lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <1272483491.2201.9.camel@edumazet-laptop>
Date:	Wed, 28 Apr 2010 21:38:11 +0200
From:	Eric Dumazet <eric.dumazet@...il.com>
To:	paulmck@...ux.vnet.ibm.com
Cc:	Miles Lane <miles.lane@...il.com>, Vivek Goyal <vgoyal@...hat.com>,
	Eric Paris <eparis@...hat.com>,
	Lai Jiangshan <laijs@...fujitsu.com>,
	Ingo Molnar <mingo@...e.hu>,
	Peter Zijlstra <peterz@...radead.org>,
	LKML <linux-kernel@...r.kernel.org>, nauman@...gle.com,
	netdev@...r.kernel.org, Jens Axboe <jens.axboe@...cle.com>,
	Gui Jianfeng <guijianfeng@...fujitsu.com>,
	Li Zefan <lizf@...fujitsu.com>,
	Johannes Berg <johannes@...solutions.net>,
	shemminger@...tta.com
Subject: Re: 2.6.34-rc5-git7 (plus all patches) -- another suspicious
 rcu_dereference_check() usage.

Le mercredi 28 avril 2010 à 10:54 -0700, Paul E. McKenney a écrit :
> On Mon, Apr 26, 2010 at 08:51:06PM -0400, Miles Lane wrote:
> > This one occurred during the wakeup from suspend to RAM.
> > 
> > [  984.724697] [ INFO: suspicious rcu_dereference_check() usage. ]
> > [  984.724700] ---------------------------------------------------
> > [  984.724703] include/linux/fdtable.h:88 invoked
> > rcu_dereference_check() without protection!
> > [  984.724706]
> > [  984.724707] other info that might help us debug this:
> > [  984.724708]
> > [  984.724711]
> > [  984.724711] rcu_scheduler_active = 1, debug_locks = 1
> > [  984.724714] no locks held by dbus-daemon/4680.
> > [  984.724717]
> > [  984.724717] stack backtrace:
> > [  984.724721] Pid: 4680, comm: dbus-daemon Not tainted 2.6.34-rc5-git7 #33
> > [  984.724724] Call Trace:
> > [  984.724734]  [<ffffffff81074556>] lockdep_rcu_dereference+0x9d/0xa6
> > [  984.724740]  [<ffffffff810fc785>] fcheck_files+0xb1/0xc9
> > [  984.724745]  [<ffffffff810fc7f5>] fget_light+0x35/0xab
> > [  984.724751]  [<ffffffff81433e1b>] ? sock_poll_wait+0x13/0x18
> > [  984.724755]  [<ffffffff81433e39>] ? unix_poll+0x19/0x95
> > [  984.724762]  [<ffffffff8110aa95>] do_sys_poll+0x1ff/0x3e5
> > [  984.724766]  [<ffffffff8110a19e>] ? __pollwait+0x0/0xc7
> > [  984.724771]  [<ffffffff8110a265>] ? pollwake+0x0/0x4f
> > [  984.724776]  [<ffffffff8110a265>] ? pollwake+0x0/0x4f
> > [  984.724780]  [<ffffffff8110a265>] ? pollwake+0x0/0x4f
> > [  984.724784]  [<ffffffff8110a265>] ? pollwake+0x0/0x4f
> > [  984.724788]  [<ffffffff8110a265>] ? pollwake+0x0/0x4f
> > [  984.724793]  [<ffffffff8110a265>] ? pollwake+0x0/0x4f
> > [  984.724797]  [<ffffffff8110a265>] ? pollwake+0x0/0x4f
> > [  984.724802]  [<ffffffff8110a265>] ? pollwake+0x0/0x4f
> > [  984.724806]  [<ffffffff8110a265>] ? pollwake+0x0/0x4f
> > [  984.724812]  [<ffffffff8110ae0f>] sys_poll+0x50/0xbb
> > [  984.724818]  [<ffffffff81009d82>] system_call_fastpath+0x16/0x1b
> 
> Hmmm...  I am not convinced that this is a false positive.  Couldn't
> there be a multi-threaded process where one thread is invoking poll()
> on a UNIX socket just as another thread is calling close() on it?
> 
> The current fcheck_files() logic requires that the caller either (1) be in
> an RCU read-side critical section, (2) hold ->files_lock, or (3) passing
> in a files_struct with ->count equal to 1 (initialization or cleanup).
> 
> So I don't feel comfortable just slapping an RCU read-side critical
> section around this one, at least not unless someone who understands
> the locking says that doing so is OK.
> 
> 		

Its a single threaded program.

So fget_light() calls fcheck_files(files, fd); without rcu lock,
but some /proc/pid/fd/... user temporarly raised files->count just
before we perform the condition check.



--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ