From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from zeniv.linux.org.uk ([195.92.253.2]:39344 "EHLO ZenIV.linux.org.uk" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1754935AbcBIXNc (ORCPT ); Tue, 9 Feb 2016 18:13:32 -0500 Date: Tue, 9 Feb 2016 23:13:28 +0000 From: Al Viro To: Mike Marshall Cc: Linus Torvalds , linux-fsdevel , Stephen Rothwell Subject: Re: Orangefs ABI documentation Message-ID: <20160209231328.GK17997@ZenIV.linux.org.uk> References: <20160207013835.GY17997@ZenIV.linux.org.uk> <20160207035331.GZ17997@ZenIV.linux.org.uk> <20160208233535.GC17997@ZenIV.linux.org.uk> <20160209033203.GE17997@ZenIV.linux.org.uk> <20160209174049.GG17997@ZenIV.linux.org.uk> <20160209221623.GI17997@ZenIV.linux.org.uk> <20160209224050.GJ17997@ZenIV.linux.org.uk> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20160209224050.GJ17997@ZenIV.linux.org.uk> Sender: linux-fsdevel-owner@vger.kernel.org List-ID: On Tue, Feb 09, 2016 at 10:40:50PM +0000, Al Viro wrote: > And the version in orangefs-2.9.3.tar.gz (your Frankenstein module?) is > vulnerable to the same race. 2.8.1 isn't - it ignores signals on the > cancel, but that means waiting for cancel to be processed (or timed out) > on any interrupted read() before we return to userland. We can return > to that behaviour, of course, but I suspect that offloading it to something > async (along with freeing the slot used by original operation) would be > better from QoI point of view. That breakage had been introduced between 2.8.5 and 2.8.6 (at some point during the spring of 2012). AFAICS, all versions starting with 2.8.6 are vulnerable...