diff mbox series

linux-user: Emulate /proc/self/maps under mmap_lock

Message ID 20241014203441.387560-1-iii@linux.ibm.com (mailing list archive)
State New, archived
Headers show
Series linux-user: Emulate /proc/self/maps under mmap_lock | expand

Commit Message

Ilya Leoshkevich Oct. 14, 2024, 8:34 p.m. UTC
If one thread modifies the mappings and another thread prints them,
a situation may occur that the printer thread sees a guest mapping
without a corresponding host mapping, leading to a crash in
open_self_maps_2().

Cc: qemu-stable@nongnu.org
Fixes: 7b7a3366e142 ("linux-user: Use walk_memory_regions for open_self_maps")
Signed-off-by: Ilya Leoshkevich <iii@linux.ibm.com>
---
 linux-user/syscall.c | 4 +++-
 1 file changed, 3 insertions(+), 1 deletion(-)

Comments

Laurent Vivier Oct. 15, 2024, 8:45 a.m. UTC | #1
Le 14/10/2024 à 22:34, Ilya Leoshkevich a écrit :
> If one thread modifies the mappings and another thread prints them,
> a situation may occur that the printer thread sees a guest mapping
> without a corresponding host mapping, leading to a crash in
> open_self_maps_2().
> 
> Cc: qemu-stable@nongnu.org
> Fixes: 7b7a3366e142 ("linux-user: Use walk_memory_regions for open_self_maps")
> Signed-off-by: Ilya Leoshkevich <iii@linux.ibm.com>
> ---
>   linux-user/syscall.c | 4 +++-
>   1 file changed, 3 insertions(+), 1 deletion(-)
> 
> diff --git a/linux-user/syscall.c b/linux-user/syscall.c
> index 1354e756941..dd2ec0712b8 100644
> --- a/linux-user/syscall.c
> +++ b/linux-user/syscall.c
> @@ -8151,17 +8151,19 @@ static int open_self_maps_1(CPUArchState *env, int fd, bool smaps)
>   {
>       struct open_self_maps_data d = {
>           .ts = get_task_state(env_cpu(env)),
> -        .host_maps = read_self_maps(),
>           .fd = fd,
>           .smaps = smaps
>       };
>   
> +    mmap_lock();
> +    d.host_maps = read_self_maps();
>       if (d.host_maps) {
>           walk_memory_regions(&d, open_self_maps_2);
>           free_self_maps(d.host_maps);
>       } else {
>           walk_memory_regions(&d, open_self_maps_3);
>       }
> +    mmap_unlock();
>       return 0;
>   }
>   

Reviewed-by: Laurent Vivier <laurent@vivier.eu>
Richard Henderson Oct. 22, 2024, 2:02 a.m. UTC | #2
On 10/14/24 13:34, Ilya Leoshkevich wrote:
> If one thread modifies the mappings and another thread prints them,
> a situation may occur that the printer thread sees a guest mapping
> without a corresponding host mapping, leading to a crash in
> open_self_maps_2().
> 
> Cc: qemu-stable@nongnu.org
> Fixes: 7b7a3366e142 ("linux-user: Use walk_memory_regions for open_self_maps")
> Signed-off-by: Ilya Leoshkevich <iii@linux.ibm.com>
> ---
>   linux-user/syscall.c | 4 +++-
>   1 file changed, 3 insertions(+), 1 deletion(-)

Reviewed-by: Richard Henderson <richard.henderson@linaro.org>

Thanks, queued.


r~
diff mbox series

Patch

diff --git a/linux-user/syscall.c b/linux-user/syscall.c
index 1354e756941..dd2ec0712b8 100644
--- a/linux-user/syscall.c
+++ b/linux-user/syscall.c
@@ -8151,17 +8151,19 @@  static int open_self_maps_1(CPUArchState *env, int fd, bool smaps)
 {
     struct open_self_maps_data d = {
         .ts = get_task_state(env_cpu(env)),
-        .host_maps = read_self_maps(),
         .fd = fd,
         .smaps = smaps
     };
 
+    mmap_lock();
+    d.host_maps = read_self_maps();
     if (d.host_maps) {
         walk_memory_regions(&d, open_self_maps_2);
         free_self_maps(d.host_maps);
     } else {
         walk_memory_regions(&d, open_self_maps_3);
     }
+    mmap_unlock();
     return 0;
 }