Received: by 2002:a05:6a10:f3d0:0:0:0:0 with SMTP id a16csp5434913pxv; Wed, 7 Jul 2021 03:48:07 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwZqVdFNDL4pVq43LXL5/o0Wu6hDCX4nhl1SK0Zzhf9C171jGwqQhcZyTdYumiMi1Vcz2sg X-Received: by 2002:a05:6402:88b:: with SMTP id e11mr29154981edy.21.1625654887720; Wed, 07 Jul 2021 03:48:07 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1625654887; cv=none; d=google.com; s=arc-20160816; b=aIJZ2PkxI5n7uQ2Z3YtTD952nyPQ6ruCJfphn5CfBhw2+bwddKHf1QSi7H07CSoK6/ QGb77RWwAq2JVfRvQpGDyfTo4vQEkBCdtX2ANScvdB4bJm7+UQlz13vWy17oAzDPlV5S Npkv2I8MdHynCWfZ5ZLx8jbIaeHsTN8f1p3pL3gW/i8b246u6dvOLmWbmL0gocEEx0rJ g+DF9RhqjC/7kRAynzj3HDBDlu+dCULw1bGjo5+ugj2MDYeTKThotRGwVXf68BCosTii WI3waUnVlIOlmWeqmjGggrXPy0GZhDlVCTYUC3T17pEYrhwcW+tcZRl+v5JlQR1GXyLl bthg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:date:cc:to:from:subject :message-id:dkim-signature; bh=Ejr988v1knEb2QDBJmFoNxREG8ck6Eu9IWMZFPfW7Nw=; b=tb7IG5Iez6EBGHjOgfAq9aG5DULH07tktbX4EAzA/zORatX+BmN/9l0CsX8F6WhvG/ GhL6IWXc4GuyA/iLDCClOnqWK3tKkFQoI+xCvqC4M+78BymfICdeUgeEa+q4nO8NeHzP 7P24Tlqz/i/o6Th24QpYUrr2qAzHGkWYxfQt9izewOd7QX0glW77HtS6AuQVdm8bMAHa zZu41kqvCjM2xov8H67tfizivtrA/2m/vp5a2yEhJ0UkjSu+H5HSBkWilOdxchm+JHtz lOf270iqo9bAwzeBKg9NnyZJnEo9oy7DObCG9Rw+tpR4/E/d4firJVNURDKqdAHb/WJ5 fIAw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=hgVGouA9; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id v17si4737122edy.2.2021.07.07.03.47.44; Wed, 07 Jul 2021 03:48:07 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=hgVGouA9; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231366AbhGGKrZ (ORCPT + 99 others); Wed, 7 Jul 2021 06:47:25 -0400 Received: from mail.kernel.org ([198.145.29.99]:33492 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231293AbhGGKrY (ORCPT ); Wed, 7 Jul 2021 06:47:24 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id C775C61C73; Wed, 7 Jul 2021 10:44:43 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1625654684; bh=7f9dZVhWz4se7QaY6DgXUfM9sIf/lWr1syPBf9l2uDQ=; h=Subject:From:To:Cc:Date:In-Reply-To:References:From; b=hgVGouA9JG5lxQBoMcH9bvjeep23ujsB7djODoFVdIuEgKzRdfQ9tbll/Pxh0D28f P+64IeA7RqnylzMbruOUZrNz3gc6/VUrs9LzSX/yyEn3lossOGIVmiRCqSdewV9Jv6 sC30BRmvwWQdNHMwfd3NGSnG9ZiSBe8qeL/sW2FkYdRdcvzeLM6cQ7sVAgobYIMUEa l1LISOcUYRNDgCvUhaNnNMX5adNwld/FxJ1VfBNxTsFSuMUp3V4TIy/tiEiJXtwnbe aw7oS2AkSjzxk1e2he8X/Y1uPWIwWizNfHZXMKgljrmrX602owjreyOSDUqQpbfitE T0jjbvxsNmz9g== Message-ID: <14633c3be87286d811263892375f2dfa9a8ed40a.camel@kernel.org> Subject: Re: [PATCH v2 1/2] fcntl: fix potential deadlocks for &fown_struct.lock From: Jeff Layton To: Greg KH , Desmond Cheong Zhi Xi Cc: bfields@fieldses.org, viro@zeniv.linux.org.uk, linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org, skhan@linuxfoundation.org, linux-kernel-mentees@lists.linuxfoundation.org, syzbot+e6d5398a02c516ce5e70@syzkaller.appspotmail.com Date: Wed, 07 Jul 2021 06:44:42 -0400 In-Reply-To: References: <20210707023548.15872-1-desmondcheongzx@gmail.com> <20210707023548.15872-2-desmondcheongzx@gmail.com> Content-Type: text/plain; charset="ISO-8859-15" User-Agent: Evolution 3.40.2 (3.40.2-1.fc34) MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, 2021-07-07 at 08:05 +0200, Greg KH wrote: > On Wed, Jul 07, 2021 at 10:35:47AM +0800, Desmond Cheong Zhi Xi wrote: > > Syzbot reports a potential deadlock in do_fcntl: > > > > ======================================================== > > WARNING: possible irq lock inversion dependency detected > > 5.12.0-syzkaller #0 Not tainted > > -------------------------------------------------------- > > syz-executor132/8391 just changed the state of lock: > > ffff888015967bf8 (&f->f_owner.lock){.+..}-{2:2}, at: f_getown_ex fs/fcntl.c:211 [inline] > > ffff888015967bf8 (&f->f_owner.lock){.+..}-{2:2}, at: do_fcntl+0x8b4/0x1200 fs/fcntl.c:395 > > but this lock was taken by another, HARDIRQ-safe lock in the past: > > (&dev->event_lock){-...}-{2:2} > > > > and interrupts could create inverse lock ordering between them. > > > > other info that might help us debug this: > > Chain exists of: > > &dev->event_lock --> &new->fa_lock --> &f->f_owner.lock > > > > Possible interrupt unsafe locking scenario: > > > > CPU0 CPU1 > > ---- ---- > > lock(&f->f_owner.lock); > > local_irq_disable(); > > lock(&dev->event_lock); > > lock(&new->fa_lock); > > > > lock(&dev->event_lock); > > > > *** DEADLOCK *** > > > > This happens because there is a lock hierarchy of > > &dev->event_lock --> &new->fa_lock --> &f->f_owner.lock > > from the following call chain: > > > > input_inject_event(): > > spin_lock_irqsave(&dev->event_lock,...); > > input_handle_event(): > > input_pass_values(): > > input_to_handler(): > > evdev_events(): > > evdev_pass_values(): > > spin_lock(&client->buffer_lock); > > __pass_event(): > > kill_fasync(): > > kill_fasync_rcu(): > > read_lock(&fa->fa_lock); > > send_sigio(): > > read_lock_irqsave(&fown->lock,...); > > > > However, since &dev->event_lock is HARDIRQ-safe, interrupts have to be > > disabled while grabbing &f->f_owner.lock, otherwise we invert the lock > > hierarchy. > > > > Hence, we replace calls to read_lock/read_unlock on &f->f_owner.lock, > > with read_lock_irq/read_unlock_irq. > > > > Here read_lock_irq/read_unlock_irq should be safe to use because the > > functions f_getown_ex and f_getowner_uids are only called from > > do_fcntl, and f_getown is only called from do_fnctl and > > sock_ioctl. do_fnctl itself is only called from syscalls. > > > > For sock_ioctl, the chain is > > compat_sock_ioctl(): > > compat_sock_ioctl_trans(): > > sock_ioctl() > > > > And interrupts are not disabled on either path. We assert this > > assumption with WARN_ON_ONCE(irqs_disabled()). This check is also > > inserted into another use of write_lock_irq in f_modown. > > > > Reported-and-tested-by: syzbot+e6d5398a02c516ce5e70@syzkaller.appspotmail.com > > Signed-off-by: Desmond Cheong Zhi Xi > > --- > > fs/fcntl.c | 17 +++++++++++------ > > 1 file changed, 11 insertions(+), 6 deletions(-) > > > > diff --git a/fs/fcntl.c b/fs/fcntl.c > > index dfc72f15be7f..262235e02c4b 100644 > > --- a/fs/fcntl.c > > +++ b/fs/fcntl.c > > @@ -88,6 +88,7 @@ static int setfl(int fd, struct file * filp, unsigned long arg) > > static void f_modown(struct file *filp, struct pid *pid, enum pid_type type, > > int force) > > { > > + WARN_ON_ONCE(irqs_disabled()); > > If this triggers, you just rebooted the box :( > > Please never do this, either properly handle the problem and return an > error, or do not check for this. It is not any type of "fix" at all, > and at most, a debugging aid while you work on the root problem. > > thanks, > > greg k-h Wait, what? Why would testing for irqs being disabled and throwing a WARN_ON in that case crash the box? -- Jeff Layton