Re: [PATCH 11/11] IB/uverbs: Fix locking around struct ib_uverbs_file ucontext

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Sun, Jul 22, 2018 at 09:44:49PM -0600, Jason Gunthorpe wrote:
> On Tue, Jul 17, 2018 at 07:14:00AM +0300, Leon Romanovsky wrote:
> > On Tue, Jul 10, 2018 at 08:55:23PM -0600, Jason Gunthorpe wrote:
> > > From: Jason Gunthorpe <jgg@xxxxxxxxxxxx>
> > >
> > > We have a parallel unlocked reader and writer with ib_uverbs_get_context()
> > > vs everything else, and nothing guarentees this works properly.
> > >
> > > Audit and fix all of the places that access ucontext to use one of the
> > > following locking schemes:
> > > - Call ib_uverbs_get_ucontext() under SRCU and check for failure
> > > - Access the ucontext through an struct ib_uobject context member
> > >   while holding a READ or WRITE lock on the uobject.
> > >   This value cannot be NULL and has no race.
> > > - Hold the hw_destroy_rwsem and check for ufile->ucontext !NULL
> > >
> > > This also re-implements ib_uverbs_get_ucontext() in a way that is safe
> > > against concurrent ib_uverbs_get_context() and disassociation.
> > >
> > > As a side effect, every access to ucontext in the commands is via
> > > ib_uverbs_get_context() with an error check, or via the uobject, so there
> > > is no longer any need for the core code to check ucontext on every command
> > > call. These checks are also removed.
> > >
> > > Signed-off-by: Jason Gunthorpe <jgg@xxxxxxxxxxxx>
> > >  drivers/infiniband/core/rdma_core.c           | 14 +++++--
> > >  drivers/infiniband/core/uverbs.h              |  4 ++
> > >  drivers/infiniband/core/uverbs_cmd.c          | 20 ++++++----
> > >  drivers/infiniband/core/uverbs_ioctl.c        |  5 +--
> > >  drivers/infiniband/core/uverbs_main.c         | 38 ++++++++++++-------
> > >  drivers/infiniband/core/uverbs_std_types_cq.c |  2 +-
> > >  drivers/infiniband/core/uverbs_std_types_dm.c |  2 +-
> > >  drivers/infiniband/hw/mlx5/devx.c             | 20 +++++++---
> > >  include/rdma/uverbs_ioctl.h                   |  8 ----
> > >  9 files changed, 68 insertions(+), 45 deletions(-)
> > >
> >
> > This patch causes to races between cleanup and destroy.
>
> This doesn't reproduce for me with this test, but by inspection, this
> is racing IB_USER_VERBS_CMD_GET_CONTEXT with destroy (not cleanup vs
> destroy).
>
> The issue is changing the lock in ib_uverbs_get_context() triggers
> this.
>
> The next series fixes the WARN_ON by making the lock in the destroy
> path blocking and then just deleting the WARN_ON entirely.
>
> Otherwise, I'm not seeing an easy fix. This lock must be changed in
> get_context to eliminate the races around ucontext (the matching
> read-side is in alloc_uobj), and that rework is a necessary piece of
> removing the WARN_ON entirely.
>
> Since this only causes dmesg spam, can only be caused by deliberate
> mis-use of the verbs API, and is being fixed in the next series, I'm
> inclined to leave it as-is, or maybe make it a WARN_ON_ONCE or similar?
>
> What do you think?

I would like to avoid exposing "race", especially that I have no
confidence that next series will close it or hide it.

Why don't we first create lock to be blockable and only after that
change locking?

>
> Jason
> --
> To unsubscribe from this list: send the line "unsubscribe linux-rdma" in
> the body of a message to majordomo@xxxxxxxxxxxxxxx
> More majordomo info at  http://vger.kernel.org/majordomo-info.html

Attachment: signature.asc
Description: PGP signature


[Index of Archives]     [Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Photo]     [Yosemite News]     [Yosemite Photos]     [Linux Kernel]     [Linux SCSI]     [XFree86]

  Powered by Linux