Received: by 2002:a25:1985:0:0:0:0:0 with SMTP id 127csp1886305ybz; Thu, 30 Apr 2020 07:13:30 -0700 (PDT) X-Google-Smtp-Source: APiQypK7OaXuZkP9UFcVAU2fY0ry5brS/sskut/6wd49Z8tRHnRr36dX2SY9EG8eql9MdkhsWprY X-Received: by 2002:aa7:d892:: with SMTP id u18mr2949552edq.156.1588256010356; Thu, 30 Apr 2020 07:13:30 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1588256010; cv=none; d=google.com; s=arc-20160816; b=ICJfJokQy53RL5QKTlBMRnIiM7JmMrBitUWpFjtS//W3GtPBHfTHVIVS5BijIQ6/M+ OuSrM/ughMQkZitwP8KR0N5GtQMAa2/N1jJOpkIWITZrLiMedbeysPvyGcuMzG8Sh45E 8tTNAVIdSknU+AVWmVGbibnnRGB2yCjA7pmzemruNuVi3vXb5m0GoSuo6hwl90fEajnl 5LwVhE/aoS/V/eKcWLdjt0Pbo24fa45+8yY+sDg9OJl1q8+TuGs3+1O6wjIV/8Z6+Wid /ApxuB9gKf93z2JvNjPhPYYhZCb30/s9voF26T3jcmVw21847EbveOSfqlA+61TXeOZm lJUQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=oPROqYtCCjdfBuTg2fUYL76846UpqcKaoe012U08/u8=; b=ETLFitwhPXtQoJtr9EznqA5nQurhwpAOX5Kxi5RryeU/3WL7RXf7t1lWcIutZk5YdB 59eWZmT4XMC5awMtGKp3NrKxjziy2arqgnqKBiKTJIR2C6U0o/Pd1E18rzlzLaIVLEaO 7zVYLWnizhuXZNo31sNoPAAdBjvUv4GG3dn1fH5t1/zqloqd7z3qJjUzM73DywYAWKSI rXkIvvVo3Cyidn3dYqorR7CkIdQAtG/fU4G7nBn4cbxU6jW9oYvHG38cQ/dNYaSIgEse +u/naGEqbETGuQ+zYffju6a8yt8KKMVQz0Duyn6eH6hQagwvIf2wlP31Eeh4VnlP4Smr pSzw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=mIEMYHK8; spf=pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id i7si5732991eja.355.2020.04.30.07.12.53; Thu, 30 Apr 2020 07:13:30 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=mIEMYHK8; spf=pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728677AbgD3OMs (ORCPT + 99 others); Thu, 30 Apr 2020 10:12:48 -0400 Received: from mail.kernel.org ([198.145.29.99]:58840 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727856AbgD3NvB (ORCPT ); Thu, 30 Apr 2020 09:51:01 -0400 Received: from sasha-vm.mshome.net (c-73-47-72-35.hsd1.nh.comcast.net [73.47.72.35]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 3CF4F208D5; Thu, 30 Apr 2020 13:51:00 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1588254661; bh=X+8B5r+3ozNjTtxJhR0LgbtW2wp7VlQ+Pb0lz57jQmY=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=mIEMYHK8k1jV8J6Od2UQdFLxY9/epwe1j/mPxU6JGhqyhhaQagtRmol9ZqaQickAG IBvpneHsuHame9iz7pBkvJTeYPvJ6UCO6Lv6hmQK31ungMbv17qm8iJfDdvi61425D 9IyEZRVOLWLhfwd7VJOA2zzQNHcZeaF6fY350PX8= From: Sasha Levin To: linux-kernel@vger.kernel.org, stable@vger.kernel.org Cc: Yihao Wu , NeilBrown , Chuck Lever , Sasha Levin , linux-nfs@vger.kernel.org, netdev@vger.kernel.org Subject: [PATCH AUTOSEL 5.6 14/79] SUNRPC/cache: Fix unsafe traverse caused double-free in cache_purge Date: Thu, 30 Apr 2020 09:49:38 -0400 Message-Id: <20200430135043.19851-14-sashal@kernel.org> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20200430135043.19851-1-sashal@kernel.org> References: <20200430135043.19851-1-sashal@kernel.org> MIME-Version: 1.0 X-stable: review X-Patchwork-Hint: Ignore Content-Transfer-Encoding: 8bit Sender: linux-nfs-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-nfs@vger.kernel.org From: Yihao Wu [ Upstream commit 43e33924c38e8faeb0c12035481cb150e602e39d ] Deleting list entry within hlist_for_each_entry_safe is not safe unless next pointer (tmp) is protected too. It's not, because once hash_lock is released, cache_clean may delete the entry that tmp points to. Then cache_purge can walk to a deleted entry and tries to double free it. Fix this bug by holding only the deleted entry's reference. Suggested-by: NeilBrown Signed-off-by: Yihao Wu Reviewed-by: NeilBrown [ cel: removed unused variable ] Signed-off-by: Chuck Lever Signed-off-by: Sasha Levin --- net/sunrpc/cache.c | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/net/sunrpc/cache.c b/net/sunrpc/cache.c index bd843a81afa0b..d36cea4e270de 100644 --- a/net/sunrpc/cache.c +++ b/net/sunrpc/cache.c @@ -521,7 +521,6 @@ void cache_purge(struct cache_detail *detail) { struct cache_head *ch = NULL; struct hlist_head *head = NULL; - struct hlist_node *tmp = NULL; int i = 0; spin_lock(&detail->hash_lock); @@ -533,7 +532,9 @@ void cache_purge(struct cache_detail *detail) dprintk("RPC: %d entries in %s cache\n", detail->entries, detail->name); for (i = 0; i < detail->hash_size; i++) { head = &detail->hash_table[i]; - hlist_for_each_entry_safe(ch, tmp, head, cache_list) { + while (!hlist_empty(head)) { + ch = hlist_entry(head->first, struct cache_head, + cache_list); sunrpc_begin_cache_remove_entry(ch, detail); spin_unlock(&detail->hash_lock); sunrpc_end_cache_remove_entry(ch, detail); -- 2.20.1