From: Andrew Vagin <avagin@parallels.com>
To: Oleg Nesterov <oleg@redhat.com>
Cc: "Toralf Förster" <toralf.foerster@gmx.de>,
"Andrey Vagin" <avagin@openvz.org>,
"Serge E. Hallyn" <serue@us.ibm.com>,
"Eric W. Biederman" <ebiederm@xmission.com>,
"Al Viro" <viro@zeniv.linux.org.uk>,
"Linux NFS mailing list" <linux-nfs@vger.kernel.org>
Subject: Re: fuzz tested user mode linux core dumps in fs/lockd/clntproc.c:131
Date: Mon, 29 Jul 2013 10:29:06 +0400 [thread overview]
Message-ID: <20130729062905.GA28282@paralelels.com> (raw)
In-Reply-To: <20130728175828.GA15020@redhat.com>
On Sun, Jul 28, 2013 at 07:58:28PM +0200, Oleg Nesterov wrote:
> On 07/28, Toralf Förster wrote:
> >
> > The attached patch works - applied on top of current git -
> > at least the issue cannot be reproduced then.
>
> Thanks Toralf.
>
> I'll write the changelog and send the patch tomorrow.
>
> Andrey, any chance you can check that with this patch free_ipc_ns()
> doesn't have any problem with ->shm_file ?
kmemleak doesn't detect any leak, but I think this patch is incorrect.
According to my previous investigations exit_task_work should be called
after exit task namespaces
(http://comments.gmane.org/gmane.linux.kernel/1475123)
I applied the following patch:
@@ -11,8 +11,11 @@ task_work_add(struct task_struct *task, struct
callback_head *work, bool notify)
do {
head = ACCESS_ONCE(task->task_works);
- if (unlikely(head == &work_exited))
+ if (unlikely(head == &work_exited)) {
+ printk("%s:%d\n", __func__, __LINE__);
+ dump_stack();
return -ESRCH;
+ }
work->next = head;
} while (cmpxchg(&task->task_works, head, work) != head);
and I got a few backtraces in a kernel log
[ 151.513725] task_work_add:15
[ 151.514860] CPU: 1 PID: 15303 Comm: ipc Not tainted 3.11.0-rc2+ #75
[ 151.516743] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011
[ 151.518558] ffff880067bf0000 ffff88006922fba0 ffffffff81630dd5 ffff88006d9b2280
[ 151.521767] ffff88006922fbb0 ffffffff8107b478 ffff88006922fbd0 ffffffff8119ad43
[ 151.524587] ffff880079e81740 ffff88007a9035c8 ffff88006922fbe8 ffffffff81281ebd
[ 151.527785] Call Trace:
[ 151.528811] [<ffffffff81630dd5>] dump_stack+0x45/0x56
[ 151.530378] [<ffffffff8107b478>] task_work_add+0x78/0x80
[ 151.533219] [<ffffffff8119ad43>] fput+0x63/0xa0
[ 151.534884] [<ffffffff81281ebd>] shm_destroy+0x7d/0xb0
[ 151.536813] [<ffffffff81281f05>] do_shm_rmid+0x15/0x50
[ 151.539523] [<ffffffff81286572>] free_ipcs+0xa2/0xf0
[ 151.541595] [<ffffffff81286534>] ? free_ipcs+0x64/0xf0
[ 151.544188] [<ffffffff81281ef0>] ? shm_destroy+0xb0/0xb0
[ 151.546393] [<ffffffff81282990>] shm_exit_ns+0x20/0x30
[ 151.548675] [<ffffffff81286619>] put_ipc_ns+0x59/0x80
[ 151.552764] [<ffffffff81083afd>] free_nsproxy+0x3d/0x90
[ 151.560241] [<ffffffff81083d45>] switch_task_namespaces+0x45/0x50
[ 151.564211] [<ffffffff81083d60>] exit_task_namespaces+0x10/0x20
[ 151.566097] [<ffffffff8105d3fd>] do_exit+0x2ad/0xa20
[ 151.567744] [<ffffffff81307ec1>] ? do_raw_spin_lock+0x41/0x110
[ 151.570734] [<ffffffff8163965c>] ? _raw_spin_unlock_irq+0x2c/0x40
[ 151.573967] [<ffffffff8105dbf9>] do_group_exit+0x49/0xc0
[ 151.576773] [<ffffffff8106d593>] get_signal_to_deliver+0x293/0x640
[ 151.580575] [<ffffffff81002458>] do_signal+0x48/0x5a0
[ 151.582401] [<ffffffff811b83f6>] ? mntput_no_expire+0xd6/0x120
[ 151.584418] [<ffffffff8163a41e>] ? paranoid_userspace+0x39/0x5a
[ 151.588639] [<ffffffff810bc42d>] ? trace_hardirqs_on_caller+0xfd/0x1c0
[ 151.590809] [<ffffffff81002a18>] do_notify_resume+0x68/0x90
[ 151.604976] [<ffffffff8163a430>] paranoid_userspace+0x4b/0x5a
Thanks,
Andrey
>
> e7b2c406 should be enough to fix that leak, but it would be nice if
> you can confirm.
>
> > On 07/27/2013 07:00 PM, Oleg Nesterov wrote:
> > > On 07/27, Toralf Förster wrote:
> > >>
> > >> I do have a user mode linux image (stable 32 bit Gentoo Linux ) which erratically crashes
> > >> while fuzz tested with trinity if the victim files are located on a NFS share.
> > >>
> > >> The back trace of the core dumps always looks like the attached.
> > >>
> > >> To bisect it is hard. However after few attempts in the last weeks the following
> > >> commit is either the first bad commit or at least the upper limit (less likely).
> > >>
> > >>
> > >> commit 8aac62706adaaf0fab02c4327761561c8bda9448
> > >> Author: Oleg Nesterov <oleg@redhat.com>
> > >> Date: Fri Jun 14 21:09:49 2013 +0200
> > >>
> > >> move exit_task_namespaces() outside of exit_notify()
> > >>
> > >> #15 nlmclnt_setlockargs (req=0x48e18860, fl=0x48f27c8c) at fs/lockd/clntproc.c:131
> > >
> > > Thanks.
> > >
> > > So nlmclnt_setlockargs()->utsname() crashes and we probably need
> > > the patch below.
> > >
> > > But is it correct? I know _absolutely_ nothing about nfs/sunrpc/etc and
> > > I never looked into this code before, most probably I am wrong.
> > >
> > > But it seems that __nlm_async_call() relies on workqueues.
> > > nlmclnt_async_call() does rpc_wait_for_completion_task(), but what if
> > > the caller is killed?
> > >
> > > nlm_rqst can't go away, ->a_count was incremented. But can't the caller
> > > exit before call->name is used? In this case the memory it points to
> > > can be already freed.
> > >
> > > Oleg.
> > >
> > > --- x/kernel/exit.c
> > > +++ x/kernel/exit.c
> > > @@ -783,8 +783,8 @@ void do_exit(long code)
> > > exit_shm(tsk);
> > > exit_files(tsk);
> > > exit_fs(tsk);
> > > - exit_task_namespaces(tsk);
> > > exit_task_work(tsk);
> > > + exit_task_namespaces(tsk);
> > > check_stack_usage();
> > > exit_thread();
> > >
> > >
> > >
> >
> >
> > --
> > MfG/Sincerely
> > Toralf Förster
> > pgp finger print: 7B1A 07F4 EC82 0F90 D4C2 8936 872A E508 7DB6 9DA3
>
next prev parent reply other threads:[~2013-07-29 6:32 UTC|newest]
Thread overview: 24+ messages / expand[flat|nested] mbox.gz Atom feed top
2013-07-27 10:03 fuzz tested user mode linux core dumps in fs/lockd/clntproc.c:131 Toralf Förster
2013-07-27 13:18 ` [uml-devel] Fwd: " Toralf Förster
2013-07-27 17:00 ` Oleg Nesterov
2013-07-27 17:27 ` Oleg Nesterov
2013-07-28 15:26 ` Toralf Förster
2013-07-28 17:58 ` Oleg Nesterov
2013-07-28 18:56 ` [uml-devel] Fwd: " Toralf Förster
2013-07-28 18:56 ` Toralf Förster
2013-07-29 6:29 ` Andrew Vagin [this message]
2013-07-29 13:10 ` Oleg Nesterov
2013-07-29 14:27 ` Andrew Vagin
2013-07-29 14:51 ` Oleg Nesterov
2013-07-29 15:43 ` Andrey Vagin
2013-07-29 0:10 ` Eric W. Biederman
2013-07-29 0:32 ` Eric W. Biederman
2013-07-29 14:17 ` Oleg Nesterov
2013-07-29 17:42 ` fuzz tested user mode linux core dumps in fs/lockd/clntproc.c:131 (nfs in a netns utsns problems?) Eric W. Biederman
2013-07-29 18:03 ` Oleg Nesterov
2013-07-29 18:17 ` Eric W. Biederman
2013-07-30 21:12 ` J. Bruce Fields
2013-07-30 21:20 ` Myklebust, Trond
2013-09-22 17:03 ` fuzz tested user mode linux core dumps in fs/lockd/clntproc.c:131 Toralf Förster
2013-09-22 17:52 ` Oleg Nesterov
-- strict thread matches above, loose matches on Subject: below --
2013-07-27 9:53 Toralf Förster
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20130729062905.GA28282@paralelels.com \
--to=avagin@parallels.com \
--cc=avagin@openvz.org \
--cc=ebiederm@xmission.com \
--cc=linux-nfs@vger.kernel.org \
--cc=oleg@redhat.com \
--cc=serue@us.ibm.com \
--cc=toralf.foerster@gmx.de \
--cc=viro@zeniv.linux.org.uk \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.