Received: by 2002:a05:6a10:c7c6:0:0:0:0 with SMTP id h6csp1638050pxy; Mon, 2 Aug 2021 06:49:43 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxMydrsrI2xeF6NcpswgFa/Eq1qkrzi5UgiCjZJ13TcbE9G+fNPcLy/9IHaDnWw5BMYPpD5 X-Received: by 2002:a92:c245:: with SMTP id k5mr1934978ilo.143.1627912183610; Mon, 02 Aug 2021 06:49:43 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1627912183; cv=none; d=google.com; s=arc-20160816; b=Q0Xl11VN1uMhLoaQ3wC/dGoYc/hQN+pr7fc4odrfAIBEmptrISSkjr0GZJETT8aT1s S/3lwlvVRCxL1TjLfEFm5MRusNKmG+X86X5Oxku9GyJXwpG8chvjjg3LHJ4BFIxJRjvx Fqzm+cMtHyrAPUxYTAGYRyEw/tfAviRe3AImpngSatQk0I1RKrUxzU/URkU/MUA8x7J1 bNvFKTEKRW9xIqeRosIWqCCp3OGGIy6w4v9nGU5iKZi/oJ4rsg7GBMdtc1oRkC7aezoq RWHBRFLB833qP+w62xZM7UWIK07Radmb66B9o1Vrv4pHu4YLsrQf5xGaEWlHdCy+DNgX IDiA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=UA5n9HGqM6f4slUFDuLU7GlvIGDtIeT5UJA+SGSPGdg=; b=KQG0OjgiiLOn1wFiMLuyOLiVuucJbMYfMBmk7YX+cVyVYArnNOKL6/jFIVp/cVCGiK HH+UUEFaTFMEY/O5egLRPxZcCUbKnRC5Hp9cdATznFSgH28Hh4XD3XI1zpy+0QkhCWye z6lJ/Nwac8ErYc2ikyn3APftT1GthB6DXQRTuvdE+kteU9bUpb15tI8mDuZAzET1bQDn BW3wvd+v5gNsOUyFr2fz0/rAXsAQF4T/kM1XcnYdGo6SaR9YOawKcpKCAw0bUPaGhULb tfqidM5Sg2hd8eA4/1zm09okhd+xEOoZ0vI9hb2DxDhOhjB0ja6ETLgd6ttao8VlaxAP wmyw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=GIUkSpGg; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id u15si13091161iot.89.2021.08.02.06.49.32; Mon, 02 Aug 2021 06:49:43 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=GIUkSpGg; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234039AbhHBNsc (ORCPT + 99 others); Mon, 2 Aug 2021 09:48:32 -0400 Received: from mail.kernel.org ([198.145.29.99]:56264 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234102AbhHBNqh (ORCPT ); Mon, 2 Aug 2021 09:46:37 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 8A851610FE; Mon, 2 Aug 2021 13:46:26 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1627911987; bh=v1qiqfhFMO1GSTZsyfLloq/DE5Y82veJh03AVlehs40=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=GIUkSpGgqxrHYLNV5n4b1ZHJ4TWQwynWtBcY7DrRSbr/uAGC2U+yFmx+LCPYq6uwK /q33vCnwYAh7Qv5WfaJ55PXWrgDC44T/HRThT8WDWZnRBhNm4bLMUf1omZcvoFZQo2 cAYG84Gcd8wgqhDJ75cdwjz7PiBOBLvogngdYJyI= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Desmond Cheong Zhi Xi , syzbot+b718ec84a87b7e73ade4@syzkaller.appspotmail.com, Viacheslav Dubeyko , Al Viro , "Gustavo A. R. Silva" , Shuah Khan , Andrew Morton , Linus Torvalds , Sasha Levin Subject: [PATCH 4.4 09/26] hfs: add lock nesting notation to hfs_find_init Date: Mon, 2 Aug 2021 15:44:19 +0200 Message-Id: <20210802134332.336863730@linuxfoundation.org> X-Mailer: git-send-email 2.32.0 In-Reply-To: <20210802134332.033552261@linuxfoundation.org> References: <20210802134332.033552261@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Desmond Cheong Zhi Xi [ Upstream commit b3b2177a2d795e35dc11597b2609eb1e7e57e570 ] Syzbot reports a possible recursive lock in [1]. This happens due to missing lock nesting information. From the logs, we see that a call to hfs_fill_super is made to mount the hfs filesystem. While searching for the root inode, the lock on the catalog btree is grabbed. Then, when the parent of the root isn't found, a call to __hfs_bnode_create is made to create the parent of the root. This eventually leads to a call to hfs_ext_read_extent which grabs a lock on the extents btree. Since the order of locking is catalog btree -> extents btree, this lock hierarchy does not lead to a deadlock. To tell lockdep that this locking is safe, we add nesting notation to distinguish between catalog btrees, extents btrees, and attributes btrees (for HFS+). This has already been done in hfsplus. Link: https://syzkaller.appspot.com/bug?id=f007ef1d7a31a469e3be7aeb0fde0769b18585db [1] Link: https://lkml.kernel.org/r/20210701030756.58760-4-desmondcheongzx@gmail.com Signed-off-by: Desmond Cheong Zhi Xi Reported-by: syzbot+b718ec84a87b7e73ade4@syzkaller.appspotmail.com Tested-by: syzbot+b718ec84a87b7e73ade4@syzkaller.appspotmail.com Reviewed-by: Viacheslav Dubeyko Cc: Al Viro Cc: Greg Kroah-Hartman Cc: Gustavo A. R. Silva Cc: Shuah Khan Signed-off-by: Andrew Morton Signed-off-by: Linus Torvalds Signed-off-by: Sasha Levin --- fs/hfs/bfind.c | 14 +++++++++++++- fs/hfs/btree.h | 7 +++++++ 2 files changed, 20 insertions(+), 1 deletion(-) diff --git a/fs/hfs/bfind.c b/fs/hfs/bfind.c index de69d8a24f6d..7f2ef95dcd05 100644 --- a/fs/hfs/bfind.c +++ b/fs/hfs/bfind.c @@ -24,7 +24,19 @@ int hfs_find_init(struct hfs_btree *tree, struct hfs_find_data *fd) fd->key = ptr + tree->max_key_len + 2; hfs_dbg(BNODE_REFS, "find_init: %d (%p)\n", tree->cnid, __builtin_return_address(0)); - mutex_lock(&tree->tree_lock); + switch (tree->cnid) { + case HFS_CAT_CNID: + mutex_lock_nested(&tree->tree_lock, CATALOG_BTREE_MUTEX); + break; + case HFS_EXT_CNID: + mutex_lock_nested(&tree->tree_lock, EXTENTS_BTREE_MUTEX); + break; + case HFS_ATTR_CNID: + mutex_lock_nested(&tree->tree_lock, ATTR_BTREE_MUTEX); + break; + default: + return -EINVAL; + } return 0; } diff --git a/fs/hfs/btree.h b/fs/hfs/btree.h index 2715f416b5a8..308b5f1af65b 100644 --- a/fs/hfs/btree.h +++ b/fs/hfs/btree.h @@ -12,6 +12,13 @@ typedef int (*btree_keycmp)(const btree_key *, const btree_key *); #define NODE_HASH_SIZE 256 +/* B-tree mutex nested subclasses */ +enum hfs_btree_mutex_classes { + CATALOG_BTREE_MUTEX, + EXTENTS_BTREE_MUTEX, + ATTR_BTREE_MUTEX, +}; + /* A HFS BTree held in memory */ struct hfs_btree { struct super_block *sb; -- 2.30.2