From: Richard Yao Date: Wed, 4 Nov 2015 21:41:13 +0000 (-0500) Subject: Fix race between getf() and areleasef() X-Git-Tag: spl-0.7.0-rc1~53 X-Git-Url: https://granicus.if.org/sourcecode?a=commitdiff_plain;h=1683e75edc1fdca1eba53f16ca08ce32c5e736d1;p=spl Fix race between getf() and areleasef() If a vnode is released asynchronously through areleasef(), it is possible for the user process to reuse the file descriptor before areleasef is called. When this happens, getf() will return a stale reference, any operations in the kernel on that file descriptor will fail (as it is closed) and the operations meant for that fd will never occur from userspace's perspective. We correct this by detecting this condition in getf(), doing a putf on the old file handle, updating the file descriptor and proceeding as if everything was fine. When the areleasef() is done, it will harmlessly decrement the reference counter on the Illumos file handle. Signed-off-by: Richard Yao Signed-off-by: Brian Behlendorf Closes #492 --- diff --git a/include/sys/user.h b/include/sys/user.h index ebbe8f6..2b25dd3 100644 --- a/include/sys/user.h +++ b/include/sys/user.h @@ -30,8 +30,8 @@ * about the Linux task_struct. Since this is internal to our compatibility * layer, we make it an opaque type. * - * XXX: If the descriptor changes under us, we would get an incorrect - * reference. + * XXX: If the descriptor changes under us and we do not do a getf() between + * the change and using it, we would get an incorrect reference. */ struct uf_info; diff --git a/module/spl/spl-vnode.c b/module/spl/spl-vnode.c index ab9830d..86349c5 100644 --- a/module/spl/spl-vnode.c +++ b/module/spl/spl-vnode.c @@ -656,6 +656,19 @@ vn_getf(int fd) fp = file_find(fd, current); if (fp) { + lfp = fget(fd); + fput(fp->f_file); + /* + * areleasef() can cause us to see a stale reference when + * userspace has reused a file descriptor before areleasef() + * has run. fput() the stale reference and replace it. We + * retain the original reference count such that the concurrent + * areleasef() will decrement its reference and terminate. + */ + if (lfp != fp->f_file) { + fp->f_file = lfp; + fp->f_vnode->v_file = lfp; + } atomic_inc(&fp->f_ref); spin_unlock(&vn_file_lock); return (fp);