lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Thu, 15 Aug 2013 15:43:25 -0400
From:	Jeff Layton <jlayton@...hat.com>
To:	Bruce Fields <bfields@...ldses.org>
Cc:	Al Viro <viro@...IV.linux.org.uk>, linux-fsdevel@...r.kernel.org,
	linux-kernel@...r.kernel.org, Matthew Wilcox <matthew@....cx>,
	David Howells <dhowells@...hat.com>
Subject: Re: [PATCH v3] locks: close potential race between setlease and
 open

On Thu, 15 Aug 2013 15:32:03 -0400
Bruce Fields <bfields@...ldses.org> wrote:

> On Wed, Aug 14, 2013 at 08:11:50AM -0400, Jeff Layton wrote:
> > v2:
> > - fix potential double-free of lease if second check finds conflict
> > - add smp_mb's to ensure that other CPUs see i_flock changes
> > 
> > v3:
> > - remove smp_mb calls. Partial ordering is unlikely to help here.
> 
> Forgive me here, I still don't understand.  So to simplify massively,
> the situation looks like:
> 
> 	setlease		open
> 	------------		------
> 
> 	atomic_read		atomic_inc
> 	write i_flock		read i_flock
> 	atomic_read
> 
> And we want to be sure that either the setlease caller sees the result
> of the atomic_inc, or the opener sees the result of the write to
> i_flock.
> 
> As an example, suppose the above steps happen in the order:
> 
> 	atomic_read
> 	write i_flock
> 	atomic_read
> 				atomic_inc
> 				read i_flock
> 
> How do we know that the read of i_flock at the last step reflects the
> latest value of i_flock?  For example, couldn't the write still be stuck
> in first CPU's cache?
> 
> --b.
> 

AIUI, all Linux architectures are cache-coherent. So if you do a
write to a memory location on one CPU then other CPUs will see it
after that event.

The thing that you have to be careful about of course is ordering, as
the CPU and compiler are allowed to reorder operations in the name of
efficiency. I don't think ordering is a concern here since, as you
point out, the refcounting operations are atomic or done under spinlock.

Now, all that said...I'm pretty clueless when it comes to this sort of
thing, so if I'm wrong then please do tell me so.

Thanks,

> > 
> > As Al Viro points out, there is an unlikely, but possible race between
> > opening a file and setting a lease on it. generic_add_lease is done with
> > the i_lock held, but the inode->i_flock check in break_lease is
> > lockless. It's possible for another task doing an open to do the entire
> > pathwalk and call break_lease between the point where generic_add_lease
> > checks for a conflicting open and adds the lease to the list. If this
> > occurs, we can end up with a lease set on the file with a conflicting
> > open.
> > 
> > To guard against that, check again for a conflicting open after adding
> > the lease to the i_flock list. If the above race occurs, then we can
> > simply unwind the lease setting and return -EAGAIN.
> > 
> > Because we take dentry references and acquire write access on the file
> > before calling break_lease, we know that if the i_flock list is empty
> > when the open caller goes to check it then the necessary refcounts have
> > already been incremented. Thus the additional check for a conflicting
> > open will see that there is one and the setlease call will fail.
> > 
> > Cc: Bruce Fields <bfields@...ldses.org>
> > Cc: David Howells <dhowells@...hat.com>
> > Reported-by: Al Viro <viro@...IV.linux.org.uk>
> > Signed-off-by: Jeff Layton <jlayton@...hat.com>
> > ---
> >  fs/locks.c | 71 ++++++++++++++++++++++++++++++++++++++++++++++++++------------
> >  1 file changed, 58 insertions(+), 13 deletions(-)
> > 
> > diff --git a/fs/locks.c b/fs/locks.c
> > index b27a300..a99adec 100644
> > --- a/fs/locks.c
> > +++ b/fs/locks.c
> > @@ -652,15 +652,18 @@ static void locks_insert_lock(struct file_lock **pos, struct file_lock *fl)
> >  	locks_insert_global_locks(fl);
> >  }
> >  
> > -/*
> > - * Delete a lock and then free it.
> > - * Wake up processes that are blocked waiting for this lock,
> > - * notify the FS that the lock has been cleared and
> > - * finally free the lock.
> > +/**
> > + * locks_delete_lock - Delete a lock and then free it.
> > + * @thisfl_p: pointer that points to the fl_next field of the previous
> > + * 	      inode->i_flock list entry
> > + *
> > + * Unlink a lock from all lists and free the namespace reference, but don't
> > + * free it yet. Wake up processes that are blocked waiting for this lock and
> > + * notify the FS that the lock has been cleared.
> >   *
> >   * Must be called with the i_lock held!
> >   */
> > -static void locks_delete_lock(struct file_lock **thisfl_p)
> > +static void locks_unlink_lock(struct file_lock **thisfl_p)
> >  {
> >  	struct file_lock *fl = *thisfl_p;
> >  
> > @@ -675,6 +678,18 @@ static void locks_delete_lock(struct file_lock **thisfl_p)
> >  	}
> >  
> >  	locks_wake_up_blocks(fl);
> > +}
> > +
> > +/*
> > + * Unlink a lock from all lists and free it.
> > + *
> > + * Must be called with i_lock held!
> > + */
> > +static void locks_delete_lock(struct file_lock **thisfl_p)
> > +{
> > +	struct file_lock *fl = *thisfl_p;
> > +
> > +	locks_unlink_lock(thisfl_p);
> >  	locks_free_lock(fl);
> >  }
> >  
> > @@ -1455,6 +1470,32 @@ int fcntl_getlease(struct file *filp)
> >  	return type;
> >  }
> >  
> > +/**
> > + * check_conflicting_open - see if the given dentry points to a file that has
> > + * 	an existing open that would conflict with the desired lease.
> > + *
> > + * @dentry:	dentry to check
> > + * @arg:	type of lease that we're trying to acquire
> > + *
> > + * Check to see if there's an existing open fd on this file that would
> > + * conflict with the lease we're trying to set.
> > + */
> > +static int
> > +check_conflicting_open(const struct dentry *dentry, const long arg)
> > +{
> > +	int ret = 0;
> > +	struct inode *inode = dentry->d_inode;
> > +
> > +	if ((arg == F_RDLCK) && (atomic_read(&inode->i_writecount) > 0))
> > +		return -EAGAIN;
> > +
> > +	if ((arg == F_WRLCK) && ((d_count(dentry) > 1) ||
> > +	    (atomic_read(&inode->i_count) > 1)))
> > +		ret = -EAGAIN;
> > +
> > +	return ret;
> > +}
> > +
> >  static int generic_add_lease(struct file *filp, long arg, struct file_lock **flp)
> >  {
> >  	struct file_lock *fl, **before, **my_before = NULL, *lease;
> > @@ -1464,12 +1505,8 @@ static int generic_add_lease(struct file *filp, long arg, struct file_lock **flp
> >  
> >  	lease = *flp;
> >  
> > -	error = -EAGAIN;
> > -	if ((arg == F_RDLCK) && (atomic_read(&inode->i_writecount) > 0))
> > -		goto out;
> > -	if ((arg == F_WRLCK)
> > -	    && ((d_count(dentry) > 1)
> > -		|| (atomic_read(&inode->i_count) > 1)))
> > +	error = check_conflicting_open(dentry, arg);
> > +	if (error)
> >  		goto out;
> >  
> >  	/*
> > @@ -1514,8 +1551,16 @@ static int generic_add_lease(struct file *filp, long arg, struct file_lock **flp
> >  		goto out;
> >  
> >  	locks_insert_lock(before, lease);
> > -	return 0;
> >  
> > +	/*
> > +	 * The check in break_lease() is lockless. It's possible for another
> > +	 * open to race in after we did the earlier check for a conflicting
> > +	 * open but before the lease was inserted. Check again for a
> > +	 * conflicting open and cancel the lease if there is one.
> > +	 */
> > +	error = check_conflicting_open(dentry, arg);
> > +	if (error)
> > +		locks_unlink_lock(flp);
> >  out:
> >  	return error;
> >  }
> > -- 
> > 1.8.3.1
> > 


-- 
Jeff Layton <jlayton@...hat.com>
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ