public inbox for linux-kernel@vger.kernel.org
 help / color / mirror / Atom feed
* rcu_read_lock/unlock protect find_task_by_vpid call in posix_cpu_timer_create
@ 2010-11-25  1:09 Dave Jones
  2010-11-25  1:35 ` rcu_read_lock/unlock protect find_task_by_vpid call in check_clock Dave Jones
  2010-11-25  8:40 ` rcu_read_lock/unlock protect find_task_by_vpid call in posix_cpu_timer_create Peter Zijlstra
  0 siblings, 2 replies; 7+ messages in thread
From: Dave Jones @ 2010-11-25  1:09 UTC (permalink / raw)
  To: Linux Kernel; +Cc: Andrew Morton

===================================================
[ INFO: suspicious rcu_dereference_check() usage. ]
---------------------------------------------------
kernel/pid.c:419 invoked rcu_dereference_check() without protection!

other info that might help us debug this:


rcu_scheduler_active = 1, debug_locks = 1
1 lock held by scrashme/20820:
 #0:  (tasklist_lock){.?.?..}, at: [<ffffffff8106e30f>] posix_cpu_timer_create+0x50/0xee

stack backtrace:
Pid: 20820, comm: scrashme Not tainted 2.6.37-rc3+ #7
Call Trace:
 [<ffffffff8107cfd5>] lockdep_rcu_dereference+0x9d/0xa5
 [<ffffffff81069d08>] find_task_by_pid_ns+0x44/0x5d
 [<ffffffff81069d43>] find_task_by_vpid+0x22/0x24
 [<ffffffff8106e32d>] posix_cpu_timer_create+0x6e/0xee
 [<ffffffff8106eb88>] do_cpu_nanosleep+0x83/0x1ad
 [<ffffffff8106f50a>] posix_cpu_nsleep+0x6d/0xf6
 [<ffffffff810f9a64>] ? might_fault+0xa5/0xac
 [<ffffffff810f9a1b>] ? might_fault+0x5c/0xac
 [<ffffffff8106bf57>] sys_clock_nanosleep+0x7c/0xcb
 [<ffffffff81009cb2>] system_call_fastpath+0x16/0x1b

Signed-off-by: Dave Jones <davej@redhat.com>

diff --git a/kernel/posix-cpu-timers.c b/kernel/posix-cpu-timers.c
index 6842eeb..2658955 100644
--- a/kernel/posix-cpu-timers.c
+++ b/kernel/posix-cpu-timers.c
@@ -391,6 +391,7 @@ int posix_cpu_timer_create(struct k_itimer *new_timer)
 	INIT_LIST_HEAD(&new_timer->it.cpu.entry);
 
 	read_lock(&tasklist_lock);
+	rcu_read_lock();
 	if (CPUCLOCK_PERTHREAD(new_timer->it_clock)) {
 		if (pid == 0) {
 			p = current;
@@ -414,6 +415,7 @@ int posix_cpu_timer_create(struct k_itimer *new_timer)
 	} else {
 		ret = -EINVAL;
 	}
+	rcu_read_unlock();
 	read_unlock(&tasklist_lock);
 
 	return ret;

^ permalink raw reply related	[flat|nested] 7+ messages in thread

* rcu_read_lock/unlock protect find_task_by_vpid call in check_clock
  2010-11-25  1:09 rcu_read_lock/unlock protect find_task_by_vpid call in posix_cpu_timer_create Dave Jones
@ 2010-11-25  1:35 ` Dave Jones
  2010-11-25  8:40   ` Peter Zijlstra
  2010-11-25  8:40 ` rcu_read_lock/unlock protect find_task_by_vpid call in posix_cpu_timer_create Peter Zijlstra
  1 sibling, 1 reply; 7+ messages in thread
From: Dave Jones @ 2010-11-25  1:35 UTC (permalink / raw)
  To: Linux Kernel, Andrew Morton

===================================================
[ INFO: suspicious rcu_dereference_check() usage. ]
---------------------------------------------------
kernel/pid.c:419 invoked rcu_dereference_check() without protection!

other info that might help us debug this:


rcu_scheduler_active = 1, debug_locks = 1
1 lock held by scrashme/13382:
 #0:  (tasklist_lock){.?.?..}, at: [<ffffffff8106ddea>] check_clock+0x46/0x9a

stack backtrace:
Pid: 13382, comm: scrashme Not tainted 2.6.37-rc3+ #8
Call Trace:
 [<ffffffff8107cfe1>] lockdep_rcu_dereference+0x9d/0xa5
 [<ffffffff81069d08>] find_task_by_pid_ns+0x44/0x5d
 [<ffffffff81069d43>] find_task_by_vpid+0x22/0x24
 [<ffffffff8106ddf2>] check_clock+0x4e/0x9a
 [<ffffffff8106deac>] posix_cpu_clock_getres+0x16/0x41
 [<ffffffff8106be74>] sys_clock_getres+0x39/0xa0
 [<ffffffff81009cb2>] system_call_fastpath+0x16/0x1b

Signed-off-by: Dave Jones <davej@redhat.com>

diff --git a/kernel/posix-cpu-timers.c b/kernel/posix-cpu-timers.c
index 6842eeb..4bef9aa 100644
--- a/kernel/posix-cpu-timers.c
+++ b/kernel/posix-cpu-timers.c
@@ -38,11 +38,13 @@ static int check_clock(const clockid_t which_clock)
 		return 0;
 
 	read_lock(&tasklist_lock);
+	rcu_read_lock();
 	p = find_task_by_vpid(pid);
 	if (!p || !(CPUCLOCK_PERTHREAD(which_clock) ?
 		   same_thread_group(p, current) : thread_group_leader(p))) {
 		error = -EINVAL;
 	}
+	rcu_read_unlock();
 	read_unlock(&tasklist_lock);
 
 	return error;


^ permalink raw reply related	[flat|nested] 7+ messages in thread

* Re: rcu_read_lock/unlock protect find_task_by_vpid call in posix_cpu_timer_create
  2010-11-25  1:09 rcu_read_lock/unlock protect find_task_by_vpid call in posix_cpu_timer_create Dave Jones
  2010-11-25  1:35 ` rcu_read_lock/unlock protect find_task_by_vpid call in check_clock Dave Jones
@ 2010-11-25  8:40 ` Peter Zijlstra
  2010-11-25 11:00   ` Oleg Nesterov
  2010-11-25 11:02   ` Oleg Nesterov
  1 sibling, 2 replies; 7+ messages in thread
From: Peter Zijlstra @ 2010-11-25  8:40 UTC (permalink / raw)
  To: Dave Jones
  Cc: Linux Kernel, Andrew Morton, tglx, Oleg Nesterov,
	Paul E. McKenney

On Wed, 2010-11-24 at 20:09 -0500, Dave Jones wrote:
> ===================================================
> [ INFO: suspicious rcu_dereference_check() usage. ]
> ---------------------------------------------------
> kernel/pid.c:419 invoked rcu_dereference_check() without protection!
> 
> other info that might help us debug this:
> 
> 
> rcu_scheduler_active = 1, debug_locks = 1
> 1 lock held by scrashme/20820:
>  #0:  (tasklist_lock){.?.?..}, at: [<ffffffff8106e30f>] posix_cpu_timer_create+0x50/0xee
> 
> stack backtrace:
> Pid: 20820, comm: scrashme Not tainted 2.6.37-rc3+ #7
> Call Trace:
>  [<ffffffff8107cfd5>] lockdep_rcu_dereference+0x9d/0xa5
>  [<ffffffff81069d08>] find_task_by_pid_ns+0x44/0x5d
>  [<ffffffff81069d43>] find_task_by_vpid+0x22/0x24
>  [<ffffffff8106e32d>] posix_cpu_timer_create+0x6e/0xee
>  [<ffffffff8106eb88>] do_cpu_nanosleep+0x83/0x1ad
>  [<ffffffff8106f50a>] posix_cpu_nsleep+0x6d/0xf6
>  [<ffffffff810f9a64>] ? might_fault+0xa5/0xac
>  [<ffffffff810f9a1b>] ? might_fault+0x5c/0xac
>  [<ffffffff8106bf57>] sys_clock_nanosleep+0x7c/0xcb
>  [<ffffffff81009cb2>] system_call_fastpath+0x16/0x1b
> 
> Signed-off-by: Dave Jones <davej@redhat.com>
> 
> diff --git a/kernel/posix-cpu-timers.c b/kernel/posix-cpu-timers.c
> index 6842eeb..2658955 100644
> --- a/kernel/posix-cpu-timers.c
> +++ b/kernel/posix-cpu-timers.c
> @@ -391,6 +391,7 @@ int posix_cpu_timer_create(struct k_itimer *new_timer)
>  	INIT_LIST_HEAD(&new_timer->it.cpu.entry);
>  
>  	read_lock(&tasklist_lock);
> +	rcu_read_lock();
>  	if (CPUCLOCK_PERTHREAD(new_timer->it_clock)) {
>  		if (pid == 0) {
>  			p = current;
> @@ -414,6 +415,7 @@ int posix_cpu_timer_create(struct k_itimer *new_timer)
>  	} else {
>  		ret = -EINVAL;
>  	}
> +	rcu_read_unlock();
>  	read_unlock(&tasklist_lock);
>  
>  	return ret;

Do we still need the tasklist_lock in this case?

Also, why is that think complaining, surely the tasklist_lock pins any
and all PID objects?

^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: rcu_read_lock/unlock protect find_task_by_vpid call in check_clock
  2010-11-25  1:35 ` rcu_read_lock/unlock protect find_task_by_vpid call in check_clock Dave Jones
@ 2010-11-25  8:40   ` Peter Zijlstra
  0 siblings, 0 replies; 7+ messages in thread
From: Peter Zijlstra @ 2010-11-25  8:40 UTC (permalink / raw)
  To: Dave Jones
  Cc: Linux Kernel, Andrew Morton, tglx, Oleg Nesterov,
	Paul E. McKenney

On Wed, 2010-11-24 at 20:35 -0500, Dave Jones wrote:
> ===================================================
> [ INFO: suspicious rcu_dereference_check() usage. ]
> ---------------------------------------------------
> kernel/pid.c:419 invoked rcu_dereference_check() without protection!
> 
> other info that might help us debug this:
> 
> 
> rcu_scheduler_active = 1, debug_locks = 1
> 1 lock held by scrashme/13382:
>  #0:  (tasklist_lock){.?.?..}, at: [<ffffffff8106ddea>] check_clock+0x46/0x9a
> 
> stack backtrace:
> Pid: 13382, comm: scrashme Not tainted 2.6.37-rc3+ #8
> Call Trace:
>  [<ffffffff8107cfe1>] lockdep_rcu_dereference+0x9d/0xa5
>  [<ffffffff81069d08>] find_task_by_pid_ns+0x44/0x5d
>  [<ffffffff81069d43>] find_task_by_vpid+0x22/0x24
>  [<ffffffff8106ddf2>] check_clock+0x4e/0x9a
>  [<ffffffff8106deac>] posix_cpu_clock_getres+0x16/0x41
>  [<ffffffff8106be74>] sys_clock_getres+0x39/0xa0
>  [<ffffffff81009cb2>] system_call_fastpath+0x16/0x1b
> 
> Signed-off-by: Dave Jones <davej@redhat.com>
> 
> diff --git a/kernel/posix-cpu-timers.c b/kernel/posix-cpu-timers.c
> index 6842eeb..4bef9aa 100644
> --- a/kernel/posix-cpu-timers.c
> +++ b/kernel/posix-cpu-timers.c
> @@ -38,11 +38,13 @@ static int check_clock(const clockid_t which_clock)
>  		return 0;
>  
>  	read_lock(&tasklist_lock);
> +	rcu_read_lock();
>  	p = find_task_by_vpid(pid);
>  	if (!p || !(CPUCLOCK_PERTHREAD(which_clock) ?
>  		   same_thread_group(p, current) : thread_group_leader(p))) {
>  		error = -EINVAL;
>  	}
> +	rcu_read_unlock();
>  	read_unlock(&tasklist_lock);
>  
>  	return error;


Pretty much the same comment as the other patch..

<copy/paste>

Do we still need the tasklist_lock in this case?

Also, why is that think complaining, surely the tasklist_lock pins any
and all PID objects?

^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: rcu_read_lock/unlock protect find_task_by_vpid call in posix_cpu_timer_create
  2010-11-25  8:40 ` rcu_read_lock/unlock protect find_task_by_vpid call in posix_cpu_timer_create Peter Zijlstra
@ 2010-11-25 11:00   ` Oleg Nesterov
  2010-11-25 11:02   ` Oleg Nesterov
  1 sibling, 0 replies; 7+ messages in thread
From: Oleg Nesterov @ 2010-11-25 11:00 UTC (permalink / raw)
  To: Peter Zijlstra
  Cc: Dave Jones, Linux Kernel, Andrew Morton, tglx, Paul E. McKenney

(add Sergey)

On 11/25, Peter Zijlstra wrote:
>
> On Wed, 2010-11-24 at 20:09 -0500, Dave Jones wrote:
> > --- a/kernel/posix-cpu-timers.c
> > +++ b/kernel/posix-cpu-timers.c
> > @@ -391,6 +391,7 @@ int posix_cpu_timer_create(struct k_itimer *new_timer)
> >  	INIT_LIST_HEAD(&new_timer->it.cpu.entry);
> >
> >  	read_lock(&tasklist_lock);
> > +	rcu_read_lock();
> >  	if (CPUCLOCK_PERTHREAD(new_timer->it_clock)) {
> >  		if (pid == 0) {
> >  			p = current;
> > @@ -414,6 +415,7 @@ int posix_cpu_timer_create(struct k_itimer *new_timer)
> >  	} else {
> >  		ret = -EINVAL;
> >  	}
> > +	rcu_read_unlock();
> >  	read_unlock(&tasklist_lock);
> >
> >  	return ret;
>
> Do we still need the tasklist_lock in this case?

No. posix-cpu-timer.c shouldn't use tasklist at all. But it is not
completely trivial to remove it.

In particular, this patch is not exactly right, we can't trust
thread_group_leader() without tasklist.

Sergey already sent the patch which removes tasklist from
posix_cpu_timer_create() and posix_cpu_timer_create(), and iirc
Thomas queued it.

> Also, why is that think complaining, surely the tasklist_lock pins any
> and all PID objects?

The only problem is: if copy_process() fails, it does free_pid()
lockless. This means, without rcu lock it is not safe to scan the
rcu-protected lists.

We can change copy_process() (in fact I sent the patch several
years ago), but everybody think that find_pid/etc should always
take rcu_read_lock() instead. I tend to agree.

Oleg.


^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: rcu_read_lock/unlock protect find_task_by_vpid call in posix_cpu_timer_create
  2010-11-25  8:40 ` rcu_read_lock/unlock protect find_task_by_vpid call in posix_cpu_timer_create Peter Zijlstra
  2010-11-25 11:00   ` Oleg Nesterov
@ 2010-11-25 11:02   ` Oleg Nesterov
  2010-11-25 11:28     ` Sergey Senozhatsky
  1 sibling, 1 reply; 7+ messages in thread
From: Oleg Nesterov @ 2010-11-25 11:02 UTC (permalink / raw)
  To: Peter Zijlstra
  Cc: Dave Jones, Linux Kernel, Andrew Morton, tglx, Paul E. McKenney,
	Sergey Senozhatsky

(another try, actually add Sergey)

On 11/25, Peter Zijlstra wrote:
>
> On Wed, 2010-11-24 at 20:09 -0500, Dave Jones wrote:
> > --- a/kernel/posix-cpu-timers.c
> > +++ b/kernel/posix-cpu-timers.c
> > @@ -391,6 +391,7 @@ int posix_cpu_timer_create(struct k_itimer *new_timer)
> >  	INIT_LIST_HEAD(&new_timer->it.cpu.entry);
> >
> >  	read_lock(&tasklist_lock);
> > +	rcu_read_lock();
> >  	if (CPUCLOCK_PERTHREAD(new_timer->it_clock)) {
> >  		if (pid == 0) {
> >  			p = current;
> > @@ -414,6 +415,7 @@ int posix_cpu_timer_create(struct k_itimer *new_timer)
> >  	} else {
> >  		ret = -EINVAL;
> >  	}
> > +	rcu_read_unlock();
> >  	read_unlock(&tasklist_lock);
> >
> >  	return ret;
>
> Do we still need the tasklist_lock in this case?

No. posix-cpu-timer.c shouldn't use tasklist at all. But it is not
completely trivial to remove it.

In particular, this patch is not exactly right, we can't trust
thread_group_leader() without tasklist.

Sergey already sent the patch which removes tasklist from
posix_cpu_timer_create() and posix_cpu_timer_create(), and iirc
Thomas queued it.

> Also, why is that think complaining, surely the tasklist_lock pins any
> and all PID objects?

The only problem is: if copy_process() fails, it does free_pid()
lockless. This means, without rcu lock it is not safe to scan the
rcu-protected lists.

We can change copy_process() (in fact I sent the patch several
years ago), but everybody think that find_pid/etc should always
take rcu_read_lock() instead. I tend to agree.

Oleg.


^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: rcu_read_lock/unlock protect find_task_by_vpid call in posix_cpu_timer_create
  2010-11-25 11:02   ` Oleg Nesterov
@ 2010-11-25 11:28     ` Sergey Senozhatsky
  0 siblings, 0 replies; 7+ messages in thread
From: Sergey Senozhatsky @ 2010-11-25 11:28 UTC (permalink / raw)
  To: Oleg Nesterov
  Cc: Peter Zijlstra, Dave Jones, Linux Kernel, Andrew Morton, tglx,
	Paul E. McKenney, Sergey Senozhatsky

[-- Attachment #1: Type: text/plain, Size: 2208 bytes --]

Hello,

On (11/25/10 12:02), Oleg Nesterov wrote:
> (another try, actually add Sergey)
>
Thank you.
 
> On 11/25, Peter Zijlstra wrote:
> >
> > On Wed, 2010-11-24 at 20:09 -0500, Dave Jones wrote:
> > > --- a/kernel/posix-cpu-timers.c
> > > +++ b/kernel/posix-cpu-timers.c
> > > @@ -391,6 +391,7 @@ int posix_cpu_timer_create(struct k_itimer *new_timer)
> > >  	INIT_LIST_HEAD(&new_timer->it.cpu.entry);
> > >
> > >  	read_lock(&tasklist_lock);
> > > +	rcu_read_lock();
> > >  	if (CPUCLOCK_PERTHREAD(new_timer->it_clock)) {
> > >  		if (pid == 0) {
> > >  			p = current;
> > > @@ -414,6 +415,7 @@ int posix_cpu_timer_create(struct k_itimer *new_timer)
> > >  	} else {
> > >  		ret = -EINVAL;
> > >  	}
> > > +	rcu_read_unlock();
> > >  	read_unlock(&tasklist_lock);
> > >
> > >  	return ret;
> >
> > Do we still need the tasklist_lock in this case?
> 
> No. posix-cpu-timer.c shouldn't use tasklist at all. But it is not
> completely trivial to remove it.
> 
> In particular, this patch is not exactly right, we can't trust
> thread_group_leader() without tasklist.
> 
> Sergey already sent the patch which removes tasklist from
> posix_cpu_timer_create() and posix_cpu_timer_create(), and iirc
> Thomas queued it.
> 

You're right, Oleg.

Commit-ID:  c0deae8c9587419ab13874b74425ce2eb2e18508
Gitweb:     http://git.kernel.org/tip/c0deae8c9587419ab13874b74425ce2eb2e18508
Author:     Sergey Senozhatsky <sergey.senozhatsky@gmail.com>
AuthorDate: Wed, 3 Nov 2010 18:52:56 +0200
Committer:  Thomas Gleixner <tglx@linutronix.de>
CommitDate: Wed, 10 Nov 2010 13:07:06 +0100

posix-cpu-timers: Rcu_read_lock/unlock protect find_task_by_vpid call

queued (15 days so far).


> > Also, why is that think complaining, surely the tasklist_lock pins any
> > and all PID objects?
> 
> The only problem is: if copy_process() fails, it does free_pid()
> lockless. This means, without rcu lock it is not safe to scan the
> rcu-protected lists.
> 
> We can change copy_process() (in fact I sent the patch several
> years ago), but everybody think that find_pid/etc should always
> take rcu_read_lock() instead. I tend to agree.
> 
> Oleg.
> 

	Sergey

[-- Attachment #2: Type: application/pgp-signature, Size: 316 bytes --]

^ permalink raw reply	[flat|nested] 7+ messages in thread

end of thread, other threads:[~2010-11-25 11:27 UTC | newest]

Thread overview: 7+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2010-11-25  1:09 rcu_read_lock/unlock protect find_task_by_vpid call in posix_cpu_timer_create Dave Jones
2010-11-25  1:35 ` rcu_read_lock/unlock protect find_task_by_vpid call in check_clock Dave Jones
2010-11-25  8:40   ` Peter Zijlstra
2010-11-25  8:40 ` rcu_read_lock/unlock protect find_task_by_vpid call in posix_cpu_timer_create Peter Zijlstra
2010-11-25 11:00   ` Oleg Nesterov
2010-11-25 11:02   ` Oleg Nesterov
2010-11-25 11:28     ` Sergey Senozhatsky

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox