Received: by 2002:a05:6a10:f3d0:0:0:0:0 with SMTP id a16csp1565613pxv; Fri, 2 Jul 2021 06:57:25 -0700 (PDT) X-Google-Smtp-Source: ABdhPJy5Kn4F7qhqBAgC+scs6JztO0i7K8XaTEd8QGEL2EnbCEobXfZ4+bus2880TdvHazf/+q8u X-Received: by 2002:a17:907:3fa7:: with SMTP id hr39mr5428151ejc.23.1625234245044; Fri, 02 Jul 2021 06:57:25 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1625234245; cv=none; d=google.com; s=arc-20160816; b=L6SH48ZYpn0ZZKIbkYn7ImYr5sMziDNX8STvAFm+Js+3tH3ViG0uzXD/dPiH0JCBDv M1wOMyL3+xaiEEaz59bxzMVoW1qJKGJ+OIstiFZo/wJX3kAxM4fu6MJ8sXjrO1qOOLOT JwJh8OR4Ki4a8xTr9cYwWeifQKLYU2nzrIq5w9bufqdLTsRlIBTTYTXG8vMS+Mi/anan ktaK2XXUBhmPyBBJm/oa4NsJUghd3AqOBJH1+xjmjZGQxENdngwmEv3lEtq/Mc2csRlE m9RyN1dP3IWPQ7QKClJX5AgGyORZz+69hEr1DnZLQj4oJnGX7hCD4/MPgQKV8aswA8Cs zV0g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject:dkim-signature; bh=y1GrXpdOcfyCNCbPpQ3waA8nmkYo8TWFbUh8sBdrK/4=; b=QOVrAlmwdiM6Bg5NKkAALGbNhUr/vPYz5VRLC0iFE0rh4RxD6DRoPjiWxxrivlCBKN +5K8TZkWhac8cmQzQUg07Nd7qJPNIo8cQfpNjt5d/1HudG3tOS/bTaaai+Z1AFQgJjlQ e1wKmfwt2WD5x6yF6bNhmyFtsNa8ajxkDSTnDpVvPSFagVKv6VG9/Qb4t4VNr+ZZhgq4 DvB9JQoyrcfU2JI7VJr/ziBeVwI0m6gmawVEq86pZpoWrqciSOgns70/m6DwPW/3rnUc 9kdjZF0MgCU3raX5l3CNOVPHVpVHHQOSwIPuhuith1LM9Vyu1YPLmPLQ36T8Nw4S4+oJ Rypw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b="sf/i4czn"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id u18si2820219edo.260.2021.07.02.06.56.59; Fri, 02 Jul 2021 06:57:25 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b="sf/i4czn"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232773AbhGBN5s (ORCPT + 99 others); Fri, 2 Jul 2021 09:57:48 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:34290 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232614AbhGBN5s (ORCPT ); Fri, 2 Jul 2021 09:57:48 -0400 Received: from mail-pf1-x42a.google.com (mail-pf1-x42a.google.com [IPv6:2607:f8b0:4864:20::42a]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 28241C061762; Fri, 2 Jul 2021 06:55:14 -0700 (PDT) Received: by mail-pf1-x42a.google.com with SMTP id g21so8973289pfc.11; Fri, 02 Jul 2021 06:55:14 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=subject:to:cc:references:from:message-id:date:user-agent :mime-version:in-reply-to:content-language:content-transfer-encoding; bh=y1GrXpdOcfyCNCbPpQ3waA8nmkYo8TWFbUh8sBdrK/4=; b=sf/i4cznLCXWBiLYReZOSVCHY19hOYot1Xv0AAjsNyHvnYyo2/lVEKcknapj4ZTD4n 8YA+RB1+kWccambkyl/U3j2zSBLZH+T/Lp5ifI5RS1+Mzkdg6+P5OtTW1KQyKpFKsrHR TJbpO5VgOBYu+HMXLtTwH+ZmZ3a5K4IT5WRdZzWwnfnNi9cb0jnqiPNZ9/SOL1cM1wL8 7FjaIN1xlUhvdDPHRk2763ulS62fnOBiettbzvrFkqcMWVGti2SUwVMgFYJ59Ow3pDip f2o1IqwuRxc0+10cYOM1qIdBeHlDWlITY+B2sMzJihkhfFHc2pqAM5qtfb71OKaJmA1/ l2HA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:cc:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=y1GrXpdOcfyCNCbPpQ3waA8nmkYo8TWFbUh8sBdrK/4=; b=XeySpXgY9elsfJmqgguvSmtMOLLB5mVwEdQh69au/Q4gCQohF5Lmwa7k+jxBhs7L+o HPrR2LM13iCU2bZ3RkvqxGjKb5wmKshyRc5GsAo3pKZUPsKcDp4/2gaaGSiFTMr3L1lt L6mzxTj9xh2YO3r1DSfcABnq/IUnz6NW4bfUnbZUKUtPpAAcwhPygF5W32cb+N5an19f omACro4UDNz15oEEDSm7WPjVcm9XwdhoCanVfqj+Fz0yc2Ok9TGpsxfJyVriWwoq3UWo Ur0K4Ky5FXockBgPiqJzudgtQ2x84VyiUh91V6B5jQoOyGFSXMhQAzpjhpRnvOKfkqPU 42mA== X-Gm-Message-State: AOAM533Q3FdXV2ekOjWfSORZB8VLIKUeWWI3tMWxhCmzrYdH8eeYkeiu 8PtrMA6ECFfWUny81z+hutU= X-Received: by 2002:a63:1d41:: with SMTP id d1mr133093pgm.199.1625234113630; Fri, 02 Jul 2021 06:55:13 -0700 (PDT) Received: from [192.168.1.237] ([118.200.190.93]) by smtp.gmail.com with ESMTPSA id x17sm3680658pfa.26.2021.07.02.06.55.10 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Fri, 02 Jul 2021 06:55:13 -0700 (PDT) Subject: Re: [PATCH 1/2] fcntl: fix potential deadlocks for &fown_struct.lock To: Jeff Layton , bfields@fieldses.org, viro@zeniv.linux.org.uk Cc: linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org, skhan@linuxfoundation.org, gregkh@linuxfoundation.org, linux-kernel-mentees@lists.linuxfoundation.org, syzbot+e6d5398a02c516ce5e70@syzkaller.appspotmail.com References: <20210702091831.615042-1-desmondcheongzx@gmail.com> <20210702091831.615042-2-desmondcheongzx@gmail.com> <43b5f2c7e7e5e5ed35c8e3de2eafeb960f267836.camel@kernel.org> From: Desmond Cheong Zhi Xi Message-ID: <9e2a46b9-5735-d73b-d35e-f88dc994f6b4@gmail.com> Date: Fri, 2 Jul 2021 21:55:09 +0800 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.11.0 MIME-Version: 1.0 In-Reply-To: <43b5f2c7e7e5e5ed35c8e3de2eafeb960f267836.camel@kernel.org> Content-Type: text/plain; charset=iso-8859-15; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2/7/21 7:44 pm, Jeff Layton wrote: > On Fri, 2021-07-02 at 17:18 +0800, Desmond Cheong Zhi Xi wrote: >> Syzbot reports a potential deadlock in do_fcntl: >> >> ======================================================== >> WARNING: possible irq lock inversion dependency detected >> 5.12.0-syzkaller #0 Not tainted >> -------------------------------------------------------- >> syz-executor132/8391 just changed the state of lock: >> ffff888015967bf8 (&f->f_owner.lock){.+..}-{2:2}, at: f_getown_ex fs/fcntl.c:211 [inline] >> ffff888015967bf8 (&f->f_owner.lock){.+..}-{2:2}, at: do_fcntl+0x8b4/0x1200 fs/fcntl.c:395 >> but this lock was taken by another, HARDIRQ-safe lock in the past: >> (&dev->event_lock){-...}-{2:2} >> >> and interrupts could create inverse lock ordering between them. >> >> other info that might help us debug this: >> Chain exists of: >> &dev->event_lock --> &new->fa_lock --> &f->f_owner.lock >> >> Possible interrupt unsafe locking scenario: >> >> CPU0 CPU1 >> ---- ---- >> lock(&f->f_owner.lock); >> local_irq_disable(); >> lock(&dev->event_lock); >> lock(&new->fa_lock); >> >> lock(&dev->event_lock); >> >> *** DEADLOCK *** >> >> This happens because there is a lock hierarchy of >> &dev->event_lock --> &new->fa_lock --> &f->f_owner.lock >> from the following call chain: >> >> input_inject_event(): >> spin_lock_irqsave(&dev->event_lock,...); >> input_handle_event(): >> input_pass_values(): >> input_to_handler(): >> evdev_events(): >> evdev_pass_values(): >> spin_lock(&client->buffer_lock); >> __pass_event(): >> kill_fasync(): >> kill_fasync_rcu(): >> read_lock(&fa->fa_lock); >> send_sigio(): >> read_lock_irqsave(&fown->lock,...); >> >> However, since &dev->event_lock is HARDIRQ-safe, interrupts have to be >> disabled while grabbing &f->f_owner.lock, otherwise we invert the lock >> hierarchy. >> >> Hence, we replace calls to read_lock/read_unlock on &f->f_owner.lock, >> with read_lock_irq/read_unlock_irq. >> > > Patches look reasonable overall, but why does this one use read_lock_irq > and the other one use read_lock_irqsave? Don't we need to *_irqsasve in > both patches? > > My thinking was that the functions f_getown_ex and f_getowner_uids are only called from do_fcntl, and f_getown is only called from do_fnctl and sock_ioctl. do_fnctl itself is only called from syscalls. For sock_ioctl, the chain is compat_sock_ioctl(): compat_sock_ioctl_trans(): sock_ioctl() For both paths, it doesn't seem that interrupts are disabled, so I used the *irq variants. But of course, I might be very mistaken on this, and I'd be happy to make the change to *_irqsave. Also, on further inspection, if these calls should be changed to *_irqsave, then I believe the call to write_lock_irq in f_modown (called from do_fcntl() --> f_setown() --> __f_setown() --> f_modown()) should also be changed to *_irqsave. There's also a call to write_lock_irq(&fa->fa_lock) in fasync_remove_entry and fasync_insert_entry. Whether these should be changed as well isn't as clear to me, but since it's safe to do, perhaps it makes sense to use *_irqsave for them too. Thoughts? >> Reported-and-tested-by: syzbot+e6d5398a02c516ce5e70@syzkaller.appspotmail.com >> Signed-off-by: Desmond Cheong Zhi Xi >> --- >> fs/fcntl.c | 13 +++++++------ >> 1 file changed, 7 insertions(+), 6 deletions(-) >> >> diff --git a/fs/fcntl.c b/fs/fcntl.c >> index dfc72f15be7f..cf9e81dfa615 100644 >> --- a/fs/fcntl.c >> +++ b/fs/fcntl.c >> @@ -150,7 +150,8 @@ void f_delown(struct file *filp) >> pid_t f_getown(struct file *filp) >> { >> pid_t pid = 0; >> - read_lock(&filp->f_owner.lock); >> + >> + read_lock_irq(&filp->f_owner.lock); >> rcu_read_lock(); >> if (pid_task(filp->f_owner.pid, filp->f_owner.pid_type)) { >> pid = pid_vnr(filp->f_owner.pid); >> @@ -158,7 +159,7 @@ pid_t f_getown(struct file *filp) >> pid = -pid; >> } >> rcu_read_unlock(); >> - read_unlock(&filp->f_owner.lock); >> + read_unlock_irq(&filp->f_owner.lock); >> return pid; >> } >> >> @@ -208,7 +209,7 @@ static int f_getown_ex(struct file *filp, unsigned long arg) >> struct f_owner_ex owner = {}; >> int ret = 0; >> >> - read_lock(&filp->f_owner.lock); >> + read_lock_irq(&filp->f_owner.lock); >> rcu_read_lock(); >> if (pid_task(filp->f_owner.pid, filp->f_owner.pid_type)) >> owner.pid = pid_vnr(filp->f_owner.pid); >> @@ -231,7 +232,7 @@ static int f_getown_ex(struct file *filp, unsigned long arg) >> ret = -EINVAL; >> break; >> } >> - read_unlock(&filp->f_owner.lock); >> + read_unlock_irq(&filp->f_owner.lock); >> >> if (!ret) { >> ret = copy_to_user(owner_p, &owner, sizeof(owner)); >> @@ -249,10 +250,10 @@ static int f_getowner_uids(struct file *filp, unsigned long arg) >> uid_t src[2]; >> int err; >> >> - read_lock(&filp->f_owner.lock); >> + read_lock_irq(&filp->f_owner.lock); >> src[0] = from_kuid(user_ns, filp->f_owner.uid); >> src[1] = from_kuid(user_ns, filp->f_owner.euid); >> - read_unlock(&filp->f_owner.lock); >> + read_unlock_irq(&filp->f_owner.lock); >> >> err = put_user(src[0], &dst[0]); >> err |= put_user(src[1], &dst[1]); >