From: asmadeus@codewreck.org
To: Schspa Shi <schspa@gmail.com>
Cc: ericvh@gmail.com, lucho@ionkov.net, linux_oss@crudebyte.com,
davem@davemloft.net, edumazet@google.com, kuba@kernel.org,
pabeni@redhat.com, v9fs-developer@lists.sourceforge.net,
netdev@vger.kernel.org, linux-kernel@vger.kernel.org,
syzbot+8f1060e2aaf8ca55220b@syzkaller.appspotmail.com
Subject: Re: [PATCH] 9p: fix crash when transaction killed
Date: Wed, 30 Nov 2022 22:34:56 +0900 [thread overview]
Message-ID: <Y4dcAGM+0xzOgSCa@codewreck.org> (raw)
In-Reply-To: <m2a6487f23.fsf@gmail.com>
Schspa Shi wrote on Wed, Nov 30, 2022 at 09:15:12PM +0800:
> >> If the req was newly alloced(It was at a new page), refcount maybe not
> >> 0, there will be problem in this case. It seems we can't relay on this.
> >>
> >> We need to set the refcount to zero before add it to idr in p9_tag_alloc.
> >
> > Hmm, if it's reused then it's zero by definition, but if it's a new
> > allocation (uninitialized) then anything goes; that lookup could find
> > and increase it before the refcount_set, and we'd have an off by one
> > leading to use after free. Good catch!
> >
> > Initializing it to zero will lead to the client busy-looping until after
> > the refcount is properly set, which should work.
>
> Why? It looks no different from the previous process here. Initializing
> it to zero should makes no difference.
I do not understand this remark.
If this is a freed request it will be zero, because we freed the request
as the refcount hit zero, but if it's a newly allocated request then the
memory is uninitalized, and the lookup can get anything.
In that case we want refcount to be zero to have the check in
p9_tag_lookup to not use the request until we set the refcount to 2.
> > Setting refcount early might have us use an re-used req before the tag
> > has been changed so that one cannot move.
> >
> > Could you test with just that changed if syzbot still reproduces this
> > bug? (perhaps add a comment if you send this)
> >
>
> I have upload a new v2 change for this. But I can't easily reproduce
> this problem.
Ah, I read that v2 as you actually ran some tests with this, sorry for
the misuderstanding.
Well, it's a fix anyway, so it cannot hurt to apply...
--
Dominique
next prev parent reply other threads:[~2022-11-30 13:35 UTC|newest]
Thread overview: 16+ messages / expand[flat|nested] mbox.gz Atom feed top
2022-11-29 16:22 [PATCH] 9p: fix crash when transaction killed Schspa Shi
2022-11-29 16:26 ` Schspa Shi
2022-11-29 18:23 ` Christian Schoenebeck
2022-11-29 22:38 ` asmadeus
2022-11-30 2:22 ` Schspa Shi
2022-11-30 3:26 ` Schspa Shi
2022-11-30 6:16 ` asmadeus
2022-11-30 8:14 ` Schspa Shi
2022-11-30 11:06 ` asmadeus
2022-11-30 12:43 ` Christian Schoenebeck
2022-11-30 12:54 ` asmadeus
2022-11-30 13:25 ` Christian Schoenebeck
2022-11-30 13:40 ` asmadeus
2022-11-30 13:15 ` Schspa Shi
2022-11-30 13:34 ` asmadeus [this message]
2022-12-01 2:26 ` Schspa Shi
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=Y4dcAGM+0xzOgSCa@codewreck.org \
--to=asmadeus@codewreck.org \
--cc=davem@davemloft.net \
--cc=edumazet@google.com \
--cc=ericvh@gmail.com \
--cc=kuba@kernel.org \
--cc=linux-kernel@vger.kernel.org \
--cc=linux_oss@crudebyte.com \
--cc=lucho@ionkov.net \
--cc=netdev@vger.kernel.org \
--cc=pabeni@redhat.com \
--cc=schspa@gmail.com \
--cc=syzbot+8f1060e2aaf8ca55220b@syzkaller.appspotmail.com \
--cc=v9fs-developer@lists.sourceforge.net \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).