Module Name:    src
Committed By:   riastradh
Date:           Thu Aug 11 12:52:24 UTC 2022

Modified Files:
        src/sys/miscfs/specfs: spec_vnops.c

Log Message:
specfs: Sprinkle opencnt/opened/closing assertions.

There seems to be a bug here but I'm not sure what it is yet:

https://mail-index.netbsd.org/current-users/2022/08/09/msg042800.html
https://syzkaller.appspot.com/bug?id=47c67ab6d3a87514d0707882a9ad6671beaa8642

The decision to actually invoke d_close is serialized under
device_lock, so it should not be possible for more than one process
to close at the same time, but syzbot and kre found a way for
sd_closing to be false later in spec_close.  Let's make sure it's
false when we're making what should be the exclusive decision to
close.

We can't assert !sd_opened before cancel and spec_io_drain, because
those are necessary to interrupt and wait for pending opens that
might later set sd_opened, but we can assert !sd_opened afterward
because once sd_closing is true nothing should set sd_opened.


To generate a diff of this commit:
cvs rdiff -u -r1.210 -r1.211 src/sys/miscfs/specfs/spec_vnops.c

Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.

Modified files:

Index: src/sys/miscfs/specfs/spec_vnops.c
diff -u src/sys/miscfs/specfs/spec_vnops.c:1.210 src/sys/miscfs/specfs/spec_vnops.c:1.211
--- src/sys/miscfs/specfs/spec_vnops.c:1.210	Mon Mar 28 12:39:10 2022
+++ src/sys/miscfs/specfs/spec_vnops.c	Thu Aug 11 12:52:24 2022
@@ -1,4 +1,4 @@
-/*	$NetBSD: spec_vnops.c,v 1.210 2022/03/28 12:39:10 riastradh Exp $	*/
+/*	$NetBSD: spec_vnops.c,v 1.211 2022/08/11 12:52:24 riastradh Exp $	*/
 
 /*-
  * Copyright (c) 2008 The NetBSD Foundation, Inc.
@@ -58,7 +58,7 @@
  */
 
 #include <sys/cdefs.h>
-__KERNEL_RCSID(0, "$NetBSD: spec_vnops.c,v 1.210 2022/03/28 12:39:10 riastradh Exp $");
+__KERNEL_RCSID(0, "$NetBSD: spec_vnops.c,v 1.211 2022/08/11 12:52:24 riastradh Exp $");
 
 #include <sys/param.h>
 #include <sys/proc.h>
@@ -603,7 +603,9 @@ spec_node_revoke(vnode_t *vp)
 	KASSERT(sn->sn_gone == false);
 
 	mutex_enter(&device_lock);
-	KASSERT(sn->sn_opencnt <= sd->sd_opencnt);
+	KASSERTMSG(sn->sn_opencnt <= sd->sd_opencnt,
+	    "sn_opencnt=%u > sd_opencnt=%u",
+	    sn->sn_opencnt, sd->sd_opencnt);
 	sn->sn_gone = true;
 	if (sn->sn_opencnt != 0) {
 		sd->sd_opencnt -= (sn->sn_opencnt - 1);
@@ -775,6 +777,9 @@ spec_open(void *v)
 			break;
 		sd->sd_opencnt++;
 		sn->sn_opencnt++;
+		KASSERTMSG(sn->sn_opencnt <= sd->sd_opencnt,
+		    "sn_opencnt=%u > sd_opencnt=%u",
+		    sn->sn_opencnt, sd->sd_opencnt);
 		break;
 	case VBLK:
 		/*
@@ -789,7 +794,8 @@ spec_open(void *v)
 			error = EBUSY;
 			break;
 		}
-		KASSERTMSG(sn->sn_opencnt == 0, "%u", sn->sn_opencnt);
+		KASSERTMSG(sn->sn_opencnt == 0, "sn_opencnt=%u",
+		    sn->sn_opencnt);
 		sn->sn_opencnt = 1;
 		sd->sd_opencnt = 1;
 		sd->sd_bdevvp = vp;
@@ -963,6 +969,9 @@ spec_open(void *v)
 	} else {
 		KASSERT(sd->sd_opencnt);
 		KASSERT(sn->sn_opencnt);
+		KASSERTMSG(sn->sn_opencnt <= sd->sd_opencnt,
+		    "sn_opencnt=%u > sd_opencnt=%u",
+		    sn->sn_opencnt, sd->sd_opencnt);
 		sd->sd_opencnt--;
 		sn->sn_opencnt--;
 		if (vp->v_type == VBLK)
@@ -1664,6 +1673,9 @@ spec_close(void *v)
 	mutex_enter(&device_lock);
 	KASSERT(sn->sn_opencnt);
 	KASSERT(sd->sd_opencnt);
+	KASSERTMSG(sn->sn_opencnt <= sd->sd_opencnt,
+	    "sn_opencnt=%u > sd_opencnt=%u",
+	    sn->sn_opencnt, sd->sd_opencnt);
 	sn->sn_opencnt--;
 	count = --sd->sd_opencnt;
 	if (vp->v_type == VBLK) {
@@ -1672,6 +1684,9 @@ spec_close(void *v)
 		sd->sd_bdevvp = NULL;
 	}
 	if (count == 0) {
+		KASSERTMSG(sn->sn_opencnt == 0, "sn_opencnt=%u",
+		    sn->sn_opencnt);
+		KASSERT(!sd->sd_closing);
 		sd->sd_opened = false;
 		sd->sd_closing = true;
 	}
@@ -1722,6 +1737,7 @@ spec_close(void *v)
 	 * reacquiring the lock would deadlock.
 	 */
 	mutex_enter(&device_lock);
+	KASSERT(!sd->sd_opened);
 	KASSERT(sd->sd_closing);
 	sd->sd_closing = false;
 	cv_broadcast(&specfs_iocv);

Reply via email to