892.861761][ T8958] kasan_check_range+0x13d/0x180 >> [ 1892.866780][ T8958] __rxe_drop_index_locked+0xb5/0x100 >> [ 1892.872164][ T8958] __rxe_drop_index+0x3f/0x60 >> [ 1892.876850][ T8958] rxe_dereg_mr+0x14b/0x240 >> [ 1892.881381][ T8958] ib_dealloc_pd_user+0x96/0x230 >> [ 1892.886566][ T8958] rds_ib_dev_free+0xd4/0x3a0 >> >> So, RDS de-allocs its PD, ib core must first de-register the PD's local MR, calls rxe_dereg_mr(), ... > > int rxe_dereg_mr(struct ib_mr *ibmr, struct ib_udata *udata) > { > struct rxe_mr *mr = to_rmr(ibmr); > > if (atomic_read(&mr->num_mw) > 0) { > pr_warn("%s: Attempt to deregister an MR while bound to MWs\n", > __func__); > return -EINVAL; > } > > mr->state = RXE_MR_STATE_ZOMBIE; > rxe_drop_ref(mr_pd(mr)); > rxe_drop_index(mr); <-------This is call trace beginning. > rxe_drop_ref(mr); > > return 0; > } > > struct rxe_mr { > struct rxe_pool_entry pelem; <-----A ref_cnt in this struct. > struct ib_mr ibmr; > > struct ib_umem *umem; > > struct rxe_pool_entry { > struct rxe_pool *pool; > struct kref ref_cnt; <-------This ref_cnt may help. > struct list_head list; > > Zhu Yanjun > >> >> >> Thxs, Håkon >> >> >>> >>>> Anyhow, this report is either rxe or rds by the look of it. >>>> >>>> Jason >> It looks like not all the objects are getting freed before the CA is deallocated. If this happens the pool cleanup code issues the warning that the pool is being cleaned up with some objects still in the pool. It then goes ahead and frees the index table for indexed objects (like MRs). If the MR is later freed it tries to remove its index in the index bit map which has already been freed causing the oops. The MR not getting freed in time is the cause of the late deallocation of the PD which was noticed by restrak. I am not sure if these late deletions are just the normal flow of the program or caused by rdma core trying to clean up afterwards. Normally MRs get a reference taken when they are created and dropped when they are freed. Additionally references are taken when an lkey or rkey is looked up an turned into a pointer to the MR object. These are normally dropped when the key goes out of scope. If an error occurs it may be possible that the key goes out of scope without dropping the reference to the MR which would cause what we are seeing. In this case in order for the late deletion of the MR someone would have to call dereg mr a second time to remove the lost ref count. It would be helpful to have a test case to trigger this oops.