Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp1009793rwb; Tue, 29 Nov 2022 07:57:52 -0800 (PST) X-Google-Smtp-Source: AA0mqf7jnH7ybvnv8ARrm5tW3wiN3MBDPwbGTMi2G35DWQYwcgosW4Y0YLMp7GWCekZ2fWW02PV3 X-Received: by 2002:a17:902:8d93:b0:17f:8042:7223 with SMTP id v19-20020a1709028d9300b0017f80427223mr42610516plo.38.1669737472401; Tue, 29 Nov 2022 07:57:52 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1669737472; cv=none; d=google.com; s=arc-20160816; b=mV1doqK8vCpGsb+3MvzCMYQjhXV0Frxvf4NHQVB022PGsiqi/M3H59+rin8WSHt/au BisnMChpuKZwu7GjvRFedhSIEtO4V4Z+QsHl1/Ahen9k1Br3cNCvEG8r7IJiyWM2ZDJs w7SqOT/KyUFQ/A/KFdPifslbLXrQdzWNaUnQSX/vkHI+zu8X7uY0ot89VV6555Hnre3U gShg+HR8rei+BCPsaw1Xhj0tm94w25oejASQSEVOhlg2RXI11McWeLwLcEz2gHVGgq7s CvmoNhTAC/sbDWBxejNh3d5d4t8YJowHWuzJPpVqd869Woi6Og3w6tQ/1h7H7YAT0kQ5 DQug== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:content-language:subject:user-agent:mime-version :date:message-id:dkim-signature; bh=XEX/nvgc/F3npA3jw3K2PpyMT0w7VYcn5gyl+BL6F6A=; b=dVv3M4h44/wLOkYS454HCXiVWNr7x0KL5afX81BsP1OFG8xyN+Y5gVSoMFSCpEc+L5 KYgUff03CJm/c1TjcXiLJA7M6ay7/ZoH3KrFhyI6YNdReCwukP9l9lX7St/eV/h/2bjN 54gBiptzfvEHPgYxalMNcX36MF+4/ewVV8CETycWO7qOYfLT2WRoCgLzp4ADz0Jn51tc UB6KHNxYiB/H4Ga+yU2R9XDDZb6vS6sXcyDGMNJZxcqxrbjiM+UvYU6TcUF1NwVGN1Zl +oNIIlW1JdX16SeIPlT5nhsh2duhS5iefHmYC5hjxRGIIoZOlBYIMPGuI9YxHtX6Phhc rADw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=fIuV5y1U; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id 13-20020a170902c24d00b00179e66b5d2csi13652036plg.398.2022.11.29.07.57.41; Tue, 29 Nov 2022 07:57:52 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=fIuV5y1U; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235782AbiK2PeB (ORCPT + 84 others); Tue, 29 Nov 2022 10:34:01 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:33484 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230151AbiK2Pd4 (ORCPT ); Tue, 29 Nov 2022 10:33:56 -0500 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.129.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id B4A9640465 for ; Tue, 29 Nov 2022 07:32:58 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1669735977; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=XEX/nvgc/F3npA3jw3K2PpyMT0w7VYcn5gyl+BL6F6A=; b=fIuV5y1Uvv3nzlspjA+mXSBtXtwIhsnaHkkqF9v7TFUAIscBNIjgzDfY8+FCmGD+UlRIAO BrYH315l2MmuhLgEs+7DZOKb7+ObE9xqdtwRv8cCxsNMHaLCJnwrhabl19lxVt8JAK2+Bw AHy52pBRKs7SiejsFopM7+ANudFAJA8= Received: from mimecast-mx02.redhat.com (mimecast-mx02.redhat.com [66.187.233.88]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-59-41YQtDwHPpeYF79gT9IuKg-1; Tue, 29 Nov 2022 10:32:53 -0500 X-MC-Unique: 41YQtDwHPpeYF79gT9IuKg-1 Received: from smtp.corp.redhat.com (int-mx07.intmail.prod.int.rdu2.redhat.com [10.11.54.7]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx02.redhat.com (Postfix) with ESMTPS id 091F4811E67; Tue, 29 Nov 2022 15:32:52 +0000 (UTC) Received: from [10.22.17.30] (unknown [10.22.17.30]) by smtp.corp.redhat.com (Postfix) with ESMTP id 3B388140EBF5; Tue, 29 Nov 2022 15:32:51 +0000 (UTC) Message-ID: Date: Tue, 29 Nov 2022 10:32:49 -0500 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Thunderbird/102.4.0 Subject: Re: [PATCH-tip v4] sched: Fix NULL user_cpus_ptr check in dup_user_cpus_ptr() Content-Language: en-US To: Will Deacon Cc: Ingo Molnar , Peter Zijlstra , Juri Lelli , Vincent Guittot , Dietmar Eggemann , Steven Rostedt , Ben Segall , Mel Gorman , Daniel Bristot de Oliveira , Phil Auld , Wenjie Li , =?UTF-8?B?RGF2aWQgV2FuZyDnjovmoIc=?= , linux-kernel@vger.kernel.org References: <20221125023943.1118603-1-longman@redhat.com> <92b99a5e-1588-4e08-a652-72e9c51421cf@redhat.com> <20221128120008.GA25090@willie-the-truck> <20221129140759.GA26437@willie-the-truck> From: Waiman Long In-Reply-To: <20221129140759.GA26437@willie-the-truck> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit X-Scanned-By: MIMEDefang 3.1 on 10.11.54.7 X-Spam-Status: No, score=-2.4 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,NICE_REPLY_A, RCVD_IN_DNSWL_NONE,RCVD_IN_MSPIKE_H2,SPF_HELO_NONE,SPF_NONE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 11/29/22 09:07, Will Deacon wrote: > On Mon, Nov 28, 2022 at 10:11:52AM -0500, Waiman Long wrote: >> On 11/28/22 07:00, Will Deacon wrote: >>> On Sun, Nov 27, 2022 at 08:43:27PM -0500, Waiman Long wrote: >>>> On 11/24/22 21:39, Waiman Long wrote: >>>>> In general, a non-null user_cpus_ptr will remain set until the task dies. >>>>> A possible exception to this is the fact that do_set_cpus_allowed() >>>>> will clear a non-null user_cpus_ptr. To allow this possible racing >>>>> condition, we need to check for NULL user_cpus_ptr under the pi_lock >>>>> before duping the user mask. >>>>> >>>>> Fixes: 851a723e45d1 ("sched: Always clear user_cpus_ptr in do_set_cpus_allowed()") >>>>> Signed-off-by: Waiman Long >>>> This is actually a pre-existing use-after-free bug since commit 07ec77a1d4e8 >>>> ("sched: Allow task CPU affinity to be restricted on asymmetric systems"). >>>> So it needs to be fixed in the stable release as well. Will resend the patch >>>> with an additional fixes tag and updated commit log. >>> Please can you elaborate on the use-after-free here? Looking at >>> 07ec77a1d4e8, the mask is only freed in free_task() when the usage refcount >>> has dropped to zero and I can't see how that can race with fork(). >>> >>> What am I missing? >> I missed that at first. The current task cloning process copies the content >> of the task structure over to the newly cloned/forked task. IOW, if >> user_cpus_ptr had been set up previously, it will be copied over to the >> cloned task. Now if user_cpus_ptr of the source task is cleared right after >> that and before dup_user_cpus_ptr() is called. The obsolete user_cpus_ptr >> value in the cloned task will remain and get used even if it has been freed. >> That is what I call as use-after-free and double-free. > If the parent task can be modified concurrently with dup_task_struct() then > surely we'd have bigger issues because that's not going to be atomic? At the > very least we'd have a data race, but it also feels like we could end up > with inconsistent task state in the child. In fact, couldn't the normal > 'cpus_mask' be corrupted by a concurrent set_cpus_allowed_common()? > > Or am I still failing to understand the race? > > Will A major difference between cpus_mask and user_cpus_ptr is that for cpus_mask, the bitmap is embedded into task_struct whereas user_cpus_ptr is a pointer to an external bitmap. So there is no issue of use-after-free wrt cpus_mask. That is not the case where the memory of the user_cpus_ptr of the parent task is freed, but then a reference to that memory is still available in the child's task struct and may be used. Note that the problematic concurrence is not between the copying of task struct and changing of the task struct. It is what will happen after the task struct copying has already been done with an extra reference present in the child's task struct. Cheers, Longman