Revision 7ff57e98fb78ad94edafbdc7435f2d745e9e6bb5 authored by Fabio M. De Francesco on 23 February 2022, 10:02:52 UTC, committed by Jakub Kicinski on 24 February 2022, 17:09:33 UTC
smc_pnetid_by_table_ib() uses read_lock() and then it calls smc_pnet_apply_ib()
which, in turn, calls mutex_lock(&smc_ib_devices.mutex).

read_lock() disables preemption. Therefore, the code acquires a mutex while in
atomic context and it leads to a SAC bug.

Fix this bug by replacing the rwlock with a mutex.

Reported-and-tested-by: syzbot+4f322a6d84e991c38775@syzkaller.appspotmail.com
Fixes: 64e28b52c7a6 ("net/smc: add pnet table namespace support")
Confirmed-by: Tony Lu <tonylu@linux.alibaba.com>
Signed-off-by: Fabio M. De Francesco <fmdefrancesco@gmail.com>
Acked-by: Karsten Graul <kgraul@linux.ibm.com>
Link: https://lore.kernel.org/r/20220223100252.22562-1-fmdefrancesco@gmail.com
Signed-off-by: Jakub Kicinski <kuba@kernel.org>
1 parent e13ad14
History
File Mode Size
crush
Kconfig -rw-r--r-- 1.2 KB
Makefile -rw-r--r-- 472 bytes
armor.c -rw-r--r-- 1.9 KB
auth.c -rw-r--r-- 15.7 KB
auth_none.c -rw-r--r-- 3.1 KB
auth_none.h -rw-r--r-- 482 bytes
auth_x.c -rw-r--r-- 26.8 KB
auth_x.h -rw-r--r-- 1013 bytes
auth_x_protocol.h -rw-r--r-- 1.9 KB
buffer.c -rw-r--r-- 1.2 KB
ceph_common.c -rw-r--r-- 23.0 KB
ceph_hash.c -rw-r--r-- 2.9 KB
ceph_strings.c -rw-r--r-- 1.6 KB
cls_lock_client.c -rw-r--r-- 11.7 KB
crypto.c -rw-r--r-- 8.0 KB
crypto.h -rw-r--r-- 1.1 KB
debugfs.c -rw-r--r-- 12.3 KB
decode.c -rw-r--r-- 4.6 KB
messenger.c -rw-r--r-- 54.0 KB
messenger_v1.c -rw-r--r-- 38.9 KB
messenger_v2.c -rw-r--r-- 91.2 KB
mon_client.c -rw-r--r-- 38.2 KB
msgpool.c -rw-r--r-- 2.3 KB
osd_client.c -rw-r--r-- 147.1 KB
osdmap.c -rw-r--r-- 70.2 KB
pagelist.c -rw-r--r-- 4.0 KB
pagevec.c -rw-r--r-- 3.3 KB
snapshot.c -rw-r--r-- 1.6 KB
string_table.c -rw-r--r-- 2.2 KB
striper.c -rw-r--r-- 7.7 KB

back to top