Received: by 2002:a25:1985:0:0:0:0:0 with SMTP id 127csp2331478ybz; Thu, 23 Apr 2020 16:10:35 -0700 (PDT) X-Google-Smtp-Source: APiQypJ1MVmWWlcs/16mbiCluxmFLyeIo7+mpefiggHrJjsVOmJpCx/Zt93GzsnYddymrAA1N+bA X-Received: by 2002:a17:906:7204:: with SMTP id m4mr4818865ejk.48.1587683435133; Thu, 23 Apr 2020 16:10:35 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1587683435; cv=none; d=google.com; s=arc-20160816; b=q639LgycAEjO1rMW/LAj9oGsz5O0MTT8A1EKqgNGTsm5w4pD5QCKJop11t78PR/tTX ZaBDb3bIPJ0m1PObpyIuIpnccvXqjltLG971omZaDiqf+9oeQGuZh+LUm7Uhp5FCjm6B FlGcV4+3vvzsmcgenvPNqqdonq10L9HqliRKtVn/BiHsYVgSy6VBPxbzNN8eByG0lYXm CTjW+muqTnXtVK/EXk1fhXnhOl0PoecSkxO0+tLcaEhAtMWFgt2Ra61V0WzVmoWSC+Gf snIYjOb3UPDPe8U1CS2INJ9lDIYskD4Khd51yl61Ni3YYRtQdS9GfcCDVb95eThY8byA dckA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:subject:message-id:date:cc:to :from:mime-version:content-transfer-encoding:content-disposition; bh=72PNKX3FYLc9xda3996ue84hbTgyOfQgLz8PT1zEUBw=; b=w6O16nZ7kZtbdBJs9RzCYhhOwug6xJo0HoTauMTy2g50Z/7hjeHEadhh7rHt4/xRGi B7+vXDj8dJTBYuGAV34g2MqbWkiEqLgYFjZccGqTcphyxSB6itF6GED+amgm4qtn9Fzv 7iRWPrk3E+/voCYPIeETLvBY02JK8WVczAZwIKvPaiQdO1ipQ2GuyxyCMlTxTEGXG5xw 1Ns6VLjKnFZmNrXfKoHeUk6LHWkryyHJFrBNI6ZeGqAyqFJAsCeoSW28KQPfB0gQr+am edGRB2dn0dMCeBouQf/IKlaZHAIeDNC39HvD0xES+wcABKuajh1fe2xcZmQknqKKWL9O TuhA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id dn6si2096516edb.514.2020.04.23.16.10.11; Thu, 23 Apr 2020 16:10:35 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728869AbgDWXH0 (ORCPT + 99 others); Thu, 23 Apr 2020 19:07:26 -0400 Received: from shadbolt.e.decadent.org.uk ([88.96.1.126]:50448 "EHLO shadbolt.e.decadent.org.uk" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728603AbgDWXGy (ORCPT ); Thu, 23 Apr 2020 19:06:54 -0400 Received: from [192.168.4.242] (helo=deadeye) by shadbolt.decadent.org.uk with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.89) (envelope-from ) id 1jRkvf-0004tC-UC; Fri, 24 Apr 2020 00:06:48 +0100 Received: from ben by deadeye with local (Exim 4.93) (envelope-from ) id 1jRkva-00E70g-PO; Fri, 24 Apr 2020 00:06:42 +0100 Content-Type: text/plain; charset="UTF-8" Content-Disposition: inline Content-Transfer-Encoding: 8bit MIME-Version: 1.0 From: Ben Hutchings To: linux-kernel@vger.kernel.org, stable@vger.kernel.org CC: akpm@linux-foundation.org, Denis Kirjanov , "Cengiz Can" , "Bob Liu" , "Steven Rostedt (VMware)" , "Ming Lei" , "Jens Axboe" Date: Fri, 24 Apr 2020 00:07:20 +0100 Message-ID: X-Mailer: LinuxStableQueue (scripts by bwh) X-Patchwork-Hint: ignore Subject: [PATCH 3.16 213/245] blktrace: fix dereference after null check In-Reply-To: X-SA-Exim-Connect-IP: 192.168.4.242 X-SA-Exim-Mail-From: ben@decadent.org.uk X-SA-Exim-Scanned: No (on shadbolt.decadent.org.uk); SAEximRunCond expanded to false Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 3.16.83-rc1 review patch. If anyone has any objections, please let me know. ------------------ From: Cengiz Can commit 153031a301bb07194e9c37466cfce8eacb977621 upstream. There was a recent change in blktrace.c that added a RCU protection to `q->blk_trace` in order to fix a use-after-free issue during access. However the change missed an edge case that can lead to dereferencing of `bt` pointer even when it's NULL: Coverity static analyzer marked this as a FORWARD_NULL issue with CID 1460458. ``` /kernel/trace/blktrace.c: 1904 in sysfs_blk_trace_attr_store() 1898 ret = 0; 1899 if (bt == NULL) 1900 ret = blk_trace_setup_queue(q, bdev); 1901 1902 if (ret == 0) { 1903 if (attr == &dev_attr_act_mask) >>> CID 1460458: Null pointer dereferences (FORWARD_NULL) >>> Dereferencing null pointer "bt". 1904 bt->act_mask = value; 1905 else if (attr == &dev_attr_pid) 1906 bt->pid = value; 1907 else if (attr == &dev_attr_start_lba) 1908 bt->start_lba = value; 1909 else if (attr == &dev_attr_end_lba) ``` Added a reassignment with RCU annotation to fix the issue. Fixes: c780e86dd48 ("blktrace: Protect q->blk_trace with RCU") Reviewed-by: Ming Lei Reviewed-by: Bob Liu Reviewed-by: Steven Rostedt (VMware) Signed-off-by: Cengiz Can Signed-off-by: Jens Axboe Signed-off-by: Ben Hutchings --- kernel/trace/blktrace.c | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) --- a/kernel/trace/blktrace.c +++ b/kernel/trace/blktrace.c @@ -1834,8 +1834,11 @@ static ssize_t sysfs_blk_trace_attr_stor } ret = 0; - if (bt == NULL) + if (bt == NULL) { ret = blk_trace_setup_queue(q, bdev); + bt = rcu_dereference_protected(q->blk_trace, + lockdep_is_held(&q->blk_trace_mutex)); + } if (ret == 0) { if (attr == &dev_attr_act_mask)