2023-05-30 20:35:31

by Demi Marie Obenour

[permalink] [raw]
Subject: [PATCH v2 13/16] xen-blkback: Implement diskseq checks

This allows specifying a disk sequence number in XenStore. If it does
not match the disk sequence number of the underlying device, the device
will not be exported and a warning will be logged. Userspace can use
this to eliminate race conditions due to major/minor number reuse.
Old kernels do not support the new syntax, but a later patch will allow
userspace to discover that the new syntax is supported.

Signed-off-by: Demi Marie Obenour <[email protected]>
---
drivers/block/xen-blkback/xenbus.c | 112 +++++++++++++++++++++++------
1 file changed, 89 insertions(+), 23 deletions(-)

diff --git a/drivers/block/xen-blkback/xenbus.c b/drivers/block/xen-blkback/xenbus.c
index 4807af1d58059394d7a992335dabaf2bc3901721..9c3eb148fbd802c74e626c3d7bcd69dcb09bd921 100644
--- a/drivers/block/xen-blkback/xenbus.c
+++ b/drivers/block/xen-blkback/xenbus.c
@@ -24,6 +24,7 @@ struct backend_info {
struct xenbus_watch backend_watch;
unsigned major;
unsigned minor;
+ unsigned long long diskseq;
char *mode;
};

@@ -479,7 +480,7 @@ static void xen_vbd_free(struct xen_vbd *vbd)

static int xen_vbd_create(struct xen_blkif *blkif, blkif_vdev_t handle,
unsigned major, unsigned minor, int readonly,
- int cdrom)
+ bool cdrom, u64 diskseq)
{
struct xen_vbd *vbd;
struct block_device *bdev;
@@ -507,6 +508,26 @@ static int xen_vbd_create(struct xen_blkif *blkif, blkif_vdev_t handle,
xen_vbd_free(vbd);
return -ENOENT;
}
+
+ if (diskseq) {
+ struct gendisk *disk = bdev->bd_disk;
+
+ if (unlikely(disk == NULL)) {
+ pr_err("%s: device %08x has no gendisk\n",
+ __func__, vbd->pdevice);
+ xen_vbd_free(vbd);
+ return -EFAULT;
+ }
+
+ if (unlikely(disk->diskseq != diskseq)) {
+ pr_warn("%s: device %08x has incorrect sequence "
+ "number 0x%llx (expected 0x%llx)\n",
+ __func__, vbd->pdevice, disk->diskseq, diskseq);
+ xen_vbd_free(vbd);
+ return -ENODEV;
+ }
+ }
+
vbd->size = vbd_sz(vbd);

if (cdrom || disk_to_cdi(vbd->bdev->bd_disk))
@@ -707,6 +728,9 @@ static void backend_changed(struct xenbus_watch *watch,
int cdrom = 0;
unsigned long handle;
char *device_type;
+ char *diskseq_str = NULL;
+ int diskseq_len;
+ unsigned long long diskseq;

pr_debug("%s %p %d\n", __func__, dev, dev->otherend_id);

@@ -725,10 +749,46 @@ static void backend_changed(struct xenbus_watch *watch,
return;
}

- if (be->major | be->minor) {
- if (be->major != major || be->minor != minor)
- pr_warn("changing physical device (from %x:%x to %x:%x) not supported.\n",
- be->major, be->minor, major, minor);
+ diskseq_str = xenbus_read(XBT_NIL, dev->nodename, "diskseq", &diskseq_len);
+ if (IS_ERR(diskseq_str)) {
+ int err = PTR_ERR(diskseq_str);
+ diskseq_str = NULL;
+
+ /*
+ * If this does not exist, it means legacy userspace that does not
+ * support diskseq.
+ */
+ if (unlikely(!XENBUS_EXIST_ERR(err))) {
+ xenbus_dev_fatal(dev, err, "reading diskseq");
+ return;
+ }
+ diskseq = 0;
+ } else if (diskseq_len <= 0) {
+ xenbus_dev_fatal(dev, -EFAULT, "diskseq must not be empty");
+ goto fail;
+ } else if (diskseq_len > 16) {
+ xenbus_dev_fatal(dev, -ERANGE, "diskseq too long: got %d but limit is 16",
+ diskseq_len);
+ goto fail;
+ } else if (diskseq_str[0] == '0') {
+ xenbus_dev_fatal(dev, -ERANGE, "diskseq must not start with '0'");
+ goto fail;
+ } else {
+ char *diskseq_end;
+ diskseq = simple_strtoull(diskseq_str, &diskseq_end, 16);
+ if (diskseq_end != diskseq_str + diskseq_len) {
+ xenbus_dev_fatal(dev, -EINVAL, "invalid diskseq");
+ goto fail;
+ }
+ kfree(diskseq_str);
+ diskseq_str = NULL;
+ }
+
+ if (be->major | be->minor | be->diskseq) {
+ if (be->major != major || be->minor != minor || be->diskseq != diskseq)
+ pr_warn("changing physical device (from %x:%x:%llx to %x:%x:%llx)"
+ " not supported.\n",
+ be->major, be->minor, be->diskseq, major, minor, diskseq);
return;
}

@@ -756,29 +816,35 @@ static void backend_changed(struct xenbus_watch *watch,

be->major = major;
be->minor = minor;
+ be->diskseq = diskseq;

err = xen_vbd_create(be->blkif, handle, major, minor,
- !strchr(be->mode, 'w'), cdrom);
-
- if (err)
- xenbus_dev_fatal(dev, err, "creating vbd structure");
- else {
- err = xenvbd_sysfs_addif(dev);
- if (err) {
- xen_vbd_free(&be->blkif->vbd);
- xenbus_dev_fatal(dev, err, "creating sysfs entries");
- }
- }
+ !strchr(be->mode, 'w'), cdrom, diskseq);

if (err) {
- kfree(be->mode);
- be->mode = NULL;
- be->major = 0;
- be->minor = 0;
- } else {
- /* We're potentially connected now */
- xen_update_blkif_status(be->blkif);
+ xenbus_dev_fatal(dev, err, "creating vbd structure");
+ goto fail;
}
+
+ err = xenvbd_sysfs_addif(dev);
+ if (err) {
+ xenbus_dev_fatal(dev, err, "creating sysfs entries");
+ goto free_vbd;
+ }
+
+ /* We're potentially connected now */
+ xen_update_blkif_status(be->blkif);
+ return;
+
+free_vbd:
+ xen_vbd_free(&be->blkif->vbd);
+fail:
+ kfree(diskseq_str);
+ kfree(be->mode);
+ be->mode = NULL;
+ be->major = 0;
+ be->minor = 0;
+ be->diskseq = 0;
}

/*
--
Sincerely,
Demi Marie Obenour (she/her/hers)
Invisible Things Lab



2023-06-06 17:32:12

by Demi Marie Obenour

[permalink] [raw]
Subject: Re: [PATCH v2 13/16] xen-blkback: Implement diskseq checks

On Tue, Jun 06, 2023 at 10:25:47AM +0200, Roger Pau Monné wrote:
> On Tue, May 30, 2023 at 04:31:13PM -0400, Demi Marie Obenour wrote:
> > This allows specifying a disk sequence number in XenStore. If it does
> > not match the disk sequence number of the underlying device, the device
> > will not be exported and a warning will be logged. Userspace can use
> > this to eliminate race conditions due to major/minor number reuse.
> > Old kernels do not support the new syntax, but a later patch will allow
> > userspace to discover that the new syntax is supported.
> >
> > Signed-off-by: Demi Marie Obenour <[email protected]>
> > ---
> > drivers/block/xen-blkback/xenbus.c | 112 +++++++++++++++++++++++------
> > 1 file changed, 89 insertions(+), 23 deletions(-)
> >
> > diff --git a/drivers/block/xen-blkback/xenbus.c b/drivers/block/xen-blkback/xenbus.c
> > index 4807af1d58059394d7a992335dabaf2bc3901721..9c3eb148fbd802c74e626c3d7bcd69dcb09bd921 100644
> > --- a/drivers/block/xen-blkback/xenbus.c
> > +++ b/drivers/block/xen-blkback/xenbus.c
> > @@ -24,6 +24,7 @@ struct backend_info {
> > struct xenbus_watch backend_watch;
> > unsigned major;
> > unsigned minor;
> > + unsigned long long diskseq;
>
> Since diskseq is declared as u64 in gendisk, better use the same type
> here too?

simple_strtoull() returns an unsigned long long, and C permits unsigned
long long to be larger than 64 bits.

> > char *mode;
> > };
> >
> > @@ -479,7 +480,7 @@ static void xen_vbd_free(struct xen_vbd *vbd)
> >
> > static int xen_vbd_create(struct xen_blkif *blkif, blkif_vdev_t handle,
> > unsigned major, unsigned minor, int readonly,
> > - int cdrom)
> > + bool cdrom, u64 diskseq)
> > {
> > struct xen_vbd *vbd;
> > struct block_device *bdev;
> > @@ -507,6 +508,26 @@ static int xen_vbd_create(struct xen_blkif *blkif, blkif_vdev_t handle,
> > xen_vbd_free(vbd);
> > return -ENOENT;
> > }
> > +
> > + if (diskseq) {
> > + struct gendisk *disk = bdev->bd_disk;
>
> const.
>
> > +
> > + if (unlikely(disk == NULL)) {
> > + pr_err("%s: device %08x has no gendisk\n",
> > + __func__, vbd->pdevice);
> > + xen_vbd_free(vbd);
> > + return -EFAULT;
>
> ENODEV or ENOENT might be more accurate IMO.

I will drop it, as this turns out to be unreachable code.

> > + }
> > +
> > + if (unlikely(disk->diskseq != diskseq)) {
> > + pr_warn("%s: device %08x has incorrect sequence "
> > + "number 0x%llx (expected 0x%llx)\n",
>
> I prefer %#llx, and likely pr_err like above. Also I think it's now
> preferred to not split printed lines, so that `grep "has incorrect
> sequence number" ...` can find the instance.

Ah, so _that_ is why I got a warning from checkpatch!

> > + __func__, vbd->pdevice, disk->diskseq, diskseq);
> > + xen_vbd_free(vbd);
> > + return -ENODEV;
> > + }
> > + }
> > +
> > vbd->size = vbd_sz(vbd);
> >
> > if (cdrom || disk_to_cdi(vbd->bdev->bd_disk))
> > @@ -707,6 +728,9 @@ static void backend_changed(struct xenbus_watch *watch,
> > int cdrom = 0;
> > unsigned long handle;
> > char *device_type;
> > + char *diskseq_str = NULL;
>
> const, and I think there's no need to init to NULL.
>
> > + int diskseq_len;
>
> unsigned int
>
> > + unsigned long long diskseq;
>
> u64
>
> >
> > pr_debug("%s %p %d\n", __func__, dev, dev->otherend_id);
> >
> > @@ -725,10 +749,46 @@ static void backend_changed(struct xenbus_watch *watch,
> > return;
> > }
> >
> > - if (be->major | be->minor) {
> > - if (be->major != major || be->minor != minor)
> > - pr_warn("changing physical device (from %x:%x to %x:%x) not supported.\n",
> > - be->major, be->minor, major, minor);
> > + diskseq_str = xenbus_read(XBT_NIL, dev->nodename, "diskseq", &diskseq_len);
> > + if (IS_ERR(diskseq_str)) {
> > + int err = PTR_ERR(diskseq_str);
> > + diskseq_str = NULL;
> > +
> > + /*
> > + * If this does not exist, it means legacy userspace that does not
> > + * support diskseq.
> > + */
> > + if (unlikely(!XENBUS_EXIST_ERR(err))) {
> > + xenbus_dev_fatal(dev, err, "reading diskseq");
> > + return;
> > + }
> > + diskseq = 0;
> > + } else if (diskseq_len <= 0) {
> > + xenbus_dev_fatal(dev, -EFAULT, "diskseq must not be empty");
> > + goto fail;
> > + } else if (diskseq_len > 16) {
> > + xenbus_dev_fatal(dev, -ERANGE, "diskseq too long: got %d but limit is 16",
> > + diskseq_len);
> > + goto fail;
> > + } else if (diskseq_str[0] == '0') {
> > + xenbus_dev_fatal(dev, -ERANGE, "diskseq must not start with '0'");
> > + goto fail;
> > + } else {
> > + char *diskseq_end;
> > + diskseq = simple_strtoull(diskseq_str, &diskseq_end, 16);
> > + if (diskseq_end != diskseq_str + diskseq_len) {
> > + xenbus_dev_fatal(dev, -EINVAL, "invalid diskseq");
> > + goto fail;
> > + }
> > + kfree(diskseq_str);
> > + diskseq_str = NULL;
> > + }
>
> Won't it be simpler to use xenbus_scanf() with %llx formatter?

xenbus_scanf() doesn’t check for overflow and accepts lots of junk it
really should not. Should this be fixed in xenbus_scanf()?

> Also, we might want to fetch "physical-device" and "diskseq" inside
> the same xenstore transaction.

Should the rest of the xenstore reads be included in the same
transaction?

> Also, you tie this logic to the "physical-device" watch, which
> strictly implies that the "diskseq" node must be written to xenstore
> before the "physical-device" node. This seems fragile, but I don't
> see much better optiono since the "diskseq" is optional.

What about including the diskseq in the "physical-device" node? Perhaps
use diskseq@major:minor syntax?

> The node and its behaviour should be documented in blkif.h.

Indeed so.

> > + if (be->major | be->minor | be->diskseq) {
> > + if (be->major != major || be->minor != minor || be->diskseq != diskseq)
> > + pr_warn("changing physical device (from %x:%x:%llx to %x:%x:%llx)"
> > + " not supported.\n",
> > + be->major, be->minor, be->diskseq, major, minor, diskseq);
> > return;
>
> You are leaking diskseq_str here, and in all the error cases between
> here and up to the call to xen_vbd_create().

I will fix this by moving the diskseq reading code into its own
function.
--
Sincerely,
Demi Marie Obenour (she/her/hers)
Invisible Things Lab


Attachments:
(No filename) (6.33 kB)
signature.asc (849.00 B)
Download all attachments

2023-06-07 16:30:51

by Demi Marie Obenour

[permalink] [raw]
Subject: Re: [PATCH v2 13/16] xen-blkback: Implement diskseq checks

On Wed, Jun 07, 2023 at 10:20:08AM +0200, Roger Pau Monné wrote:
> On Tue, Jun 06, 2023 at 01:01:20PM -0400, Demi Marie Obenour wrote:
> > On Tue, Jun 06, 2023 at 10:25:47AM +0200, Roger Pau Monné wrote:
> > > On Tue, May 30, 2023 at 04:31:13PM -0400, Demi Marie Obenour wrote:
> > > > This allows specifying a disk sequence number in XenStore. If it does
> > > > not match the disk sequence number of the underlying device, the device
> > > > will not be exported and a warning will be logged. Userspace can use
> > > > this to eliminate race conditions due to major/minor number reuse.
> > > > Old kernels do not support the new syntax, but a later patch will allow
> > > > userspace to discover that the new syntax is supported.
> > > >
> > > > Signed-off-by: Demi Marie Obenour <[email protected]>
> > > > ---
> > > > drivers/block/xen-blkback/xenbus.c | 112 +++++++++++++++++++++++------
> > > > 1 file changed, 89 insertions(+), 23 deletions(-)
> > > >
> > > > diff --git a/drivers/block/xen-blkback/xenbus.c b/drivers/block/xen-blkback/xenbus.c
> > > > index 4807af1d58059394d7a992335dabaf2bc3901721..9c3eb148fbd802c74e626c3d7bcd69dcb09bd921 100644
> > > > --- a/drivers/block/xen-blkback/xenbus.c
> > > > +++ b/drivers/block/xen-blkback/xenbus.c
> > > > @@ -24,6 +24,7 @@ struct backend_info {
> > > > struct xenbus_watch backend_watch;
> > > > unsigned major;
> > > > unsigned minor;
> > > > + unsigned long long diskseq;
> > >
> > > Since diskseq is declared as u64 in gendisk, better use the same type
> > > here too?
> >
> > simple_strtoull() returns an unsigned long long, and C permits unsigned
> > long long to be larger than 64 bits.
>
> Right, but the type of gendisk is u64. It's fine if you want to store
> the result of simple_strtoull() into an unsigned long long and do
> whatever checks to assert it matches the format expected by gendisk,
> but ultimately the field type would better use u64 for consistency IMO.

I changed my mind on this, not least because the 16-byte length limit
means that the value is limited to UINT64_MAX anyway.

> > > > @@ -725,10 +749,46 @@ static void backend_changed(struct xenbus_watch *watch,
> > > > return;
> > > > }
> > > >
> > > > - if (be->major | be->minor) {
> > > > - if (be->major != major || be->minor != minor)
> > > > - pr_warn("changing physical device (from %x:%x to %x:%x) not supported.\n",
> > > > - be->major, be->minor, major, minor);
> > > > + diskseq_str = xenbus_read(XBT_NIL, dev->nodename, "diskseq", &diskseq_len);
> > > > + if (IS_ERR(diskseq_str)) {
> > > > + int err = PTR_ERR(diskseq_str);
> > > > + diskseq_str = NULL;
> > > > +
> > > > + /*
> > > > + * If this does not exist, it means legacy userspace that does not
> > > > + * support diskseq.
> > > > + */
> > > > + if (unlikely(!XENBUS_EXIST_ERR(err))) {
> > > > + xenbus_dev_fatal(dev, err, "reading diskseq");
> > > > + return;
> > > > + }
> > > > + diskseq = 0;
> > > > + } else if (diskseq_len <= 0) {
> > > > + xenbus_dev_fatal(dev, -EFAULT, "diskseq must not be empty");
> > > > + goto fail;
> > > > + } else if (diskseq_len > 16) {
> > > > + xenbus_dev_fatal(dev, -ERANGE, "diskseq too long: got %d but limit is 16",
> > > > + diskseq_len);
> > > > + goto fail;
> > > > + } else if (diskseq_str[0] == '0') {
> > > > + xenbus_dev_fatal(dev, -ERANGE, "diskseq must not start with '0'");
> > > > + goto fail;
> > > > + } else {
> > > > + char *diskseq_end;
> > > > + diskseq = simple_strtoull(diskseq_str, &diskseq_end, 16);
> > > > + if (diskseq_end != diskseq_str + diskseq_len) {
> > > > + xenbus_dev_fatal(dev, -EINVAL, "invalid diskseq");
> > > > + goto fail;
> > > > + }
> > > > + kfree(diskseq_str);
> > > > + diskseq_str = NULL;
> > > > + }
> > >
> > > Won't it be simpler to use xenbus_scanf() with %llx formatter?
> >
> > xenbus_scanf() doesn’t check for overflow and accepts lots of junk it
> > really should not. Should this be fixed in xenbus_scanf()?
>
> That would be my preference, so that you can use it here instead of
> kind of open-coding it.

This winds up being a much more invasive patch as it requires changing
sscanf(). It also has a risk (probably mostly theoretical) of breaking
buggy userspace that passes garbage values here.

> > > Also, we might want to fetch "physical-device" and "diskseq" inside
> > > the same xenstore transaction.
> >
> > Should the rest of the xenstore reads be included in the same
> > transaction?
>
> I guess it would make the code simpler to indeed fetch everything
> inside the same transaction.

Okay, will change in v3.

> > > Also, you tie this logic to the "physical-device" watch, which
> > > strictly implies that the "diskseq" node must be written to xenstore
> > > before the "physical-device" node. This seems fragile, but I don't
> > > see much better optiono since the "diskseq" is optional.
> >
> > What about including the diskseq in the "physical-device" node? Perhaps
> > use diskseq@major:minor syntax?
>
> Hm, how would you know whether the blkback instance in the kernel
> supports the diskseq syntax in physical-device?

That’s what the next patch is for ????.

> Can you fetch a disk using a diskseq identifier?

Not yet, although I have considered adding this ability. It would be
one step towards a “diskseqfs” that userspace could use to open a device
by diskseq.

> Why I understand that this is an extra safety check in order to assert
> blkback is opening the intended device, is this attempting to fix some
> existing issue?

Yes, it is. I have a block script (written in C) that validates the
device it has opened before passing the information to blkback. It uses
the diskseq to do this, but for that protection to be complete, blkback
must also be aware of it.

> I'm not sure I see how the major:minor numbers would point to a
> different device than the one specified by the toolstack unless the
> admin explicitly messes with the devices before blkback has got time
> to open them. But then the admin can already do pretty much
> everything it wants with the system.

Admins typically refer to e.g. device-mapper devices by name, not by
major:minor number. If a device is destroyed and recreated right as the
block script is running, this race condition can occur.
--
Sincerely,
Demi Marie Obenour (she/her/hers)
Invisible Things Lab


Attachments:
(No filename) (6.37 kB)
signature.asc (849.00 B)
Download all attachments

2023-06-08 15:44:08

by Demi Marie Obenour

[permalink] [raw]
Subject: Re: [PATCH v2 13/16] xen-blkback: Implement diskseq checks

On Thu, Jun 08, 2023 at 10:29:18AM +0200, Roger Pau Monné wrote:
> On Wed, Jun 07, 2023 at 12:14:46PM -0400, Demi Marie Obenour wrote:
> > On Wed, Jun 07, 2023 at 10:20:08AM +0200, Roger Pau Monné wrote:
> > > On Tue, Jun 06, 2023 at 01:01:20PM -0400, Demi Marie Obenour wrote:
> > > > On Tue, Jun 06, 2023 at 10:25:47AM +0200, Roger Pau Monné wrote:
> > > > > On Tue, May 30, 2023 at 04:31:13PM -0400, Demi Marie Obenour wrote:
> > > > > > - if (be->major | be->minor) {
> > > > > > - if (be->major != major || be->minor != minor)
> > > > > > - pr_warn("changing physical device (from %x:%x to %x:%x) not supported.\n",
> > > > > > - be->major, be->minor, major, minor);
> > > > > > + diskseq_str = xenbus_read(XBT_NIL, dev->nodename, "diskseq", &diskseq_len);
> > > > > > + if (IS_ERR(diskseq_str)) {
> > > > > > + int err = PTR_ERR(diskseq_str);
> > > > > > + diskseq_str = NULL;
> > > > > > +
> > > > > > + /*
> > > > > > + * If this does not exist, it means legacy userspace that does not
> > > > > > + * support diskseq.
> > > > > > + */
> > > > > > + if (unlikely(!XENBUS_EXIST_ERR(err))) {
> > > > > > + xenbus_dev_fatal(dev, err, "reading diskseq");
> > > > > > + return;
> > > > > > + }
> > > > > > + diskseq = 0;
> > > > > > + } else if (diskseq_len <= 0) {
> > > > > > + xenbus_dev_fatal(dev, -EFAULT, "diskseq must not be empty");
> > > > > > + goto fail;
> > > > > > + } else if (diskseq_len > 16) {
> > > > > > + xenbus_dev_fatal(dev, -ERANGE, "diskseq too long: got %d but limit is 16",
> > > > > > + diskseq_len);
> > > > > > + goto fail;
> > > > > > + } else if (diskseq_str[0] == '0') {
> > > > > > + xenbus_dev_fatal(dev, -ERANGE, "diskseq must not start with '0'");
> > > > > > + goto fail;
> > > > > > + } else {
> > > > > > + char *diskseq_end;
> > > > > > + diskseq = simple_strtoull(diskseq_str, &diskseq_end, 16);
> > > > > > + if (diskseq_end != diskseq_str + diskseq_len) {
> > > > > > + xenbus_dev_fatal(dev, -EINVAL, "invalid diskseq");
> > > > > > + goto fail;
> > > > > > + }
> > > > > > + kfree(diskseq_str);
> > > > > > + diskseq_str = NULL;
> > > > > > + }
> > > > >
> > > > > Won't it be simpler to use xenbus_scanf() with %llx formatter?
> > > >
> > > > xenbus_scanf() doesn’t check for overflow and accepts lots of junk it
> > > > really should not. Should this be fixed in xenbus_scanf()?
> > >
> > > That would be my preference, so that you can use it here instead of
> > > kind of open-coding it.
> >
> > This winds up being a much more invasive patch as it requires changing
> > sscanf(). It also has a risk (probably mostly theoretical) of breaking
> > buggy userspace that passes garbage values here.
>
> Well, if the current function is not suitable for your purposes it
> would be better to fix it rather than open-code what you need. Mostly
> because further usages would then also need to open-code whatever
> required.

That is fair.

> > > > > Also, you tie this logic to the "physical-device" watch, which
> > > > > strictly implies that the "diskseq" node must be written to xenstore
> > > > > before the "physical-device" node. This seems fragile, but I don't
> > > > > see much better optiono since the "diskseq" is optional.
> > > >
> > > > What about including the diskseq in the "physical-device" node? Perhaps
> > > > use diskseq@major:minor syntax?
> > >
> > > Hm, how would you know whether the blkback instance in the kernel
> > > supports the diskseq syntax in physical-device?
> >
> > That’s what the next patch is for ????.
>
> Hm, I think we should separate diskseq support from the notify open
> stuff: it's possible a different (non-Linux) backend wants to
> implement open notify support but doesn't have diskseq.

I like this idea! What about having blkback set diskseq to zero?
Userspace could then replace it with the actual value.

> > > Can you fetch a disk using a diskseq identifier?
> >
> > Not yet, although I have considered adding this ability. It would be
> > one step towards a “diskseqfs” that userspace could use to open a device
> > by diskseq.
> >
> > > Why I understand that this is an extra safety check in order to assert
> > > blkback is opening the intended device, is this attempting to fix some
> > > existing issue?
> >
> > Yes, it is. I have a block script (written in C) that validates the
> > device it has opened before passing the information to blkback. It uses
> > the diskseq to do this, but for that protection to be complete, blkback
> > must also be aware of it.
>
> But if your block script opens the device, and keeps it open until
> blkback has also taken a reference to it, there's no way such device
> could be removed and recreated in the window you point out above, as
> there's always a reference on it taken?

This assumes that the block script is not killed in the meantime,
which is not a safe assumption due to timeouts and the OOM killer.

> > > I'm not sure I see how the major:minor numbers would point to a
> > > different device than the one specified by the toolstack unless the
> > > admin explicitly messes with the devices before blkback has got time
> > > to open them. But then the admin can already do pretty much
> > > everything it wants with the system.
> >
> > Admins typically refer to e.g. device-mapper devices by name, not by
> > major:minor number. If a device is destroyed and recreated right as the
> > block script is running, this race condition can occur.
>
> Right, but what about this device recreation happening after the admin
> has written the guest config file but before the call to (lib)xl
> happens? blkback would also end up using a different device than
> indented, and your proposed approach doesn't fix this. The only way to
> solve this would be to reference devices by UUID (iow: diskseq)
> directly in the guest config file.

That would be a good idea, but it is orthogonal to this patch. My
script opens the device and uses various means to check that it did
open the correct device. It then passes the diskseq to blkback.

> Then the block script will open the device by diskseq and pass the
> major:minor numbers to blkback.

Alternatively, the toolstack could write both the diskseq and
major:minor numbers and be confident that it is referring to the
correct device, no matter how long ago it got that information.
This could be quite useful for e.g. one VM exporting a device to
another VM by calling losetup(8) and expecting a human to make a
decision based on various properties about the device. In this
case there is no upper bound on the race window.
--
Sincerely,
Demi Marie Obenour (she/her/hers)
Invisible Things Lab


Attachments:
(No filename) (6.66 kB)
signature.asc (849.00 B)
Download all attachments

2023-06-09 17:21:45

by Demi Marie Obenour

[permalink] [raw]
Subject: Re: [PATCH v2 13/16] xen-blkback: Implement diskseq checks

On Fri, Jun 09, 2023 at 05:13:45PM +0200, Roger Pau Monné wrote:
> On Thu, Jun 08, 2023 at 11:33:26AM -0400, Demi Marie Obenour wrote:
> > On Thu, Jun 08, 2023 at 10:29:18AM +0200, Roger Pau Monné wrote:
> > > On Wed, Jun 07, 2023 at 12:14:46PM -0400, Demi Marie Obenour wrote:
> > > > On Wed, Jun 07, 2023 at 10:20:08AM +0200, Roger Pau Monné wrote:
> > > > > On Tue, Jun 06, 2023 at 01:01:20PM -0400, Demi Marie Obenour wrote:
> > > > > > On Tue, Jun 06, 2023 at 10:25:47AM +0200, Roger Pau Monné wrote:
> > > > > > > On Tue, May 30, 2023 at 04:31:13PM -0400, Demi Marie Obenour wrote:
> > > > > > > Also, you tie this logic to the "physical-device" watch, which
> > > > > > > strictly implies that the "diskseq" node must be written to xenstore
> > > > > > > before the "physical-device" node. This seems fragile, but I don't
> > > > > > > see much better optiono since the "diskseq" is optional.
> > > > > >
> > > > > > What about including the diskseq in the "physical-device" node? Perhaps
> > > > > > use diskseq@major:minor syntax?
> > > > >
> > > > > Hm, how would you know whether the blkback instance in the kernel
> > > > > supports the diskseq syntax in physical-device?
> > > >
> > > > That’s what the next patch is for ????.
> > >
> > > Hm, I think we should separate diskseq support from the notify open
> > > stuff: it's possible a different (non-Linux) backend wants to
> > > implement open notify support but doesn't have diskseq.
> >
> > I like this idea! What about having blkback set diskseq to zero?
> > Userspace could then replace it with the actual value.
>
> I think it would be better if we used a sysfs node, because blkfront
> has no business is knowing whether diskseq is supported by the
> backend or not.
>
> xenstore should be reserved to features exposed between blkfront and
> blkback if possible. I know we haven't been very good at this
> however.
>
> > > > > Can you fetch a disk using a diskseq identifier?
> > > >
> > > > Not yet, although I have considered adding this ability. It would be
> > > > one step towards a “diskseqfs” that userspace could use to open a device
> > > > by diskseq.
> > > >
> > > > > Why I understand that this is an extra safety check in order to assert
> > > > > blkback is opening the intended device, is this attempting to fix some
> > > > > existing issue?
> > > >
> > > > Yes, it is. I have a block script (written in C) that validates the
> > > > device it has opened before passing the information to blkback. It uses
> > > > the diskseq to do this, but for that protection to be complete, blkback
> > > > must also be aware of it.
> > >
> > > But if your block script opens the device, and keeps it open until
> > > blkback has also taken a reference to it, there's no way such device
> > > could be removed and recreated in the window you point out above, as
> > > there's always a reference on it taken?
> >
> > This assumes that the block script is not killed in the meantime,
> > which is not a safe assumption due to timeouts and the OOM killer.
>
> Doesn't seem very reliable to use with delete-on-close either then.

That’s actually the purpose of delete-on-close! It ensures that if the
block script gets killed, the device is automatically cleaned up.

> > > > > I'm not sure I see how the major:minor numbers would point to a
> > > > > different device than the one specified by the toolstack unless the
> > > > > admin explicitly messes with the devices before blkback has got time
> > > > > to open them. But then the admin can already do pretty much
> > > > > everything it wants with the system.
> > > >
> > > > Admins typically refer to e.g. device-mapper devices by name, not by
> > > > major:minor number. If a device is destroyed and recreated right as the
> > > > block script is running, this race condition can occur.
> > >
> > > Right, but what about this device recreation happening after the admin
> > > has written the guest config file but before the call to (lib)xl
> > > happens? blkback would also end up using a different device than
> > > indented, and your proposed approach doesn't fix this. The only way to
> > > solve this would be to reference devices by UUID (iow: diskseq)
> > > directly in the guest config file.
> >
> > That would be a good idea, but it is orthogonal to this patch. My
> > script opens the device and uses various means to check that it did
> > open the correct device. It then passes the diskseq to blkback.
>
> How you do this with losetup? I guess there's an atomic way to setup
> a loop device and get its diskseq?

It can’t be done with losetup. I use a C program that directly
issues ioctls to /dev/loop-control and /dev/loop*. Doing this with
device-mapper requires kernel patches that have been submitted but are
not yet upstream.

> > > Then the block script will open the device by diskseq and pass the
> > > major:minor numbers to blkback.
> >
> > Alternatively, the toolstack could write both the diskseq and
> > major:minor numbers and be confident that it is referring to the
> > correct device, no matter how long ago it got that information.
> > This could be quite useful for e.g. one VM exporting a device to
> > another VM by calling losetup(8) and expecting a human to make a
> > decision based on various properties about the device. In this
> > case there is no upper bound on the race window.
>
> Instead of playing with xenstore nodes, it might be better to simply
> have blkback export on sysfs the diskseq of the opened device, and let
> the block script check whether that's correct or not. That implies
> less code in the kernel side, and doesn't pollute xenstore.

This would require that blkback delay exposing the device to the
frontend until the block script has checked that the diskseq is correct.
Much simpler for the block script to provide the diskseq in xenstore.
If you want to avoid an extra xenstore node, I can make the diskseq part
of the physical-device node.
--
Sincerely,
Demi Marie Obenour (she/her/hers)
Invisible Things Lab


Attachments:
(No filename) (6.03 kB)
signature.asc (849.00 B)
Download all attachments

2023-06-21 01:33:07

by Demi Marie Obenour

[permalink] [raw]
Subject: Re: [PATCH v2 13/16] xen-blkback: Implement diskseq checks

On Mon, Jun 12, 2023 at 10:09:39AM +0200, Roger Pau Monné wrote:
> On Fri, Jun 09, 2023 at 12:55:39PM -0400, Demi Marie Obenour wrote:
> > On Fri, Jun 09, 2023 at 05:13:45PM +0200, Roger Pau Monné wrote:
> > > On Thu, Jun 08, 2023 at 11:33:26AM -0400, Demi Marie Obenour wrote:
> > > > On Thu, Jun 08, 2023 at 10:29:18AM +0200, Roger Pau Monné wrote:
> > > > > On Wed, Jun 07, 2023 at 12:14:46PM -0400, Demi Marie Obenour wrote:
> > > > > > On Wed, Jun 07, 2023 at 10:20:08AM +0200, Roger Pau Monné wrote:
> > > > > > > Can you fetch a disk using a diskseq identifier?
> > > > > >
> > > > > > Not yet, although I have considered adding this ability. It would be
> > > > > > one step towards a “diskseqfs” that userspace could use to open a device
> > > > > > by diskseq.
> > > > > >
> > > > > > > Why I understand that this is an extra safety check in order to assert
> > > > > > > blkback is opening the intended device, is this attempting to fix some
> > > > > > > existing issue?
> > > > > >
> > > > > > Yes, it is. I have a block script (written in C) that validates the
> > > > > > device it has opened before passing the information to blkback. It uses
> > > > > > the diskseq to do this, but for that protection to be complete, blkback
> > > > > > must also be aware of it.
> > > > >
> > > > > But if your block script opens the device, and keeps it open until
> > > > > blkback has also taken a reference to it, there's no way such device
> > > > > could be removed and recreated in the window you point out above, as
> > > > > there's always a reference on it taken?
> > > >
> > > > This assumes that the block script is not killed in the meantime,
> > > > which is not a safe assumption due to timeouts and the OOM killer.
> > >
> > > Doesn't seem very reliable to use with delete-on-close either then.
> >
> > That’s actually the purpose of delete-on-close! It ensures that if the
> > block script gets killed, the device is automatically cleaned up.
>
> Block script attach getting killed shouldn't prevent the toolstack
> from performing domain destruction, and thus removing the stale block
> device.
>
> OTOH if your toolstack gets killed then there's not much that can be
> done, and the system will need intervention in order to get back into
> a sane state.
>
> Hitting OOM in your control domain however is unlikely to be handled
> gracefully, even with delete-on-close.

I agree, _but_ we should not make it any harder than necessary.

> > > > > Then the block script will open the device by diskseq and pass the
> > > > > major:minor numbers to blkback.
> > > >
> > > > Alternatively, the toolstack could write both the diskseq and
> > > > major:minor numbers and be confident that it is referring to the
> > > > correct device, no matter how long ago it got that information.
> > > > This could be quite useful for e.g. one VM exporting a device to
> > > > another VM by calling losetup(8) and expecting a human to make a
> > > > decision based on various properties about the device. In this
> > > > case there is no upper bound on the race window.
> > >
> > > Instead of playing with xenstore nodes, it might be better to simply
> > > have blkback export on sysfs the diskseq of the opened device, and let
> > > the block script check whether that's correct or not. That implies
> > > less code in the kernel side, and doesn't pollute xenstore.
> >
> > This would require that blkback delay exposing the device to the
> > frontend until the block script has checked that the diskseq is correct.
>
> This depends on your toolstack implementation. libxl won't start the
> domain until block scripts have finished execution, and hence the
> block script waiting for the sysfs node to appear and check it against
> the expected value would be enough.

True, but we cannot assume that everyone is using libxl.

> > Much simpler for the block script to provide the diskseq in xenstore.
> > If you want to avoid an extra xenstore node, I can make the diskseq part
> > of the physical-device node.
>
> I'm thinking that we might want to introduce a "physical-device-uuid"
> node and use that to provide the diskseq to the backened. Toolstacks
> (or block scripts) would need to be sure the "physical-device-uuid"
> node is populated before setting "physical-device", as writes to
> that node would still trigger blkback watch. I think using two
> distinct watches would just make the logic in blkback too
> complicated.
>
> My preference would be for the kernel to have a function for opening a
> device identified by a diskseq (as fetched from
> "physical-device-uuid"), so that we don't have to open using
> major:minor and then check the diskseq.

In theory I agree, but in practice it would be a significantly more
complex patch and given that it does not impact the uAPI I would prefer
the less-invasive option. Is there anything more that needs to be done
here, other than replacing the "diskseq" name? I prefer
"physical-device-luid" because the ID is only valid in one particular
VM.
--
Sincerely,
Demi Marie Obenour (she/her/hers)
Invisible Things Lab


Attachments:
(No filename) (5.09 kB)
signature.asc (849.00 B)
Download all attachments