lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Wed, 17 Mar 2010 12:15:51 +0900
From:	KAMEZAWA Hiroyuki <kamezawa.hiroyu@...fujitsu.com>
To:	Minchan Kim <minchan.kim@...il.com>
Cc:	Mel Gorman <mel@....ul.ie>,
	Andrew Morton <akpm@...ux-foundation.org>,
	Andrea Arcangeli <aarcange@...hat.com>,
	Christoph Lameter <cl@...ux-foundation.org>,
	Adam Litke <agl@...ibm.com>, Avi Kivity <avi@...hat.com>,
	David Rientjes <rientjes@...gle.com>,
	KOSAKI Motohiro <kosaki.motohiro@...fujitsu.com>,
	Rik van Riel <riel@...hat.com>, linux-kernel@...r.kernel.org,
	linux-mm@...ck.org
Subject: Re: [PATCH 02/11] mm,migration: Do not try to migrate unmapped 
 anonymous pages

On Wed, 17 Mar 2010 12:00:15 +0900
Minchan Kim <minchan.kim@...il.com> wrote:

> On Wed, Mar 17, 2010 at 11:12 AM, KAMEZAWA Hiroyuki
> > BTW, I doubt freeing anon_vma can happen even when we check mapcount.
> >
> > "unmap" is 2-stage operation.
> >        1. unmap_vmas() => modify ptes, free pages, etc.
> >        2. free_pgtables() => free pgtables, unlink vma and free it.
> >
> > Then, if migration is enough slow.
> >
> >        Migration():                            Exit():
> >        check mapcount
> >        rcu_read_lock
> >        pte_lock
> >        replace pte with migration pte
> >        pte_unlock
> >                                                pte_lock
> >        copy page etc...                        zap pte (clear pte)
> >                                                pte_unlock
> >                                                free_pgtables
> >                                                ->free vma
> >                                                ->free anon_vma
> >        pte_lock
> >        remap pte with new pfn(fail)
> >        pte_unlock
> >
> >        lock anon_vma->lock             # modification after free.
> >        check list is empty
> 
> check list is empty?
> Do you mean anon_vma->head?
> 
yes.

> If it is, is it possible that that list isn't empty since anon_vma is
> used by others due to
> SLAB_DESTROY_BY_RCU?
> 
There are 4 cases.
	A) anon_vma->list is not empty because anon_vma is not freed.
	B) anon_vma->list is empty because it's freed.
	C) anon_vma->list is empty but it's reused.
	D) anon_vma->list is not empty but it's reused.
 
> but such case is handled by page_check_address, vma_address, I think.
> 
yes. Then, this corrupt nothing, as I wrote. We just modify anon_vma->lock
and it's safe because of SLAB_DESTROY_BY_RCU.


> >        unlock anon_vma->lock
> >        free anon_vma
> >        rcu_read_unlock
> >
> >
> > Hmm. IIUC, anon_vma is allocated as SLAB_DESTROY_BY_RCU. Then, while
> > rcu_read_lock() is taken, anon_vma is anon_vma even if freed. But it
> > may reused as anon_vma for someone else.
> > (IOW, it may be reused but never pushed back to general purpose memory
> >  until RCU grace period.)
> > Then, touching anon_vma->lock never cause any corruption.
> >
> > Does use-after-free check for SLAB_DESTROY_BY_RCU correct behavior ?
> 
> Could you elaborate your point?
> 

Ah, my point is "how use-after-free is detected ?"

If use-after-free is detected by free_pages() (DEBUG_PGALLOC), it seems
strange because DESTROY_BY_RCU guarantee that never happens.

So, I assume use-after-free is detected in SLAB layer. If so,
in above B), C), D) case, it seems there is use-after free in slab's point
of view but it works as expected, no corruption.

Then, my question is
"Does use-after-free check for SLAB_DESTROY_BY_RCU work correctly ?"

and implies we need this patch ?
(But this will prevent unnecessary page copy etc. by easy check.)

Thanks,
-Kame



--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ