Re: [PATCH] block: protect iterate_bdevs() against concurrent close

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Thu, Jan 5, 2017 at 4:03 PM, Dan Williams <dan.j.williams@xxxxxxxxx> wrote:
> On Thu, Dec 1, 2016 at 12:18 AM, Jan Kara <jack@xxxxxxx> wrote:
>> From: Rabin Vincent <rabinv@xxxxxxxx>
>>
>> If a block device is closed while iterate_bdevs() is handling it, the
>> following NULL pointer dereference occurs because bdev->b_disk is NULL
>> in bdev_get_queue(), which is called from blk_get_backing_dev_info() (in
>> turn called by the mapping_cap_writeback_dirty() call in
>> __filemap_fdatawrite_range()):
>>
>>  BUG: unable to handle kernel NULL pointer dereference at 0000000000000508
>>  IP: [<ffffffff81314790>] blk_get_backing_dev_info+0x10/0x20
>>  PGD 9e62067 PUD 9ee8067 PMD 0
>>  Oops: 0000 [#1] PREEMPT SMP DEBUG_PAGEALLOC
>>  Modules linked in:
>>  CPU: 1 PID: 2422 Comm: sync Not tainted 4.5.0-rc7+ #400
>>  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996)
>>  task: ffff880009f4d700 ti: ffff880009f5c000 task.ti: ffff880009f5c000
>>  RIP: 0010:[<ffffffff81314790>]  [<ffffffff81314790>] blk_get_backing_dev_info+0x10/0x20
>>  RSP: 0018:ffff880009f5fe68  EFLAGS: 00010246
>>  RAX: 0000000000000000 RBX: ffff88000ec17a38 RCX: ffffffff81a4e940
>>  RDX: 7fffffffffffffff RSI: 0000000000000000 RDI: ffff88000ec176c0
>>  RBP: ffff880009f5fe68 R08: 0000000000000000 R09: 0000000000000000
>>  R10: 0000000000000001 R11: 0000000000000000 R12: ffff88000ec17860
>>  R13: ffffffff811b25c0 R14: ffff88000ec178e0 R15: ffff88000ec17a38
>>  FS:  00007faee505d700(0000) GS:ffff88000fb00000(0000) knlGS:0000000000000000
>>  CS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003b
>>  CR2: 0000000000000508 CR3: 0000000009e8a000 CR4: 00000000000006e0
>>  Stack:
>>   ffff880009f5feb8 ffffffff8112e7f5 0000000000000000 7fffffffffffffff
>>   0000000000000000 0000000000000000 7fffffffffffffff 0000000000000001
>>   ffff88000ec178e0 ffff88000ec17860 ffff880009f5fec8 ffffffff8112e81f
>>  Call Trace:
>>   [<ffffffff8112e7f5>] __filemap_fdatawrite_range+0x85/0x90
>>   [<ffffffff8112e81f>] filemap_fdatawrite+0x1f/0x30
>>   [<ffffffff811b25d6>] fdatawrite_one_bdev+0x16/0x20
>>   [<ffffffff811bc402>] iterate_bdevs+0xf2/0x130
>>   [<ffffffff811b2763>] sys_sync+0x63/0x90
>>   [<ffffffff815d4272>] entry_SYSCALL_64_fastpath+0x12/0x76
>>  Code: 0f 1f 44 00 00 48 8b 87 f0 00 00 00 55 48 89 e5 <48> 8b 80 08 05 00 00 5d
>>  RIP  [<ffffffff81314790>] blk_get_backing_dev_info+0x10/0x20
>>   RSP <ffff880009f5fe68>
>>  CR2: 0000000000000508
>>  ---[ end trace 2487336ceb3de62d ]---
>>
>> The crash is easily reproducible by running the following command, if an
>> msleep(100) is inserted before the call to func() in iterate_devs():
>>
>>  while :; do head -c1 /dev/nullb0; done > /dev/null & while :; do sync; done
>>
>> Fix it by holding the bd_mutex across the func() call and only calling
>> func() if the bdev is opened.
>>
>> Cc: stable@xxxxxxxxxxxxxxx
>> Fixes: 5c0d6b60a0ba46d45020547eacf7199171920935
>> Reported-and-tested-by: Wei Fang <fangwei1@xxxxxxxxxx>
>> Signed-off-by: Rabin Vincent <rabinv@xxxxxxxx>
>> Signed-off-by: Jan Kara <jack@xxxxxxx>
>> ---
>>  fs/block_dev.c | 7 ++++++-
>>  1 file changed, 6 insertions(+), 1 deletion(-)
>>
>> diff --git a/fs/block_dev.c b/fs/block_dev.c
>> index 05b553368bb4..899fa8ccc347 100644
>> --- a/fs/block_dev.c
>> +++ b/fs/block_dev.c
>> @@ -1950,6 +1950,7 @@ void iterate_bdevs(void (*func)(struct block_device *, void *), void *arg)
>>         spin_lock(&blockdev_superblock->s_inode_list_lock);
>>         list_for_each_entry(inode, &blockdev_superblock->s_inodes, i_sb_list) {
>>                 struct address_space *mapping = inode->i_mapping;
>> +               struct block_device *bdev;
>>
>>                 spin_lock(&inode->i_lock);
>>                 if (inode->i_state & (I_FREEING|I_WILL_FREE|I_NEW) ||
>> @@ -1970,8 +1971,12 @@ void iterate_bdevs(void (*func)(struct block_device *, void *), void *arg)
>>                  */
>>                 iput(old_inode);
>>                 old_inode = inode;
>> +               bdev = I_BDEV(inode);
>>
>> -               func(I_BDEV(inode), arg);
>> +               mutex_lock(&bdev->bd_mutex);
>> +               if (bdev->bd_openers)
>> +                       func(bdev, arg);
>> +               mutex_unlock(&bdev->bd_mutex);
>>
>>                 spin_lock(&blockdev_superblock->s_inode_list_lock);
>>         }
>> --
>
>
> Hi,
>
> I hit a bug with a similar signature back in October:
>
>     http://marc.info/?l=linux-block&m=147769594003740&w=2
>
> ...and still see it in 4.10-rc2.
>
> My reproducer is not very reliable. I'm thinking this fix doesn't work
> because it assumes the only race is close vs sync, but my case is
> device-shutdown vs sync. In fact iterate_bdevs() is not in my
> backtrace:
>
> [ 5750.941063] BUG: unable to handle kernel NULL pointer dereference
> at 0000000000000568
> [..]
> [ 5750.959449] CPU: 1 PID: 8910 Comm: lt-libndctl Tainted: G
> O    4.10.0-rc2+ #672
> [ 5750.961283] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996),
> BIOS rel-1.9.3-0-ge2fc41e-prebuilt.qemu-project.org 04/01/2014
> [ 5750.963538] task: ffff88033173c600 task.stack: ffffc90006a80000
> [ 5750.964694] RIP: 0010:blk_get_backing_dev_info+0x10/0x20
> [ 5750.965774] RSP: 0018:ffffc90006a83b00 EFLAGS: 00010246
> [ 5750.966842] RAX: 0000000000000000 RBX: ffffc90006a83b60 RCX: 0000000000000000
> [ 5750.968136] RDX: 0000000000000001 RSI: 0000000000000000 RDI: ffff88031b3a8040
> [ 5750.969429] RBP: ffffc90006a83b00 R08: ffffffff82b013d0 R09: ffffffff81ea8107
> [ 5750.970732] R10: 0000000000000001 R11: ffffffff82acd5c0 R12: ffff88031b3a83d0
> [ 5750.972046] R13: ffff88031b3a81d0 R14: ffff8801efa934a0 R15: ffff88031b3a81d0
> [ 5750.973344] FS:  00007f2cc4ed5d80(0000) GS:ffff88033ed00000(0000)
> knlGS:0000000000000000
> [ 5750.975171] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
> [ 5750.976295] CR2: 0000000000000568 CR3: 0000000333fcf000 CR4: 00000000000406e0
> [ 5750.977608] Call Trace:
> [ 5750.978345]  __inode_attach_wb+0x3a7/0x5d0
> [ 5750.979281]  __filemap_fdatawrite_range+0xf8/0x100
> [ 5750.980303]  filemap_write_and_wait+0x40/0x90
> [ 5750.981270]  fsync_bdev+0x54/0x60
> [ 5750.982110]  ? bdget_disk+0x30/0x40
> [ 5750.982967]  invalidate_partition+0x24/0x50
> [ 5750.983910]  del_gendisk+0xfa/0x230
> [ 5750.984768]  pmem_release_disk+0x12/0x20 [nd_pmem]
> [ 5750.985787]  devm_action_release+0xf/0x20
> [ 5750.986697]  release_nodes+0x16d/0x2b0
> [ 5750.987595]  devres_release_all+0x3c/0x60
> [ 5750.988510]  device_release_driver_internal+0x16d/0x210
> [ 5750.989586]  device_release_driver+0x12/0x20
> [ 5750.990537]  unbind_store+0x10f/0x160
> [ 5750.991425]  drv_attr_store+0x25/0x30
> [ 5750.992301]  sysfs_kf_write+0x45/0x60
> [ 5750.993176]  kernfs_fop_write+0x13c/0x1c0
> [ 5750.994099]  __vfs_write+0x37/0x160
> [ 5750.994967]  ? rcu_read_lock_sched_held+0x5d/0x70
> [ 5750.995975]  ? rcu_sync_lockdep_assert+0x2f/0x60
> [ 5750.996975]  ? __sb_start_write+0xce/0x1d0
> [ 5750.997913]  ? vfs_write+0x17d/0x1a0
> [ 5750.998790]  vfs_write+0xb5/0x1a0
> [ 5750.999626]  SyS_write+0x58/0xc0
> [ 5751.000458]  entry_SYSCALL_64_fastpath+0x1f/0xc2
>
> ...so I'm going to take a look at having blk_get_backing_dev_info()
> take its own blkdev_get() reference.

No, that's wrong I think we just need make bdev->bd_disk have the same
lifetime as bdev->bd_inode...
--
To unsubscribe from this list: send the line "unsubscribe linux-block" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html



[Index of Archives]     [Linux RAID]     [Linux SCSI]     [Linux ATA RAID]     [IDE]     [Linux Wireless]     [Linux Kernel]     [ATH6KL]     [Linux Bluetooth]     [Linux Netdev]     [Kernel Newbies]     [Security]     [Git]     [Netfilter]     [Bugtraq]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Device Mapper]

  Powered by Linux