[PATCH 2/2] fork: plug a use after free of the returned process pointer
Konstantin Belousov
kib at freebsd.org
Thu Feb 4 09:53:49 UTC 2016
On Thu, Feb 04, 2016 at 10:35:15AM +0100, Mateusz Guzik wrote:
> Stuff below is just speculation.
>
> So the remaining problem, after we know the process has to survive, is
> survival of the thread and its relationship with the process.
>
> The problem stems from not having the proc lock over the entire time
> from the moment the thread is marked as runnable to the moment where the
> code is done with it.
>
> Race 1:
>
> CPU0 CPU1
> p1: p2 and td2 created
> td2: marked runnable
> td2: scheduled here
> td2: does not have TDB_STOPATFORK set
> td2: calls thr_new
> td2: calls thr_exit
> td2: reused and linked into p3
> td2: gets TDB_STOPATFORK
> p1: PROC_LOCK(p2);
> p1: TDB_STOPATFORK test on td2
> p1: cv_wait(&p2->p_dbgwait, ..);
>
> p2 is the process we want, but td2 now belongs to a different thread.
>
> Race 2:
>
> However, seems to be even more buggy. To quote:
>
> while ((td2->td_dbgflags & TDB_STOPATFORK) != 0)
> cv_wait(&p2->p_dbgwait, &p2->p_mtx);
>
> The check is done in a loop which drops the proc lock. This makes me
> wonder about the following additional race:
>
> p2 is traced, TDB_STOPATFORK is set on td2.
>
> CPU0 CPU1
> p1: PROC_LOCK(p2);
> p1: TDB_STOPATFORK test on td2
> p1: cv_wait(&p2->p_dbgwait, ..);
> td2: is scheduled here
> td2: clears TDB_STOPATFORK
> td2: cv_broadcast(&p2->p_dbgwait)
> p1: not scheduled yet
> td2: calls thr_new
> td2: calls thr_exit
> td2: is reused and linked into p3
> td2: gets TDB_STOPATFORK
> p1: scheduled here
> p1: internal PROC_LOCK(p2);
> p1: TDB_STOPATFORK test on td2
>
> But td2 now belongs to p3.
>
> I think the patch below deals with race 1 just fine.
>
> For race 2, it is unclear to me if the while loop is justified. If a
> single 'if' statement was sufficient, there would be no problem since
> unlock + lock would be avoided guaranteeting the consistency.
>
> I was pondering borrowing fork_return's logic to check if tracing is
> enabled before testing TDB_STOPATFORK. However, tracing state could have
> changed several times invalidating the result. Maybe refreshing the
> pointer to th first thread would do the trick, but imho the lock
> dropping business is extremely fishy and will have to be dealt with at
> some point.
>
So if the issue is only reassignment of td2 to p3, why not do the following ?
I think that possible ABA problem where td2 gets TDB_STOPATFORK set after
being reused for p2 (and not p3) after yet another fork, is actually fine.
diff --git a/sys/kern/kern_fork.c b/sys/kern/kern_fork.c
index baee954..5bb14e8 100644
--- a/sys/kern/kern_fork.c
+++ b/sys/kern/kern_fork.c
@@ -777,7 +777,7 @@ do_fork(struct thread *td, struct fork_req *fr, struct proc *p2, struct thread *
/*
* Wait until debugger is attached to child.
*/
- while ((td2->td_dbgflags & TDB_STOPATFORK) != 0)
+ while (td2->td_proc == p2 && (td2->td_dbgflags & TDB_STOPATFORK) != 0)
cv_wait(&p2->p_dbgwait, &p2->p_mtx);
_PRELE(p2);
racct_proc_fork_done(p2);
More information about the freebsd-hackers
mailing list