Re: [PATCH RESEND] kthread, tracing: Don't expose half-written comm when creating kthreads

2018-07-24 Thread Snild Dolkow
On 07/24/2018 04:48 PM, Steven Rostedt wrote:
> On Tue, 24 Jul 2018 10:17:37 +0200
> Snild Dolkow  wrote:
> 
>>  creator other
>>  vsnprintf:
>>fill (not terminated)
>>count the restread/use comm
> 
> I think it would be better to state what was reading the comm. Like
> 
>   trace_sched_waking(p)
> memcpy(comm, p->comm, TASK_COMM_LEN)
> 
> But the rest looks fine.
> 
> -- Steve

Works for me. Reworded v2 coming up soon.

//Snild


Re: [PATCH RESEND] kthread, tracing: Don't expose half-written comm when creating kthreads

2018-07-24 Thread Steven Rostedt
On Tue, 24 Jul 2018 10:17:37 +0200
Snild Dolkow  wrote:

> On 07/23/2018 06:41 PM, Steven Rostedt wrote:
> > On Mon, 23 Jul 2018 17:49:36 +0200
> > Snild Dolkow  wrote:  
> >> Any issues with the commit message? Reading it back again now, it doesn't
> >> seem quite as clear as when I wrote it.  
> > 
> > Yeah, I think it does need some updates:
> >   
> >> There was a window for racing when task->comm was being written. The  
> > 
> > It would be nice to explain this race window in more detail.
> >   
> I hope the following is more clear:
> 
> kthread, tracing: Don't expose half-written comm when creating kthreads
> 
> There is a window for racing when printing directly to task->comm,
> allowing other threads to see a non-terminated string. The vsnprintf
> function fills the buffer, counts the truncated chars, then finally
> writes the \0 at the end.
> 
>   creator other
>   vsnprintf:
> fill (not terminated)
> count the restread/use comm

I think it would be better to state what was reading the comm. Like

trace_sched_waking(p)
  memcpy(comm, p->comm, TASK_COMM_LEN)

But the rest looks fine.

-- Steve


> write \0
> 
> The consequences depend on how 'other' uses the string. In our case,
> it was copied into the tracing system's saved cmdlines, a buffer of
> adjacent TASK_COMM_LEN-byte buffers (note the 'n' where 0 should be):
> 
>   crash-arm64> x/1024s savedcmd->saved_cmdlines | grep 'evenk'
>   0xffd5b3818640: "irq/497-pwr_evenkworker/u16:12"
> 
> ...and a strcpy out of there would cause stack corruption:
> 
>   [224761.522292] Kernel panic - not syncing: stack-protector:
>   Kernel stack is corrupted in: ff9bf9783c78
> 
>   crash-arm64> kbt | grep 'comm\|trace_print_context'
>   #6  0xff9bf9783c78 in trace_print_context+0x18c(+396)
> comm (char [16]) =  "irq/497-pwr_even"
> 
>   crash-arm64> rd 0xffd4d0e17d14 8
>   ffd4d0e17d14:  2f717269 5f7277702d373934   irq/497-pwr_
>   ffd4d0e17d24:  726f776b6e657665 3a3631752f72656b   evenkworker/u16:
>   ffd4d0e17d34:  f9780248ff003231 cede60e0ff9b   12..H.x..`..
>   ffd4d0e17d44:  cede60c8ffd4 0fd4   .`..
> 
> The workaround in e09e28671 (use strlcpy in __trace_find_cmdline) was
> likely needed because of this same bug.
> 
> Solved by vsnprintf:ing to a local buffer, then using set_task_comm().
> This way, there won't be a window where comm is not terminated.
> 
> 
> //Snild



Re: [PATCH RESEND] kthread, tracing: Don't expose half-written comm when creating kthreads

2018-07-24 Thread Snild Dolkow
On 07/23/2018 06:41 PM, Steven Rostedt wrote:
> On Mon, 23 Jul 2018 17:49:36 +0200
> Snild Dolkow  wrote:
>> Any issues with the commit message? Reading it back again now, it doesn't
>> seem quite as clear as when I wrote it.
> 
> Yeah, I think it does need some updates:
> 
>> There was a window for racing when task->comm was being written. The
> 
> It would be nice to explain this race window in more detail.
> 
I hope the following is more clear:

kthread, tracing: Don't expose half-written comm when creating kthreads

There is a window for racing when printing directly to task->comm,
allowing other threads to see a non-terminated string. The vsnprintf
function fills the buffer, counts the truncated chars, then finally
writes the \0 at the end.

creator other
vsnprintf:
  fill (not terminated)
  count the restread/use comm
  write \0

The consequences depend on how 'other' uses the string. In our case,
it was copied into the tracing system's saved cmdlines, a buffer of
adjacent TASK_COMM_LEN-byte buffers (note the 'n' where 0 should be):

crash-arm64> x/1024s savedcmd->saved_cmdlines | grep 'evenk'
0xffd5b3818640: "irq/497-pwr_evenkworker/u16:12"

...and a strcpy out of there would cause stack corruption:

[224761.522292] Kernel panic - not syncing: stack-protector:
Kernel stack is corrupted in: ff9bf9783c78

crash-arm64> kbt | grep 'comm\|trace_print_context'
#6  0xff9bf9783c78 in trace_print_context+0x18c(+396)
  comm (char [16]) =  "irq/497-pwr_even"

crash-arm64> rd 0xffd4d0e17d14 8
ffd4d0e17d14:  2f717269 5f7277702d373934   irq/497-pwr_
ffd4d0e17d24:  726f776b6e657665 3a3631752f72656b   evenkworker/u16:
ffd4d0e17d34:  f9780248ff003231 cede60e0ff9b   12..H.x..`..
ffd4d0e17d44:  cede60c8ffd4 0fd4   .`..

The workaround in e09e28671 (use strlcpy in __trace_find_cmdline) was
likely needed because of this same bug.

Solved by vsnprintf:ing to a local buffer, then using set_task_comm().
This way, there won't be a window where comm is not terminated.


//Snild


Re: [PATCH RESEND] kthread, tracing: Don't expose half-written comm when creating kthreads

2018-07-23 Thread Steven Rostedt
On Mon, 23 Jul 2018 17:49:36 +0200
Snild Dolkow  wrote:

> On 07/23/2018 05:37 PM, Steven Rostedt wrote:

> Will add:
> 
>   /*
>* task is already visible to other tasks, so updating
>* COMM must be protected.
>*/

Thanks.

> 
> Any issues with the commit message? Reading it back again now, it doesn't
> seem quite as clear as when I wrote it.

Yeah, I think it does need some updates:

> There was a window for racing when task->comm was being written. The

It would be nice to explain this race window in more detail.

> vsnprintf function writes 16 bytes, then counts the rest, then null
> terminates. In the meantime, other threads could see the non-terminated
> comm value. In our case, it got into the trace system's saved cmdlines
> and could cause stack corruption when strcpy'd out of there.

Perhaps add in the change log something about the fact that the
vsprintf() is performed on the COMM when the task is visible to other
tasks, and that could cause problems if other tasks read the COMM (like
in tracing) without updating it properly with set_task_comm().

-- Steve


> 
> The workaround in e09e28671 (use strlcpy in __trace_find_cmdline) was
> likely needed because of this bug.
> 
> Solved by vsnprintf:ing to a local buffer, then using set_task_comm().


Re: [PATCH RESEND] kthread, tracing: Don't expose half-written comm when creating kthreads

2018-07-23 Thread Snild Dolkow
On 07/23/2018 05:37 PM, Steven Rostedt wrote:
> On Mon, 23 Jul 2018 16:23:09 +0200
> Snild Dolkow  wrote:
> 
>> On 07/23/2018 03:55 PM, Steven Rostedt wrote:
>>
>>> Can you add a comment here stating something to the affect of:
>>> /* task is now visible to other tasks */
>>>
>>> -- Steve  
>> Sure, but isn't that a bit misleading? It will have been visible since
>> some unknown point in time between waking up kthreadd and the return of
>> wait_for_completion(); we're not the ones making it visible.
>>
> 
> I guess that should be reworded, as that is not what I meant, and I
> thought not what I stated. It's stating that the task is now visible,
> not that we are now making it invisible. But I guess I was being too
> short with what I meant. Here's the full statement:
> 
>   /*
>* task is now visible by other tasks, so updating COMM
>* must be protected.
>*/
> 
> -- Steve
> 

Ah. It's the "now" that trips me up. :)

Will add:

/*
 * task is already visible to other tasks, so updating
 * COMM must be protected.
 */

Any issues with the commit message? Reading it back again now, it doesn't
seem quite as clear as when I wrote it.

//Snild


Re: [PATCH RESEND] kthread, tracing: Don't expose half-written comm when creating kthreads

2018-07-23 Thread Steven Rostedt
On Mon, 23 Jul 2018 16:23:09 +0200
Snild Dolkow  wrote:

> On 07/23/2018 03:55 PM, Steven Rostedt wrote:
> 
> > Can you add a comment here stating something to the affect of:
> > /* task is now visible to other tasks */
> >
> > -- Steve  
> Sure, but isn't that a bit misleading? It will have been visible since
> some unknown point in time between waking up kthreadd and the return of
> wait_for_completion(); we're not the ones making it visible.
> 

I guess that should be reworded, as that is not what I meant, and I
thought not what I stated. It's stating that the task is now visible,
not that we are now making it invisible. But I guess I was being too
short with what I meant. Here's the full statement:

/*
 * task is now visible by other tasks, so updating COMM
 * must be protected.
 */

-- Steve


Re: [PATCH RESEND] kthread, tracing: Don't expose half-written comm when creating kthreads

2018-07-23 Thread Snild Dolkow
On 07/23/2018 03:55 PM, Steven Rostedt wrote:

> Can you add a comment here stating something to the affect of:
>   /* task is now visible to other tasks */
>
> -- Steve
Sure, but isn't that a bit misleading? It will have been visible since
some unknown point in time between waking up kthreadd and the return of
wait_for_completion(); we're not the ones making it visible.

//Snild


Re: [PATCH RESEND] kthread, tracing: Don't expose half-written comm when creating kthreads

2018-07-23 Thread Steven Rostedt
On Mon, 23 Jul 2018 15:42:10 +0200
Snild Dolkow  wrote:

> There was a window for racing when task->comm was being written. The
> vsnprintf function writes 16 bytes, then counts the rest, then null
> terminates. In the meantime, other threads could see the non-terminated
> comm value. In our case, it got into the trace system's saved cmdlines
> and could cause stack corruption when strcpy'd out of there.
> 
> The workaround in e09e28671 (use strlcpy in __trace_find_cmdline) was
> likely needed because of this bug.
> 
> Solved by vsnprintf:ing to a local buffer, then using set_task_comm().
> 
> Signed-off-by: Snild Dolkow 
> ---
>  kernel/kthread.c | 4 +++-
>  1 file changed, 3 insertions(+), 1 deletion(-)
> 
> diff --git a/kernel/kthread.c b/kernel/kthread.c
> index 481951bf091d..28874afbf747 100644
> --- a/kernel/kthread.c
> +++ b/kernel/kthread.c
> @@ -319,8 +319,10 @@ struct task_struct *__kthread_create_on_node(int 
> (*threadfn)(void *data),
>   task = create->result;
>   if (!IS_ERR(task)) {
>   static const struct sched_param param = { .sched_priority = 0 };
> + char name[TASK_COMM_LEN];
>  
> - vsnprintf(task->comm, sizeof(task->comm), namefmt, args);

Can you add a comment here stating something to the affect of:

/* task is now visible to other tasks */

-- Steve

> + vsnprintf(name, sizeof(name), namefmt, args);
> + set_task_comm(task, name);
>   /*
>* root may have changed our (kthreadd's) priority or CPU mask.
>* The kernel thread should not inherit these properties.



[PATCH RESEND] kthread, tracing: Don't expose half-written comm when creating kthreads

2018-07-23 Thread Snild Dolkow
There was a window for racing when task->comm was being written. The
vsnprintf function writes 16 bytes, then counts the rest, then null
terminates. In the meantime, other threads could see the non-terminated
comm value. In our case, it got into the trace system's saved cmdlines
and could cause stack corruption when strcpy'd out of there.

The workaround in e09e28671 (use strlcpy in __trace_find_cmdline) was
likely needed because of this bug.

Solved by vsnprintf:ing to a local buffer, then using set_task_comm().

Signed-off-by: Snild Dolkow 
---
 kernel/kthread.c | 4 +++-
 1 file changed, 3 insertions(+), 1 deletion(-)

diff --git a/kernel/kthread.c b/kernel/kthread.c
index 481951bf091d..28874afbf747 100644
--- a/kernel/kthread.c
+++ b/kernel/kthread.c
@@ -319,8 +319,10 @@ struct task_struct *__kthread_create_on_node(int 
(*threadfn)(void *data),
task = create->result;
if (!IS_ERR(task)) {
static const struct sched_param param = { .sched_priority = 0 };
+   char name[TASK_COMM_LEN];
 
-   vsnprintf(task->comm, sizeof(task->comm), namefmt, args);
+   vsnprintf(name, sizeof(name), namefmt, args);
+   set_task_comm(task, name);
/*
 * root may have changed our (kthreadd's) priority or CPU mask.
 * The kernel thread should not inherit these properties.
-- 
2.15.1