Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp538927ybt; Fri, 19 Jun 2020 07:46:57 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyrJMnj6U9ygN9pZYd8jexZbBPTTBINMUvPzlwqJurjkpftBFQAAaizoVZfhbuF/iDanTeO X-Received: by 2002:a17:906:7247:: with SMTP id n7mr3988572ejk.105.1592578017350; Fri, 19 Jun 2020 07:46:57 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1592578017; cv=none; d=google.com; s=arc-20160816; b=zCWNds7N0jyOt+MRCS4GIysA/pYOevAuwaQ50BS3g1K4dmhwzU77U/YNcKSL95OOCY H1N63NUzGPeflo6pl7tPEg/uRMo+tVDi78QItI/TXsvfNDWgUsCmuygrTxcnUZKrq3yc eJiKIp6iDUNopvU4BFjHD7lRY2Jv/+QxtOOqTr000eQ88HYIwuHVjyMGS+Ol23w155HB oGALZngepp7Zp1OLudEWskpsGrHtCpROVb/XIj8x7Pfu+rf21n6HyLwCFGQP/TwmTpMe 0EkKTVV0Y/XKweGggDl4N/xs8JR9lPfxvc7XGqv2jfYu8hyAk4FVLgq16UqaHuafqHDc BA5A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=xPhtvPvJ5HjQD4MX26afIm4EJH3rWTcGG2O9u6iRjns=; b=nvATyeasSzbv7WKgYQIdSftVud0dQrG6KPfZCovxOIrgXvUUDsn/Z8Jc3NotBuOqWo CQtnE/CSYRh5o0LTjnb2TKctkirQIRY1Mgpb5OHru/a+dMuX7ZO8pZRgZ3bt78dDo2ZG dYmn5dldvRv0sH0e7EZgEA6YihKXFTK9FokrbZ5EMKX/NG5CkW+1si/mDVQPPFpgGLCH oRXZYy29OlzxQnwn2JD1Q+uXoAWE7+q889hrxE8zNgn6sXxCTWRli8lthiENriFTRX4e /9S+SFSYoNXI54sbodT4OHK1gPTzRqldRlUpUKtrhkSS9wYmh3PVmv5FurZI+4xJaELe kzNA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=2Odk4GUm; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id s6si4079618edy.143.2020.06.19.07.46.35; Fri, 19 Jun 2020 07:46:57 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=2Odk4GUm; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2388504AbgFSOno (ORCPT + 99 others); Fri, 19 Jun 2020 10:43:44 -0400 Received: from mail.kernel.org ([198.145.29.99]:34826 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2388492AbgFSOnk (ORCPT ); Fri, 19 Jun 2020 10:43:40 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 9842220CC7; Fri, 19 Jun 2020 14:43:39 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1592577820; bh=HR4gwka30yFDMqj/us9MNam3p8IddmIDqG+OvkbeWrI=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=2Odk4GUmv7x6uy1L5J3wNl2GoygInETJtfUoibHBKqWQlb7CfmUJEQlVATG+LYhVH 1wsEj8zk+5M8n2BbnjF2FBWCFm7e3rG0whjg3YJiH4w1fR3ueTG48nlRI0FstJJMWE z+wANBvzdhGgk/I99EfnB86YI0sCubF++8sycCcU= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Eric Biggers , Theodore Tso Subject: [PATCH 4.9 103/128] ext4: fix race between ext4_sync_parent() and rename() Date: Fri, 19 Jun 2020 16:33:17 +0200 Message-Id: <20200619141625.565865733@linuxfoundation.org> X-Mailer: git-send-email 2.27.0 In-Reply-To: <20200619141620.148019466@linuxfoundation.org> References: <20200619141620.148019466@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Eric Biggers commit 08adf452e628b0e2ce9a01048cfbec52353703d7 upstream. 'igrab(d_inode(dentry->d_parent))' without holding dentry->d_lock is broken because without d_lock, d_parent can be concurrently changed due to a rename(). Then if the old directory is immediately deleted, old d_parent->inode can be NULL. That causes a NULL dereference in igrab(). To fix this, use dget_parent() to safely grab a reference to the parent dentry, which pins the inode. This also eliminates the need to use d_find_any_alias() other than for the initial inode, as we no longer throw away the dentry at each step. This is an extremely hard race to hit, but it is possible. Adding a udelay() in between the reads of ->d_parent and its ->d_inode makes it reproducible on a no-journal filesystem using the following program: #include #include int main() { if (fork()) { for (;;) { mkdir("dir1", 0700); int fd = open("dir1/file", O_RDWR|O_CREAT|O_SYNC); write(fd, "X", 1); close(fd); } } else { mkdir("dir2", 0700); for (;;) { rename("dir1/file", "dir2/file"); rmdir("dir1"); } } } Fixes: d59729f4e794 ("ext4: fix races in ext4_sync_parent()") Cc: stable@vger.kernel.org Signed-off-by: Eric Biggers Link: https://lore.kernel.org/r/20200506183140.541194-1-ebiggers@kernel.org Signed-off-by: Theodore Ts'o Signed-off-by: Greg Kroah-Hartman --- fs/ext4/fsync.c | 28 +++++++++++++--------------- 1 file changed, 13 insertions(+), 15 deletions(-) --- a/fs/ext4/fsync.c +++ b/fs/ext4/fsync.c @@ -43,30 +43,28 @@ */ static int ext4_sync_parent(struct inode *inode) { - struct dentry *dentry = NULL; - struct inode *next; + struct dentry *dentry, *next; int ret = 0; if (!ext4_test_inode_state(inode, EXT4_STATE_NEWENTRY)) return 0; - inode = igrab(inode); + dentry = d_find_any_alias(inode); + if (!dentry) + return 0; while (ext4_test_inode_state(inode, EXT4_STATE_NEWENTRY)) { ext4_clear_inode_state(inode, EXT4_STATE_NEWENTRY); - dentry = d_find_any_alias(inode); - if (!dentry) - break; - next = igrab(d_inode(dentry->d_parent)); + + next = dget_parent(dentry); dput(dentry); - if (!next) - break; - iput(inode); - inode = next; + dentry = next; + inode = dentry->d_inode; + /* * The directory inode may have gone through rmdir by now. But * the inode itself and its blocks are still allocated (we hold - * a reference to the inode so it didn't go through - * ext4_evict_inode()) and so we are safe to flush metadata - * blocks and the inode. + * a reference to the inode via its dentry), so it didn't go + * through ext4_evict_inode()) and so we are safe to flush + * metadata blocks and the inode. */ ret = sync_mapping_buffers(inode->i_mapping); if (ret) @@ -75,7 +73,7 @@ static int ext4_sync_parent(struct inode if (ret) break; } - iput(inode); + dput(dentry); return ret; }