Received: by 2002:a25:868d:0:0:0:0:0 with SMTP id z13csp2926452ybk; Mon, 18 May 2020 11:16:57 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyimcvm0t5qv2ijTZvADVAWjgFlvMWLqpY6A2VYv7xji6PDYEPijK4RvcE8Feow1+cueSTx X-Received: by 2002:aa7:c942:: with SMTP id h2mr15003277edt.23.1589825817495; Mon, 18 May 2020 11:16:57 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1589825817; cv=none; d=google.com; s=arc-20160816; b=U9PaYJdSwU636N4Brx9k+bnX6ZuQuxfFJE83ph/uhlfYwjeOVdmBxwpXEfq0BrF5pU RwlftOfv4YpkIsT7bbiomPvFku2IALHh4PiO6a2l0DrZ0zRtaZoyUI8KBG1vYpqRoXkJ XjUQWKqFlMfntVrr7bEzEqXkMuyD//o7Zv63+rlsn/kkMNhieIYI8qQE0+zFBUvW8ZzK Xs1mCQnKLZmfk0jAkdExBS/K7baBli6Xr19qn1PD6CfToua8npvEb8fE8yKZJ86Ndnuq QkQ1vJNUVBcj/JE3+NtwlanlYru0SHdyfKMKusJ3T2P+rhPmxUZJrXOmfkqufVdNOdOR KW4g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=ULeNzgfyPgTE0MydV0m6dYzu4qBJviJvg+P+7XuIRNQ=; b=p4GxGWDatSDRKQCfU/2m2ZIsl4LAcPbDmM7CD/vRzVl4kqiZ/d5z5t5flkniZk783G 1qzYlPesNeAgP0r9OXEBsmxQYy+aUUwHPJiRE+tVeBbWwn4V4O5HEhwlTT4yJvqMh4A0 r0khF3QjV5TWfZRJTHbmdo02d7raDR79yClA1CGE1IerZ4DSL6YjaphewAlXsp7/gfSW jthbJHmNgFn4xPCJaC4mwCjIeVaFq6E+tujy504Z+DtBw68Al1OSxWvE8klFkTqxVKyn Zb07Po0R4+d1Dw1icvTxU5IDeiU3+AOr1UVj/eoAhWOXCRycjB3urGvuW53oONKMkpGT 0lOg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=wUE7amen; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id bz10si6108876ejc.507.2020.05.18.11.16.32; Mon, 18 May 2020 11:16:57 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=wUE7amen; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732416AbgERSBg (ORCPT + 99 others); Mon, 18 May 2020 14:01:36 -0400 Received: from mail.kernel.org ([198.145.29.99]:43690 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1732398AbgERSBY (ORCPT ); Mon, 18 May 2020 14:01:24 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 92B3F207F5; Mon, 18 May 2020 18:01:23 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1589824884; bh=q8ZMBAb4Llu4GVHaTpArXUnY6o2YL79FpWPTzHjpttM=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=wUE7amenrw8atbj8Yjq7SQ833+EI4MkcBvAMFbSKIL+eVVIx6RamcFRT9CTUAuXDW 4xYepLBRssVPs0Fv1D7pMV5amrOIxmSiso/0l7cfjTlx6HhPM5evqskcDKuA3NYayx tGl01/Hr0Pl9rOUccP/ecQYWpJGj45hZ+zFp35KE= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, syzbot+c8a8197c8852f566b9d9@syzkaller.appspotmail.com, syzbot+40b71e145e73f78f81ad@syzkaller.appspotmail.com, Hugh Dickins , Andrew Morton , Yang Shi , Linus Torvalds , Sasha Levin Subject: [PATCH 5.6 008/194] shmem: fix possible deadlocks on shmlock_user_lock Date: Mon, 18 May 2020 19:34:58 +0200 Message-Id: <20200518173532.317490114@linuxfoundation.org> X-Mailer: git-send-email 2.26.2 In-Reply-To: <20200518173531.455604187@linuxfoundation.org> References: <20200518173531.455604187@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Hugh Dickins [ Upstream commit ea0dfeb4209b4eab954d6e00ed136bc6b48b380d ] Recent commit 71725ed10c40 ("mm: huge tmpfs: try to split_huge_page() when punching hole") has allowed syzkaller to probe deeper, uncovering a long-standing lockdep issue between the irq-unsafe shmlock_user_lock, the irq-safe xa_lock on mapping->i_pages, and shmem inode's info->lock which nests inside xa_lock (or tree_lock) since 4.8's shmem_uncharge(). user_shm_lock(), servicing SysV shmctl(SHM_LOCK), wants shmlock_user_lock while its caller shmem_lock() holds info->lock with interrupts disabled; but hugetlbfs_file_setup() calls user_shm_lock() with interrupts enabled, and might be interrupted by a writeback endio wanting xa_lock on i_pages. This may not risk an actual deadlock, since shmem inodes do not take part in writeback accounting, but there are several easy ways to avoid it. Requiring interrupts disabled for shmlock_user_lock would be easy, but it's a high-level global lock for which that seems inappropriate. Instead, recall that the use of info->lock to guard info->flags in shmem_lock() dates from pre-3.1 days, when races with SHMEM_PAGEIN and SHMEM_TRUNCATE could occur: nowadays it serves no purpose, the only flag added or removed is VM_LOCKED itself, and calls to shmem_lock() an inode are already serialized by the caller. Take info->lock out of the chain and the possibility of deadlock or lockdep warning goes away. Fixes: 4595ef88d136 ("shmem: make shmem_inode_info::lock irq-safe") Reported-by: syzbot+c8a8197c8852f566b9d9@syzkaller.appspotmail.com Reported-by: syzbot+40b71e145e73f78f81ad@syzkaller.appspotmail.com Signed-off-by: Hugh Dickins Signed-off-by: Andrew Morton Acked-by: Yang Shi Cc: Yang Shi Link: http://lkml.kernel.org/r/alpine.LSU.2.11.2004161707410.16322@eggly.anvils Link: https://lore.kernel.org/lkml/000000000000e5838c05a3152f53@google.com/ Link: https://lore.kernel.org/lkml/0000000000003712b305a331d3b1@google.com/ Signed-off-by: Linus Torvalds Signed-off-by: Sasha Levin --- mm/shmem.c | 7 +++++-- 1 file changed, 5 insertions(+), 2 deletions(-) diff --git a/mm/shmem.c b/mm/shmem.c index 7406f91f8a528..153d889e32d1d 100644 --- a/mm/shmem.c +++ b/mm/shmem.c @@ -2184,7 +2184,11 @@ int shmem_lock(struct file *file, int lock, struct user_struct *user) struct shmem_inode_info *info = SHMEM_I(inode); int retval = -ENOMEM; - spin_lock_irq(&info->lock); + /* + * What serializes the accesses to info->flags? + * ipc_lock_object() when called from shmctl_do_lock(), + * no serialization needed when called from shm_destroy(). + */ if (lock && !(info->flags & VM_LOCKED)) { if (!user_shm_lock(inode->i_size, user)) goto out_nomem; @@ -2199,7 +2203,6 @@ int shmem_lock(struct file *file, int lock, struct user_struct *user) retval = 0; out_nomem: - spin_unlock_irq(&info->lock); return retval; } -- 2.20.1