lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Thu, 15 Jan 2009 11:00:44 +0900
From:	KAMEZAWA Hiroyuki <kamezawa.hiroyu@...fujitsu.com>
To:	Daisuke Nishimura <nishimura@....nes.nec.co.jp>
Cc:	"LKML" <linux-kernel@...r.kernel.org>,
	"linux-mm" <linux-mm@...ck.org>,
	"Andrew Morton" <akpm@...ux-foundation.org>,
	"Balbir Singh" <balbir@...ux.vnet.ibm.com>,
	"Pavel Emelyanov" <xemul@...nvz.org>,
	"Li Zefan" <lizf@...fujitsu.com>, "Paul Menage" <menage@...gle.com>
Subject: Re: [RFC][PATCH 5/4] memcg: don't call res_counter_uncharge when
 obsolete

On Thu, 15 Jan 2009 10:03:30 +0900
Daisuke Nishimura <nishimura@....nes.nec.co.jp> wrote:

> On Wed, 14 Jan 2009 22:43:05 +0900 (JST), "KAMEZAWA Hiroyuki" <kamezawa.hiroyu@...fujitsu.com> wrote:
> > Daisuke Nishimura さんは書きました:
> > > This is a new one. Please review.
> > >
> > > ===
> > > From: Daisuke Nishimura <nishimura@....nes.nec.co.jp>
> > >
> > > mem_cgroup_get ensures that the memcg that has been got can be accessed
> > > even after the directory has been removed, but it doesn't ensure that
> > > parents
> > > of it can be accessed: parents might have been freed already by rmdir.
> > >
> > > This causes a bug in case of use_hierarchy==1, because
> > > res_counter_uncharge
> > > climb up the tree.
> > >
> > > Check if the memcg is obsolete, and don't call res_counter_uncharge when
> > > obsole.
> > >
> > Hmm, did you see panic ?
> I saw 2 types of bugs, A: spinlock lockup and B: general protection fault.
> (described below)
> 
> Those bugs happened in case of (use_hierarchy && do_swap_account),
> and didn't happen (at leaset I haven't seen) in case of
> (!use_hierarchy && do_swap_account) nor (use_hierarchy && !do_swap_account).
> And, they didn't happen with this patch applied all through the last night.
> 
> A: spinlock lockup
> ===
> BUG: spinlock lockup on CPU#1, mmapstress10/27706, ffff880
> 3a41ef0a0
> Pid: 27706, comm: mmapstress10 Not tainted 2.6.28-git12-7c
> 99bf20 #1
> Call Trace:
>  [<ffffffff803687ba>] _raw_spin_lock+0xfb/0x122
>  [<ffffffff804d83b7>] _spin_lock+0x4e/0x5f
>  [<ffffffff8026f999>] res_counter_uncharge+0x2a/0x70
>  [<ffffffff8026f999>] res_counter_uncharge+0x2a/0x70
>  [<ffffffff802a5ddc>] swap_info_get+0x6a/0xa3
>  [<ffffffff802b72a2>] mem_cgroup_uncharge_swap+0x2a/0x35
>  [<ffffffff802a6059>] swap_entry_free+0x8f/0x93
>  [<ffffffff802a6076>] swap_free+0x19/0x28
>  [<ffffffff802a572d>] delete_from_swap_cache+0x36/0x43
>  [<ffffffff802a6be9>] free_swap_and_cache+0xb1/0xeb
>  [<ffffffff80299e77>] unmap_vmas+0x57f/0x837
>  [<ffffffff8029e426>] exit_mmap+0xa5/0x11c
>  [<ffffffff80239f78>] mmput+0x41/0x9f
>  [<ffffffff8023ddeb>] exit_mm+0x102/0x10d
>  [<ffffffff8023f36a>] do_exit+0x1a2/0x73e
>  [<ffffffff80246317>] __dequeue_signal+0x15/0x11c
>  [<ffffffff8023f979>] do_group_exit+0x73/0xa5
>  [<ffffffff8024870a>] get_signal_to_deliver+0x34f/0x3a1
>  [<ffffffff8020b212>] do_notify_resume+0x8c/0x7a5
>  [<ffffffff80250f64>] lock_hrtimer_base+0x1b/0x3c
>  [<ffffffff8025474e>] getnstimeofday+0x57/0xb6
>  [<ffffffff80251314>] ktime_get_ts+0x22/0x4b
>  [<ffffffff802513bf>] ktime_get+0xc/0x41
>  [<ffffffff802511fa>] hrtimer_nanosleep+0xa5/0xf1
>  [<ffffffff80250d24>] hrtimer_wakeup+0x0/0x22
>  [<ffffffff8020bf58>] sysret_signal+0x7c/0xcb
> ===
> 
>   This context has hold swap_lock already, so other contexts trying to hold
>   swap_lock also get spinlock lockup bug.
> 
> B: general protection fault
> ===
> general protection fault: 0000 [#1] SMP
> last sysfs file: /sys/devices/system/cpu/cpu15/cache/index1/shared_cpu_map
> CPU 3
> Modules linked in: ipt_REJECT xt_tcpudp iptable_filter ip_tables x_tables bridge stp ipv6
> autofs4 hidp rfcomm l2cap bluetooth sunrpc dm_mirror dm_region_hash dm_log dm_multipath dm
> _mod sbs sbshc battery ac lp sg rtc_cmos rtc_core ide_cd_mod parport_pc rtc_lib parport se
> rio_raw cdrom acpi_memhotplug button e1000 i2c_i801 i2c_core shpchp pcspkr ata_piix libata
>  megaraid_mbox megaraid_mm sd_mod scsi_mod ext3 jbd ehci_hcd ohci_hcd uhci_hcd [last unloa
> ded: microcode]
> Pid: 8051, comm: bash Not tainted 2.6.29-rc1-0ed85935 #1
> RIP: 0010:[<ffffffff80368620>]  [<ffffffff80368620>] _raw_spin_trylock+0x0/0x39
> RSP: 0000:ffff8800bb995e00  EFLAGS: 00010092
> RAX: ffff88010b54a620 RBX: 0097040900455377 RCX: 0000000000000000
> RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0097040900455377
> RBP: 009704090045538f R08: 0000000000000002 R09: 0000000000000001
> R10: ffffe2000c861640 R11: ffffffff8026f9b5 R12: 0000000000000296
> R13: 0000000000001000 R14: ffff8801003cf080 R15: 00007fa79a932028
> FS:  00007fa79a9316f0(0000) GS:ffff8803af7d7a80(0000) knlGS:0000000000000000
> CS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003b
> CR2: 00007fa79a932028 CR3: 00000000cc8e0000 CR4: 00000000000006e0
> DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
> DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
> Process bash (pid: 8051, threadinfo ffff8800bb994000, task ffff88010b54a620)
> Stack:
>  ffffffff804d8f1e ffffffff8026f9b5 0097040900455377 0097040900455357
>  ffffffff8026f9b5 0000000000000282 ffff88010e1a2000 ffffe2000c861640
>  ffff8801094f9000 0000000000000000 ffffffff802b7371 00000001ed3e8025
> Call Trace:
>  [<ffffffff804d8f1e>] ? _spin_lock+0x35/0x5f
>  [<ffffffff8026f9b5>] ? res_counter_uncharge+0x2a/0x70
>  [<ffffffff8026f9b5>] ? res_counter_uncharge+0x2a/0x70
>  [<ffffffff802b7371>] ? mem_cgroup_commit_charge_swapin+0x74/0x8a
>  [<ffffffff8029ad00>] ? handle_mm_fault+0x5e3/0x750
>  [<ffffffff804db70a>] ? do_page_fault+0x3b2/0x73e
>  [<ffffffff804d96ef>] ? page_fault+0x1f/0x30
> Code: 31 c0 e8 5f 4a ed ff 48 c7 c7 da df 5c 80 31 c0 e8 51 4a ed ff c7 05 cc d5 33 00 01
> 00 00 00 c7 05 62 c7 de 00 00 00 00 00 58 c3 <0f> b7 07 38 e0 8d 88 00 01 00 00 75 05 f0 6
> 6 0f b1 0f 0f 94 c1
> RIP  [<ffffffff80368620>] _raw_spin_trylock+0x0/0x39
>  RSP <ffff8800bb995e00>
> ---[ end trace 1ecf768aff114688 ]---
> ===
> 
> 
> > To handle the problem "parent may be obsolete",
> > 
> > call mem_cgroup_get(parent) at create()
> > call mem_cgroup_put(parent) at freeing memcg.
> >      (regardless of use_hierarchy.)
> > 
> > is clearer way to go, I think.
> > 
> > I wonder whether there is  mis-accounting problem or not..
> > 
> > So, adding css_tryget() around problematic code can be a fix.
> > --
> >   mem = swap_cgroup_record();
> >   if (css_tryget(&mem->css)) {
> >       res_counter_uncharge(&mem->memsw, PAZE_SIZE);
> >       css_put(&mem->css)
> >   }
> > --
> > I like css_tryget() rather than mem_cgroup_obsolete().
> I agree.
> The updated version is attached.
> 
> 
> Thanks,
> Daisuke nishimura.
> 
> > To be honest, I'd like to remove memcg special stuff when I can.
> > 
> > Thanks,
> > -Kame
> > 
> ===
> From: Daisuke Nishimura <nishimura@....nes.nec.co.jp>
> 
> mem_cgroup_get ensures that the memcg that has been got can be accessed
> even after the directory has been removed, but it doesn't ensure that parents
> of it can be accessed: parents might have been freed already by rmdir.
> 
> This causes a bug in case of use_hierarchy==1, because res_counter_uncharge
> climb up the tree.
> 
> Check if the memcg is obsolete by css_tryget, and don't call
> res_counter_uncharge when obsole.
> 
> Signed-off-by: Daisuke Nishimura <nishimura@....nes.nec.co.jp>
seems nice loock.


> ---
>  mm/memcontrol.c |   15 ++++++++++++---
>  1 files changed, 12 insertions(+), 3 deletions(-)
> 
> diff --git a/mm/memcontrol.c b/mm/memcontrol.c
> index fb62b43..4e3b100 100644
> --- a/mm/memcontrol.c
> +++ b/mm/memcontrol.c
> @@ -1182,7 +1182,10 @@ int mem_cgroup_cache_charge(struct page *page, struct mm_struct *mm,
>  		/* avoid double counting */
>  		mem = swap_cgroup_record(ent, NULL);
>  		if (mem) {
> -			res_counter_uncharge(&mem->memsw, PAGE_SIZE);
> +			if (!css_tryget(&mem->css)) {
> +				res_counter_uncharge(&mem->memsw, PAGE_SIZE);
> +				css_put(&mem->css);
> +			}
>  			mem_cgroup_put(mem);
>  		}
>  	}

I think css_tryget() returns "ture" at success....

So,
==
	if (mem && css_tryget(&mem->css))
		res_counter....

is correct.

-Kame


> @@ -1252,7 +1255,10 @@ void mem_cgroup_commit_charge_swapin(struct page *page, struct mem_cgroup *ptr)
>  		struct mem_cgroup *memcg;
>  		memcg = swap_cgroup_record(ent, NULL);
>  		if (memcg) {
> -			res_counter_uncharge(&memcg->memsw, PAGE_SIZE);
> +			if (!css_tryget(&memcg->css)) {
> +				res_counter_uncharge(&memcg->memsw, PAGE_SIZE);
> +				css_put(&memcg->css);
> +			}
>  			mem_cgroup_put(memcg);
>  		}
>  
> @@ -1397,7 +1403,10 @@ void mem_cgroup_uncharge_swap(swp_entry_t ent)
>  
>  	memcg = swap_cgroup_record(ent, NULL);
>  	if (memcg) {
> -		res_counter_uncharge(&memcg->memsw, PAGE_SIZE);
> +		if (!css_tryget(&memcg->css)) {
> +			res_counter_uncharge(&memcg->memsw, PAGE_SIZE);
> +			css_put(&memcg->css);
> +		}
>  		mem_cgroup_put(memcg);
>  	}
>  }
> 

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ