Received: by 2002:a05:6a10:16a7:0:0:0:0 with SMTP id gp39csp247619pxb; Thu, 12 Nov 2020 02:48:55 -0800 (PST) X-Google-Smtp-Source: ABdhPJwKS/wAqPM3mBEohkHS3JVLC6t76yQa31zuc60Sf21ENK3FIKYkD6YUOG28uJUCyTd/oECv X-Received: by 2002:aa7:c74e:: with SMTP id c14mr4372290eds.321.1605178134769; Thu, 12 Nov 2020 02:48:54 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1605178134; cv=none; d=google.com; s=arc-20160816; b=lNrhJ9cZC8i6cd1b1CdzM/arYe/EZycYwW/HpCK9habaGzoDKOk9OZ3O5FX+Bo5Nsd tv71fSC6vraDhQusnQMFyXY7ohwwmlipADg3VvTokIFv/E/j7lgfnGNzUY2325oqC4XX GA35lqku9vw1JN+TkrdA7/oRedKc5jsW+xz94Mh6rrNzEDq+pD2jlo7oYRG2TIDjT1hK eIvN/CdL8cDQDxLjjGeINnGQr2CNrbXDxwRyjcIhn33TfIiY5kyndAev/HevvC9coXP6 1hnHajcAhNXwfE74Rg59WOq0XeE6kGCd7ZJVUZrEj9RTLq4vhecfxpThnCrQRis9ENpe rnqg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=2pRnsL4wq46XkZt4RtLB6EOKgi7bdMav5m1Id7CpcAY=; b=p5AvrEYqMh3oQq3NZpxoVKgPuuvhGHqZeDZprc3VjWT8uEO5ozqaXDHv1b49TDI9mN I13qpqJDWZhskiK9YvtY2+2tYRu+FF3kL+8bD/6CyRCmDhr1UsdlBmg5sT0WYvEbf0WB Q/GY7EUP3EuL1LtGtNC5ZSCqq0HxwFINhlbqpJpkYfVUTfhe7M3F7IMGR2668hmGc37X TfKKGg61qzURoHxsTXk7yELenONlUpdG5x0ebnbROvNzVk4DiHGahAeZZWZsJMtPg2jE oxnAey2fIWn6MtBdpLdHHajMEJRPsnwgWKEwikNZBJULFB7SXBAQs5XkNNomYi5btSU+ z2Zg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id x3si3255655ede.333.2020.11.12.02.48.32; Thu, 12 Nov 2020 02:48:54 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727962AbgKLKpD (ORCPT + 99 others); Thu, 12 Nov 2020 05:45:03 -0500 Received: from mx2.suse.de ([195.135.220.15]:49932 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727796AbgKLKpC (ORCPT ); Thu, 12 Nov 2020 05:45:02 -0500 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.221.27]) by mx2.suse.de (Postfix) with ESMTP id BEE5BABCC; Thu, 12 Nov 2020 10:45:00 +0000 (UTC) Received: from localhost (brahms [local]) by brahms (OpenSMTPD) with ESMTPA id 753283bd; Thu, 12 Nov 2020 10:45:13 +0000 (UTC) From: Luis Henriques To: Jeff Layton , Ilya Dryomov Cc: ceph-devel@vger.kernel.org, linux-kernel@vger.kernel.org, Luis Henriques Subject: [PATCH] ceph: fix race in concurrent __ceph_remove_cap invocations Date: Thu, 12 Nov 2020 10:45:12 +0000 Message-Id: <20201112104512.17472-1-lhenriques@suse.de> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org A NULL pointer dereference may occur in __ceph_remove_cap with some of the callbacks used in ceph_iterate_session_caps, namely trim_caps_cb and remove_session_caps_cb. These aren't protected against the concurrent execution of __ceph_remove_cap. Since the callers of this function hold the i_ceph_lock, the fix is simply a matter of returning immediately if caps->ci is NULL. Based on a patch from Jeff Layton. Cc: stable@vger.kernel.org URL: https://tracker.ceph.com/issues/43272 Link: https://www.spinics.net/lists/ceph-devel/msg47064.html Signed-off-by: Luis Henriques --- fs/ceph/caps.c | 11 +++++++++-- 1 file changed, 9 insertions(+), 2 deletions(-) diff --git a/fs/ceph/caps.c b/fs/ceph/caps.c index ded4229c314a..443f164760d5 100644 --- a/fs/ceph/caps.c +++ b/fs/ceph/caps.c @@ -1140,12 +1140,19 @@ void __ceph_remove_cap(struct ceph_cap *cap, bool queue_release) { struct ceph_mds_session *session = cap->session; struct ceph_inode_info *ci = cap->ci; - struct ceph_mds_client *mdsc = - ceph_sb_to_client(ci->vfs_inode.i_sb)->mdsc; + struct ceph_mds_client *mdsc; int removed = 0; + /* 'ci' being NULL means he remove have already occurred */ + if (!ci) { + dout("%s: cap inode is NULL\n", __func__); + return; + } + dout("__ceph_remove_cap %p from %p\n", cap, &ci->vfs_inode); + mdsc = ceph_inode_to_client(&ci->vfs_inode)->mdsc; + /* remove from inode's cap rbtree, and clear auth cap */ rb_erase(&cap->ci_node, &ci->i_caps); if (ci->i_auth_cap == cap) {