Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp973158ybt; Wed, 17 Jun 2020 19:33:29 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzS2xHIdSJg1+yCjiJ0k2xAb4BRSg56F4gKl3QUcKudS/CPqtJp+aG6ZK39FjAKfCnWNIbi X-Received: by 2002:a17:906:1c02:: with SMTP id k2mr1927157ejg.37.1592447609297; Wed, 17 Jun 2020 19:33:29 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1592447609; cv=none; d=google.com; s=arc-20160816; b=KBQk0oiamL5TVo5D+4321GSSP7jNW9tPiEwBAGdugId+ttl4aLX+4hY3xxuugPo96M J/d8dm4g0YYuVyA23///g21wIlG+17342bCkuhGobSzpNTq+7syFcSfOZpoAoGEIXS4R 7R9ScBrhdG0ezUUZune+SpVwmxB13apYi6NREk7SA0bjux2O++j8n6ECcIdOcQnyldNP D59U6a4b4SP7PF1Al6f7BA0rKejhwPByG9/tUuBQCbaAg/Ze65CpikSNNMNsQ0fyj3fj J0KiOYaC42y3wMwbGUwljnczssqrgCqoiMiqMDjvlLph6q+bPHkhO+z8j79q9wun2y7s 4u0Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=hrt58QSNpCTYpbK3PzcHhgIadn0Gs3CKSTH4+HSkGYo=; b=ZAA0N/ZmNykAtV6uN8yCi4QClHPUI7oTl0Kqfug0VXkEht3x+ehBGBlZqJPRhSAMS9 KqMxgZ4Qj24EbN++jIZ6eHEYB5QQSv/D0jdwa3OEInPSZOY+MN0WfQXsvjaUgunTqy1L 3rOB8TfSdVYbx3Szxd1fTAhMJcutEaarPZviqh6QCtzD2+fC9yYlahB6UBFgdNsazSbh qLoN4O9D08TUK+LO1P2qrqnrX4whlUrSeKIMoJ7dJYPIM1JtZvRzPiBlY2f38p8+hmn+ uSSPSSanfCCLxkepBp8nnuccWvlXQ/dGnB9ppxQkF5vyA0CeAHUx4dvriJ6Rwaf95IKQ NmdQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=uwX8cLEp; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id md3si1009489ejb.206.2020.06.17.19.33.07; Wed, 17 Jun 2020 19:33:29 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=uwX8cLEp; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730881AbgFRCb3 (ORCPT + 99 others); Wed, 17 Jun 2020 22:31:29 -0400 Received: from mail.kernel.org ([198.145.29.99]:45558 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728563AbgFRBP3 (ORCPT ); Wed, 17 Jun 2020 21:15:29 -0400 Received: from sasha-vm.mshome.net (c-73-47-72-35.hsd1.nh.comcast.net [73.47.72.35]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id C38C421D79; Thu, 18 Jun 2020 01:15:28 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1592442929; bh=GJ34EjidoZBzIOjN/wVvFdpLNoYkvOoGaKbAlBWHRAM=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=uwX8cLEp9Wo6HD0GyxxFNnZL8qCjVLKfG8IU4rJJKR8bZ/KlurlszVHOPK34iCWtq xmodBnGa+x1/Js9ph1ATwA66QDrSBfNAsA1RShcAXjfvKJuMazbbWx2MjdHvA0zRM1 F0mSNoZx9Y1ZXY7wZmZPtENuDIdQqHogBTOBY77g= From: Sasha Levin To: linux-kernel@vger.kernel.org, stable@vger.kernel.org Cc: Bob Peterson , Andreas Gruenbacher , Sasha Levin , cluster-devel@redhat.com Subject: [PATCH AUTOSEL 5.7 343/388] gfs2: fix use-after-free on transaction ail lists Date: Wed, 17 Jun 2020 21:07:20 -0400 Message-Id: <20200618010805.600873-343-sashal@kernel.org> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20200618010805.600873-1-sashal@kernel.org> References: <20200618010805.600873-1-sashal@kernel.org> MIME-Version: 1.0 X-stable: review X-Patchwork-Hint: Ignore Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Bob Peterson [ Upstream commit 83d060ca8d90fa1e3feac227f995c013100862d3 ] Before this patch, transactions could be merged into the system transaction by function gfs2_merge_trans(), but the transaction ail lists were never merged. Because the ail flushing mechanism can run separately, bd elements can be attached to the transaction's buffer list during the transaction (trans_add_meta, etc) but quickly moved to its ail lists. Later, in function gfs2_trans_end, the transaction can be freed (by gfs2_trans_end) while it still has bd elements queued to its ail lists, which can cause it to either lose track of the bd elements altogether (memory leak) or worse, reference the bd elements after the parent transaction has been freed. Although I've not seen any serious consequences, the problem becomes apparent with the previous patch's addition of: gfs2_assert_warn(sdp, list_empty(&tr->tr_ail1_list)); to function gfs2_trans_free(). This patch adds logic into gfs2_merge_trans() to move the merged transaction's ail lists to the sdp transaction. This prevents the use-after-free. To do this properly, we need to hold the ail lock, so we pass sdp into the function instead of the transaction itself. Signed-off-by: Bob Peterson Signed-off-by: Andreas Gruenbacher Signed-off-by: Sasha Levin --- fs/gfs2/log.c | 11 +++++++++-- 1 file changed, 9 insertions(+), 2 deletions(-) diff --git a/fs/gfs2/log.c b/fs/gfs2/log.c index 0644e58c6191..b7a5221bea7d 100644 --- a/fs/gfs2/log.c +++ b/fs/gfs2/log.c @@ -1003,8 +1003,10 @@ void gfs2_log_flush(struct gfs2_sbd *sdp, struct gfs2_glock *gl, u32 flags) * @new: New transaction to be merged */ -static void gfs2_merge_trans(struct gfs2_trans *old, struct gfs2_trans *new) +static void gfs2_merge_trans(struct gfs2_sbd *sdp, struct gfs2_trans *new) { + struct gfs2_trans *old = sdp->sd_log_tr; + WARN_ON_ONCE(!test_bit(TR_ATTACHED, &old->tr_flags)); old->tr_num_buf_new += new->tr_num_buf_new; @@ -1016,6 +1018,11 @@ static void gfs2_merge_trans(struct gfs2_trans *old, struct gfs2_trans *new) list_splice_tail_init(&new->tr_databuf, &old->tr_databuf); list_splice_tail_init(&new->tr_buf, &old->tr_buf); + + spin_lock(&sdp->sd_ail_lock); + list_splice_tail_init(&new->tr_ail1_list, &old->tr_ail1_list); + list_splice_tail_init(&new->tr_ail2_list, &old->tr_ail2_list); + spin_unlock(&sdp->sd_ail_lock); } static void log_refund(struct gfs2_sbd *sdp, struct gfs2_trans *tr) @@ -1027,7 +1034,7 @@ static void log_refund(struct gfs2_sbd *sdp, struct gfs2_trans *tr) gfs2_log_lock(sdp); if (sdp->sd_log_tr) { - gfs2_merge_trans(sdp->sd_log_tr, tr); + gfs2_merge_trans(sdp, tr); } else if (tr->tr_num_buf_new || tr->tr_num_databuf_new) { gfs2_assert_withdraw(sdp, test_bit(TR_ALLOCED, &tr->tr_flags)); sdp->sd_log_tr = tr; -- 2.25.1