* [PATCH] configfs: fix a race in configfs_lookup()
@ 2023-09-02 20:20 Kyle Zeng
2023-09-02 21:08 ` Greg KH
0 siblings, 1 reply; 4+ messages in thread
From: Kyle Zeng @ 2023-09-02 20:20 UTC (permalink / raw)
To: stable
commit c42dd069be8dfc9b2239a5c89e73bbd08ab35de0 upstream.
Backporting the patch to stable-v5.10.y to avoid race condition between configfs_dir_lseek and
configfs_lookup since they both operate ->s_childre and configfs_lookup
forgets to obtain the lock.
The patch deviates from the original patch because of code change.
The idea is to hold the configfs_dirent_lock when traversing
->s_children, which follows the core idea of the original patch.
Signed-off-by: Kyle Zeng <zengyhkyle@gmail.com>
---
fs/configfs/dir.c | 2 ++
1 file changed, 2 insertions(+)
diff --git a/fs/configfs/dir.c b/fs/configfs/dir.c
index 12388ed4faa5..0b7e9ab517d5 100644
--- a/fs/configfs/dir.c
+++ b/fs/configfs/dir.c
@@ -479,6 +479,7 @@ static struct dentry * configfs_lookup(struct inode *dir,
if (!configfs_dirent_is_ready(parent_sd))
goto out;
+ spin_lock(&configfs_dirent_lock);
list_for_each_entry(sd, &parent_sd->s_children, s_sibling) {
if (sd->s_type & CONFIGFS_NOT_PINNED) {
const unsigned char * name = configfs_get_name(sd);
@@ -491,6 +492,7 @@ static struct dentry * configfs_lookup(struct inode *dir,
break;
}
}
+ spin_unlock(&configfs_dirent_lock);
if (!found) {
/*
--
2.34.1
^ permalink raw reply related [flat|nested] 4+ messages in thread
* Re: [PATCH] configfs: fix a race in configfs_lookup()
2023-09-02 20:20 [PATCH] configfs: fix a race in configfs_lookup() Kyle Zeng
@ 2023-09-02 21:08 ` Greg KH
2023-09-02 21:55 ` Kyle Zeng
0 siblings, 1 reply; 4+ messages in thread
From: Greg KH @ 2023-09-02 21:08 UTC (permalink / raw)
To: Kyle Zeng; +Cc: stable
On Sat, Sep 02, 2023 at 01:20:36PM -0700, Kyle Zeng wrote:
> commit c42dd069be8dfc9b2239a5c89e73bbd08ab35de0 upstream.
> Backporting the patch to stable-v5.10.y to avoid race condition between configfs_dir_lseek and
> configfs_lookup since they both operate ->s_childre and configfs_lookup
> forgets to obtain the lock.
> The patch deviates from the original patch because of code change.
> The idea is to hold the configfs_dirent_lock when traversing
> ->s_children, which follows the core idea of the original patch.
>
>
> Signed-off-by: Kyle Zeng <zengyhkyle@gmail.com>
> ---
> fs/configfs/dir.c | 2 ++
> 1 file changed, 2 insertions(+)
You lost all the original signed-off-by lines of the original, AND you
lost the authorship of the original commit. And you didn't cc: anyone
involved in the original patch, to get their review, or objection to it
being backported.
Take a look at many of the backports that happen on the stable list for
examples of how to do this properly.
Here are 2 examples from this weekend alone that are good examples of
how to do this properly:
https://lore.kernel.org/r/20230902151000.3817-1-konishi.ryusuke@gmail.com
https://lore.kernel.org/r/cover.1693593288.git.luizcap@amazon.com
Also, how did you test this change? is this something that you have
actually hit in real life?
thanks,
greg k-h
^ permalink raw reply [flat|nested] 4+ messages in thread
* Re: [PATCH] configfs: fix a race in configfs_lookup()
2023-09-02 21:08 ` Greg KH
@ 2023-09-02 21:55 ` Kyle Zeng
2023-09-03 8:45 ` Greg KH
0 siblings, 1 reply; 4+ messages in thread
From: Kyle Zeng @ 2023-09-02 21:55 UTC (permalink / raw)
To: Greg KH, stable; +Cc: sishuai, hch
[-- Attachment #1: Type: text/plain, Size: 831 bytes --]
> You lost all the original signed-off-by lines of the original, AND you
> lost the authorship of the original commit. And you didn't cc: anyone
> involved in the original patch, to get their review, or objection to it
> being backported.
Sorry for the rookie mistakes. I drafted another version and it is
attached to the email. Can you please check whether it is OK?
> Also, how did you test this change? is this something that you have
> actually hit in real life?
Yes. I encountered this when testing the latest v5.10.y branch. A
minimal proof-of-concept code looks like this:
~~~
#include <stdio.h>
#include <stdlib.h>
#include <fcntl.h>
#include <unistd.h>
int main(void)
{
int fd = open("/sys/kernel/config", 0);
if(!fork()) {
while(1) lseek(fd, SEEK_CUR, 1);
}
while(1) unlinkat(fd, "file", 0);
return 0;
}
~~~
[-- Attachment #2: 0001-configfs-fix-a-race-in-configfs_lookup.patch --]
[-- Type: text/x-diff, Size: 1943 bytes --]
From 366d165e876a14a5b25ad741fdcd8658aa7e690d Mon Sep 17 00:00:00 2001
From: Kyle Zeng <zengyhkyle@gmail.com>
Date: Fri, 1 Sep 2023 17:41:14 -0700
Subject: [PATCH v5.10.y] configfs: fix a race in configfs_lookup()
commit c42dd069be8dfc9b2239a5c89e73bbd08ab35de0 upstream.
configfs: fix a race in configfs_lookup()
When configfs_lookup() is executing list_for_each_entry(),
it is possible that configfs_dir_lseek() is calling list_del().
Some unfortunate interleavings of them can cause a kernel NULL
pointer dereference error
Thread 1 Thread 2
//configfs_dir_lseek() //configfs_lookup()
list_del(&cursor->s_sibling);
list_for_each_entry(sd, ...)
Fix this by grabbing configfs_dirent_lock in configfs_lookup()
while iterating ->s_children.
Signed-off-by: Sishuai Gong <sishuai@purdue.edu>
Signed-off-by: Christoph Hellwig <hch@lst.de>
Signed-off-by: Kyle Zeng <zengyhkyle@gmail.com>
---
Please apply this patch to v5.10.y. This patch adapts the original patch
to v5.10.y considering codebase change.
The idea is to hold the configfs_dirent_lock when traversing
->s_children, which follows the core idea of the original patch.
This patch has been tested against the v5.10.y stable tree.
fs/configfs/dir.c | 2 ++
1 file changed, 2 insertions(+)
diff --git a/fs/configfs/dir.c b/fs/configfs/dir.c
index 12388ed4faa5..0b7e9ab517d5 100644
--- a/fs/configfs/dir.c
+++ b/fs/configfs/dir.c
@@ -479,6 +479,7 @@ static struct dentry * configfs_lookup(struct inode *dir,
if (!configfs_dirent_is_ready(parent_sd))
goto out;
+ spin_lock(&configfs_dirent_lock);
list_for_each_entry(sd, &parent_sd->s_children, s_sibling) {
if (sd->s_type & CONFIGFS_NOT_PINNED) {
const unsigned char * name = configfs_get_name(sd);
@@ -491,6 +492,7 @@ static struct dentry * configfs_lookup(struct inode *dir,
break;
}
}
+ spin_unlock(&configfs_dirent_lock);
if (!found) {
/*
--
2.34.1
^ permalink raw reply related [flat|nested] 4+ messages in thread
* Re: [PATCH] configfs: fix a race in configfs_lookup()
2023-09-02 21:55 ` Kyle Zeng
@ 2023-09-03 8:45 ` Greg KH
0 siblings, 0 replies; 4+ messages in thread
From: Greg KH @ 2023-09-03 8:45 UTC (permalink / raw)
To: Kyle Zeng; +Cc: stable, sishuai, hch
On Sat, Sep 02, 2023 at 02:55:14PM -0700, Kyle Zeng wrote:
> > You lost all the original signed-off-by lines of the original, AND you
> > lost the authorship of the original commit. And you didn't cc: anyone
> > involved in the original patch, to get their review, or objection to it
> > being backported.
> Sorry for the rookie mistakes. I drafted another version and it is
> attached to the email. Can you please check whether it is OK?
Good enough, thanks! Now queued up.
greg k-h
^ permalink raw reply [flat|nested] 4+ messages in thread
end of thread, other threads:[~2023-09-03 8:45 UTC | newest]
Thread overview: 4+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2023-09-02 20:20 [PATCH] configfs: fix a race in configfs_lookup() Kyle Zeng
2023-09-02 21:08 ` Greg KH
2023-09-02 21:55 ` Kyle Zeng
2023-09-03 8:45 ` Greg KH
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox