Received: by 10.192.165.148 with SMTP id m20csp855956imm; Fri, 27 Apr 2018 08:35:15 -0700 (PDT) X-Google-Smtp-Source: AB8JxZotpUF7uHrGUU/zbaW7MNRl9zGausB/t38LuCoKIWro/LD4TWm0LaVWPd1mjhnOGMV0Z133 X-Received: by 2002:a17:902:207:: with SMTP id 7-v6mr2716059plc.261.1524843315636; Fri, 27 Apr 2018 08:35:15 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1524843315; cv=none; d=google.com; s=arc-20160816; b=sltva2DMMjSdH3Qzz9g18Z6v5tp4RDIARqkyDTReaStFxuaMr8wCJvzuQ8m+fhNWXM QL2fIhpIyVTZ5pxzVWyOH3qkPE9tz8rgJDMQn6y//epFdjae517BWkWD9y7RDE67Q5Ic wCX5IML7ralc3Vrmb4cGeajLoMTUbmtt1df8O3FGLC8B4TMY8tKo/ZeGGuuiXbIrV4qo gy0mQj0YvoWGP70Gk8wBlTpKpVlCoYjEon7AV1BZvqznmyPyP0j3z81n0EnPpRnbtjZI ynV2P8DoGItoa/XcOHg8skpws8Ao/zYR8adpkdWTDkRGYgEOzWsNTz8toZAtMnm5GrkU x3TA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :in-reply-to:message-id:date:subject:cc:to:from:dmarc-filter :arc-authentication-results; bh=SHfZa0x6rPVzbNmIfdwqxK87gt7FarzSdCHyq/xVrQM=; b=PAzsr66eM17+A7x68skjpRJvYGegIq+ufp6fh2NBX1q97ZR/XBwdLfxStLrD2yf0J5 Z1haJmGj5CSCuZt/XPumnWByOewWlSLmxxuOLc/hIDRyd7D1vSP9pSni0s5ZgaqDrqT3 Uad57YL3QaMeRT5e1UrKtS8NL4fGwicaqIBEMOikuIzxnXlCtfSwd9sr5EDreq0aEv2O 84ietZb7T7dF8va5ToK2H8TeaVxTD8TjMfa/3hQ0l7WxSgLzzACu1TG3tmxyT+bg+RK2 4b8kSOo82+q2cnMeaLF0RyKc2GWat0I/WKd2op9N3eaydwMQ8RXiipq0vhOPlZiXOqeT GX9A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id y14-v6si1426996pgo.286.2018.04.27.08.35.01; Fri, 27 Apr 2018 08:35:15 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S933124AbeD0Pd6 (ORCPT + 99 others); Fri, 27 Apr 2018 11:33:58 -0400 Received: from mail.kernel.org ([198.145.29.99]:47676 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932922AbeD0OAa (ORCPT ); Fri, 27 Apr 2018 10:00:30 -0400 Received: from localhost (LFbn-1-12247-202.w90-92.abo.wanadoo.fr [90.92.61.202]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id CE4162189D; Fri, 27 Apr 2018 14:00:29 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org CE4162189D Authentication-Results: mail.kernel.org; dmarc=none (p=none dis=none) header.from=linuxfoundation.org Authentication-Results: mail.kernel.org; spf=fail smtp.mailfrom=gregkh@linuxfoundation.org From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Sahitya Tummala , Theodore Tso , Amit Pundir Subject: [PATCH 3.18 08/24] jbd2: fix use after free in kjournald2() Date: Fri, 27 Apr 2018 15:57:43 +0200 Message-Id: <20180427135631.927496107@linuxfoundation.org> X-Mailer: git-send-email 2.17.0 In-Reply-To: <20180427135631.584839868@linuxfoundation.org> References: <20180427135631.584839868@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 3.18-stable review patch. If anyone has any objections, please let me know. ------------------ From: Sahitya Tummala commit dbfcef6b0f4012c57bc0b6e0e660d5ed12a5eaed upstream. Below is the synchronization issue between unmount and kjournald2 contexts, which results into use after free issue in kjournald2(). Fix this issue by using journal->j_state_lock to synchronize the wait_event() done in journal_kill_thread() and the wake_up() done in kjournald2(). TASK 1: umount cmd: |--jbd2_journal_destroy() { |--journal_kill_thread() { write_lock(&journal->j_state_lock); journal->j_flags |= JBD2_UNMOUNT; ... write_unlock(&journal->j_state_lock); wake_up(&journal->j_wait_commit); TASK 2 wakes up here: kjournald2() { ... checks JBD2_UNMOUNT flag and calls goto end-loop; ... end_loop: write_unlock(&journal->j_state_lock); journal->j_task = NULL; --> If this thread gets pre-empted here, then TASK 1 wait_event will exit even before this thread is completely done. wait_event(journal->j_wait_done_commit, journal->j_task == NULL); ... write_lock(&journal->j_state_lock); write_unlock(&journal->j_state_lock); } |--kfree(journal); } } wake_up(&journal->j_wait_done_commit); --> this step now results into use after free issue. } Signed-off-by: Sahitya Tummala Signed-off-by: Theodore Ts'o Cc: Amit Pundir Signed-off-by: Greg Kroah-Hartman --- fs/jbd2/journal.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/fs/jbd2/journal.c +++ b/fs/jbd2/journal.c @@ -275,11 +275,11 @@ loop: goto loop; end_loop: - write_unlock(&journal->j_state_lock); del_timer_sync(&journal->j_commit_timer); journal->j_task = NULL; wake_up(&journal->j_wait_done_commit); jbd_debug(1, "Journal thread exiting.\n"); + write_unlock(&journal->j_state_lock); return 0; }