On Tue, 6 Jan 2026, Uladzislau Rezki wrote:

> On Tue, Jan 06, 2026 at 04:56:07PM +0100, Mikulas Patocka wrote:
> > On the kernel 6.19-rc, I am experiencing 15-second boot stall in a
> > virtual machine when probing a virtio-scsi disk:
> > [    1.011641] SCSI subsystem initialized
> > [    1.013972] virtio_scsi virtio6: 16/0/0 default/read/poll queues
> > [    1.015983] scsi host0: Virtio SCSI HBA
> > [    1.019578] ACPI: \_SB_.GSIA: Enabled at IRQ 16
> > [    1.020225] ahci 0000:00:1f.2: AHCI vers 0001.0000, 32 command slots, 
> > 1.5 Gbps, SATA mode
> > [    1.020228] ahci 0000:00:1f.2: 6/6 ports implemented (port mask 0x3f)
> > [    1.020230] ahci 0000:00:1f.2: flags: 64bit ncq only
> > [    1.024688] scsi host1: ahci
> > [    1.025432] scsi host2: ahci
> > [    1.025966] scsi host3: ahci
> > [    1.026511] scsi host4: ahci
> > [    1.028371] scsi host5: ahci
> > [    1.028918] scsi host6: ahci
> > [    1.029266] ata1: SATA max UDMA/133 abar m4096@0xfea23000 port 
> > 0xfea23100 irq 16 lpm-pol 1
> > [    1.029305] ata2: SATA max UDMA/133 abar m4096@0xfea23000 port 
> > 0xfea23180 irq 16 lpm-pol 1
> > [    1.029316] ata3: SATA max UDMA/133 abar m4096@0xfea23000 port 
> > 0xfea23200 irq 16 lpm-pol 1
> > [    1.029327] ata4: SATA max UDMA/133 abar m4096@0xfea23000 port 
> > 0xfea23280 irq 16 lpm-pol 1
> > [    1.029341] ata5: SATA max UDMA/133 abar m4096@0xfea23000 port 
> > 0xfea23300 irq 16 lpm-pol 1
> > [    1.029356] ata6: SATA max UDMA/133 abar m4096@0xfea23000 port 
> > 0xfea23380 irq 16 lpm-pol 1
> > [    1.118111] scsi 0:0:0:0: Direct-Access     QEMU     QEMU HARDDISK 2.5+ 
> > PQ: 0 ANSI: 5
> > [    1.348916] ata1: SATA link down (SStatus 0 SControl 300)
> > [    1.350713] ata2: SATA link down (SStatus 0 SControl 300)
> > [    1.351025] ata6: SATA link down (SStatus 0 SControl 300)
> > [    1.351160] ata5: SATA link down (SStatus 0 SControl 300)
> > [    1.351326] ata3: SATA link down (SStatus 0 SControl 300)
> > [    1.351536] ata4: SATA link down (SStatus 0 SControl 300)
> > [    1.449153] input: ImExPS/2 Generic Explorer Mouse as 
> > /devices/platform/i8042/serio1/input/input2
> > [   16.483477] sd 0:0:0:0: Power-on or device reset occurred
> > [   16.483691] sd 0:0:0:0: [sda] 2097152 512-byte logical blocks: (1.07 
> > GB/1.00 GiB)
> > [   16.483762] sd 0:0:0:0: [sda] Write Protect is off
> > [   16.483877] sd 0:0:0:0: [sda] Write cache: enabled, read cache: enabled, 
> > doesn't support DPO or FUA
> > [   16.569225] sd 0:0:0:0: [sda] Attached SCSI disk
> > 
> > I bisected it and it is caused by the commit 89e1fb7ceffd which
> > introduces calls to synchronize_rcu_expedited.
> > 
> > This commit replaces synchronize_rcu_expedited and kfree with a call to 
> > kfree_rcu_mightsleep, avoiding the 15-second delay.
> > 
> > Signed-off-by: Mikulas Patocka <[email protected]>
> > Fixes: 89e1fb7ceffd ("blk-mq: fix potential uaf for 'queue_hw_ctx'")
> > 
> > ---
> >  block/blk-mq.c |    3 +--
> >  1 file changed, 1 insertion(+), 2 deletions(-)
> > 
> > Index: linux-2.6/block/blk-mq.c
> > ===================================================================
> > --- linux-2.6.orig/block/blk-mq.c   2026-01-06 16:45:11.000000000 +0100
> > +++ linux-2.6/block/blk-mq.c        2026-01-06 16:48:00.000000000 +0100
> > @@ -4553,8 +4553,7 @@ static void __blk_mq_realloc_hw_ctxs(str
> >              * Make sure reading the old queue_hw_ctx from other
> >              * context concurrently won't trigger uaf.
> >              */
> > -           synchronize_rcu_expedited();
> > -           kfree(hctxs);
> > +           kfree_rcu_mightsleep(hctxs);
> >
> I agree, doing freeing that way is not optimal. But kfree_rcu_mightsleep()
> also might not work. It has a fallback, if we can not place an object into
> "page" due to memory allocation failure, it inlines freeing:
> 
> <snip>
> synchronize_rcu();
> free().
> <snip>
> 
> Please note, synchronize_rcu() can easily be converted into expedited
> version. See rcu_gp_is_expedited().
> 
> --
> Uladzislau Rezki

Would this patch be better? It does GFP_KERNEL allocation which dones't 
fail in practice.

> Inlining is a corner case but it can happen. The best way is to add
> rcu_head to the blk_mq_hw_ctx structure and use kfree_rcu(). It never
> blocks.

We are not protecting the blk_mq_hw_ctx structure with RCU, we are 
protecting the q->queue_hw_ctx array. So, rcu_head cannot be added to an 
array. We could cast the array to rcu_head (and make sure that the initial 
allocation is at least sizeof(struct rcu_head)), but that is hacky.

Mikulas

---
 block/blk-mq.c |   23 +++++++++++++++++++++--
 1 file changed, 21 insertions(+), 2 deletions(-)

Index: linux-2.6/block/blk-mq.c
===================================================================
--- linux-2.6.orig/block/blk-mq.c       2026-01-06 15:55:41.000000000 +0100
+++ linux-2.6/block/blk-mq.c    2026-01-06 16:22:40.000000000 +0100
@@ -4531,6 +4531,18 @@ static struct blk_mq_hw_ctx *blk_mq_allo
        return NULL;
 }
 
+struct rcu_free_hctxs {
+       struct rcu_head head;
+       struct blk_mq_hw_ctx **hctxs;
+};
+
+static void rcu_free_hctxs(struct rcu_head *head)
+{
+       struct rcu_free_hctxs *r = container_of(head, struct rcu_free_hctxs, 
head);
+       kfree(r->hctxs);
+       kfree(r);
+}
+
 static void __blk_mq_realloc_hw_ctxs(struct blk_mq_tag_set *set,
                                     struct request_queue *q)
 {
@@ -4539,6 +4551,7 @@ static void __blk_mq_realloc_hw_ctxs(str
 
        if (q->nr_hw_queues < set->nr_hw_queues) {
                struct blk_mq_hw_ctx **new_hctxs;
+               struct rcu_free_hctxs *r;
 
                new_hctxs = kcalloc_node(set->nr_hw_queues,
                                       sizeof(*new_hctxs), GFP_KERNEL,
@@ -4553,8 +4566,14 @@ static void __blk_mq_realloc_hw_ctxs(str
                 * Make sure reading the old queue_hw_ctx from other
                 * context concurrently won't trigger uaf.
                 */
-               synchronize_rcu_expedited();
-               kfree(hctxs);
+               r = kmalloc(sizeof(struct rcu_free_hctxs), GFP_KERNEL);
+               if (!r) {
+                       synchronize_rcu_expedited();
+                       kfree(hctxs);
+               } else {
+                       r->hctxs = hctxs;
+                       call_rcu(&r->head, rcu_free_hctxs);
+               }
                hctxs = new_hctxs;
        }
 
> 


Reply via email to