fs/jfs/jfs_umount.c | 21 +++++++++++---------- 1 file changed, 11 insertions(+), 10 deletions(-)
There is a race condition when accessing ipimap and ipbmap.
CPU1 CPU2
==== ====
jfs_umount
sbi->ipimap = NULL; lmLogSync
sbi->ipbmap = NULL; write_special_inodes
lmLogClose writer(sbi->ipbmap->i_mapping);
writer(sbi->ipimap->i_mapping);
The jfs umount and lmLogSync compete to access ipimap and ipbmap, resulting in
null pointer access to ipimap and ipbmap when executing write_special_inodes.
We can fix it by first closing the log in jfs umount, and then releasing
ipimap/ipbmap.
Reported-by: Hui Guo<guohui.study@gmail.com>
Link: https://lore.kernel.org/all/CAHOo4gKf2mjPX8oAxCBUc74=+OToMdu6pe6iALGCOmXjToFaKw@mail.gmail.com/
Signed-off-by: Edward Adam Davis <eadavis@qq.com>
---
fs/jfs/jfs_umount.c | 21 +++++++++++----------
1 file changed, 11 insertions(+), 10 deletions(-)
diff --git a/fs/jfs/jfs_umount.c b/fs/jfs/jfs_umount.c
index 8ec43f53f686..c5fda516ca85 100644
--- a/fs/jfs/jfs_umount.c
+++ b/fs/jfs/jfs_umount.c
@@ -42,7 +42,7 @@ int jfs_umount(struct super_block *sb)
struct inode *ipaimap = sbi->ipaimap;
struct inode *ipaimap2 = sbi->ipaimap2;
struct jfs_log *log;
- int rc = 0;
+ int rc = 0, sb_update = 0;
jfs_info("UnMount JFS: sb:0x%p", sb);
@@ -51,11 +51,19 @@ int jfs_umount(struct super_block *sb)
*
* if mounted read-write and log based recovery was enabled
*/
- if ((log = sbi->log))
+ if ((log = sbi->log)) {
/*
* Wait for outstanding transactions to be written to log:
*/
jfs_flush_journal(log, 2);
+ /*
+ * close log:
+ *
+ * remove file system from log active file system list.
+ */
+ rc = lmLogClose(sb);
+ sb_update = 1;
+ }
/*
* close fileset inode allocation map (aka fileset inode)
@@ -103,15 +111,8 @@ int jfs_umount(struct super_block *sb)
* consistent state) and log superblock active file system
* list (to signify skip logredo()).
*/
- if (log) { /* log = NULL if read-only mount */
+ if (sb_update) { /* log = NULL if read-only mount */
updateSuper(sb, FM_CLEAN);
-
- /*
- * close log:
- *
- * remove file system from log active file system list.
- */
- rc = lmLogClose(sb);
}
jfs_info("UnMount JFS Complete: rc = %d", rc);
return rc;
--
2.43.0
On Tue, Oct 15, 2024 at 12:50:05PM +0800, Edward Adam Davis wrote: > There is a race condition when accessing ipimap and ipbmap. > > CPU1 CPU2 > ==== ==== > jfs_umount > sbi->ipimap = NULL; lmLogSync how are we unmounting the filesystem while still writing to it?
On Tue, 22 Oct 2024 13:13:59 +0100, Matthew Wilcox wrote: > On Tue, Oct 15, 2024 at 12:50:05PM +0800, Edward Adam Davis wrote: > > There is a race condition when accessing ipimap and ipbmap. > > > > CPU1 CPU2 > > ==== ==== > > jfs_umount > > sbi->ipimap = NULL; lmLogSync > > how are we unmounting the filesystem while still writing to it? Based on the test logs when I reproduced the problem, [ 77.691713][ T7747] jfs sbi: ffff88801d8b0000, jfs_umount [ 77.706091][ T7749] jfs sbi: ffff88801d8b0000, write_special_inodes [ 77.706976][ T7749] jfs ipbmap: 0000000000000000, ipimap: 0000000000000000, write_special_inodes [ 77.708233][ T7749] Oops: general protection fault, probably for non-canonical address 0xdffffc0000000006: 0000 [#1] PREEMPT SMP KASAN PTI [ 77.709985][ T7749] KASAN: null-ptr-deref in range [0x0000000000000030-0x0000000000000037] [ 77.711133][ T7749] CPU: 2 PID: 7749 Comm: rpeml Not tainted 6.10.3-yocto-standard-00118-g7bc0a34d8159 #1 [ 77.712466][ T7749] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.13.0-1ubuntu1.1 04/01/2014 [ 77.712614][ T7765] loop4: detected capacity change from 0 to 32768 [ 77.713219][ T7749] RIP: 0010:write_special_inodes+0x126/0x203 [ 77.715528][ T7749] Code: 48 c1 e0 2a 80 3c 02 00 74 08 4c 89 f7 e8 72 02 c3 f7 4c 8b 73 10 b8 ff ff 37 00 48 c1 e0 2a 49 8d 7e 30 48 89 fa 48 c1 ea 03 <80> 3c 02 00 74 05 e8 4f 02 c3 f7 49 8b 7e 30 c [ 77.718177][ T7749] RSP: 0018:ffffc9001229fbe8 EFLAGS: 00010206 [ 77.719011][ T7749] RAX: dffffc0000000000 RBX: ffff88801d8b0000 RCX: 0000000000000000 [ 77.720088][ T7749] RDX: 0000000000000006 RSI: ffffffff816ef99b RDI: 0000000000000030 [ 77.721187][ T7749] RBP: ffff88810a012000 R08: 0000000000000005 R09: 0000000000000000 [ 77.722284][ T7749] R10: 0000000080000000 R11: 0000000000000001 R12: ffffffff81c2be90 [ 77.723383][ T7749] R13: ffff88801d8b0028 R14: 0000000000000000 R15: ffff88801d8b0038 [ 77.724474][ T7749] FS: 00007f8e58b94740(0000) GS:ffff888063680000(0000) knlGS:0000000000000000 [ 77.725712][ T7749] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 77.726621][ T7749] CR2: 00007fffc26cc6e8 CR3: 0000000108778000 CR4: 00000000000006f0 [ 77.727715][ T7749] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 77.728813][ T7749] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 77.729901][ T7749] Call Trace: [ 77.730354][ T7749] <TASK> [ 77.730764][ T7749] ? die_addr.cold+0xd/0x12 [ 77.731400][ T7749] ? exc_general_protection+0x147/0x240 [ 77.732177][ T7749] ? asm_exc_general_protection+0x26/0x30 [ 77.732992][ T7749] ? __pfx_filemap_flush+0x10/0x10 [ 77.733712][ T7749] ? vprintk+0x8b/0xa0 [ 77.734286][ T7749] ? write_special_inodes+0x126/0x203 [ 77.735036][ T7749] ? write_special_inodes+0xf0/0x203 [ 77.735775][ T7749] lmLogSync+0xe8/0x71e [ 77.736360][ T7749] ? __pfx_lmLogSync+0x10/0x10 [ 77.737032][ T7749] ? dquot_writeback_dquots+0x24f/0xb40 [ 77.737810][ T7749] ? __pfx_dquot_writeback_dquots+0x10/0x10 [ 77.738631][ T7749] jfs_syncpt.cold+0x10/0x15 [ 77.739277][ T7749] jfs_sync_fs+0x88/0xb0 [ 77.739884][ T7749] ? __pfx_jfs_sync_fs+0x10/0x10 [ 77.740582][ T7749] sync_filesystem+0x115/0x290 [ 77.741255][ T7749] generic_shutdown_super+0x83/0x360 [ 77.741998][ T7749] kill_block_super+0x40/0xa0 [ 77.742652][ T7749] deactivate_locked_super+0xc6/0x1b0 [ 77.743405][ T7749] deactivate_super+0xec/0x110 [ 77.744080][ T7749] cleanup_mnt+0x224/0x450 [ 77.744707][ T7749] task_work_run+0x156/0x250 As long as the test runs for a long time, there may be situations where sbi uses the same address (of course, on two different CPUs), at this point, the null pointer dereference issue will be triggered. Based on the tests I conducted later, both T7747 and T7749 triggered the same path when running cleanup_mnt. BR, Edward
© 2016 - 2024 Red Hat, Inc.