diff mbox series

SUNRPC/TLS: Lock the lower_xprt during the tls handshake

Message ID 20230926210322.184335-1-anna@kernel.org (mailing list archive)
State New, archived
Headers show
Series SUNRPC/TLS: Lock the lower_xprt during the tls handshake | expand

Commit Message

Anna Schumaker Sept. 26, 2023, 9:03 p.m. UTC
From: Anna Schumaker <Anna.Schumaker@Netapp.com>

Otherwise we run the risk of having the lower_xprt freed from underneath
us, causing an oops that looks like this:

[  224.150698] BUG: kernel NULL pointer dereference, address: 0000000000000018
[  224.150951] #PF: supervisor read access in kernel mode
[  224.151117] #PF: error_code(0x0000) - not-present page
[  224.151278] PGD 0 P4D 0
[  224.151361] Oops: 0000 [#1] PREEMPT SMP NOPTI
[  224.151499] CPU: 2 PID: 99 Comm: kworker/u10:6 Not tainted 6.6.0-rc3-g6465e260f487 #41264 a00b0960990fb7bc6d6a330ee03588b67f08a47b
[  224.151977] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS unknown 2/2/2022
[  224.152216] Workqueue: xprtiod xs_tcp_tls_setup_socket [sunrpc]
[  224.152434] RIP: 0010:xs_tcp_tls_setup_socket+0x3cc/0x7e0 [sunrpc]
[  224.152643] Code: 00 00 48 8b 7c 24 08 e9 f3 01 00 00 48 83 7b c0 00 0f 85 d2 01 00 00 49 8d 84 24 f8 05 00 00 48 89 44 24 10 48 8b 00 48 89 c5 <4c> 8b 68 18 66 41 83 3f 0a 75 71 45 31 ff 4c 89 ef 31 f6 e8 5c 76
[  224.153246] RSP: 0018:ffffb00ec060fd18 EFLAGS: 00010246
[  224.153427] RAX: 0000000000000000 RBX: ffff8c06c2e53e40 RCX: 0000000000000001
[  224.153652] RDX: ffff8c073bca2408 RSI: 0000000000000282 RDI: ffff8c06c259ee00
[  224.153868] RBP: 0000000000000000 R08: ffffffff9da55aa0 R09: 0000000000000001
[  224.154084] R10: 00000034306c30f1 R11: 0000000000000002 R12: ffff8c06c2e51800
[  224.154300] R13: ffff8c06c355d400 R14: 0000000004208160 R15: ffff8c06c2e53820
[  224.154521] FS:  0000000000000000(0000) GS:ffff8c073bd00000(0000) knlGS:0000000000000000
[  224.154763] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  224.154940] CR2: 0000000000000018 CR3: 0000000062c1e000 CR4: 0000000000750ee0
[  224.155157] PKRU: 55555554
[  224.155244] Call Trace:
[  224.155325]  <TASK>
[  224.155395]  ? __die_body+0x68/0xb0
[  224.155507]  ? page_fault_oops+0x34c/0x3a0
[  224.155635]  ? _raw_spin_unlock_irqrestore+0xe/0x40
[  224.155793]  ? exc_page_fault+0x7a/0x1b0
[  224.155916]  ? asm_exc_page_fault+0x26/0x30
[  224.156047]  ? xs_tcp_tls_setup_socket+0x3cc/0x7e0 [sunrpc ae3a15912ae37fd51dafbdbc2dbd069117f8f5c8]
[  224.156367]  ? xs_tcp_tls_setup_socket+0x2fe/0x7e0 [sunrpc ae3a15912ae37fd51dafbdbc2dbd069117f8f5c8]
[  224.156697]  ? __pfx_xs_tls_handshake_done+0x10/0x10 [sunrpc ae3a15912ae37fd51dafbdbc2dbd069117f8f5c8]
[  224.157013]  process_scheduled_works+0x24e/0x450
[  224.157158]  worker_thread+0x21c/0x2d0
[  224.157275]  ? __pfx_worker_thread+0x10/0x10
[  224.157409]  kthread+0xe8/0x110
[  224.157510]  ? __pfx_kthread+0x10/0x10
[  224.157628]  ret_from_fork+0x37/0x50
[  224.157741]  ? __pfx_kthread+0x10/0x10
[  224.157859]  ret_from_fork_asm+0x1b/0x30
[  224.157983]  </TASK>

Signed-off-by: Anna Schumaker <Anna.Schumaker@Netapp.com>
---
 net/sunrpc/xprtsock.c | 6 ++++++
 1 file changed, 6 insertions(+)

Comments

Anna Schumaker Sept. 27, 2023, 2:32 p.m. UTC | #1
On Tue, Sep 26, 2023 at 5:17 PM Chuck Lever III <chuck.lever@oracle.com> wrote:
>
>
>
> > On Sep 26, 2023, at 5:03 PM, Anna Schumaker <anna@kernel.org> wrote:
> >
> > From: Anna Schumaker <Anna.Schumaker@Netapp.com>
> >
> > Otherwise we run the risk of having the lower_xprt freed from underneath
> > us, causing an oops that looks like this:
> >
> > [  224.150698] BUG: kernel NULL pointer dereference, address: 0000000000000018
> > [  224.150951] #PF: supervisor read access in kernel mode
> > [  224.151117] #PF: error_code(0x0000) - not-present page
> > [  224.151278] PGD 0 P4D 0
> > [  224.151361] Oops: 0000 [#1] PREEMPT SMP NOPTI
> > [  224.151499] CPU: 2 PID: 99 Comm: kworker/u10:6 Not tainted 6.6.0-rc3-g6465e260f487 #41264 a00b0960990fb7bc6d6a330ee03588b67f08a47b
> > [  224.151977] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS unknown 2/2/2022
> > [  224.152216] Workqueue: xprtiod xs_tcp_tls_setup_socket [sunrpc]
> > [  224.152434] RIP: 0010:xs_tcp_tls_setup_socket+0x3cc/0x7e0 [sunrpc]
> > [  224.152643] Code: 00 00 48 8b 7c 24 08 e9 f3 01 00 00 48 83 7b c0 00 0f 85 d2 01 00 00 49 8d 84 24 f8 05 00 00 48 89 44 24 10 48 8b 00 48 89 c5 <4c> 8b 68 18 66 41 83 3f 0a 75 71 45 31 ff 4c 89 ef 31 f6 e8 5c 76
> > [  224.153246] RSP: 0018:ffffb00ec060fd18 EFLAGS: 00010246
> > [  224.153427] RAX: 0000000000000000 RBX: ffff8c06c2e53e40 RCX: 0000000000000001
> > [  224.153652] RDX: ffff8c073bca2408 RSI: 0000000000000282 RDI: ffff8c06c259ee00
> > [  224.153868] RBP: 0000000000000000 R08: ffffffff9da55aa0 R09: 0000000000000001
> > [  224.154084] R10: 00000034306c30f1 R11: 0000000000000002 R12: ffff8c06c2e51800
> > [  224.154300] R13: ffff8c06c355d400 R14: 0000000004208160 R15: ffff8c06c2e53820
> > [  224.154521] FS:  0000000000000000(0000) GS:ffff8c073bd00000(0000) knlGS:0000000000000000
> > [  224.154763] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
> > [  224.154940] CR2: 0000000000000018 CR3: 0000000062c1e000 CR4: 0000000000750ee0
> > [  224.155157] PKRU: 55555554
> > [  224.155244] Call Trace:
> > [  224.155325]  <TASK>
> > [  224.155395]  ? __die_body+0x68/0xb0
> > [  224.155507]  ? page_fault_oops+0x34c/0x3a0
> > [  224.155635]  ? _raw_spin_unlock_irqrestore+0xe/0x40
> > [  224.155793]  ? exc_page_fault+0x7a/0x1b0
> > [  224.155916]  ? asm_exc_page_fault+0x26/0x30
> > [  224.156047]  ? xs_tcp_tls_setup_socket+0x3cc/0x7e0 [sunrpc ae3a15912ae37fd51dafbdbc2dbd069117f8f5c8]
> > [  224.156367]  ? xs_tcp_tls_setup_socket+0x2fe/0x7e0 [sunrpc ae3a15912ae37fd51dafbdbc2dbd069117f8f5c8]
> > [  224.156697]  ? __pfx_xs_tls_handshake_done+0x10/0x10 [sunrpc ae3a15912ae37fd51dafbdbc2dbd069117f8f5c8]
> > [  224.157013]  process_scheduled_works+0x24e/0x450
> > [  224.157158]  worker_thread+0x21c/0x2d0
> > [  224.157275]  ? __pfx_worker_thread+0x10/0x10
> > [  224.157409]  kthread+0xe8/0x110
> > [  224.157510]  ? __pfx_kthread+0x10/0x10
> > [  224.157628]  ret_from_fork+0x37/0x50
> > [  224.157741]  ? __pfx_kthread+0x10/0x10
> > [  224.157859]  ret_from_fork_asm+0x1b/0x30
> > [  224.157983]  </TASK>
> >
> > Signed-off-by: Anna Schumaker <Anna.Schumaker@Netapp.com>
>
> I don't have any quibbles with this. Thanks!

Great! I'm putting together another client bugfixes pull request for
6.6, so I'll plan to include it in that!

Anna

>
> Reviewed-by: Chuck Lever <chuck.lever@oracle.com <mailto:chuck.lever@oracle.com>>
>
>
> > ---
> > net/sunrpc/xprtsock.c | 6 ++++++
> > 1 file changed, 6 insertions(+)
> >
> > diff --git a/net/sunrpc/xprtsock.c b/net/sunrpc/xprtsock.c
> > index 71cd916e384f..a15bf2ede89b 100644
> > --- a/net/sunrpc/xprtsock.c
> > +++ b/net/sunrpc/xprtsock.c
> > @@ -2672,6 +2672,10 @@ static void xs_tcp_tls_setup_socket(struct work_struct *work)
> > rcu_read_lock();
> > lower_xprt = rcu_dereference(lower_clnt->cl_xprt);
> > rcu_read_unlock();
> > +
> > + if (wait_on_bit_lock(&lower_xprt->state, XPRT_LOCKED, TASK_KILLABLE))
> > + goto out_unlock;
> > +
> > status = xs_tls_handshake_sync(lower_xprt, &upper_xprt->xprtsec);
> > if (status) {
> > trace_rpc_tls_not_started(upper_clnt, upper_xprt);
> > @@ -2681,6 +2685,7 @@ static void xs_tcp_tls_setup_socket(struct work_struct *work)
> > status = xs_tcp_tls_finish_connecting(lower_xprt, upper_transport);
> > if (status)
> > goto out_close;
> > + xprt_release_write(lower_xprt, NULL);
> >
> > trace_rpc_socket_connect(upper_xprt, upper_transport->sock, 0);
> > if (!xprt_test_and_set_connected(upper_xprt)) {
> > @@ -2702,6 +2707,7 @@ static void xs_tcp_tls_setup_socket(struct work_struct *work)
> > return;
> >
> > out_close:
> > + xprt_release_write(lower_xprt, NULL);
> > rpc_shutdown_client(lower_clnt);
> >
> > /* xprt_force_disconnect() wakes tasks with a fixed tk_status code.
> > --
> > 2.42.0
> >
>
> --
> Chuck Lever
>
>
diff mbox series

Patch

diff --git a/net/sunrpc/xprtsock.c b/net/sunrpc/xprtsock.c
index 71cd916e384f..a15bf2ede89b 100644
--- a/net/sunrpc/xprtsock.c
+++ b/net/sunrpc/xprtsock.c
@@ -2672,6 +2672,10 @@  static void xs_tcp_tls_setup_socket(struct work_struct *work)
 	rcu_read_lock();
 	lower_xprt = rcu_dereference(lower_clnt->cl_xprt);
 	rcu_read_unlock();
+
+	if (wait_on_bit_lock(&lower_xprt->state, XPRT_LOCKED, TASK_KILLABLE))
+		goto out_unlock;
+
 	status = xs_tls_handshake_sync(lower_xprt, &upper_xprt->xprtsec);
 	if (status) {
 		trace_rpc_tls_not_started(upper_clnt, upper_xprt);
@@ -2681,6 +2685,7 @@  static void xs_tcp_tls_setup_socket(struct work_struct *work)
 	status = xs_tcp_tls_finish_connecting(lower_xprt, upper_transport);
 	if (status)
 		goto out_close;
+	xprt_release_write(lower_xprt, NULL);
 
 	trace_rpc_socket_connect(upper_xprt, upper_transport->sock, 0);
 	if (!xprt_test_and_set_connected(upper_xprt)) {
@@ -2702,6 +2707,7 @@  static void xs_tcp_tls_setup_socket(struct work_struct *work)
 	return;
 
 out_close:
+	xprt_release_write(lower_xprt, NULL);
 	rpc_shutdown_client(lower_clnt);
 
 	/* xprt_force_disconnect() wakes tasks with a fixed tk_status code.