* vfs: INFO: possible circular locking dependency detected @ 2012-05-09 15:25 Sasha Levin 2012-05-09 16:12 ` Al Viro 0 siblings, 1 reply; 9+ messages in thread From: Sasha Levin @ 2012-05-09 15:25 UTC (permalink / raw) To: viro, linux-fsdevel; +Cc: linux-kernel@vger.kernel.org Hi all, I've started seeing the following warning while fuzzing inside a KVM guest with the latest -next: [ 91.892449] ====================================================== [ 91.894167] [ INFO: possible circular locking dependency detected ] [ 91.894167] 3.4.0-rc6-next-20120508-sasha-00003-g9f34dd7-dirty #120 Tainted: G W [ 91.894167] ------------------------------------------------------- [ 91.894167] trinity/21513 is trying to acquire lock: [ 91.894167] (&p->lock){+.+.+.}, at: [<ffffffff811fe53a>] seq_read+0x3a/0x420 [ 91.894167] [ 91.894167] but task is already holding lock: [ 91.894167] (&sig->cred_guard_mutex){+.+.+.}, at: [<ffffffff811e2cb2>] prepare_bprm_creds+0x32/0x80 [ 91.894167] [ 91.894167] which lock already depends on the new lock. [ 91.894167] [ 91.894167] [ 91.894167] the existing dependency chain (in reverse order) is: [ 91.894167] [ 91.894167] -> #1 (&sig->cred_guard_mutex){+.+.+.}: [ 91.894167] [<ffffffff81115e3e>] validate_chain.clone.26+0x70e/0x8c0 [ 91.894167] [<ffffffff8111910d>] __lock_acquire+0xa3d/0xb00 [ 91.894167] [<ffffffff81119881>] lock_acquire+0xd1/0x110 [ 91.894167] [<ffffffff82d89515>] __mutex_lock_common+0x65/0x570 [ 91.894167] [<ffffffff82d89b00>] mutex_lock_killable_nested+0x40/0x50 [ 91.894167] [<ffffffff810b1a7f>] mm_access+0x2f/0xb0 [ 91.894167] [<ffffffff8123f0c4>] m_start+0x74/0x1c0 [ 91.894167] [<ffffffff811fe687>] seq_read+0x187/0x420 [ 91.894167] [<ffffffff811dac8d>] vfs_read+0xbd/0x190 [ 91.894167] [<ffffffff811db04f>] sys_read+0x4f/0x90 [ 91.894167] [<ffffffff82d8dbbd>] system_call_fastpath+0x1a/0x1f [ 91.894167] [ 91.894167] -> #0 (&p->lock){+.+.+.}: [ 91.894167] [<ffffffff8111523e>] check_prev_add+0x11e/0x610 [ 91.894167] [<ffffffff81115e3e>] validate_chain.clone.26+0x70e/0x8c0 [ 91.894167] [<ffffffff8111910d>] __lock_acquire+0xa3d/0xb00 [ 91.894167] [<ffffffff81119881>] lock_acquire+0xd1/0x110 [ 91.894167] [<ffffffff82d89515>] __mutex_lock_common+0x65/0x570 [ 91.894167] [<ffffffff82d89a60>] mutex_lock_nested+0x40/0x50 [ 91.894167] [<ffffffff811fe53a>] seq_read+0x3a/0x420 [ 91.894167] [<ffffffff81241769>] proc_reg_read+0xa9/0xe0 [ 91.894167] [<ffffffff811dac8d>] vfs_read+0xbd/0x190 [ 91.894167] [<ffffffff811e2a51>] kernel_read+0x41/0x60 [ 91.894167] [<ffffffff811e2ed3>] prepare_binprm+0x123/0x140 [ 91.894167] [<ffffffff811e3487>] do_execve_common.clone.32+0x197/0x320 [ 91.894167] [<ffffffff811e3626>] do_execve+0x16/0x20 [ 91.894167] [<ffffffff81056571>] sys_execve+0x51/0x80 [ 91.894167] [<ffffffff82d8e08c>] stub_execve+0x6c/0xc0 [ 91.894167] [ 91.894167] other info that might help us debug this: [ 91.894167] [ 91.894167] Possible unsafe locking scenario: [ 91.894167] [ 91.894167] CPU0 CPU1 [ 91.894167] ---- ---- [ 91.894167] lock(&sig->cred_guard_mutex); [ 91.894167] lock(&p->lock); [ 91.894167] lock(&sig->cred_guard_mutex); [ 91.894167] lock(&p->lock); [ 91.894167] [ 91.894167] *** DEADLOCK *** [ 91.894167] [ 91.894167] 1 lock held by trinity/21513: [ 91.894167] #0: (&sig->cred_guard_mutex){+.+.+.}, at: [<ffffffff811e2cb2>] prepare_bprm_creds+0x32/0x80 [ 91.894167] [ 91.894167] stack backtrace: [ 91.894167] Pid: 21513, comm: trinity Tainted: G W 3.4.0-rc6-next-20120508-sasha-00003-g9f34dd7-dirty #120 [ 91.894167] Call Trace: [ 91.894167] [<ffffffff811144d7>] print_circular_bug+0x107/0x130 [ 91.894167] [<ffffffff8111523e>] check_prev_add+0x11e/0x610 [ 91.894167] [<ffffffff81115e3e>] validate_chain.clone.26+0x70e/0x8c0 [ 91.894167] [<ffffffff8111910d>] __lock_acquire+0xa3d/0xb00 [ 91.894167] [<ffffffff81116c06>] ? mark_held_locks+0xe6/0x120 [ 91.894167] [<ffffffff81119881>] lock_acquire+0xd1/0x110 [ 91.894167] [<ffffffff811fe53a>] ? seq_read+0x3a/0x420 [ 91.894167] [<ffffffff82d8d426>] ? retint_kernel+0x26/0x30 [ 91.894167] [<ffffffff82d89515>] __mutex_lock_common+0x65/0x570 [ 91.894167] [<ffffffff811fe53a>] ? seq_read+0x3a/0x420 [ 91.894167] [<ffffffff810b4879>] ? vprintk+0x3f9/0x480 [ 91.894167] [<ffffffff811fe53a>] ? seq_read+0x3a/0x420 [ 91.894167] [<ffffffff811fe500>] ? seq_open+0xb0/0xb0 [ 91.894167] [<ffffffff82d89a60>] mutex_lock_nested+0x40/0x50 [ 91.894167] [<ffffffff811fe53a>] seq_read+0x3a/0x420 [ 91.894167] [<ffffffff810e891e>] ? sub_preempt_count+0xae/0xe0 [ 91.894167] [<ffffffff811fe500>] ? seq_open+0xb0/0xb0 [ 91.894167] [<ffffffff81241769>] proc_reg_read+0xa9/0xe0 [ 91.894167] [<ffffffff811dac8d>] vfs_read+0xbd/0x190 [ 91.894167] [<ffffffff811e2a51>] kernel_read+0x41/0x60 [ 91.894167] [<ffffffff811e2ed3>] prepare_binprm+0x123/0x140 [ 91.894167] [<ffffffff811e3487>] do_execve_common.clone.32+0x197/0x320 [ 91.894167] [<ffffffff811e3626>] do_execve+0x16/0x20 [ 91.894167] [<ffffffff81056571>] sys_execve+0x51/0x80 [ 91.894167] [<ffffffff82d8e08c>] stub_execve+0x6c/0xc0 ^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: vfs: INFO: possible circular locking dependency detected 2012-05-09 15:25 vfs: INFO: possible circular locking dependency detected Sasha Levin @ 2012-05-09 16:12 ` Al Viro 2012-05-09 16:23 ` Sasha Levin 2012-05-09 16:25 ` Al Viro 0 siblings, 2 replies; 9+ messages in thread From: Al Viro @ 2012-05-09 16:12 UTC (permalink / raw) To: Sasha Levin; +Cc: linux-fsdevel, linux-kernel@vger.kernel.org On Wed, May 09, 2012 at 05:25:14PM +0200, Sasha Levin wrote: > Hi all, > > I've started seeing the following warning while fuzzing inside a KVM guest with the latest -next: [->read() may grab ->cred_guard_mutex, but it may itself be called by prepare_binprm() after having ->cred_guard_mutex grabbed] Nasty, that... What's more, it's not just prepare_binprm() itself - ->load_binary() might end up calling read(); it doesn't have to limit itself to mmap(), so essentially anything that can be grabbed by ->read() of a regular file might nest under ->cred_guard_mutex. AFAICS, /proc/*/stack, /proc/*/syscall, /proc/*/personality, /proc/*/io_accounting, /proc/*/auxv, /proc/*/environ, /proc/*/*maps and /proc/*/pagemap have ->cred_guard_mutex grabbed on read. seq_file is a red herring here - io_accounting has the same issue and it does things directly, without seq_read(). It's not a realistic attack, fortunately, since you need root to get past open_exec() on any of those... Wait. How _did_ you get past open_exec(), anyway? MAY_EXEC is not supposed to be granted on anything that has no exec bits at all and AFAICS none of those files have them. ^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: vfs: INFO: possible circular locking dependency detected 2012-05-09 16:12 ` Al Viro @ 2012-05-09 16:23 ` Sasha Levin 2012-05-09 16:28 ` Al Viro 2012-05-09 16:25 ` Al Viro 1 sibling, 1 reply; 9+ messages in thread From: Sasha Levin @ 2012-05-09 16:23 UTC (permalink / raw) To: Al Viro; +Cc: linux-fsdevel, linux-kernel@vger.kernel.org On Wed, May 9, 2012 at 6:12 PM, Al Viro <viro@zeniv.linux.org.uk> wrote: > On Wed, May 09, 2012 at 05:25:14PM +0200, Sasha Levin wrote: >> Hi all, >> >> I've started seeing the following warning while fuzzing inside a KVM guest with the latest -next: > It's not a realistic attack, fortunately, since you need root > to get past open_exec() on any of those... Wait. How _did_ you get > past open_exec(), anyway? MAY_EXEC is not supposed to be granted on > anything that has no exec bits at all and AFAICS none of those files > have them. You could chmod +x and run them, no? ^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: vfs: INFO: possible circular locking dependency detected 2012-05-09 16:23 ` Sasha Levin @ 2012-05-09 16:28 ` Al Viro 2012-05-09 16:36 ` Sasha Levin 2012-05-09 16:37 ` Al Viro 0 siblings, 2 replies; 9+ messages in thread From: Al Viro @ 2012-05-09 16:28 UTC (permalink / raw) To: Sasha Levin; +Cc: linux-fsdevel, linux-kernel@vger.kernel.org On Wed, May 09, 2012 at 06:23:30PM +0200, Sasha Levin wrote: > On Wed, May 9, 2012 at 6:12 PM, Al Viro <viro@zeniv.linux.org.uk> wrote: > > On Wed, May 09, 2012 at 05:25:14PM +0200, Sasha Levin wrote: > >> Hi all, > >> > >> I've started seeing the following warning while fuzzing inside a KVM guest with the latest -next: > > ? ? ? ?It's not a realistic attack, fortunately, since you need root > > to get past open_exec() on any of those... ?Wait. ?How _did_ you get > > past open_exec(), anyway? ?MAY_EXEC is not supposed to be granted on > > anything that has no exec bits at all and AFAICS none of those files > > have them. > > You could chmod +x and run them, no? Can't. proc_setattr() will give you -EPERM and refuse to do anything if you call it with ATTR_MODE in ->ia_valid. ^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: vfs: INFO: possible circular locking dependency detected 2012-05-09 16:28 ` Al Viro @ 2012-05-09 16:36 ` Sasha Levin 2012-05-09 16:37 ` Al Viro 1 sibling, 0 replies; 9+ messages in thread From: Sasha Levin @ 2012-05-09 16:36 UTC (permalink / raw) To: Al Viro; +Cc: linux-fsdevel, linux-kernel@vger.kernel.org On Wed, May 9, 2012 at 6:28 PM, Al Viro <viro@zeniv.linux.org.uk> wrote: > On Wed, May 09, 2012 at 06:23:30PM +0200, Sasha Levin wrote: >> On Wed, May 9, 2012 at 6:12 PM, Al Viro <viro@zeniv.linux.org.uk> wrote: >> > On Wed, May 09, 2012 at 05:25:14PM +0200, Sasha Levin wrote: >> >> Hi all, >> >> >> >> I've started seeing the following warning while fuzzing inside a KVM guest with the latest -next: >> > ? ? ? ?It's not a realistic attack, fortunately, since you need root >> > to get past open_exec() on any of those... ?Wait. ?How _did_ you get >> > past open_exec(), anyway? ?MAY_EXEC is not supposed to be granted on >> > anything that has no exec bits at all and AFAICS none of those files >> > have them. >> >> You could chmod +x and run them, no? > > Can't. proc_setattr() will give you -EPERM and refuse to do anything > if you call it with ATTR_MODE in ->ia_valid. If we look at /proc/irq/*/smp_affinity, which uses seq file ops, we can do this: sh-4.2# ls -al /proc/irq/5/smp_affinity -rw------- 1 root 0 0 May 9 16:35 /proc/irq/5/smp_affinity sh-4.2# chmod +x /proc/irq/5/smp_affinity sh-4.2# ls -al /proc/irq/5/smp_affinity -rwx--x--x 1 root 0 0 May 9 16:35 /proc/irq/5/smp_affinity sh-4.2# /proc/irq/5/smp_affinity /proc/irq/5/smp_affinity: line 1: 1f: command not found There are quite a lot of files under /proc that let me do that. ^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: vfs: INFO: possible circular locking dependency detected 2012-05-09 16:28 ` Al Viro 2012-05-09 16:36 ` Sasha Levin @ 2012-05-09 16:37 ` Al Viro 2012-05-09 17:13 ` Sasha Levin 1 sibling, 1 reply; 9+ messages in thread From: Al Viro @ 2012-05-09 16:37 UTC (permalink / raw) To: Sasha Levin; +Cc: linux-fsdevel, linux-kernel@vger.kernel.org On Wed, May 09, 2012 at 05:28:54PM +0100, Al Viro wrote: > On Wed, May 09, 2012 at 06:23:30PM +0200, Sasha Levin wrote: > > On Wed, May 9, 2012 at 6:12 PM, Al Viro <viro@zeniv.linux.org.uk> wrote: > > > On Wed, May 09, 2012 at 05:25:14PM +0200, Sasha Levin wrote: > > >> Hi all, > > >> > > >> I've started seeing the following warning while fuzzing inside a KVM guest with the latest -next: > > > ? ? ? ?It's not a realistic attack, fortunately, since you need root > > > to get past open_exec() on any of those... ?Wait. ?How _did_ you get > > > past open_exec(), anyway? ?MAY_EXEC is not supposed to be granted on > > > anything that has no exec bits at all and AFAICS none of those files > > > have them. > > > > You could chmod +x and run them, no? > > Can't. proc_setattr() will give you -EPERM and refuse to do anything > if you call it with ATTR_MODE in ->ia_valid. OTOH, you probably can do that on unrelated seq_file outside of per-process part of procfs. So, yes, one could get a warning like that if they, as root, would do e.g. chmod +x /proc/swaps attempt to execve() /proc/swaps cat /proc/self/environ and enjoy the hard-earned false positive (it's a different seq_file, so we have no deadlock). If that's _all_ that happened, I'm not particulary concerned; it's not pretty, but saying "thou shalt not grab ->cred_guard_mutex anywhere in ->read() on anything that has exec bits or might get one" is not too terrible. If that's something else, though, we might have a real problem... ^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: vfs: INFO: possible circular locking dependency detected 2012-05-09 16:37 ` Al Viro @ 2012-05-09 17:13 ` Sasha Levin 2012-05-09 18:49 ` Dave Jones 0 siblings, 1 reply; 9+ messages in thread From: Sasha Levin @ 2012-05-09 17:13 UTC (permalink / raw) To: Al Viro; +Cc: linux-fsdevel, linux-kernel@vger.kernel.org On Wed, May 9, 2012 at 6:37 PM, Al Viro <viro@zeniv.linux.org.uk> wrote: > If that's _all_ that happened, I'm not particulary > concerned; it's not pretty, but saying "thou shalt not grab ->cred_guard_mutex > anywhere in ->read() on anything that has exec bits or might get one" is > not too terrible. If that's something else, though, we might have a real > problem... That's probably the case. The proc file got chmodded and exec'ed. Can we do something to eliminate this false positive though? I can't think of anything nice... btw, I've never seen this issue before, even though I run same tests for a while now. What could have triggered it now? ^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: vfs: INFO: possible circular locking dependency detected 2012-05-09 17:13 ` Sasha Levin @ 2012-05-09 18:49 ` Dave Jones 0 siblings, 0 replies; 9+ messages in thread From: Dave Jones @ 2012-05-09 18:49 UTC (permalink / raw) To: Sasha Levin; +Cc: Al Viro, linux-fsdevel, linux-kernel@vger.kernel.org On Wed, May 09, 2012 at 07:13:29PM +0200, Sasha Levin wrote: > On Wed, May 9, 2012 at 6:37 PM, Al Viro <viro@zeniv.linux.org.uk> wrote: > > If that's _all_ that happened, I'm not particulary > > concerned; it's not pretty, but saying "thou shalt not grab ->cred_guard_mutex > > anywhere in ->read() on anything that has exec bits or might get one" is > > not too terrible. If that's something else, though, we might have a real > > problem... > > That's probably the case. The proc file got chmodded and exec'ed. > > Can we do something to eliminate this false positive though? I can't > think of anything nice... > > btw, > I've never seen this issue before, even though I run same tests for a > while now. What could have triggered it now? Assuming you're running trinity du-jour, I only added fuzzing of execve yesterday. Dave -- To unsubscribe from this list: send the line "unsubscribe linux-fsdevel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html ^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: vfs: INFO: possible circular locking dependency detected 2012-05-09 16:12 ` Al Viro 2012-05-09 16:23 ` Sasha Levin @ 2012-05-09 16:25 ` Al Viro 1 sibling, 0 replies; 9+ messages in thread From: Al Viro @ 2012-05-09 16:25 UTC (permalink / raw) To: Sasha Levin; +Cc: linux-fsdevel, linux-kernel@vger.kernel.org On Wed, May 09, 2012 at 05:12:03PM +0100, Al Viro wrote: > On Wed, May 09, 2012 at 05:25:14PM +0200, Sasha Levin wrote: > > Hi all, > > > > I've started seeing the following warning while fuzzing inside a KVM guest with the latest -next: > > [->read() may grab ->cred_guard_mutex, but it may itself be called by > prepare_binprm() after having ->cred_guard_mutex grabbed] > > Nasty, that... What's more, it's not just prepare_binprm() itself - > ->load_binary() might end up calling read(); it doesn't have to > limit itself to mmap(), so essentially anything that can be grabbed > by ->read() of a regular file might nest under ->cred_guard_mutex. > > AFAICS, /proc/*/stack, /proc/*/syscall, /proc/*/personality, > /proc/*/io_accounting, /proc/*/auxv, /proc/*/environ, /proc/*/*maps > and /proc/*/pagemap have ->cred_guard_mutex grabbed on read. seq_file > is a red herring here - io_accounting has the same issue and it does > things directly, without seq_read(). > > It's not a realistic attack, fortunately, since you need root > to get past open_exec() on any of those... Wait. How _did_ you get > past open_exec(), anyway? MAY_EXEC is not supposed to be granted on > anything that has no exec bits at all and AFAICS none of those files > have them. FWIW, that's _probably_ a false positive, but I really wonder what has triggered it. It would take seq_file-based file somewhere with _some_ exec bits set (otherwise it shouldn't have been seen by prepare_binprm()). The file itself isn't one of those that grab ->cred_guard_mutex anywhere in their ->read(), but since lockdep can't tell one seq_file from another, we get the warning. The interesting part is who the hell had managed to do executable seq_file-based anything - false positive or not, it's almost certainly a bug... ^ permalink raw reply [flat|nested] 9+ messages in thread
end of thread, other threads:[~2012-05-09 18:49 UTC | newest] Thread overview: 9+ messages (download: mbox.gz follow: Atom feed -- links below jump to the message on this page -- 2012-05-09 15:25 vfs: INFO: possible circular locking dependency detected Sasha Levin 2012-05-09 16:12 ` Al Viro 2012-05-09 16:23 ` Sasha Levin 2012-05-09 16:28 ` Al Viro 2012-05-09 16:36 ` Sasha Levin 2012-05-09 16:37 ` Al Viro 2012-05-09 17:13 ` Sasha Levin 2012-05-09 18:49 ` Dave Jones 2012-05-09 16:25 ` Al Viro
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox; as well as URLs for NNTP newsgroup(s).