lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Tue, 2 Feb 2016 09:13:55 +0100
From:	Ingo Molnar <mingo@...nel.org>
To:	Byungchul Park <byungchul.park@....com>
Cc:	willy@...ux.intel.com, akpm@...ux-foundation.org,
	linux-kernel@...r.kernel.org, akinobu.mita@...il.com, jack@...e.cz,
	sergey.senozhatsky.work@...il.com, peter@...leysoftware.com,
	torvalds@...ux-foundation.org,
	Peter Zijlstra <a.p.zijlstra@...llo.nl>,
	Thomas Gleixner <tglx@...utronix.de>
Subject: Re: [PATCH] lock/semaphore: Avoid a deadlock within __up()


* Byungchul Park <byungchul.park@....com> wrote:

> Since I faced a infinite recursive printk() bug, I've tried to propose
> patches the title of which is "lib/spinlock_debug.c: prevent a recursive
> cycle in the debug code". But I noticed the root problem cannot be fixed
> by that, through some discussion thanks to Sergey and Peter. So I focused
> on preventing the DEADLOCK.
> 
> -----8<-----
> From 94a66990677735459a7790b637179d8600479639 Mon Sep 17 00:00:00 2001
> From: Byungchul Park <byungchul.park@....com>
> Date: Tue, 2 Feb 2016 15:35:48 +0900
> Subject: [PATCH] lock/semaphore: Avoid a deadlock within __up()
> 
> When the semaphore __up() is called from within printk() with
> console_sem.lock, a DEADLOCK can happen, since the wake_up_process() can
> call printk() again, esp. if defined CONFIG_DEBUG_SPINLOCK. And the
> wake_up_process() don't need to be within a critical section.
> 
> The scenario the bad thing can happen is,
> 
> printk
>   console_trylock
>   console_unlock
>     up_console_sem
>       up
>         raw_spin_lock_irqsave(&sem->lock, flags)
>         __up
>           wake_up_process
>             try_to_wake_up
>               raw_spin_lock_irqsave(&p->pi_lock)
>                 __spin_lock_debug
>                   spin_dump
>                     printk
>                       console_trylock
>                         raw_spin_lock_irqsave(&sem->lock, flags)
> 
>                         *** DEADLOCK ***
> 
> Signed-off-by: Byungchul Park <byungchul.park@....com>
> ---
>  kernel/locking/semaphore.c | 9 +++++++++
>  1 file changed, 9 insertions(+)
> 
> diff --git a/kernel/locking/semaphore.c b/kernel/locking/semaphore.c
> index b8120ab..d3a28dc 100644
> --- a/kernel/locking/semaphore.c
> +++ b/kernel/locking/semaphore.c
> @@ -259,5 +259,14 @@ static noinline void __sched __up(struct semaphore *sem)
>  						struct semaphore_waiter, list);
>  	list_del(&waiter->list);
>  	waiter->up = true;
> +
> +	/*
> +	 * Trying to acquire this sem->lock in wake_up_process() leads a
> +	 * DEADLOCK unless we unlock it here. For example, it's possile
> +	 * in the case that called from within printk() since
> +	 * wake_up_process() might call printk().
> +	 */
> +	raw_spin_unlock_irq(&sem->lock);
>  	wake_up_process(waiter->task);
> +	raw_spin_lock_irq(&sem->lock);

So I'm pretty sad about this solution, as it penalizes every semaphore user - 
while the deadlock is a really obscure one occuring within the scheduler or a 
console driver, which are very narrow code paths!

(Also, please don't shout in comments, unless there's some really good reason to 
do it.)

Why doesn't spin_dump() break the console lock instead, if it detects that it's 
spinning on it, before doing the printk()? It's a likely fail state anyway - and 
this way we push any intrusive debug oriented action towards the unlikely fail 
state.

Alternatively: why not improve down_trylock() to be lockless? The main reason for 
the lockup is that a trylock op takes the semaphore spinlock unconditionally. 
Which is fine for legacy code, but could perhaps be improved upon - I think we 
could in fact do it without turning sem->count into atomics.

Alternatively #2: move printk() away from semaphores - it's pretty special code 
anyway and semaphore semanthics are far from obvious.

Thanks,

	Ingo

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ