Received: by 2002:a05:6358:3188:b0:123:57c1:9b43 with SMTP id q8csp5179538rwd; Mon, 12 Jun 2023 00:49:38 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ4T3+n74xMM/A1/DCRmaKQlQxliYEQeIluKy8da897kVcpgVl0V21agIjD5+Em5l03KAAs9 X-Received: by 2002:a05:6a00:22ca:b0:651:cd9d:7dd7 with SMTP id f10-20020a056a0022ca00b00651cd9d7dd7mr12778658pfj.15.1686556177932; Mon, 12 Jun 2023 00:49:37 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1686556177; cv=none; d=google.com; s=arc-20160816; b=h6pRWLMR4KXIy2uUv7diJ37CQv1MHLhhMMadzYZA98h414vkvkI0nEfcXxBty3qb6i F1toiYvxOPX2+ng/bqk1SJaZPo4GES4HwY1mJZaKiSaJh5tP7yMVe7He9wh7nBEI4gEI AxA0Vmg2x+KGUyvwCRo+vyVb/JbtFsKSudvcwhqOUxuQVn9c64o9BP/wxeW1DJu75O94 Q5LyvtOf2EzH5SLRcPgClBNNCmxqZmDpuZWD30tSWpeZU9xMniJ1MbMwWy46kNm78qUC 7hOj/c6UvAPZM1wWDiGc62e/T1lXSPNIva4ETunUx4L3+HNfm7WrigJcEjDODPYKpLAN gAlA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=5ihg0r6NNHpPPCqrWno7mABOyOIjyqCDVNKZnVfGiSQ=; b=W2J7CYWGgiJOyXgcyINw74n/G6wgQbIaU2szWu/nk6yJx6DCQAGjfBBYhaTq4IiySl nw5pOHlawzDCyxHCyWCM6SNaSxNt4fy5We+Zql7Qh+TOunKm5k+rAQWmHySd3Crohyv0 1bZFKJEyAMxqtw8g1UU8LCVGiex0B0dGyl2sX3cvpIH/Q6xD+hfnqhnvW5eyFtKXzyVx /4Jb13jD8KkTKEyPH8vENdbpebdAMXDMXk960J6bdqJ69PNw2KcOh7rWliv8UZIs3+3k FEe1ru8r/NShPLrWQj/iXCrNxAFZaWWQVvTUY3GC9sEHTkCqCvNxeYEprXMA0DW/Yrco HcJg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20221208 header.b=Qk3VyjI3; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id i64-20020a639d43000000b005342966f497si3479962pgd.712.2023.06.12.00.49.26; Mon, 12 Jun 2023 00:49:37 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20221208 header.b=Qk3VyjI3; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234549AbjFLHfC (ORCPT + 99 others); Mon, 12 Jun 2023 03:35:02 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:46554 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234676AbjFLHe4 (ORCPT ); Mon, 12 Jun 2023 03:34:56 -0400 Received: from mail-pf1-x431.google.com (mail-pf1-x431.google.com [IPv6:2607:f8b0:4864:20::431]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 213B4170B for ; Mon, 12 Jun 2023 00:32:27 -0700 (PDT) Received: by mail-pf1-x431.google.com with SMTP id d2e1a72fcca58-6549df4321aso4168809b3a.2 for ; Mon, 12 Jun 2023 00:32:27 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20221208; t=1686554909; x=1689146909; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:from:to:cc:subject:date:message-id:reply-to; bh=5ihg0r6NNHpPPCqrWno7mABOyOIjyqCDVNKZnVfGiSQ=; b=Qk3VyjI3CKicegm6uDWXnbLj7tZZ2bls/tOCAo6NQf+gi+UzVnrvQxssIqLKJ/2P91 VLTX7VeYnHwtG3mQTI0GlAxFucOh7hiX1KnoJk8AInXaSFuNtZOWgsLTZq2S02SrzX9J 1nCNNpGPxoGqA77nLj/T2OVXxJqdYMfCvE49AkrBYqt1bePJlzE1e45ESFB7RBfNgQ4n QN8Qp+QtWHytAx2ac9NFHLJejOVbZ0ZHt172jYle3oKrBRzvpZQzvg/PKjRPaOpqSEQd SjeMpa2dPjl3hcLJUaKbpo+S9vGutDUqczGlijx52lci2Yt3ZDc73Q1j4AYUseXZh6q0 s4aw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1686554909; x=1689146909; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=5ihg0r6NNHpPPCqrWno7mABOyOIjyqCDVNKZnVfGiSQ=; b=S8SHBJPRyBXwV0l6JDc4ChznrEx0DkyjldaCs8pOtnfgrg2++e2OR/XmPZqUGp2Ft3 5ddcRbw5JfzP6+K00fdKNP0O4l5hnX9yfmmLridrMnaWoNYXbYISf87cIRKxO/YjiAoa TMqjjT/9YxBRHPMZvRuIrIINverrb+GTrL5lZbEYJWb9J0gSP3g7tki/DbxeQ8oCRAiv 3zO/yq1w9UBIeK8Suyw98zHita+KRRA8U99HCMdNcd1rm6sM5D0JILYXu4z5hwYBDe/2 wWOW3aA37TSyCx9BQ+cd1ap6StEzjxQiJGSpvxuuwfXPx++PbvTbzwabmRSfLPi2MW9p fATg== X-Gm-Message-State: AC+VfDx8wSmRBPDULFaQXTvH1BGPGUoTj8dR+UIrP4Xp48lCOFqkK4Nf KREiaU5JHygCi3/+8Vs5F7ldAUa3DZ7teEI6 X-Received: by 2002:a05:6a00:2195:b0:654:100f:c003 with SMTP id h21-20020a056a00219500b00654100fc003mr10429585pfi.6.1686554482409; Mon, 12 Jun 2023 00:21:22 -0700 (PDT) Received: from oslab-pc.tsinghua.edu.cn ([166.111.139.112]) by smtp.gmail.com with ESMTPSA id z3-20020aa785c3000000b0064fe9862ec2sm6272580pfn.116.2023.06.12.00.21.19 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 12 Jun 2023 00:21:21 -0700 (PDT) From: Tuo Li To: jaharkes@cs.cmu.edu Cc: coda@cs.cmu.edu, codalist@coda.cs.cmu.edu, linux-kernel@vger.kernel.org, baijiaju1990@outlook.com, Tuo Li , BassCheck Subject: [PATCH] coda: fix possible data race around sb->s_fs_info access Date: Mon, 12 Jun 2023 15:21:01 +0800 Message-Id: <20230612072101.2923400-1-islituo@gmail.com> X-Mailer: git-send-email 2.34.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,FREEMAIL_FROM, RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The struct field s_fs_info is often protected by the lock vc_mutex when is accessed. Here is an example in coda_put_super(): mutex_lock(&vcp->vc_mutex); vcp->vc_sb = NULL; sb->s_fs_info = NULL; mutex_unlock(&vcp->vc_mutex); However, sb->s_fs_info is accessed after the lock vc->vc_mutex is unlocked in coda_fill_super() vc->vc_sb = sb; mutex_unlock(&vc->vc_mutex); sb->s_fs_info = vc; And thus can cause a data race when another thread access sb->s_fs_info concurrently. To fix this possible data race, the instruction to unlock vc->vc_mutex is moved in front of the access to sb->s_fs_info. Reported-by: BassCheck Signed-off-by: Tuo Li --- fs/coda/inode.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/fs/coda/inode.c b/fs/coda/inode.c index d661e6cf17ac..743030ec5ef6 100644 --- a/fs/coda/inode.c +++ b/fs/coda/inode.c @@ -179,9 +179,9 @@ static int coda_fill_super(struct super_block *sb, void *data, int silent) } vc->vc_sb = sb; + sb->s_fs_info = vc; mutex_unlock(&vc->vc_mutex); - sb->s_fs_info = vc; sb->s_flags |= SB_NOATIME; sb->s_blocksize = 4096; /* XXXXX what do we put here?? */ sb->s_blocksize_bits = 12; -- 2.34.1