Received: by 2002:a25:1985:0:0:0:0:0 with SMTP id 127csp3867758ybz; Mon, 4 May 2020 11:10:45 -0700 (PDT) X-Google-Smtp-Source: APiQypLA69fEVh9n32kO4AM1IppC5qlF+yGXwjS2iW/8K1qtGuTBX8XFqlpygrTfv8m/EKvtF00R X-Received: by 2002:a17:906:17c5:: with SMTP id u5mr16109494eje.275.1588615845264; Mon, 04 May 2020 11:10:45 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1588615845; cv=none; d=google.com; s=arc-20160816; b=sCdF4jGAbFvTXJ9KU6hX3dXtnOe/aps/7kxNywPcwsoDmeVB35QFchQPEC+m6j3I21 m0FsxEFj5Ny2sK9Wqj8tvx3t3MXAGcDDUlR5sAMiYXvVlxUlv0svc0Lg2svnbzBGaZLD 8DNn/Q+RikClpEJ2KUI/VqGpgeYvinj/8UcQaO5xFpcIWT6KRxgXGyRjeV+aSScBsPXt p/oV3TOUq4ZGvWYSNw3I4YMq+yWwf2YPR/xLfhbVxkNhNiFeFEG8j3POpRt+4BksCgMw m0zlk01VxZF9RGeQgrKwYnuq60GwarXJbDJAmLBylZ+d2UdEP+WrinT2k+VrTngXa4La zJ2Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=GZvPE25XcutHHUqV6yLlyS79MgWBHdd2BA6u6usibHA=; b=vicVeGTs78Bs7OrsUtn4JraK8i0byyLxaCucuFQf+4oaH72szN5Unqq2xf6raf5xV9 MWF8gHeAeD4UrpTocQ3UjULh1QPlXtSTTCp2gZ59yRTYQSJx9LFt3XqmFkXXPW/7BIVW JnQUN1xVyt+u6CKhPpQL00aTR0XJWZCizhEbvvDQwqv0OZ0IdJVeT8JovpVnoc9gBemW GkK39IVMqy9jIDLatbAGehJMWQaHC2BsqTAgUG4GGGLfZWsiGCDaaQPfVuRv3cwXzLTS IWvSBcTXeVGOLY0OpWbSTBSAwbF9dOCuifwGrOczvneRO2uPHi+UI9iw2thW3xnfJnC1 yHXw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Kgg+7B9R; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id v10si7819088edl.365.2020.05.04.11.10.19; Mon, 04 May 2020 11:10:45 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Kgg+7B9R; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732002AbgEDSGm (ORCPT + 99 others); Mon, 4 May 2020 14:06:42 -0400 Received: from mail.kernel.org ([198.145.29.99]:37130 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731397AbgEDSGk (ORCPT ); Mon, 4 May 2020 14:06:40 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id AD7E02075A; Mon, 4 May 2020 18:06:38 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1588615599; bh=l2pz1Q/etFufQ9FGN6o4PN+pFteV/HMU9wnCVm0Kyvg=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=Kgg+7B9RDIPs/7kQOV0tehfv57ckm+fFEkyevCPQPtpRgrz8PBUoGeWBCD6T2hYqu wfYAM1VOE+Ep/+5HemTKpwQt1I4AlfMmXHDMzjJK0VRARghq4EXUtWm28GEX7iER11 POoq7Pe1EdrX3X19xwwrCMIkMIidG7K0M4gYwmzE= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Jason Gunthorpe , Leon Romanovsky Subject: [PATCH 5.6 47/73] RDMA/core: Prevent mixed use of FDs between shared ufiles Date: Mon, 4 May 2020 19:57:50 +0200 Message-Id: <20200504165508.915229051@linuxfoundation.org> X-Mailer: git-send-email 2.26.2 In-Reply-To: <20200504165501.781878940@linuxfoundation.org> References: <20200504165501.781878940@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Leon Romanovsky commit 0fb00941dc63990a10951146df216fc7b0e20bc2 upstream. FDs can only be used on the ufile that created them, they cannot be mixed to other ufiles. We are lacking a check to prevent it. BUG: KASAN: null-ptr-deref in atomic64_sub_and_test include/asm-generic/atomic-instrumented.h:1547 [inline] BUG: KASAN: null-ptr-deref in atomic_long_sub_and_test include/asm-generic/atomic-long.h:460 [inline] BUG: KASAN: null-ptr-deref in fput_many+0x1a/0x140 fs/file_table.c:336 Write of size 8 at addr 0000000000000038 by task syz-executor179/284 CPU: 0 PID: 284 Comm: syz-executor179 Not tainted 5.5.0-rc5+ #1 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.12.1-0-ga5cab58e9a3f-prebuilt.qemu.org 04/01/2014 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x94/0xce lib/dump_stack.c:118 __kasan_report+0x18f/0x1b7 mm/kasan/report.c:510 kasan_report+0xe/0x20 mm/kasan/common.c:639 check_memory_region_inline mm/kasan/generic.c:185 [inline] check_memory_region+0x15d/0x1b0 mm/kasan/generic.c:192 atomic64_sub_and_test include/asm-generic/atomic-instrumented.h:1547 [inline] atomic_long_sub_and_test include/asm-generic/atomic-long.h:460 [inline] fput_many+0x1a/0x140 fs/file_table.c:336 rdma_lookup_put_uobject+0x85/0x130 drivers/infiniband/core/rdma_core.c:692 uobj_put_read include/rdma/uverbs_std_types.h:96 [inline] _ib_uverbs_lookup_comp_file drivers/infiniband/core/uverbs_cmd.c:198 [inline] create_cq+0x375/0xba0 drivers/infiniband/core/uverbs_cmd.c:1006 ib_uverbs_create_cq+0x114/0x140 drivers/infiniband/core/uverbs_cmd.c:1089 ib_uverbs_write+0xaa5/0xdf0 drivers/infiniband/core/uverbs_main.c:769 __vfs_write+0x7c/0x100 fs/read_write.c:494 vfs_write+0x168/0x4a0 fs/read_write.c:558 ksys_write+0xc8/0x200 fs/read_write.c:611 do_syscall_64+0x9c/0x390 arch/x86/entry/common.c:294 entry_SYSCALL_64_after_hwframe+0x44/0xa9 RIP: 0033:0x44ef99 Code: 00 b8 00 01 00 00 eb e1 e8 74 1c 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c4 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007ffc0b74c028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 RAX: ffffffffffffffda RBX: 00007ffc0b74c030 RCX: 000000000044ef99 RDX: 0000000000000040 RSI: 0000000020000040 RDI: 0000000000000005 RBP: 00007ffc0b74c038 R08: 0000000000401830 R09: 0000000000401830 R10: 00007ffc0b74c038 R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000000 R14: 00000000006be018 R15: 0000000000000000 Fixes: cf8966b3477d ("IB/core: Add support for fd objects") Link: https://lore.kernel.org/r/20200421082929.311931-2-leon@kernel.org Suggested-by: Jason Gunthorpe Signed-off-by: Leon Romanovsky Signed-off-by: Jason Gunthorpe Signed-off-by: Greg Kroah-Hartman --- drivers/infiniband/core/rdma_core.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/drivers/infiniband/core/rdma_core.c +++ b/drivers/infiniband/core/rdma_core.c @@ -360,7 +360,7 @@ lookup_get_fd_uobject(const struct uverb * uverbs_uobject_fd_release(), and the caller is expected to ensure * that release is never done while a call to lookup is possible. */ - if (f->f_op != fd_type->fops) { + if (f->f_op != fd_type->fops || uobject->ufile != ufile) { fput(f); return ERR_PTR(-EBADF); }