From: Jan Kara <jack@suse.cz>
To: Al Viro <viro@zeniv.linux.org.uk>
Cc: Jan Kara <jack@suse.cz>, linux-fsdevel@vger.kernel.org
Subject: Re: [PATCH 2/2] proc: Protect readers of /proc/mounts from remount
Date: Wed, 12 Dec 2018 13:56:18 +0100 [thread overview]
Message-ID: <20181212125618.GD10902@quack2.suse.cz> (raw)
In-Reply-To: <20181211191451.GJ2217@ZenIV.linux.org.uk>
On Tue 11-12-18 19:14:52, Al Viro wrote:
> On Tue, Dec 11, 2018 at 06:58:31PM +0000, Al Viro wrote:
>
> > > +static bool mounts_trylock_super(struct proc_mounts *p, struct super_block *sb)
> > > +{
> > > + if (p->locked_sb == sb)
> > > + return true;
> > > + if (p->locked_sb) {
> > > + drop_super(p->locked_sb);
> > > + p->locked_sb = NULL;
> > > + }
> > > + if (down_read_trylock(&sb->s_umount)) {
> > > + hold_sb(sb);
> > > + p->locked_sb = sb;
> > > + return true;
> > > + }
> > > + return false;
> > > +}
> >
> > Bad calling conventions, and you are paying for those with making
> > hold_sb() non-static (and having it, in the first place).
> >
> > > + if (mounts_trylock_super(p, sb))
> > > + return p->cached_mount;
> > > + /*
> > > + * Trylock failed. Since namepace_sem ranks below s_umount (through
> > > + * sb->s_umount > dir->i_rwsem > namespace_sem in the mount path), we
> > > + * have to drop it, wait for s_umount and then try again to guarantee
> > > + * forward progress.
> > > + */
> > > + hold_sb(sb);
> >
> > That. Just hoist that hold_sb() into your trylock (and put it before the
> > down_read_trylock() there, while we are at it). And turn the other caller
> > into
> > if (unlikely(!.....))
> > ret = -EAGAIN;
> > else
> > ret = p->show(m, &r->mnt);
> > followed by unconditional drop_super(). And I would probably go for
> > mount_trylock_super(&p->locked_super, sb)
> > while we are at it, so that it's isolated from proc_mounts and can
> > be moved to fs/super.c
>
> Looking at it some more... I still hate it ;-/ Take a look at traverse()
> in fs/seq_file.c and think what kind of clusterfuck will it cause...
I guess you mean that in case we fail to lock s_umount semaphore, we'll
return -EAGAIN and traverse() will abort? That is true but since we return
-EAGAIN, callers will call into traverse() again - both do:
while ((err = traverse(m, *ppos)) == -EAGAIN) ;
and then in m_start() we will do the blocking lock on s_umount. I agree it
is ugly and twisted but it should be rare...
Now looking at the code, maybe we could avoid this weird retry dance with
traverse(). Something like following in m_show():
sb = mnt->mnt_sb;
if (mount_trylock_super())
show and done
get passive sb reference
namespace_unlock();
down_read(&sb->s_umount);
namespace_lock();
new_mnt = seq_list_start();
if (new_mnt != mnt)
retry
show and done
This could be handled completely inside m_show() so no strange retry dance
with traverse(). Do you find this better?
Honza
--
Jan Kara <jack@suse.com>
SUSE Labs, CR
next prev parent reply other threads:[~2018-12-12 12:56 UTC|newest]
Thread overview: 10+ messages / expand[flat|nested] mbox.gz Atom feed top
2018-12-11 17:24 [PATCH 0/2 RESEND] vfs: Fix crashes when reading /proc/mounts Jan Kara
2018-12-11 17:24 ` [PATCH 1/2] vfs: Provide function to grab superblock reference Jan Kara
2018-12-11 17:24 ` [PATCH 2/2] proc: Protect readers of /proc/mounts from remount Jan Kara
2018-12-11 18:36 ` Al Viro
2018-12-11 18:37 ` Al Viro
2018-12-11 18:58 ` Al Viro
2018-12-11 19:14 ` Al Viro
2018-12-12 12:56 ` Jan Kara [this message]
-- strict thread matches above, loose matches on Subject: below --
2018-12-18 13:46 [PATCH 0/2 v2] vfs: Fix crashes when reading /proc/mounts Jan Kara
2018-12-18 13:46 ` [PATCH 2/2] proc: Protect readers of /proc/mounts from remount Jan Kara
2018-10-18 13:17 [PATCH 0/2] vfs: Fix crashes when reading /proc/mounts Jan Kara
2018-10-18 13:17 ` [PATCH 2/2] proc: Protect readers of /proc/mounts from remount Jan Kara
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20181212125618.GD10902@quack2.suse.cz \
--to=jack@suse.cz \
--cc=linux-fsdevel@vger.kernel.org \
--cc=viro@zeniv.linux.org.uk \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).