From: Charan Teja Kalla <quic_charante@quicinc.com>
To: Michal Hocko <mhocko@suse.com>,
Pavan Kondeti <quic_pkondeti@quicinc.com>
Cc: <akpm@linux-foundation.org>, <pasha.tatashin@soleen.com>,
<sjpark@amazon.de>, <sieberf@amazon.com>, <shakeelb@google.com>,
<dhowells@redhat.com>, <willy@infradead.org>, <vbabka@suse.cz>,
<david@redhat.com>, <minchan@kernel.org>,
<linux-kernel@vger.kernel.org>, <linux-mm@kvack.org>,
"iamjoonsoo.kim@lge.com" <iamjoonsoo.kim@lge.com>
Subject: Re: [PATCH] mm: fix use-after free of page_ext after race with memory-offline
Date: Wed, 20 Jul 2022 16:13:19 +0530 [thread overview]
Message-ID: <f7e1efa4-43da-22e0-b748-d0855ecc7456@quicinc.com> (raw)
In-Reply-To: <YtfGeUUoi9cq3g0A@dhcp22.suse.cz>
Thanks Michal & Pavan,
On 7/20/2022 2:40 PM, Michal Hocko wrote:
>>>> Thanks! The most imporant part is how the exclusion is actual achieved
>>>> because that is not really clear at first sight
>>>>
>>>> CPU1 CPU2
>>>> lookup_page_ext(PageA) offlining
>>>> offline_page_ext
>>>> __free_page_ext(addrA)
>>>> get_entry(addrA)
>>>> ms->page_ext = NULL
>>>> synchronize_rcu()
>>>> free_page_ext
>>>> free_pages_exact (now addrA is unusable)
>>>>
>>>> rcu_read_lock()
>>>> entryA = get_entry(addrA)
>>>> base + page_ext_size * index # an address not invalidated by the freeing path
>>>> do_something(entryA)
>>>> rcu_read_unlock()
>>>>
>>>> CPU1 never checks ms->page_ext so it cannot bail out early when the
>>>> thing is torn down. Or maybe I am missing something. I am not familiar
>>>> with page_ext much.
>>>
>>> Thanks a lot for catching this Michal. You are correct that the proposed
>>> code from me is still racy. I Will correct this along with the proper
>>> commit message in the next version of this patch.
>>>
>> Trying to understand your discussion with Michal. What part is still racy? We
>> do check for mem_section::page_ext and bail out early from lookup_page_ext(),
>> no?
>>
>> Also to make this scheme explicit, we can annotate page_ext member with __rcu
>> and use rcu_assign_pointer() on the writer side.
Annotating with __rcu requires all the read and writes to ms->page_ext
to be under rcu_[access|assign]_pointer which is a big patch. I think
READ_ONCE and WRITE_ONCE, mentioned by Michal, below should does the job.
>>
>> struct page_ext *lookup_page_ext(const struct page *page)
>> {
>> unsigned long pfn = page_to_pfn(page);
>> struct mem_section *section = __pfn_to_section(pfn);
>> /*
>> * The sanity checks the page allocator does upon freeing a
>> * page can reach here before the page_ext arrays are
>> * allocated when feeding a range of pages to the allocator
>> * for the first time during bootup or memory hotplug.
>> */
>> if (!section->page_ext)
>> return NULL;
>> return get_entry(section->page_ext, pfn);
>> }
> You are right. I was looking at the wrong implementation and misread
> ifdef vs. ifndef CONFIG_SPARSEMEM. My bad.
>
There is still a small race window b/n ms->page_ext setting NULL and its
access even under CONFIG_SPARSEMEM. In the above mentioned example:
CPU1 CPU2
rcu_read_lock()
lookup_page_ext(PageA): offlining
offline_page_ext
__free_page_ext(addrA)
get_entry(addrA)
if (!section->page_ext)
turns to be false.
ms->page_ext = NULL
addrA = get_entry(base=section->page_ext):
base + page_ext_size * index;
**Since base is NULL here, caller
can still do the dereference on
the invalid pointer address.**
synchronize_rcu()
free_page_ext
free_pages_exact (now )
> Memory hotplug is not supported outside of CONFIG_SPARSEMEM so the
> scheme should really work. I would use READ_ONCE for ms->page_ext and
> WRITE_ONCE on the initialization side.
Yes, I should be using the READ_ONCE() and WRITE_ONCE() here.
Thanks,
Charan
next prev parent reply other threads:[~2022-07-20 10:43 UTC|newest]
Thread overview: 20+ messages / expand[flat|nested] mbox.gz Atom feed top
2022-07-14 14:47 Charan Teja Kalla
2022-07-15 1:04 ` Andrew Morton
2022-07-15 12:32 ` Charan Teja Kalla
2022-07-18 6:11 ` Pavan Kondeti
2022-07-18 13:15 ` Charan Teja Kalla
2022-07-18 11:50 ` Michal Hocko
2022-07-18 13:58 ` Charan Teja Kalla
2022-07-18 14:54 ` Michal Hocko
2022-07-19 15:12 ` Charan Teja Kalla
2022-07-19 15:43 ` Michal Hocko
2022-07-19 15:54 ` David Hildenbrand
2022-07-20 15:08 ` Charan Teja Kalla
2022-07-20 15:22 ` Michal Hocko
2022-07-20 8:21 ` Pavan Kondeti
2022-07-20 9:10 ` Michal Hocko
2022-07-20 10:43 ` Charan Teja Kalla [this message]
2022-07-20 11:13 ` Michal Hocko
2022-07-19 15:19 ` David Hildenbrand
2022-07-19 15:37 ` Michal Hocko
2022-07-19 15:50 ` David Hildenbrand
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=f7e1efa4-43da-22e0-b748-d0855ecc7456@quicinc.com \
--to=quic_charante@quicinc.com \
--cc=akpm@linux-foundation.org \
--cc=david@redhat.com \
--cc=dhowells@redhat.com \
--cc=iamjoonsoo.kim@lge.com \
--cc=linux-kernel@vger.kernel.org \
--cc=linux-mm@kvack.org \
--cc=mhocko@suse.com \
--cc=minchan@kernel.org \
--cc=pasha.tatashin@soleen.com \
--cc=quic_pkondeti@quicinc.com \
--cc=shakeelb@google.com \
--cc=sieberf@amazon.com \
--cc=sjpark@amazon.de \
--cc=vbabka@suse.cz \
--cc=willy@infradead.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox