diff mbox series

sunrpc: only free unix grouplist after RCU settles

Message ID 20230330182427.19013-1-jlayton@kernel.org (mailing list archive)
State New, archived
Headers show
Series sunrpc: only free unix grouplist after RCU settles | expand

Commit Message

Jeff Layton March 30, 2023, 6:24 p.m. UTC
While the unix_gid object is rcu-freed, the group_info list that it
contains is not. Ensure that we only put the group list reference once
we are really freeing the unix_gid object.

Reported-by: Zhi Li <yieli@redhat.com>
Link: https://bugzilla.redhat.com/show_bug.cgi?id=2183056
Signed-off-by: Jeff Layton <jlayton@kernel.org>
---
 net/sunrpc/svcauth_unix.c | 17 +++++++++++++----
 1 file changed, 13 insertions(+), 4 deletions(-)

Comments

Chuck Lever III March 30, 2023, 6:31 p.m. UTC | #1
Hi Jeff-

> On Mar 30, 2023, at 2:24 PM, Jeff Layton <jlayton@kernel.org> wrote:
> 
> While the unix_gid object is rcu-freed, the group_info list that it
> contains is not. Ensure that we only put the group list reference once
> we are really freeing the unix_gid object.
> 
> Reported-by: Zhi Li <yieli@redhat.com>

Should we also add

Fixes: fd5d2f78261b ("SUNRPC: Make server side AUTH_UNIX use lockless lookups") ?


> Link: https://bugzilla.redhat.com/show_bug.cgi?id=2183056

This bug isn't publicly accessible, fwiw.


> Signed-off-by: Jeff Layton <jlayton@kernel.org>
> ---
> net/sunrpc/svcauth_unix.c | 17 +++++++++++++----
> 1 file changed, 13 insertions(+), 4 deletions(-)
> 
> diff --git a/net/sunrpc/svcauth_unix.c b/net/sunrpc/svcauth_unix.c
> index 50e2eb579194..4485088ce27b 100644
> --- a/net/sunrpc/svcauth_unix.c
> +++ b/net/sunrpc/svcauth_unix.c
> @@ -416,14 +416,23 @@ static int unix_gid_hash(kuid_t uid)
> 	return hash_long(from_kuid(&init_user_ns, uid), GID_HASHBITS);
> }
> 
> -static void unix_gid_put(struct kref *kref)
> +static void unix_gid_free(struct rcu_head *rcu)
> {
> -	struct cache_head *item = container_of(kref, struct cache_head, ref);
> -	struct unix_gid *ug = container_of(item, struct unix_gid, h);
> +	struct unix_gid *ug = container_of(rcu, struct unix_gid, rcu);
> +	struct cache_head *item = &ug->h;
> +
> 	if (test_bit(CACHE_VALID, &item->flags) &&
> 	    !test_bit(CACHE_NEGATIVE, &item->flags))
> 		put_group_info(ug->gi);
> -	kfree_rcu(ug, rcu);
> +	kfree(ug);
> +}
> +
> +static void unix_gid_put(struct kref *kref)
> +{
> +	struct cache_head *item = container_of(kref, struct cache_head, ref);
> +	struct unix_gid *ug = container_of(item, struct unix_gid, h);
> +
> +	call_rcu(&ug->rcu, unix_gid_free);
> }
> 
> static int unix_gid_match(struct cache_head *corig, struct cache_head *cnew)
> -- 
> 2.39.2
> 

--
Chuck Lever
Jeff Layton March 30, 2023, 6:49 p.m. UTC | #2
On Thu, 2023-03-30 at 18:31 +0000, Chuck Lever III wrote:
> Hi Jeff-
> 
> > On Mar 30, 2023, at 2:24 PM, Jeff Layton <jlayton@kernel.org> wrote:
> > 
> > While the unix_gid object is rcu-freed, the group_info list that it
> > contains is not. Ensure that we only put the group list reference once
> > we are really freeing the unix_gid object.
> > 
> > Reported-by: Zhi Li <yieli@redhat.com>
> 
> Should we also add
> 
> Fixes: fd5d2f78261b ("SUNRPC: Make server side AUTH_UNIX use lockless lookups") ?
> 
> 

Sure. That does look like when that particular bug crept in.
 
> > Link: https://bugzilla.redhat.com/show_bug.cgi?id=2183056
> 
> This bug isn't publicly accessible, fwiw.
> 

Thanks. It should be now.

> 
> > Signed-off-by: Jeff Layton <jlayton@kernel.org>
> > ---
> > net/sunrpc/svcauth_unix.c | 17 +++++++++++++----
> > 1 file changed, 13 insertions(+), 4 deletions(-)
> > 
> > diff --git a/net/sunrpc/svcauth_unix.c b/net/sunrpc/svcauth_unix.c
> > index 50e2eb579194..4485088ce27b 100644
> > --- a/net/sunrpc/svcauth_unix.c
> > +++ b/net/sunrpc/svcauth_unix.c
> > @@ -416,14 +416,23 @@ static int unix_gid_hash(kuid_t uid)
> > 	return hash_long(from_kuid(&init_user_ns, uid), GID_HASHBITS);
> > }
> > 
> > -static void unix_gid_put(struct kref *kref)
> > +static void unix_gid_free(struct rcu_head *rcu)
> > {
> > -	struct cache_head *item = container_of(kref, struct cache_head, ref);
> > -	struct unix_gid *ug = container_of(item, struct unix_gid, h);
> > +	struct unix_gid *ug = container_of(rcu, struct unix_gid, rcu);
> > +	struct cache_head *item = &ug->h;
> > +
> > 	if (test_bit(CACHE_VALID, &item->flags) &&
> > 	    !test_bit(CACHE_NEGATIVE, &item->flags))
> > 		put_group_info(ug->gi);
> > -	kfree_rcu(ug, rcu);
> > +	kfree(ug);
> > +}
> > +
> > +static void unix_gid_put(struct kref *kref)
> > +{
> > +	struct cache_head *item = container_of(kref, struct cache_head, ref);
> > +	struct unix_gid *ug = container_of(item, struct unix_gid, h);
> > +
> > +	call_rcu(&ug->rcu, unix_gid_free);
> > }
> > 
> > static int unix_gid_match(struct cache_head *corig, struct cache_head *cnew)
> > -- 
> > 2.39.2
> > 
> 
> --
> Chuck Lever
> 
>
Chuck Lever III March 30, 2023, 7:33 p.m. UTC | #3
> On Mar 30, 2023, at 2:49 PM, Jeff Layton <jlayton@kernel.org> wrote:
> 
> On Thu, 2023-03-30 at 18:31 +0000, Chuck Lever III wrote:
>> Hi Jeff-
>> 
>>> On Mar 30, 2023, at 2:24 PM, Jeff Layton <jlayton@kernel.org> wrote:
>>> 
>>> While the unix_gid object is rcu-freed, the group_info list that it
>>> contains is not. Ensure that we only put the group list reference once
>>> we are really freeing the unix_gid object.
>>> 
>>> Reported-by: Zhi Li <yieli@redhat.com>
>> 
>> Should we also add
>> 
>> Fixes: fd5d2f78261b ("SUNRPC: Make server side AUTH_UNIX use lockless lookups") ?
>> 
>> 
> 
> Sure. That does look like when that particular bug crept in.
> 
>>> Link: https://bugzilla.redhat.com/show_bug.cgi?id=2183056
>> 
>> This bug isn't publicly accessible, fwiw.
>> 
> 
> Thanks. It should be now.

OK, applied to nfsd-fixes!


>>> Signed-off-by: Jeff Layton <jlayton@kernel.org>
>>> ---
>>> net/sunrpc/svcauth_unix.c | 17 +++++++++++++----
>>> 1 file changed, 13 insertions(+), 4 deletions(-)
>>> 
>>> diff --git a/net/sunrpc/svcauth_unix.c b/net/sunrpc/svcauth_unix.c
>>> index 50e2eb579194..4485088ce27b 100644
>>> --- a/net/sunrpc/svcauth_unix.c
>>> +++ b/net/sunrpc/svcauth_unix.c
>>> @@ -416,14 +416,23 @@ static int unix_gid_hash(kuid_t uid)
>>> 	return hash_long(from_kuid(&init_user_ns, uid), GID_HASHBITS);
>>> }
>>> 
>>> -static void unix_gid_put(struct kref *kref)
>>> +static void unix_gid_free(struct rcu_head *rcu)
>>> {
>>> -	struct cache_head *item = container_of(kref, struct cache_head, ref);
>>> -	struct unix_gid *ug = container_of(item, struct unix_gid, h);
>>> +	struct unix_gid *ug = container_of(rcu, struct unix_gid, rcu);
>>> +	struct cache_head *item = &ug->h;
>>> +
>>> 	if (test_bit(CACHE_VALID, &item->flags) &&
>>> 	    !test_bit(CACHE_NEGATIVE, &item->flags))
>>> 		put_group_info(ug->gi);
>>> -	kfree_rcu(ug, rcu);
>>> +	kfree(ug);
>>> +}
>>> +
>>> +static void unix_gid_put(struct kref *kref)
>>> +{
>>> +	struct cache_head *item = container_of(kref, struct cache_head, ref);
>>> +	struct unix_gid *ug = container_of(item, struct unix_gid, h);
>>> +
>>> +	call_rcu(&ug->rcu, unix_gid_free);
>>> }
>>> 
>>> static int unix_gid_match(struct cache_head *corig, struct cache_head *cnew)
>>> -- 
>>> 2.39.2
>>> 
>> 
>> --
>> Chuck Lever
>> 
>> 
> 
> -- 
> Jeff Layton <jlayton@kernel.org>

--
Chuck Lever
diff mbox series

Patch

diff --git a/net/sunrpc/svcauth_unix.c b/net/sunrpc/svcauth_unix.c
index 50e2eb579194..4485088ce27b 100644
--- a/net/sunrpc/svcauth_unix.c
+++ b/net/sunrpc/svcauth_unix.c
@@ -416,14 +416,23 @@  static int unix_gid_hash(kuid_t uid)
 	return hash_long(from_kuid(&init_user_ns, uid), GID_HASHBITS);
 }
 
-static void unix_gid_put(struct kref *kref)
+static void unix_gid_free(struct rcu_head *rcu)
 {
-	struct cache_head *item = container_of(kref, struct cache_head, ref);
-	struct unix_gid *ug = container_of(item, struct unix_gid, h);
+	struct unix_gid *ug = container_of(rcu, struct unix_gid, rcu);
+	struct cache_head *item = &ug->h;
+
 	if (test_bit(CACHE_VALID, &item->flags) &&
 	    !test_bit(CACHE_NEGATIVE, &item->flags))
 		put_group_info(ug->gi);
-	kfree_rcu(ug, rcu);
+	kfree(ug);
+}
+
+static void unix_gid_put(struct kref *kref)
+{
+	struct cache_head *item = container_of(kref, struct cache_head, ref);
+	struct unix_gid *ug = container_of(item, struct unix_gid, h);
+
+	call_rcu(&ug->rcu, unix_gid_free);
 }
 
 static int unix_gid_match(struct cache_head *corig, struct cache_head *cnew)