lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAEH94LhqGAxjQ3W6-e1RxpXj0Zdte6joMHmUbeFPV1eKB=2+uQ@mail.gmail.com>
Date:	Tue, 3 Sep 2013 14:22:14 +0800
From:	Zhi Yong Wu <zwu.kernel@...il.com>
To:	Michel Lespinasse <walken@...gle.com>
Cc:	linux-kernel mlist <linux-kernel@...r.kernel.org>,
	akpm@...ux-foundation.org, Zhi Yong Wu <wuzhy@...ux.vnet.ibm.com>
Subject: Re: [PATCH] rbtree: Add some necessary condition checks

On Tue, Sep 3, 2013 at 1:48 PM, Michel Lespinasse <walken@...gle.com> wrote:
> On Mon, Sep 2, 2013 at 9:45 PM, Zhi Yong Wu <zwu.kernel@...il.com> wrote:
>> On Mon, Sep 2, 2013 at 4:57 PM, Michel Lespinasse <walken@...gle.com> wrote:
>>> Thanks for the link - I now better understand where you are coming
>>> from with these fixes.
>>>
>>> Going back to the original message:
>>>
>>>> diff --git a/include/linux/rbtree_augmented.h b/include/linux/rbtree_augmented.h
>>>> index fea49b5..7d19770 100644
>>>> --- a/include/linux/rbtree_augmented.h
>>>> +++ b/include/linux/rbtree_augmented.h
>>>> @@ -199,7 +199,8 @@ __rb_erase_augmented(struct rb_node *node, struct rb_root *root,
>>>>                 }
>>>>
>>>>                 successor->rb_left = tmp = node->rb_left;
>>>> -               rb_set_parent(tmp, successor);
>>>> +               if (tmp)
>>>> +                       rb_set_parent(tmp, successor);
>>>>
>>>>                 pc = node->__rb_parent_color;
>>>>                 tmp = __rb_parent(pc);
>>>
>>> Note that node->rb_left was already fetched at the top of
>>> __rb_erase_augmented(), and was checked to be non-NULL at the time -
>>> otherwise we would have executed 'Case 1' in that function. So, you
>> If 'Case 1' is executed, this line of code is also done, how about the result?
>> 'Case 1' seems *not* to change node->rb_left at all.
>
> Wait, I believe this line of code is executed only in Case 2 and Case 3 ?
Yes.
>
>>>> diff --git a/lib/rbtree.c b/lib/rbtree.c
>>>> index c0e31fe..2cb01ba 100644
>>>> --- a/lib/rbtree.c
>>>> +++ b/lib/rbtree.c
>>>> @@ -214,7 +214,7 @@ ____rb_erase_color(struct rb_node *parent, struct rb_root *root,
>>>>                  */
>>>>                 sibling = parent->rb_right;
>>>>                 if (node != sibling) {  /* node == parent->rb_left */
>>>> -                       if (rb_is_red(sibling)) {
>>>> +                       if (sibling && rb_is_red(sibling)) {
>>>>                                 /*
>>>>                                  * Case 1 - left rotate at parent
>>>>                                  *
>>>
>>> Note the loop invariants quoted just above:
>>>
>>>                 /*
>>>                  * Loop invariants:
>>>                  * - node is black (or NULL on first iteration)
>>>                  * - node is not the root (parent is not NULL)
>>>                  * - All leaf paths going through parent and node have a
>>>                  *   black node count that is 1 lower than other leaf paths.
>>>                  */
>>>
>>> Because of these, each path from sibling to a leaf must include at
>>> least one black node, which implies that sibling can't be NULL - or to
>>> put it another way, if sibling is null then the expected invariants
>>> were violated before we even got there.
>> In theory, i can understand what you mean, But don't know why and
>> where it got violated.
>
> Same here. My point is, I don't think we can fix the issue without
> answering that question.
Yes, but how to look for this answer is the key. :)
>
>>> Now I had a quick look at your code and I couldn't tell at which point
>>> the invariants are violated. However I did notice a couple suspicious
>>> things in the very first patch
>>> (f5c8f2b256d87ac0bf789a787e6b795ac0c736e8):
>>>
>>> 1- In both hot_range_tree_free() and and hot_tree_exit(), you try to
>>> destroy rb trees by iterating on each node with rb_next() and then
>> yes, but this item may not been freed immediately, You can know each item
>> has its ref count.
>
> Are items guaranteed to have another refcount than the one we're dropping ?
Those items maybe have another refcount. You know, other function may
be referencing those items. e.g. hot_freqs_update().
>
>>> freeing them. Note that rb_next() can reference prior nodes, which
>>> have already been freed in your scheme, so that seems quite unsafe.
>> I checked rb_next() function, and found that if its prior nodes are
>> freed, is this node's parent  not NULL?
>
> No, if the parent was freed with just a put() operation, the child
> will still have a pointer to it. This is why I suggested using
> rb_erase() on each node before freeing them, so that we don't keep
> pointers to freed nodes.
ah.
>
>>> The simplest fix would be to do a full rb_erase() on each node before
>> full rb_erase()? sorry, i don't get what you mean. Do you mean we
>> should erase all nodes from rbtree, then begin to free them? If yes,
>> how to iterate them? If no, can you elaborate it?
>
> No, I meant to call rb_erase() on each individual node right before
> the corresponding put() operation.
rb_erase() has been called in current code. You can see
static void hot_range_item_free(struct kref *kref)
{
        struct hot_range_item *hr = container_of(kref,
                                struct hot_range_item, refs);
        struct hot_info *root = hr->hot_inode->hot_root;

        if (!RB_EMPTY_NODE(&hr->rb_node))
                rb_erase(&hr->rb_node, &hr->hot_inode->hot_range_tree);
        spin_lock(&root->m_lock);
        if (!list_empty(&hr->track_list))
                list_del_init(&hr->track_list);
        spin_unlock(&root->m_lock);
        call_rcu(&hr->rcu, hot_range_item_free_cb);
}

void hot_range_item_put(struct hot_range_item *hr)
{
        kref_put(&hr->refs, hot_range_item_free);
}

But hot_range_item_free() may be not executed if this item's refcount
is more than one when put() is called.


>
>>> 2- I did not look long enough to understand the locking, but it wasn't
>>> clear to me if you lock the rbtrees when doing rb_erase() on them
>>> (while I could more clearly see that you do it for insertions).
>> Yes, it get locking when doing rb_erase() or rb_insert(). You can see
>> there are multiple functions maybe rbtree at the same time. To sync
>> them, we need to lock the rbtree.
>
> Yes, agree we need to lock rbtree in all such operations. I just
> wasn't able to determine if it's done around rb_erase() calls, but it
> definitely needs to be.
>
>>> I'm really not sure if either of these will fix the issues you're
>>> seeing, though. What I would try next would be to add explicit rbtree
>>> invariant checks before and after rbtree manipulations, like what the
>>> check() function does in lib/rbtree_test.c, to see at which point do
>>> they get broken.
>> Great, any progress so far? :)
>
> Unfortunately no.
>
> --
> Michel "Walken" Lespinasse
> A program is never fully debugged until the last user dies.



-- 
Regards,

Zhi Yong Wu
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ