lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20191023150319.GD22601@optiplex-lnx>
Date:   Wed, 23 Oct 2019 11:03:19 -0400
From:   Rafael Aquini <aquini@...hat.com>
To:     Qian Cai <cai@....pw>
Cc:     Waiman Long <longman@...hat.com>,
        Andrew Morton <akpm@...ux-foundation.org>, linux-mm@...ck.org,
        linux-kernel@...r.kernel.org, Johannes Weiner <hannes@...xchg.org>,
        Michal Hocko <mhocko@...nel.org>, Roman Gushchin <guro@...com>,
        Vlastimil Babka <vbabka@...e.cz>,
        Konstantin Khlebnikov <khlebnikov@...dex-team.ru>,
        Jann Horn <jannh@...gle.com>, Song Liu <songliubraving@...com>,
        Greg Kroah-Hartman <gregkh@...uxfoundation.org>
Subject: Re: [PATCH] mm/vmstat: Reduce zone lock hold time when reading
 /proc/pagetypeinfo

On Wed, Oct 23, 2019 at 10:48:13AM -0400, Qian Cai wrote:
> On Wed, 2019-10-23 at 10:30 -0400, Waiman Long wrote:
> > On 10/22/19 5:59 PM, Andrew Morton wrote:
> > > On Tue, 22 Oct 2019 12:21:56 -0400 Waiman Long <longman@...hat.com> wrote:
> > > 
> > > > The pagetypeinfo_showfree_print() function prints out the number of
> > > > free blocks for each of the page orders and migrate types. The current
> > > > code just iterates the each of the free lists to get counts.  There are
> > > > bug reports about hard lockup panics when reading the /proc/pagetyeinfo
> > > > file just because it look too long to iterate all the free lists within
> > > > a zone while holing the zone lock with irq disabled.
> > > > 
> > > > Given the fact that /proc/pagetypeinfo is readable by all, the possiblity
> > > > of crashing a system by the simple act of reading /proc/pagetypeinfo
> > > > by any user is a security problem that needs to be addressed.
> > > 
> > > Yes.
> > > 
> > > > There is a free_area structure associated with each page order. There
> > > > is also a nr_free count within the free_area for all the different
> > > > migration types combined. Tracking the number of free list entries
> > > > for each migration type will probably add some overhead to the fast
> > > > paths like moving pages from one migration type to another which may
> > > > not be desirable.
> > > > 
> > > > we can actually skip iterating the list of one of the migration types
> > > > and used nr_free to compute the missing count. Since MIGRATE_MOVABLE
> > > > is usually the largest one on large memory systems, this is the one
> > > > to be skipped. Since the printing order is migration-type => order, we
> > > > will have to store the counts in an internal 2D array before printing
> > > > them out.
> > > > 
> > > > Even by skipping the MIGRATE_MOVABLE pages, we may still be holding the
> > > > zone lock for too long blocking out other zone lock waiters from being
> > > > run. This can be problematic for systems with large amount of memory.
> > > > So a check is added to temporarily release the lock and reschedule if
> > > > more than 64k of list entries have been iterated for each order. With
> > > > a MAX_ORDER of 11, the worst case will be iterating about 700k of list
> > > > entries before releasing the lock.
> > > > 
> > > > ...
> > > > 
> > > > --- a/mm/vmstat.c
> > > > +++ b/mm/vmstat.c
> > > > @@ -1373,23 +1373,54 @@ static void pagetypeinfo_showfree_print(struct seq_file *m,
> > > >  					pg_data_t *pgdat, struct zone *zone)
> > > >  {
> > > >  	int order, mtype;
> > > > +	unsigned long nfree[MAX_ORDER][MIGRATE_TYPES];
> > > 
> > > 600+ bytes is a bit much.  I guess it's OK in this situation.
> > > 
> > 
> > This function is called by reading /proc/pagetypeinfo. The call stack is
> > rather shallow:
> > 
> > PID: 58188  TASK: ffff938a4d4f1fa0  CPU: 2   COMMAND: "sosreport"
> >  #0 [ffff9483bf488e48] crash_nmi_callback at ffffffffb8c551d7
> >  #1 [ffff9483bf488e58] nmi_handle at ffffffffb931d8cc
> >  #2 [ffff9483bf488eb0] do_nmi at ffffffffb931dba8
> >  #3 [ffff9483bf488ef0] end_repeat_nmi at ffffffffb931cd69
> >     [exception RIP: pagetypeinfo_showfree_print+0x73]
> >     RIP: ffffffffb8db7173  RSP: ffff938b9fcbfda0  RFLAGS: 00000006
> >     RAX: fffff0c9946d7020  RBX: ffff96073ffd5528  RCX: 0000000000000000
> >     RDX: 00000000001c7764  RSI: ffffffffb9676ab1  RDI: 0000000000000000
> >     RBP: ffff938b9fcbfdd0   R8: 000000000000000a   R9: 00000000fffffffe
> >     R10: 0000000000000000  R11: ffff938b9fcbfc36  R12: ffff942b97758240
> >     R13: ffffffffb942f730  R14: ffff96073ffd5000  R15: ffff96073ffd5180
> >     ORIG_RAX: ffffffffffffffff  CS: 0010  SS: 0018
> > --- <NMI exception stack> ---
> >  #4 [ffff938b9fcbfda0] pagetypeinfo_showfree_print at ffffffffb8db7173
> >  #5 [ffff938b9fcbfdd8] walk_zones_in_node at ffffffffb8db74df
> >  #6 [ffff938b9fcbfe20] pagetypeinfo_show at ffffffffb8db7a29
> >  #7 [ffff938b9fcbfe48] seq_read at ffffffffb8e45c3c
> >  #8 [ffff938b9fcbfeb8] proc_reg_read at ffffffffb8e95070
> >  #9 [ffff938b9fcbfed8] vfs_read at ffffffffb8e1f2af
> > #10 [ffff938b9fcbff08] sys_read at ffffffffb8e2017f
> > #11 [ffff938b9fcbff50] system_call_fastpath at ffffffffb932579b
> > 
> > So we should not be in any risk of overflowing the stack.
> > 
> > > > -	for (mtype = 0; mtype < MIGRATE_TYPES; mtype++) {
> > > > -		seq_printf(m, "Node %4d, zone %8s, type %12s ",
> > > > -					pgdat->node_id,
> > > > -					zone->name,
> > > > -					migratetype_names[mtype]);
> > > > -		for (order = 0; order < MAX_ORDER; ++order) {
> > > > +	lockdep_assert_held(&zone->lock);
> > > > +	lockdep_assert_irqs_disabled();
> > > > +
> > > > +	/*
> > > > +	 * MIGRATE_MOVABLE is usually the largest one in large memory
> > > > +	 * systems. We skip iterating that list. Instead, we compute it by
> > > > +	 * subtracting the total of the rests from free_area->nr_free.
> > > > +	 */
> > > > +	for (order = 0; order < MAX_ORDER; ++order) {
> > > > +		unsigned long nr_total = 0;
> > > > +		struct free_area *area = &(zone->free_area[order]);
> > > > +
> > > > +		for (mtype = 0; mtype < MIGRATE_TYPES; mtype++) {
> > > >  			unsigned long freecount = 0;
> > > > -			struct free_area *area;
> > > >  			struct list_head *curr;
> > > >  
> > > > -			area = &(zone->free_area[order]);
> > > > -
> > > > +			if (mtype == MIGRATE_MOVABLE)
> > > > +				continue;
> > > >  			list_for_each(curr, &area->free_list[mtype])
> > > >  				freecount++;
> > > > -			seq_printf(m, "%6lu ", freecount);
> > > > +			nfree[order][mtype] = freecount;
> > > > +			nr_total += freecount;
> > > >  		}
> > > > +		nfree[order][MIGRATE_MOVABLE] = area->nr_free - nr_total;
> > > > +
> > > > +		/*
> > > > +		 * If we have already iterated more than 64k of list
> > > > +		 * entries, we might have hold the zone lock for too long.
> > > > +		 * Temporarily release the lock and reschedule before
> > > > +		 * continuing so that other lock waiters have a chance
> > > > +		 * to run.
> > > > +		 */
> > > > +		if (nr_total > (1 << 16)) {
> > > > +			spin_unlock_irq(&zone->lock);
> > > > +			cond_resched();
> > > > +			spin_lock_irq(&zone->lock);
> > > > +		}
> > > > +	}
> > > > +
> > > > +	for (mtype = 0; mtype < MIGRATE_TYPES; mtype++) {
> > > > +		seq_printf(m, "Node %4d, zone %8s, type %12s ",
> > > > +					pgdat->node_id,
> > > > +					zone->name,
> > > > +					migratetype_names[mtype]);
> > > > +		for (order = 0; order < MAX_ORDER; ++order)
> > > > +			seq_printf(m, "%6lu ", nfree[order][mtype]);
> > > >  		seq_putc(m, '\n');
> > > 
> > > This is not exactly a thing of beauty :( Presumably there might still
> > > be situations where the irq-off times remain excessive.
> > 
> > Yes, that is still possible.
> > > 
> > > Why are we actually holding zone->lock so much?  Can we get away with
> > > holding it across the list_for_each() loop and nothing else?  If so,
> > 
> > We can certainly do that with the risk that the counts will be less
> > reliable for a given order. I can send a v2 patch if you think this is
> > safer.
> > 
> > 
> > > this still isn't a bulletproof fix.  Maybe just terminate the list
> > > walk if freecount reaches 1024.  Would anyone really care?
> > > 
> > > Sigh.  I wonder if anyone really uses this thing for anything
> > > important.  Can we just remove it all?
> > > 
> > 
> > Removing it will be a breakage of kernel API.
> 
> Who cares about breaking this part of the API that essentially nobody will use
> this file?
>

Seems that _some_ are using it, aren't they? Otherwise we wouldn't be
seeing complaints. Moving it out of /proc to /sys/kernel/debug looks 
like a reasonable compromise with those that care about the interface.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ