Message ID | 20210803175126.29165-1-jlayton@kernel.org |
---|---|
State | New |
Headers | show |
Series | ceph: ensure we take snap_empty_lock atomically with refcount change | expand |
On Tue, 2021-08-03 at 13:51 -0400, Jeff Layton wrote: > There is a race in ceph_put_snap_realm. The change to the nref and the > spinlock acquisition are not done atomically, so you could change nref, > and before you take the spinlock, the nref is incremented again. At that > point, you end up putting it on the empty list when it shouldn't be > there. Eventually __cleanup_empty_realms runs and frees it when it's > still in-use. > > Fix this by protecting the 1->0 transition with atomic_dec_and_lock, > which should ensure that the race can't occur. > > Because these objects can also undergo a 0->1 refcount transition, we > must protect that change as well with the spinlock. Increment locklessly > unless the value is at 0, in which case we take the spinlock, increment > and then take it off the empty list. > > With these changes, I'm removing the dout() messages from these > functions as well. They've always been racy, and it's better to not > print values that may be misleading. > > Cc: Sage Weil <sage@redhat.com> > Reported-by: Mark Nelson <mnelson@redhat.com> > URL: https://tracker.ceph.com/issues/46419 > Signed-off-by: Jeff Layton <jlayton@kernel.org> > --- > fs/ceph/snap.c | 29 ++++++++++++++--------------- > 1 file changed, 14 insertions(+), 15 deletions(-) > > diff --git a/fs/ceph/snap.c b/fs/ceph/snap.c > index 9dbc92cfda38..c81ba22711a5 100644 > --- a/fs/ceph/snap.c > +++ b/fs/ceph/snap.c > @@ -67,19 +67,20 @@ void ceph_get_snap_realm(struct ceph_mds_client *mdsc, > { > lockdep_assert_held(&mdsc->snap_rwsem); > > - dout("get_realm %p %d -> %d\n", realm, > - atomic_read(&realm->nref), atomic_read(&realm->nref)+1); > /* > - * since we _only_ increment realm refs or empty the empty > - * list with snap_rwsem held, adjusting the empty list here is > - * safe. we do need to protect against concurrent empty list > - * additions, however. > + * The 0->1 and 1->0 transitions must take the snap_empty_lock > + * atomically with the refcount change. Go ahead and bump the > + * nref * here, unless it's 0, in which case we take the I've cleaned up the comment block above before I merged this into the testing branch. I've also marked this for stable kernels as well. > + * spinlock and then do the increment and remove it from the > + * list. > */ > - if (atomic_inc_return(&realm->nref) == 1) { > - spin_lock(&mdsc->snap_empty_lock); > + if (atomic_add_unless(&realm->nref, 1, 0)) > + return; > + > + spin_lock(&mdsc->snap_empty_lock); > + if (atomic_inc_return(&realm->nref) == 1) > list_del_init(&realm->empty_item); > - spin_unlock(&mdsc->snap_empty_lock); > - } > + spin_unlock(&mdsc->snap_empty_lock); > } > > static void __insert_snap_realm(struct rb_root *root, > @@ -215,21 +216,19 @@ static void __put_snap_realm(struct ceph_mds_client *mdsc, > } > > /* > - * caller needn't hold any locks > + * See comments in ceph_get_snap_realm. Caller needn't hold any locks. > */ > void ceph_put_snap_realm(struct ceph_mds_client *mdsc, > struct ceph_snap_realm *realm) > { > - dout("put_snap_realm %llx %p %d -> %d\n", realm->ino, realm, > - atomic_read(&realm->nref), atomic_read(&realm->nref)-1); > - if (!atomic_dec_and_test(&realm->nref)) > + if (!atomic_dec_and_lock(&realm->nref, &mdsc->snap_empty_lock)) > return; > > if (down_write_trylock(&mdsc->snap_rwsem)) { > + spin_unlock(&mdsc->snap_empty_lock); > __destroy_snap_realm(mdsc, realm); > up_write(&mdsc->snap_rwsem); > } else { > - spin_lock(&mdsc->snap_empty_lock); > list_add(&realm->empty_item, &mdsc->snap_empty); > spin_unlock(&mdsc->snap_empty_lock); > }
diff --git a/fs/ceph/snap.c b/fs/ceph/snap.c index 9dbc92cfda38..c81ba22711a5 100644 --- a/fs/ceph/snap.c +++ b/fs/ceph/snap.c @@ -67,19 +67,20 @@ void ceph_get_snap_realm(struct ceph_mds_client *mdsc, { lockdep_assert_held(&mdsc->snap_rwsem); - dout("get_realm %p %d -> %d\n", realm, - atomic_read(&realm->nref), atomic_read(&realm->nref)+1); /* - * since we _only_ increment realm refs or empty the empty - * list with snap_rwsem held, adjusting the empty list here is - * safe. we do need to protect against concurrent empty list - * additions, however. + * The 0->1 and 1->0 transitions must take the snap_empty_lock + * atomically with the refcount change. Go ahead and bump the + * nref * here, unless it's 0, in which case we take the + * spinlock and then do the increment and remove it from the + * list. */ - if (atomic_inc_return(&realm->nref) == 1) { - spin_lock(&mdsc->snap_empty_lock); + if (atomic_add_unless(&realm->nref, 1, 0)) + return; + + spin_lock(&mdsc->snap_empty_lock); + if (atomic_inc_return(&realm->nref) == 1) list_del_init(&realm->empty_item); - spin_unlock(&mdsc->snap_empty_lock); - } + spin_unlock(&mdsc->snap_empty_lock); } static void __insert_snap_realm(struct rb_root *root, @@ -215,21 +216,19 @@ static void __put_snap_realm(struct ceph_mds_client *mdsc, } /* - * caller needn't hold any locks + * See comments in ceph_get_snap_realm. Caller needn't hold any locks. */ void ceph_put_snap_realm(struct ceph_mds_client *mdsc, struct ceph_snap_realm *realm) { - dout("put_snap_realm %llx %p %d -> %d\n", realm->ino, realm, - atomic_read(&realm->nref), atomic_read(&realm->nref)-1); - if (!atomic_dec_and_test(&realm->nref)) + if (!atomic_dec_and_lock(&realm->nref, &mdsc->snap_empty_lock)) return; if (down_write_trylock(&mdsc->snap_rwsem)) { + spin_unlock(&mdsc->snap_empty_lock); __destroy_snap_realm(mdsc, realm); up_write(&mdsc->snap_rwsem); } else { - spin_lock(&mdsc->snap_empty_lock); list_add(&realm->empty_item, &mdsc->snap_empty); spin_unlock(&mdsc->snap_empty_lock); }
There is a race in ceph_put_snap_realm. The change to the nref and the spinlock acquisition are not done atomically, so you could change nref, and before you take the spinlock, the nref is incremented again. At that point, you end up putting it on the empty list when it shouldn't be there. Eventually __cleanup_empty_realms runs and frees it when it's still in-use. Fix this by protecting the 1->0 transition with atomic_dec_and_lock, which should ensure that the race can't occur. Because these objects can also undergo a 0->1 refcount transition, we must protect that change as well with the spinlock. Increment locklessly unless the value is at 0, in which case we take the spinlock, increment and then take it off the empty list. With these changes, I'm removing the dout() messages from these functions as well. They've always been racy, and it's better to not print values that may be misleading. Cc: Sage Weil <sage@redhat.com> Reported-by: Mark Nelson <mnelson@redhat.com> URL: https://tracker.ceph.com/issues/46419 Signed-off-by: Jeff Layton <jlayton@kernel.org> --- fs/ceph/snap.c | 29 ++++++++++++++--------------- 1 file changed, 14 insertions(+), 15 deletions(-)