Received: by 2002:a25:683:0:0:0:0:0 with SMTP id 125csp2039857ybg; Fri, 5 Jun 2020 04:09:17 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzQAvJqOKroPr76RaY0BtH6lCl3zi4Y4mGrJu0f0UaWPIg7Hb1UaiAkmAcQKFtg47tA0ifN X-Received: by 2002:a17:906:c1c4:: with SMTP id bw4mr970424ejb.452.1591355356949; Fri, 05 Jun 2020 04:09:16 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1591355356; cv=none; d=google.com; s=arc-20160816; b=lOGRyQ33eKKsPycnM9SCF7rp9NGrVb8jAWxy7uVxvcVfYLYvDLbiT/B68GM0fWOH60 kUyasxj2Exmqo/AvCqxd5ebNZupJsldSyYMMKjvGbYrWr0Wj6MkiNQkFB0oU12mW+w+j uYG8xai2DqQC6ukBewFXxzjJGs3gCjOXkwVn5sVqkCl8vT3y5cZhTuzxK+kQT2jGtvhH CuV3cEtJKttSRMAtrPf0SyiYtrEJmJyWe7SALtVsz1pFVW3NybQY8hnGkpuXvd8TRBmF cMtq7NUiF+bppl0x2MipQMJEbXIIKNFgXI1bJfB6ZpzQtkmCZjoKN2/HRbLHPQk/ChNT KDHw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :reply-to:in-reply-to:references:mime-version:dkim-signature; bh=+VjCdw30w2Q+2F0bQm7D6xci037AIztHw8WSQCjuJhc=; b=T51TNy3kaLJaGLLGyuprwpQO97/3ETaj+xvGTorEZNVwHXKDdbikDWOG+K9zEIhXk2 o6P6DPusr8etdaF9ZMgHbaiYnhIIAwjTfzWRRZxuUOGiAWOU/jrdgaEyKo5OADS6IJ9/ 0VuSJXrIT2TdlRwSmOoHWY7LuxgNOKbcGaJ5IuF37rHr/2EfpvgbddQuGygOispmA/HJ NjWgC6f+i0n/T6gCfUOW7UYmgZ80XOrxHblFHuzakW2CR57QemvKZSE9lb2l185cyIis zTha+241qzq9HqMSaxHaLUnTCR6QeCAZx6EDKGN8131fPz0VVA1gVYJQDQd3WR9MPg09 8Liw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=H3KcyY5b; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id pw15si3256994ejb.583.2020.06.05.04.08.54; Fri, 05 Jun 2020 04:09:16 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=H3KcyY5b; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726853AbgFELGT (ORCPT + 99 others); Fri, 5 Jun 2020 07:06:19 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:46634 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726690AbgFELGN (ORCPT ); Fri, 5 Jun 2020 07:06:13 -0400 Received: from mail-il1-x144.google.com (mail-il1-x144.google.com [IPv6:2607:f8b0:4864:20::144]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 331E1C08C5C3; Fri, 5 Jun 2020 04:06:08 -0700 (PDT) Received: by mail-il1-x144.google.com with SMTP id e11so4023483ilr.4; Fri, 05 Jun 2020 04:06:08 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:reply-to:from:date:message-id :subject:to:cc; bh=+VjCdw30w2Q+2F0bQm7D6xci037AIztHw8WSQCjuJhc=; b=H3KcyY5bXpn+V4vb3etflUsQqYoN4droIJGI1EwZT/I4UDpCPIKz4MaNs+6iPTE4Nu PzpeiMA4B9RMmyA0uNibApwQfcnQrC0E+J4DMWs4iXQOvP+XmLXK3ipU4IPDu2Jef6WW 3gVqpL8nyxM4bOKTvmM2Y9BjSRvGf+p9944zAeBD6ojaRBUHdfgid0CLfgUOte/MRw1q Lbp+NV0EI8oTcjc5P1sHEaclOD1A2q5Hu13b01GzFYKUWiFCneoMPp0wWMdEwqHnvbW+ 6uKEWJhrCt1Xo8T0zuE8jNfaK2GE2Md6gDHrK3i0nGCj+6VBtXFaGzzP9DiTENV+tT0E NoTg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:reply-to :from:date:message-id:subject:to:cc; bh=+VjCdw30w2Q+2F0bQm7D6xci037AIztHw8WSQCjuJhc=; b=lQWRHwUPsOqkNJBBeVHEMx26S6TsM4P8SQ5tagQt0QQrinYd8sJxNAhuxIZLrx1z4b mJ4ZblHwN6eCcVXxhHlgBrpYMqFqa8YcbUv570ifHxkV+KCePx7Df7lgY9mYHQPJ5FTe kCtnmGxT6ZQHKFDcyvx80HdlcCA3AcLLDrkYuEXbKAcqgRfMTlDwprhPkU16A22XsM4H oe25qGIT5tncE8t5Sz4Pl6WAij9rfCJeXo/dYU0X/Iyk04wEiBgNGs1PJQGMDpCBK41L ltOpdRHi2CzpWRCZkTXxd/JtfHQJ0RJjxoqgId+MtwMjQ+76y4QhNNgZpwU++2qecIf0 joIA== X-Gm-Message-State: AOAM532tN1jbcoLxLa+pVIF/p0dbBuq66iJYUYcdcsgb+zzEGEkjVOvL mARvFZsQ6G3Omns9N50Tt0dk2HnQJ1y/G9HCXEs= X-Received: by 2002:a92:898e:: with SMTP id w14mr7638188ilk.212.1591355167447; Fri, 05 Jun 2020 04:06:07 -0700 (PDT) MIME-Version: 1.0 References: <20200605104558.16686-1-yanaijie@huawei.com> In-Reply-To: <20200605104558.16686-1-yanaijie@huawei.com> Reply-To: sedat.dilek@gmail.com From: Sedat Dilek Date: Fri, 5 Jun 2020 13:05:55 +0200 Message-ID: Subject: Re: [PATCH v3] block: Fix use-after-free in blkdev_get() To: Jason Yan Cc: viro@zeniv.linux.org.uk, axboe@kernel.dk, linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org, linux-block@vger.kernel.org, Christoph Hellwig , Ming Lei , Jan Kara , Hulk Robot Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Jun 5, 2020 at 12:23 PM Jason Yan wrote: > > In blkdev_get() we call __blkdev_get() to do some internal jobs and if > there is some errors in __blkdev_get(), the bdput() is called which > means we have released the refcount of the bdev (actually the refcount of > the bdev inode). This means we cannot access bdev after that point. But > accually bdev is still accessed in blkdev_get() after calling > __blkdev_get(). This may leads to use-after-free if the refcount is the > last one we released in __blkdev_get(). Let's take a look at the > following scenerio: > > CPU0 CPU1 CPU2 > blkdev_open blkdev_open Remove disk > bd_acquire > blkdev_get > __blkdev_get del_gendisk > bdev_unhash_inode > bd_acquire bdev_get_gendisk > bd_forget failed because of unhashed > bdput > bdput (the last one) > bdev_evict_inode > > access bdev => use after free > > [ 459.350216] BUG: KASAN: use-after-free in __lock_acquire+0x24c1/0x31b0 > [ 459.351190] Read of size 8 at addr ffff88806c815a80 by task syz-executor.0/20132 > [ 459.352347] > [ 459.352594] CPU: 0 PID: 20132 Comm: syz-executor.0 Not tainted 4.19.90 #2 > [ 459.353628] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1ubuntu1 04/01/2014 > [ 459.354947] Call Trace: > [ 459.355337] dump_stack+0x111/0x19e > [ 459.355879] ? __lock_acquire+0x24c1/0x31b0 > [ 459.356523] print_address_description+0x60/0x223 > [ 459.357248] ? __lock_acquire+0x24c1/0x31b0 > [ 459.357887] kasan_report.cold+0xae/0x2d8 > [ 459.358503] __lock_acquire+0x24c1/0x31b0 > [ 459.359120] ? _raw_spin_unlock_irq+0x24/0x40 > [ 459.359784] ? lockdep_hardirqs_on+0x37b/0x580 > [ 459.360465] ? _raw_spin_unlock_irq+0x24/0x40 > [ 459.361123] ? finish_task_switch+0x125/0x600 > [ 459.361812] ? finish_task_switch+0xee/0x600 > [ 459.362471] ? mark_held_locks+0xf0/0xf0 > [ 459.363108] ? __schedule+0x96f/0x21d0 > [ 459.363716] lock_acquire+0x111/0x320 > [ 459.364285] ? blkdev_get+0xce/0xbe0 > [ 459.364846] ? blkdev_get+0xce/0xbe0 > [ 459.365390] __mutex_lock+0xf9/0x12a0 > [ 459.365948] ? blkdev_get+0xce/0xbe0 > [ 459.366493] ? bdev_evict_inode+0x1f0/0x1f0 > [ 459.367130] ? blkdev_get+0xce/0xbe0 > [ 459.367678] ? destroy_inode+0xbc/0x110 > [ 459.368261] ? mutex_trylock+0x1a0/0x1a0 > [ 459.368867] ? __blkdev_get+0x3e6/0x1280 > [ 459.369463] ? bdev_disk_changed+0x1d0/0x1d0 > [ 459.370114] ? blkdev_get+0xce/0xbe0 > [ 459.370656] blkdev_get+0xce/0xbe0 > [ 459.371178] ? find_held_lock+0x2c/0x110 > [ 459.371774] ? __blkdev_get+0x1280/0x1280 > [ 459.372383] ? lock_downgrade+0x680/0x680 > [ 459.373002] ? lock_acquire+0x111/0x320 > [ 459.373587] ? bd_acquire+0x21/0x2c0 > [ 459.374134] ? do_raw_spin_unlock+0x4f/0x250 > [ 459.374780] blkdev_open+0x202/0x290 > [ 459.375325] do_dentry_open+0x49e/0x1050 > [ 459.375924] ? blkdev_get_by_dev+0x70/0x70 > [ 459.376543] ? __x64_sys_fchdir+0x1f0/0x1f0 > [ 459.377192] ? inode_permission+0xbe/0x3a0 > [ 459.377818] path_openat+0x148c/0x3f50 > [ 459.378392] ? kmem_cache_alloc+0xd5/0x280 > [ 459.379016] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe > [ 459.379802] ? path_lookupat.isra.0+0x900/0x900 > [ 459.380489] ? __lock_is_held+0xad/0x140 > [ 459.381093] do_filp_open+0x1a1/0x280 > [ 459.381654] ? may_open_dev+0xf0/0xf0 > [ 459.382214] ? find_held_lock+0x2c/0x110 > [ 459.382816] ? lock_downgrade+0x680/0x680 > [ 459.383425] ? __lock_is_held+0xad/0x140 > [ 459.384024] ? do_raw_spin_unlock+0x4f/0x250 > [ 459.384668] ? _raw_spin_unlock+0x1f/0x30 > [ 459.385280] ? __alloc_fd+0x448/0x560 > [ 459.385841] do_sys_open+0x3c3/0x500 > [ 459.386386] ? filp_open+0x70/0x70 > [ 459.386911] ? trace_hardirqs_on_thunk+0x1a/0x1c > [ 459.387610] ? trace_hardirqs_off_caller+0x55/0x1c0 > [ 459.388342] ? do_syscall_64+0x1a/0x520 > [ 459.388930] do_syscall_64+0xc3/0x520 > [ 459.389490] entry_SYSCALL_64_after_hwframe+0x49/0xbe > [ 459.390248] RIP: 0033:0x416211 > [ 459.390720] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 > 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f > 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d > 01 > [ 459.393483] RSP: 002b:00007fe45dfe9a60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 > [ 459.394610] RAX: ffffffffffffffda RBX: 00007fe45dfea6d4 RCX: 0000000000416211 > [ 459.395678] RDX: 00007fe45dfe9b0a RSI: 0000000000000002 RDI: 00007fe45dfe9b00 > [ 459.396758] RBP: 000000000076bf20 R08: 0000000000000000 R09: 000000000000000a > [ 459.397930] R10: 0000000000000075 R11: 0000000000000293 R12: 00000000ffffffff > [ 459.399022] R13: 0000000000000bd9 R14: 00000000004cdb80 R15: 000000000076bf2c > [ 459.400168] > [ 459.400430] Allocated by task 20132: > [ 459.401038] kasan_kmalloc+0xbf/0xe0 > [ 459.401652] kmem_cache_alloc+0xd5/0x280 > [ 459.402330] bdev_alloc_inode+0x18/0x40 > [ 459.402970] alloc_inode+0x5f/0x180 > [ 459.403510] iget5_locked+0x57/0xd0 > [ 459.404095] bdget+0x94/0x4e0 > [ 459.404607] bd_acquire+0xfa/0x2c0 > [ 459.405113] blkdev_open+0x110/0x290 > [ 459.405702] do_dentry_open+0x49e/0x1050 > [ 459.406340] path_openat+0x148c/0x3f50 > [ 459.406926] do_filp_open+0x1a1/0x280 > [ 459.407471] do_sys_open+0x3c3/0x500 > [ 459.408010] do_syscall_64+0xc3/0x520 > [ 459.408572] entry_SYSCALL_64_after_hwframe+0x49/0xbe > [ 459.409415] > [ 459.409679] Freed by task 1262: > [ 459.410212] __kasan_slab_free+0x129/0x170 > [ 459.410919] kmem_cache_free+0xb2/0x2a0 > [ 459.411564] rcu_process_callbacks+0xbb2/0x2320 > [ 459.412318] __do_softirq+0x225/0x8ac > > Fix this by delaying bdput() to the end of blkdev_get() which means we > have finished accessing bdev. > > Cc: Christoph Hellwig > Cc: Jens Axboe > Cc: Ming Lei > Cc: Jan Kara > Reported-by: Hulk Robot > Signed-off-by: Jason Yan In things of Fixes: tag... For the 1st hunk I found: commit 8266602033d6adc6d10cb8811c1fd694767909b0 ("fix bdev leak in block_dev.c do_open()") - Sedat - > --- > v3: Add bdput() when __blkdev_get() calling itself failed. > v2: Add Reported-by tag and cc linux-block mailing list > > fs/block_dev.c | 9 ++++++--- > 1 file changed, 6 insertions(+), 3 deletions(-) > > diff --git a/fs/block_dev.c b/fs/block_dev.c > index 47860e589388..d7b74e44ad5a 100644 > --- a/fs/block_dev.c > +++ b/fs/block_dev.c > @@ -1566,7 +1566,6 @@ static int __blkdev_get(struct block_device *bdev, fmode_t mode, int for_part) > if (!for_part) { > ret = devcgroup_inode_permission(bdev->bd_inode, perm); > if (ret != 0) { > - bdput(bdev); > return ret; > } > } > @@ -1637,8 +1636,10 @@ static int __blkdev_get(struct block_device *bdev, fmode_t mode, int for_part) > goto out_clear; > BUG_ON(for_part); > ret = __blkdev_get(whole, mode, 1); > - if (ret) > + if (ret) { > + bdput(whole); > goto out_clear; > + } > bdev->bd_contains = whole; > bdev->bd_part = disk_get_part(disk, partno); > if (!(disk->flags & GENHD_FL_UP) || > @@ -1688,7 +1689,6 @@ static int __blkdev_get(struct block_device *bdev, fmode_t mode, int for_part) > disk_unblock_events(disk); > put_disk_and_module(disk); > out: > - bdput(bdev); > > return ret; > } > @@ -1755,6 +1755,9 @@ int blkdev_get(struct block_device *bdev, fmode_t mode, void *holder) > bdput(whole); > } > > + if (res) > + bdput(bdev); > + > return res; > } > EXPORT_SYMBOL(blkdev_get); > -- > 2.21.3 >