From: Oleg Nesterov <oleg@redhat.com>
To: Peter Zijlstra <peterz@infradead.org>
Cc: Sasha Levin <sasha.levin@oracle.com>,
Ingo Molnar <mingo@kernel.org>,
John Stultz <john.stultz@linaro.org>,
Thomas Gleixner <tglx@linutronix.de>,
Frederic Weisbecker <fweisbec@gmail.com>,
LKML <linux-kernel@vger.kernel.org>,
Dave Jones <davej@redhat.com>,
Andrey Ryabinin <a.ryabinin@samsung.com>
Subject: Re: sched, timers: use after free in __lock_task_sighand when exiting a process
Date: Mon, 14 Jul 2014 16:49:53 +0200 [thread overview]
Message-ID: <20140714144953.GA8173@redhat.com> (raw)
In-Reply-To: <20140714090449.GL9918@twins.programming.kicks-ass.net>
On 07/14, Peter Zijlstra wrote:
>
> On Sun, Jul 13, 2014 at 07:45:56PM -0400, Sasha Levin wrote:
> >
> > [ 876.319044] ==================================================================
> > [ 876.319044] AddressSanitizer: use after free in do_raw_spin_unlock+0x4b/0x1a0 at addr ffff8803e48cec18
> > [ 876.319044] page:ffffea000f923380 count:0 mapcount:0 mapping: (null) index:0x0
> > [ 876.319044] page flags: 0x2fffff80008000(tail)
> > [ 876.319044] page dumped because: kasan error
> > [ 876.319044] CPU: 26 PID: 8749 Comm: trinity-watchdo Tainted: G W 3.16.0-rc4-next-20140711-sasha-00046-g07d3099-dirty #817
> > [ 876.319044] 00000000000000fb 0000000000000000 ffffea000f923380 ffff8805c417fc70
> > [ 876.319044] ffffffff9de47068 ffff8805c417fd40 ffff8805c417fd30 ffffffff99426f5c
> > [ 876.319044] 0000000000000010 0000000000000000 ffff8805c417fc9d 66666620000000a8
> > [ 876.319044] Call Trace:
> > [ 876.319044] dump_stack (lib/dump_stack.c:52)
> > [ 876.319044] kasan_report_error (mm/kasan/report.c:98 mm/kasan/report.c:166)
> > [ 876.319044] __asan_load8 (mm/kasan/kasan.c:364)
> > [ 876.319044] do_raw_spin_unlock (./arch/x86/include/asm/current.h:14 kernel/locking/spinlock_debug.c:99 kernel/locking/spinlock_debug.c:158)
> > [ 876.319044] _raw_spin_unlock (include/linux/spinlock_api_smp.h:152 kernel/locking/spinlock.c:183)
> > [ 876.319044] __lock_task_sighand (include/linux/rcupdate.h:858 kernel/signal.c:1285)
> > [ 876.319044] do_send_sig_info (kernel/signal.c:1191)
> > [ 876.319044] group_send_sig_info (kernel/signal.c:1304)
> > [ 876.319044] kill_pid_info (kernel/signal.c:1339)
> > [ 876.319044] SYSC_kill (kernel/signal.c:1423 kernel/signal.c:2900)
Looks like a false alarm at first glance...
> Oleg, what guarantees the RCU free of task-struct and sighand?
> The only RCU I can find is delayed_put_task_struct() but that's not
> often used.
Yes, usually the code uses put_task_struct(). delayed_put_task_struct()
acts almost as "if (dec_and_test(usage)) kfree_rcu(), but allows to use
get_task_struct() if you observe this task under rcu_read_lock().
Say,
rcu_read_lock();
task = find_task_by_vpid(...);
if (task)
get_task_struct(task);
rcu_read_unlock();
If release_task() used dec_and_test + kfree_rcu, the code above could
not work.
> TASK_DEAD etc. use regular put_task_struct() and that
> doesn't seem to involve RCU.
Yes, the task itself (or, depending ob pov, scheduler) has a reference.
copy_process() does
/*
* One for us, one for whoever does the "release_task()" (usually
* parent)
*/
atomic_set(&tsk->usage, 2);
"us" actually means that put_task_struct(TASK_DEAD).
As for ->sighand, note that sighand_cachep is SLAB_DESTROY_BY_RCU. So this
memory is RCU free in a sense that it can't be returned to system, but it
can be reused by another task. This is fine, lock_task_sighand() rechecks
sighand == task->sighand under ->siglock.
So perhaps this tool misinterprets kmem_cache_free(sighand_cachep) as use
after free?
We are going to add some comments into lock_task_sighand(). And cleanup it,
it can look much simpler.
Oleg.
next prev parent reply other threads:[~2014-07-14 14:52 UTC|newest]
Thread overview: 17+ messages / expand[flat|nested] mbox.gz Atom feed top
2014-07-13 21:51 sched, timers: use after free in __lock_task_sighand when exiting a process Sasha Levin
2014-07-13 23:45 ` Sasha Levin
2014-07-14 9:04 ` Peter Zijlstra
2014-07-14 9:34 ` Andrey Ryabinin
2014-07-14 9:58 ` Peter Zijlstra
2014-07-14 10:25 ` Andrey Ryabinin
2014-07-14 14:49 ` Oleg Nesterov [this message]
2014-07-14 15:13 ` Oleg Nesterov
2014-07-14 15:31 ` Andrey Ryabinin
2014-07-14 16:01 ` finish_task_switch && prev_state (Was: sched, timers: use after free in __lock_task_sighand when exiting a process) Oleg Nesterov
2014-07-15 13:12 ` Oleg Nesterov
2014-07-15 13:23 ` Peter Zijlstra
2014-07-15 14:25 ` Oleg Nesterov
2014-07-29 9:10 ` Peter Zijlstra
2014-07-29 9:22 ` Peter Zijlstra
2014-07-29 15:53 ` Oleg Nesterov
2014-07-15 13:28 ` sched, timers: use after free in __lock_task_sighand when exiting a process Peter Zijlstra
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20140714144953.GA8173@redhat.com \
--to=oleg@redhat.com \
--cc=a.ryabinin@samsung.com \
--cc=davej@redhat.com \
--cc=fweisbec@gmail.com \
--cc=john.stultz@linaro.org \
--cc=linux-kernel@vger.kernel.org \
--cc=mingo@kernel.org \
--cc=peterz@infradead.org \
--cc=sasha.levin@oracle.com \
--cc=tglx@linutronix.de \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox