Received: by 2002:a25:8b12:0:0:0:0:0 with SMTP id i18csp2874172ybl; Thu, 29 Aug 2019 14:18:07 -0700 (PDT) X-Google-Smtp-Source: APXvYqz8c3X53X01JS4jOFc7uIhF5clfAsFr39eVYsBzhJf6WRRoF9n37DZ8BOAKEB5W6ujbY7mk X-Received: by 2002:a17:90a:22f0:: with SMTP id s103mr12653750pjc.56.1567113487810; Thu, 29 Aug 2019 14:18:07 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1567113487; cv=none; d=google.com; s=arc-20160816; b=sOLh7/gRKSD44LkB3wQvd4W1p7fBPVt2M5nsZBUVGC0c1mRnNQh7L2hV86epZKqHRp 0uzboO8E44cqO8Ghlf+SQ/pzDv6aKjOR4gt1ta+q253lgABpllcB8GznlN5RaLIxarh5 TQsUZFlBDgjjCGPrTQ5YikjSE3kmTh5yd2R37QdaXHLVKib7rsCDX2oiDq1SUidw8tkn 0wjhLgE8Y1EkNIrfm7EUvXM2drwyo2fgsb2tPb5qjagRHrIdrc7YWEwmgz7+HX2mhD6w dCoJTbDfLBaF1uoHmEwIhsfsF6Ktzd9IsF3MHipGbn6xE1yefA67LbRmn4FjCRxKLl6u D5OQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=jR8OjQTHy9bZx3pgyKN7gfc7Hso8wWlZd/TmwE2Rfhw=; b=m/msvnSri3NfsQBryEB2umSFgV8/qkJO+bNc1q+dw0GsTSiiQ0S8kSo2FCak2oE43a Ch+J2fJU4lZ8QnBzM0HOA/mLc4rwNmVyZ7xAl71lFzK+YwMP+FxXYQcBjHiAitMQaIeI WRMIzBVE8k7UFsdh6BsEEhQVEPTqxd3sva4xyidLH7+F8JxmP9oAQmoYZeE2QmfV4sXW FB1TDQW+Sw4K2A3d7Rhnu8KVB09/RzWKFY9ah7wGvyPloSpUsjKZMYhQpJInyGBXBKEq BgCx+ofCX5dZrY3ypLZJ5Rt0ybqEyorqKt3p485j4DhfWG4e9eYcNTNV+yQ2qe8pOGaZ sJWw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="pf4R/qE5"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id u14si3205834pjn.61.2019.08.29.14.17.52; Thu, 29 Aug 2019 14:18:07 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="pf4R/qE5"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727959AbfH2VQn (ORCPT + 99 others); Thu, 29 Aug 2019 17:16:43 -0400 Received: from mail.kernel.org ([198.145.29.99]:55106 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726526AbfH2VQm (ORCPT ); Thu, 29 Aug 2019 17:16:42 -0400 Received: from localhost (c-73-47-72-35.hsd1.nh.comcast.net [73.47.72.35]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 3CECB208C2; Thu, 29 Aug 2019 21:16:41 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1567113401; bh=S8jZl5qXwtASsh5sqmmpoIddnxCBuXvV58tUABgzZKo=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=pf4R/qE5U0ptoMvA6pBMA2mE1A59uGzHclP0IcO1McDCsMmRqgD/adkoEj+nu59xk dR/inm3HdrOS6Hml8x/aWb6cykxATePFa/h5RbsRBepApDwGyxBIOKpa6ihPstjoLd QEcnRqw1Vl2tvAuVCKYZI6mtQlXlE9yeSISENWnw= Date: Thu, 29 Aug 2019 17:16:40 -0400 From: Sasha Levin To: Ilya Dryomov Cc: LKML , stable@vger.kernel.org, Luis Henriques , Jeff Layton , Ceph Development Subject: Re: [PATCH AUTOSEL 5.2 66/76] ceph: fix buffer free while holding i_ceph_lock in __ceph_setxattr() Message-ID: <20190829211640.GN5281@sasha-vm> References: <20190829181311.7562-1-sashal@kernel.org> <20190829181311.7562-66-sashal@kernel.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii; format=flowed Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Aug 29, 2019 at 10:51:04PM +0200, Ilya Dryomov wrote: >On Thu, Aug 29, 2019 at 8:15 PM Sasha Levin wrote: >> >> From: Luis Henriques >> >> [ Upstream commit 86968ef21596515958d5f0a40233d02be78ecec0 ] >> >> Calling ceph_buffer_put() in __ceph_setxattr() may end up freeing the >> i_xattrs.prealloc_blob buffer while holding the i_ceph_lock. This can be >> fixed by postponing the call until later, when the lock is released. >> >> The following backtrace was triggered by fstests generic/117. >> >> BUG: sleeping function called from invalid context at mm/vmalloc.c:2283 >> in_atomic(): 1, irqs_disabled(): 0, pid: 650, name: fsstress >> 3 locks held by fsstress/650: >> #0: 00000000870a0fe8 (sb_writers#8){.+.+}, at: mnt_want_write+0x20/0x50 >> #1: 00000000ba0c4c74 (&type->i_mutex_dir_key#6){++++}, at: vfs_setxattr+0x55/0xa0 >> #2: 000000008dfbb3f2 (&(&ci->i_ceph_lock)->rlock){+.+.}, at: __ceph_setxattr+0x297/0x810 >> CPU: 1 PID: 650 Comm: fsstress Not tainted 5.2.0+ #437 >> Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.12.1-0-ga5cab58-prebuilt.qemu.org 04/01/2014 >> Call Trace: >> dump_stack+0x67/0x90 >> ___might_sleep.cold+0x9f/0xb1 >> vfree+0x4b/0x60 >> ceph_buffer_release+0x1b/0x60 >> __ceph_setxattr+0x2b4/0x810 >> __vfs_setxattr+0x66/0x80 >> __vfs_setxattr_noperm+0x59/0xf0 >> vfs_setxattr+0x81/0xa0 >> setxattr+0x115/0x230 >> ? filename_lookup+0xc9/0x140 >> ? rcu_read_lock_sched_held+0x74/0x80 >> ? rcu_sync_lockdep_assert+0x2e/0x60 >> ? __sb_start_write+0x142/0x1a0 >> ? mnt_want_write+0x20/0x50 >> path_setxattr+0xba/0xd0 >> __x64_sys_lsetxattr+0x24/0x30 >> do_syscall_64+0x50/0x1c0 >> entry_SYSCALL_64_after_hwframe+0x49/0xbe >> RIP: 0033:0x7ff23514359a >> >> Signed-off-by: Luis Henriques >> Reviewed-by: Jeff Layton >> Signed-off-by: Ilya Dryomov >> Signed-off-by: Sasha Levin >> --- >> fs/ceph/xattr.c | 8 ++++++-- >> 1 file changed, 6 insertions(+), 2 deletions(-) >> >> diff --git a/fs/ceph/xattr.c b/fs/ceph/xattr.c >> index 0619adbcbe14c..8382299fc2d84 100644 >> --- a/fs/ceph/xattr.c >> +++ b/fs/ceph/xattr.c >> @@ -1028,6 +1028,7 @@ int __ceph_setxattr(struct inode *inode, const char *name, >> struct ceph_inode_info *ci = ceph_inode(inode); >> struct ceph_mds_client *mdsc = ceph_sb_to_client(inode->i_sb)->mdsc; >> struct ceph_cap_flush *prealloc_cf = NULL; >> + struct ceph_buffer *old_blob = NULL; >> int issued; >> int err; >> int dirty = 0; >> @@ -1101,13 +1102,15 @@ int __ceph_setxattr(struct inode *inode, const char *name, >> struct ceph_buffer *blob; >> >> spin_unlock(&ci->i_ceph_lock); >> - dout(" preaallocating new blob size=%d\n", required_blob_size); >> + ceph_buffer_put(old_blob); /* Shouldn't be required */ >> + dout(" pre-allocating new blob size=%d\n", required_blob_size); >> blob = ceph_buffer_new(required_blob_size, GFP_NOFS); >> if (!blob) >> goto do_sync_unlocked; >> spin_lock(&ci->i_ceph_lock); >> + /* prealloc_blob can't be released while holding i_ceph_lock */ >> if (ci->i_xattrs.prealloc_blob) >> - ceph_buffer_put(ci->i_xattrs.prealloc_blob); >> + old_blob = ci->i_xattrs.prealloc_blob; >> ci->i_xattrs.prealloc_blob = blob; >> goto retry; >> } >> @@ -1123,6 +1126,7 @@ int __ceph_setxattr(struct inode *inode, const char *name, >> } >> >> spin_unlock(&ci->i_ceph_lock); >> + ceph_buffer_put(old_blob); >> if (lock_snap_rwsem) >> up_read(&mdsc->snap_rwsem); >> if (dirty) > >Hi Sasha, > >I didn't tag i_ceph_lock series for stable because this is a very old >bug which no one ever hit in real life, at least to my knowledge. I can drop it if you prefer. -- Thanks, Sasha