lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Tue, 21 Nov 2017 14:06:52 +0100
From:   Michal Hocko <mhocko@...nel.org>
To:     Vlastimil Babka <vbabka@...e.cz>
Cc:     Mike Kravetz <mike.kravetz@...cle.com>, linux-mm@...ck.org,
        linux-kernel@...r.kernel.org, Joonsoo Kim <iamjoonsoo.kim@....com>,
        Michal Nazarewicz <mina86@...a86.com>,
        Mel Gorman <mgorman@...hsingularity.net>,
        Johannes Weiner <hannes@...xchg.org>,
        Andrew Morton <akpm@...ux-foundation.org>,
        stable@...r.kernel.org
Subject: Re: [PATCH 1/1] mm/cma: fix alloc_contig_range ret code/potential
 leak

On Tue 21-11-17 08:53:11, Vlastimil Babka wrote:
> On 11/20/2017 08:39 PM, Mike Kravetz wrote:
> > If the call __alloc_contig_migrate_range() in alloc_contig_range
> > returns -EBUSY, processing continues so that test_pages_isolated()
> > is called where there is a tracepoint to identify the busy pages.
> > However, it is possible for busy pages to become available between
> > the calls to these two routines.  In this case, the range of pages
> > may be allocated.   Unfortunately, the original return code (ret
> > == -EBUSY) is still set and returned to the caller.  Therefore,
> > the caller believes the pages were not allocated and they are leaked.
> > 
> > Update the return code with the value from test_pages_isolated().
> 
> Good catch and seems ok for a stable fix. But it's another indication
> that this area needs some larger rewrite.

Absolutely. The whole thing is subtle as hell. And shaping the code just
around the tracepoint here smells like the whole design could be thought
through much more.
-- 
Michal Hocko
SUSE Labs

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ