From: Jason Gunthorpe <jgunthorpe-ePGOBjL8dl3ta4EC/59zMFaTQe2KTcn/@public.gmane.org>
To: Jarkko Sakkinen
<jarkko.sakkinen-VuQAYsv1563Yd54FQh9/CA@public.gmane.org>
Cc: tpmdd-devel-5NWGOfrQmneRv+LV9MX5uipxlwaOVQ5f@public.gmane.org
Subject: Re: [PATCH v5 4/7] tpm: fix the race condition between event log access and chip getting unregistered
Date: Mon, 7 Nov 2016 16:48:39 -0700 [thread overview]
Message-ID: <20161107234839.GC7002@obsidianresearch.com> (raw)
In-Reply-To: <20161104051410.iqxb5k6fwizv7inc-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org>
On Thu, Nov 03, 2016 at 11:14:10PM -0600, Jarkko Sakkinen wrote:
> On Tue, Oct 18, 2016 at 08:49:42PM -0400, Nayna Jain wrote:
> > Currently, the event log file operations are not serialized with
> > tpm_chip_unregister(), which can possibly cause a race condition.
> >
> > This patch fixes the race condition by:
> > - moving read_log() from fops to chip register.
>
> What is "chip register"? Please use exact names.
>
> > - disallowing event log file operations when chip unregister is in
> > progress.
>
> Could you elaborate this sentence?
>
> > - guarding event log memory using chip krefs.
>
> Could you elaborate this sentence?
>
> Please describe how the race condition could happen and provide the
> "Fixes:" line for the commit ID that caused it. Otherwise, your commit
> message won't make any sense. I cannot apply this commit with this
> commit message.
>
> The commit message does not make much sense...
Lets get this moving along, it is hard to keep everything straight
over months..
Nayna: This commit message should work:
tpm: Have eventlog use the tpm_chip
Move the backing memory for the eventlog into tpm_chip and push
the tpm_chip into read_log. This optimizes read_log processing by
only doing it once and prepares things for the next patches in the
series which require the tpm_chip to locate the event log via
ACPI and OF handles instead of searching.
This is straightfoward except for the issue of passing a kref through
i_private with securityfs. Since securityfs_remove does not have any
removal fencing like sysfs we use the inode lock to safely get a
kref on the tpm_chip.
> > diff --git a/drivers/char/tpm/tpm-chip.c b/drivers/char/tpm/tpm-chip.c
> > index eac1f10..813e0d7 100644
> > +++ b/drivers/char/tpm/tpm-chip.c
> > @@ -127,6 +127,7 @@ static void tpm_dev_release(struct device *dev)
> > idr_remove(&dev_nums_idr, chip->dev_num);
> > mutex_unlock(&idr_lock);
> >
> > + kfree(chip->log.bios_event_log);
> > kfree(chip);
> > }
[..]
> > /* read binary bios log */
> > -int read_log(struct tpm_bios_log *log)
> > +int read_log(struct tpm_chip *chip)
[..]
> > +err:
> > + kfree(log->bios_event_log);
>
> Is this kfree() necessary?
Yes, if the log is not loaded then bios_event_log log should be null.
Nayna - there is a bug here, you have to null bios_event_log after
kfree'ing it so that tpm_dev_release does not attempt to kfree a
free'd pointer.
> > + inode_lock(inode);
> > + if (!inode->i_private) {
> > + inode_unlock(inode);
> > + return -ENODEV;
> > + }
>
> Why is this is done (inode_lock + setting to NULL), and if so, why
> it wasn't done in 1/7?
Patch 1 does not use memory backed by tpm_chip, this is the first
patch in the series that introduces that concept, so it is the first
place that needs to do this.
> > - for (i = (TPM_NUM_EVENT_LOG_FILES - 1); i >= 0; i--)
> > + for (i = (TPM_NUM_EVENT_LOG_FILES - 1); i >= 0; i--) {
> > + inode = d_inode(chip->bios_dir[i]);
> > + inode_lock(inode);
> > + inode->i_private = NULL;
> > + inode_unlock(inode);
>
> Why is this is done (inode_lock + setting to NULL), and if so, why
> it wasn't done in 1/7?
I'm sure I've explained this before, but again, the inode lock is
a work around for lack of removal fencing in securityfs. We null the
i_private here during remove and test for null during open under this
lock.
This design ensures that open either safely gets a kref or fails.
Holding the kref as long as the securityfs file is open by userspace
ensures there are no use-after-frees in this code.
A comment to that effect would be good.
Jason
------------------------------------------------------------------------------
Developer Access Program for Intel Xeon Phi Processors
Access to Intel Xeon Phi processor-based developer platforms.
With one year of Intel Parallel Studio XE.
Training and support from Colfax.
Order your platform today. http://sdm.link/xeonphi
next prev parent reply other threads:[~2016-11-07 23:48 UTC|newest]
Thread overview: 35+ messages / expand[flat|nested] mbox.gz Atom feed top
2016-10-19 0:49 [PATCH v5 0/7] tpm: cleanup/fixes in existing event log support Nayna Jain
[not found] ` <1476838185-24007-1-git-send-email-nayna-23VcF4HTsmIX0ybBhKVfKdBPR1lH4CV8@public.gmane.org>
2016-10-19 0:49 ` [PATCH v5 1/7] tpm: define a generic open() method for ascii & bios measurements Nayna Jain
[not found] ` <1476838185-24007-2-git-send-email-nayna-23VcF4HTsmIX0ybBhKVfKdBPR1lH4CV8@public.gmane.org>
2016-11-02 10:36 ` Jarkko Sakkinen
2016-10-19 0:49 ` [PATCH v5 2/7] tpm: replace dynamically allocated bios_dir with a static array Nayna Jain
2016-10-19 0:49 ` [PATCH v5 3/7] tpm: drop tpm1_chip_register(/unregister) Nayna Jain
2016-10-19 0:49 ` [PATCH v5 4/7] tpm: fix the race condition between event log access and chip getting unregistered Nayna Jain
[not found] ` <1476838185-24007-5-git-send-email-nayna-23VcF4HTsmIX0ybBhKVfKdBPR1lH4CV8@public.gmane.org>
2016-10-19 16:13 ` Jarkko Sakkinen
2016-10-20 20:28 ` Jason Gunthorpe
2016-11-04 5:14 ` Jarkko Sakkinen
[not found] ` <20161104051410.iqxb5k6fwizv7inc-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org>
2016-11-07 23:48 ` Jason Gunthorpe [this message]
[not found] ` <20161107234839.GC7002-ePGOBjL8dl3ta4EC/59zMFaTQe2KTcn/@public.gmane.org>
2016-11-08 0:26 ` Jarkko Sakkinen
[not found] ` <20161108002642.4pvvubjcz57m4nov-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org>
2016-11-08 0:29 ` Jason Gunthorpe
[not found] ` <20161108002943.GB13959-ePGOBjL8dl3ta4EC/59zMFaTQe2KTcn/@public.gmane.org>
2016-11-08 0:48 ` Jarkko Sakkinen
2016-11-08 0:34 ` Jarkko Sakkinen
2016-10-19 0:49 ` [PATCH v5 5/7] tpm: redefine read_log() to handle ACPI/OF at runtime Nayna Jain
[not found] ` <1476838185-24007-6-git-send-email-nayna-23VcF4HTsmIX0ybBhKVfKdBPR1lH4CV8@public.gmane.org>
2016-10-19 16:17 ` Jarkko Sakkinen
[not found] ` <20161019161739.ium2peamjwarpb5d-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org>
2016-10-19 17:26 ` Jason Gunthorpe
[not found] ` <20161019172625.GC29879-ePGOBjL8dl3ta4EC/59zMFaTQe2KTcn/@public.gmane.org>
2016-10-20 7:17 ` Jarkko Sakkinen
2016-11-04 5:15 ` Jarkko Sakkinen
2016-10-19 0:49 ` [PATCH v5 6/7] tpm: replace of_find_node_by_name() with dev of_node property Nayna Jain
2016-10-19 0:49 ` [PATCH v5 7/7] tpm: replace or remove printk error messages Nayna Jain
[not found] ` <1476838185-24007-8-git-send-email-nayna-23VcF4HTsmIX0ybBhKVfKdBPR1lH4CV8@public.gmane.org>
2016-10-19 16:18 ` Jarkko Sakkinen
[not found] ` <20161019161854.iuzgacimusfcivvf-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org>
2016-10-20 7:34 ` Winkler, Tomas
[not found] ` <5B8DA87D05A7694D9FA63FD143655C1B5430045A-Jy8z56yoSI8MvF1YICWikbfspsVTdybXVpNB7YpNyf8@public.gmane.org>
2016-10-20 11:24 ` Jarkko Sakkinen
[not found] ` <20161020112400.75pwp5ttk3yxuinq-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org>
2016-10-21 3:22 ` Nayna
[not found] ` <580989E6.3060103-23VcF4HTsmIX0ybBhKVfKdBPR1lH4CV8@public.gmane.org>
2016-10-21 15:02 ` Jarkko Sakkinen
[not found] ` <20161021150250.24dyyi427rbnkpba-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org>
2016-10-26 2:22 ` Nayna
[not found] ` <5810137D.2010002-23VcF4HTsmIX0ybBhKVfKdBPR1lH4CV8@public.gmane.org>
2016-10-26 10:56 ` Jarkko Sakkinen
[not found] ` <20161026105649.kgav732btjfv4pfw-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org>
2016-10-26 17:31 ` Nayna
[not found] ` <5810E854.3070905-23VcF4HTsmIX0ybBhKVfKdBPR1lH4CV8@public.gmane.org>
2016-10-27 13:53 ` Jarkko Sakkinen
[not found] ` <20161027135351.jndcn27xymgdgmux-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org>
2016-10-27 15:05 ` Nayna
2016-10-20 13:31 ` Nayna
[not found] ` <5808C747.4040709-23VcF4HTsmIX0ybBhKVfKdBPR1lH4CV8@public.gmane.org>
2016-10-20 13:43 ` Jarkko Sakkinen
2016-11-04 5:18 ` Jarkko Sakkinen
2016-11-04 13:08 ` [PATCH v5 0/7] tpm: cleanup/fixes in existing event log support Jarkko Sakkinen
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20161107234839.GC7002@obsidianresearch.com \
--to=jgunthorpe-epgobjl8dl3ta4ec/59zmfatqe2ktcn/@public.gmane.org \
--cc=jarkko.sakkinen-VuQAYsv1563Yd54FQh9/CA@public.gmane.org \
--cc=tpmdd-devel-5NWGOfrQmneRv+LV9MX5uipxlwaOVQ5f@public.gmane.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).