lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <b004838f-602d-0992-cb1d-2d083227186c@kernel.dk>
Date:   Thu, 6 Feb 2020 12:55:38 -0700
From:   Jens Axboe <axboe@...nel.dk>
To:     Kirill Tkhai <ktkhai@...tuozzo.com>,
        LKML <linux-kernel@...r.kernel.org>, io-uring@...r.kernel.org
Subject: Re: io_uring: io_grab_files() misses taking files->count?

On 2/6/20 9:32 AM, Kirill Tkhai wrote:
> Hi, Jens,
> 
> in io_grab_files() we take pointer to current->files without taking
> files->count.  Later, this files become attached to worker in
> io_worker_handle_work() also without any manipulation with counter.
> 
> But files->count is used for different optimizations. Say, in
> expand_fdtable() we avoid synchonize_rcu() in case of there is only
> files user. In case of there are more users, missing of
> synchronize_rcu() is not safe.
> 
> Is this correct? Or maybe there is some hidden logic in io_uring,
> which prevents this problem? Say, IORING_OP_OPENAT/CLOSE/ETC can't be
> propagated to worker etc...

We track requests that grab files on the side, since we can't safely
grab a reference to the file table. We could have our own ring fd in the
file table, and thus create a circular reference if we incremented
files->count here.

Looks like we might need a 2nd way to know if we need to use
synchronize_rcu() or not, though I need to look into this particular
case.

-- 
Jens Axboe

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ