lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date:   Mon, 22 Nov 2021 08:14:17 -0800
From:   Josh Poimboeuf <jpoimboe@...hat.com>
To:     Peter Zijlstra <peterz@...radead.org>
Cc:     Linus Torvalds <torvalds@...ux-foundation.org>,
        Holger Hoffst??tte <holger@...lied-asynchrony.com>,
        Qi Zheng <zhengqi.arch@...edance.com>,
        Kees Cook <keescook@...omium.org>,
        Thomas Gleixner <tglx@...utronix.de>,
        Justin Forbes <jmforbes@...uxtx.org>,
        Greg Kroah-Hartman <gregkh@...uxfoundation.org>,
        Linux Kernel Mailing List <linux-kernel@...r.kernel.org>,
        Andrew Morton <akpm@...ux-foundation.org>,
        Guenter Roeck <linux@...ck-us.net>,
        Shuah Khan <shuah@...nel.org>, patches@...nelci.org,
        lkft-triage@...ts.linaro.org, Pavel Machek <pavel@...x.de>,
        Jon Hunter <jonathanh@...dia.com>,
        Florian Fainelli <f.fainelli@...il.com>,
        stable <stable@...r.kernel.org>
Subject: Re: [PATCH] x86: Pin task-stack in __get_wchan()

On Mon, Nov 22, 2021 at 10:32:32AM +0100, Peter Zijlstra wrote:
> On Fri, Nov 19, 2021 at 10:35:44AM -0800, Josh Poimboeuf wrote:
> > On Fri, Nov 19, 2021 at 10:29:47AM +0100, Peter Zijlstra wrote:
> > > On Thu, Nov 18, 2021 at 06:04:27PM -0800, Josh Poimboeuf wrote:
> > > > On Thu, Nov 18, 2021 at 01:11:09PM +0100, Peter Zijlstra wrote:
> > > 
> > > > > I now have the below, the only thing missing is that there's a
> > > > > user_mode() call on a stack based regs. Now on x86_64 we can
> > > > > __get_kernel_nofault() regs->cs and call it a day, but on i386 we have
> > > > > to also fetch regs->flags.
> > > > > 
> > > > > Is this really the way to go?
> > > > 
> > > > Please no.  Can we just add a check in unwind_start() to ensure the
> > > > caller did try_get_task_stack()?
> > > 
> > > I tried; but at best it's fundamentally racy and in practise its worse
> > > because init_task doesn't seem to believe in refcounts and kthreads are
> > > odd for some raisin. Now those are fixable, but given the fundamental
> > > races, I don't see how it's ever going to be reliable.
> > 
> > I'm probably out of the loop here, but I wonder what races you're
> > referring to.
> 
> We can do the warn as you suggest, however, it can become 0 right after
> we test and then still make the unwder explode.
> 
> That is, the test is not sufficient.

Realistically there are a limited number of callers to the unwinder.  If
anybody calls with refcount < 2 then we can WARN() and root them out.

It would have found this bug far before any weird races would have been
found.

True, it's not bulletproof, but task unwinder usage is (to some degree)
less critical than oopses.

Now I'm off to disappear for turkey week.  Cheers.

-- 
Josh

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ