From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail-ot0-f199.google.com (mail-ot0-f199.google.com [74.125.82.199]) by kanga.kvack.org (Postfix) with ESMTP id 60A5F6B0012 for ; Tue, 27 Mar 2018 13:49:32 -0400 (EDT) Received: by mail-ot0-f199.google.com with SMTP id g36-v6so14175691ote.14 for ; Tue, 27 Mar 2018 10:49:32 -0700 (PDT) Received: from foss.arm.com (usa-sjc-mx-foss1.foss.arm.com. [217.140.101.70]) by mx.google.com with ESMTP id 15-v6si461010ois.553.2018.03.27.10.49.30 for ; Tue, 27 Mar 2018 10:49:31 -0700 (PDT) Date: Tue, 27 Mar 2018 18:49:27 +0100 From: Catalin Marinas Subject: Re: [PATCH] mm: kmemleak: wait for scan completion before disabling free Message-ID: <20180327174927.o5lhb7yyl4gjkkxl@armageddon.cambridge.arm.com> References: <1522063429-18992-1-git-send-email-vinmenon@codeaurora.org> <20180326154421.obk7ikx3h5ko62o5@armageddon.cambridge.arm.com> <20180326122611.acbfe1bfe6f7c1792b42a3a7@linux-foundation.org> MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: Sender: owner-linux-mm@kvack.org List-ID: To: Vinayak Menon Cc: Andrew Morton , linux-mm@kvack.org On Tue, Mar 27, 2018 at 10:59:31AM +0530, Vinayak Menon wrote: > On 3/27/2018 12:56 AM, Andrew Morton wrote: > > On Mon, 26 Mar 2018 16:44:21 +0100 Catalin Marinas wrote: > >> On Mon, Mar 26, 2018 at 04:53:49PM +0530, Vinayak Menon wrote: > >>> A crash is observed when kmemleak_scan accesses the > >>> object->pointer, likely due to the following race. > >>> > >>> TASK A TASK B TASK C > >>> kmemleak_write > >>> (with "scan" and > >>> NOT "scan=on") > >>> kmemleak_scan() > >>> create_object > >>> kmem_cache_alloc fails > >>> kmemleak_disable > >>> kmemleak_do_cleanup > >>> kmemleak_free_enabled = 0 > >>> kfree > >>> kmemleak_free bails out > >>> (kmemleak_free_enabled is 0) > >>> slub frees object->pointer > >>> update_checksum > >>> crash - object->pointer > >>> freed (DEBUG_PAGEALLOC) > >>> > >>> kmemleak_do_cleanup waits for the scan thread to complete, but not for > >>> direct call to kmemleak_scan via kmemleak_write. So add a wait for > >>> kmemleak_scan completion before disabling kmemleak_free. > >>> > >>> Signed-off-by: Vinayak Menon > >> It looks fine to me. Maybe Andrew can pick it up. > >> > >> Reviewed-by: Catalin Marinas > > Well, the comment says: > > > > /* > > * Stop the automatic memory scanning thread. This function must be called > > * with the scan_mutex held. > > */ > > static void stop_scan_thread(void) > > > > > > So shouldn't we do it this way? > > Earlier it was done the way you mentioned. But that was changed to fix > a deadlock by > > commit 5f369f374ba4889fe3c17883402db5ee8d254216 > Author: Catalin Marinas > Date: Wed Jun 24 16:58:31 2015 -0700 > > mm: kmemleak: do not acquire scan_mutex in kmemleak_do_cleanup() > > Not able to see a reason why stop_scan_thread must be called with > scan_mutex held. The comment needs a fix ? Indeed, the comment needs fixing as waiting on the mutex here may lead deadlock. Would you mind sending an updated patch? Feel free to keep my reviewed-by tag. Thanks. -- Catalin