From: Andrew Morton <akpm@linux-foundation.org>
To: "Sapan Bhatia" <sapan.bhatia@gmail.com>
Cc: linux-kernel@vger.kernel.org, daniel@hozac.com
Subject: Re: race leading to held mutexes, inode_cache corruption
Date: Tue, 1 Apr 2008 18:38:29 -0700 [thread overview]
Message-ID: <20080401183829.110ae2b9.akpm@linux-foundation.org> (raw)
In-Reply-To: <3cb76b010804011815l52e69576x9ddb97c07ab38111@mail.gmail.com>
On Tue, 1 Apr 2008 21:15:52 -0400 "Sapan Bhatia" <sapan.bhatia@gmail.com> wrote:
> Hi,
>
> We've been trying to investigate a file-system corruption issue in our
> kernel (http://svn.planet-lab.org/browser/linux-2.6/trunk) that
> manifests itself both with ext3 and ext2. It appears to be happening
> to due a contamination of the inode cache (we spent some time
> monitoring our systems to arrive at this hypothesis), and can be
> reproduced on a vanilla kernel as well.
>
> The race that leads to this issue involves a process being terminated
> when it is waiting for a mutex in __mutex_lock_common. eg. when it is
> sent a SIGKILL, and the mutex is unlocked, causing the process to be
> woken up and sent to exit while now holding the lock.
>
> The way it contaminates the inode_cache slab is that inode->i_mutex is
> only initialized once, and assumes that inodes coming back into the
> cache are initialized. It seems that in our case such poisoned inodes
> were leaking out of pipe.c.
>
> This (www.cs.princeton.edu/~sapanb/mut.c) is the module we used to
> test the condition, as follows. Writing to the char device locks a
> mutex and reading from it unlocks it.
> # echo 1 > /dev/mut
> # cat /etc/passwd > /dev/mut &
> [2] 6232
> # kill -9 6232
> # cat /dev/mut
> [2]- Killed cat /etc/passwd > /dev/mut
> # echo 1 > /dev/mut
> (goes to sleep)
>
> I suppose that one could also construct an attack to proactively
> corrupt inode_cache, but I haven't tried that as yet.
>
> Our base kernel is 2.6.22.19.
This is ... confusing.
Are you saying that some caller of mutex_lock_interruptible() is getting a
return value of -EINTR from mutex_lock_interruptible(), but this task in
fact _did_ acquire the mutex?
That's the only way in which I can interpret your second paragraph, but as
far as I can tell the code cannot do that.
Can you provide more detail?
next prev parent reply other threads:[~2008-04-02 1:39 UTC|newest]
Thread overview: 3+ messages / expand[flat|nested] mbox.gz Atom feed top
2008-04-02 1:15 race leading to held mutexes, inode_cache corruption Sapan Bhatia
2008-04-02 1:38 ` Andrew Morton [this message]
[not found] ` <3cb76b010804012113p1758addsbfaea2882280b082@mail.gmail.com>
2008-04-02 4:28 ` Andrew Morton
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20080401183829.110ae2b9.akpm@linux-foundation.org \
--to=akpm@linux-foundation.org \
--cc=daniel@hozac.com \
--cc=linux-kernel@vger.kernel.org \
--cc=sapan.bhatia@gmail.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox