Received: by 2002:a05:6358:7058:b0:131:369:b2a3 with SMTP id 24csp3108608rwp; Fri, 14 Jul 2023 17:55:30 -0700 (PDT) X-Google-Smtp-Source: APBJJlFw4YLz7geJEuqkihUe1nHh5xnakpzksxqu0x0sSc6yDxMwVnHKvv2BJ9kgdts3ycvvW6Ud X-Received: by 2002:a17:906:51d2:b0:992:b928:adb3 with SMTP id v18-20020a17090651d200b00992b928adb3mr5719983ejk.54.1689382529743; Fri, 14 Jul 2023 17:55:29 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1689382529; cv=none; d=google.com; s=arc-20160816; b=Oxlfkq/npDHCRGYR4eZnMgrh0eNNiLy6kjCZPJDaGuF0kqn8iv4y7HEERT6SwLQlJa eC5hFe+4J2GpGDjgPoQvE54wS6frHjkFmtJALi0aM+Drppqx5KmF2LMXDbmaASZ1wi/s di2ajp6nhUPaAlBwjPWxjeYNyO7pjnHWekhDcS/ELtYWdEh1OfnJV064lYIucjt3w80k pR9mVAeiYHsujWzp5k0Rfu8Hrn4UTCdx9xvaDAQfNzy2j1vbKfgduGZ+FxAg+52hHc+t kAJIB5RfRtDMZ1bgFoEsrkBEdIgn29cBnf+QKYLNEOE9kSETUjOVglVRl3nd9OZMAzIw eNiA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:references :in-reply-to:mime-version:dkim-signature; bh=NHDFg4hHFfaqGleIX/e8pnjQc9L/cN7BmreACRgjnl0=; fh=RhOenyvXDoaSBUIXdTZInMvQyg3fDB4sY8BNdCsTiIM=; b=APWrKOTRfFAJJEHS9L56H090+wfqNlDCRQHIom4iC1h58e+9HUm+FCyhXlgHXRjAZt QUgvI+Fhr6PgvU5HRX8sh7zLJsPsyebmcMISLBtpNqaqrCoqA+2bydZouNyxaAsyqQ6U B63ckjKVXsgK2NxxrUc7cuVdwhugmyakY5QAhCRgcsnkOnNGUj7yv/iy3gmVtaTAGsY9 dDIkddDRCAShWscSpVnE0OVjCYoZ+f/1Z1n3wkzukahf1WYXTph0wBO3SafOdKujLvNW JUKyjDwqRX6kae6d7NsLRJZYWGkbKvY06p0wPkUd86c084L7vcsXE4wFtZWtJMSoptX5 /61g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=XZqdXW3o; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id ot1-20020a170906ccc100b009938cb10548si9812511ejb.549.2023.07.14.17.55.06; Fri, 14 Jul 2023 17:55:29 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=XZqdXW3o; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229974AbjGNXgL (ORCPT + 99 others); Fri, 14 Jul 2023 19:36:11 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:48220 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229483AbjGNXgJ (ORCPT ); Fri, 14 Jul 2023 19:36:09 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [IPv6:2604:1380:4641:c500::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id CF7753A92; Fri, 14 Jul 2023 16:36:08 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 3C4F061E15; Fri, 14 Jul 2023 23:36:08 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 925F2C433C9; Fri, 14 Jul 2023 23:36:07 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1689377767; bh=QeueiOpDQZwo6rtEiZoJ8qhJKkd5jWANfodFVO3UgnI=; h=In-Reply-To:References:From:Date:Subject:To:Cc:From; b=XZqdXW3oB1OA9npd73eLtv/UBG5Scu7Gm/HetbtRBr1UGMYwh65+KUMe01Kn4GgU4 q2Jz1V+G92sDeoO2CF5EyqhvK70W+MGZ8Z2NFCeTu+96ikE+QHnKU9GelJZJwRQMTU niqyUujd0BW+4UYKz3YPXgknNQgGSoO/u2x3ctS2qt9lO9U/xsWMDjr151ZYOO7MR5 nuJHn+QT3CGYqdKbcAXhbF44rNZI9bnMIllNVQhZieAU4QUHqKRkelJFkDsWxHFHNd erynCy1bOqvj9GHi/Y0qWMaPqGL+ro5IyFAxmVFh454+4vvM131WG/AK9dRlm6OgS8 AAzAjvKAleHJg== Received: by mail-oo1-f44.google.com with SMTP id 006d021491bc7-56597d949b1so1689905eaf.1; Fri, 14 Jul 2023 16:36:07 -0700 (PDT) X-Gm-Message-State: ABy/qLYXvUZteR0AZK79E2TF+/9r69cqJhWPRvf/LXNl2rGlwyPEJNRj aBHB7NoFWSgwk98YQ8IikvHn0fwkJwRlnGat28k= X-Received: by 2002:a05:6870:c588:b0:1b7:613c:2eb2 with SMTP id ba8-20020a056870c58800b001b7613c2eb2mr8323917oab.6.1689377766742; Fri, 14 Jul 2023 16:36:06 -0700 (PDT) MIME-Version: 1.0 Received: by 2002:a8a:4c7:0:b0:4e8:f6ff:2aab with HTTP; Fri, 14 Jul 2023 16:36:06 -0700 (PDT) In-Reply-To: <20230714084354.1959951-1-sj1557.seo@samsung.com> References: <20230714084354.1959951-1-sj1557.seo@samsung.com> From: Namjae Jeon Date: Sat, 15 Jul 2023 08:36:06 +0900 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: [PATCH] exfat: release s_lock before calling dir_emit() To: Sungjong Seo Cc: linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org, stable@vger.kernel.org, syzbot+1741a5d9b79989c10bdc@syzkaller.appspotmail.com Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-4.4 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_MED, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 2023-07-14 17:43 GMT+09:00, Sungjong Seo : > There is a potential deadlock reported by syzbot as below: > > ====================================================== > WARNING: possible circular locking dependency detected > 6.4.0-next-20230707-syzkaller #0 Not tainted > ------------------------------------------------------ > syz-executor330/5073 is trying to acquire lock: > ffff8880218527a0 (&mm->mmap_lock){++++}-{3:3}, at: mmap_read_lock_killable > include/linux/mmap_lock.h:151 [inline] > ffff8880218527a0 (&mm->mmap_lock){++++}-{3:3}, at: get_mmap_lock_carefully > mm/memory.c:5293 [inline] > ffff8880218527a0 (&mm->mmap_lock){++++}-{3:3}, at: > lock_mm_and_find_vma+0x369/0x510 mm/memory.c:5344 > but task is already holding lock: > ffff888019f760e0 (&sbi->s_lock){+.+.}-{3:3}, at: exfat_iterate+0x117/0xb50 > fs/exfat/dir.c:232 > > which lock already depends on the new lock. > > Chain exists of: > &mm->mmap_lock --> mapping.invalidate_lock#3 --> &sbi->s_lock > > Possible unsafe locking scenario: > > CPU0 CPU1 > ---- ---- > lock(&sbi->s_lock); > lock(mapping.invalidate_lock#3); > lock(&sbi->s_lock); > rlock(&mm->mmap_lock); > > Let's try to avoid above potential deadlock condition by moving dir_emit*() > out of sbi->s_lock coverage. > > Fixes: ca06197382bd ("exfat: add directory operations") > Cc: stable@vger.kernel.org #v5.7+ > Reported-by: syzbot+1741a5d9b79989c10bdc@syzkaller.appspotmail.com > Link: > https://lore.kernel.org/lkml/00000000000078ee7e060066270b@google.com/T/#u > Signed-off-by: Sungjong Seo Applied it to #dev, Thanks for your patch!