Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp13714ybt; Tue, 23 Jun 2020 14:01:43 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzYhVv1pQD25hZzNpE1DU2QzIR3LQ3+HES6aFTqLfYj34ksHcmPr9BOJjxiiQAJcS3W/rWi X-Received: by 2002:a17:906:404e:: with SMTP id y14mr8093467ejj.260.1592946103652; Tue, 23 Jun 2020 14:01:43 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1592946103; cv=none; d=google.com; s=arc-20160816; b=V5yn7ZdNNFY0xHD+JGN3bswutKuAQJcdczKnEC/95/HigY+7p1cLl6KeLZZIdBo8Zo v1XMs0mBHl7ECPt1HkhwUhf5PXzhcHepwYqrW/cKhxL2XL5MFaox09XHTiUAmFpC7g+M JCiBIND4FHvnXCfhN3sHnTAcDKzCBkFsx/MgFAdwF8gFRUn+UP3tEiFpdiiqhUGvy3jJ mZ65TctZNzsg1QxR3cLuJ17zc5VyTDe/701u7iBLvAIHNsr0JPMSgOV1vhVHMpgS1W2N D3NEOYDCb5XaI7fhmf5NqhXHoeA9UI8+SZwaZS18grIx4LNW5zFSU64es9HIb8WouE6k SF+g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=yCB3nPYOGdc07i3VlrxfRcKyMLsD/PiRbBoKL+P/gHI=; b=K3623pWbbbHOd+SfJY90yzUJR2DlmxzbDNBB13pTCWdCV3A3r+yGZmnOC0ZvsYz7Bj QR39YLgJJRjroYEMxtVs203XoFdfhKmepwpSP8Wz8B1j8EbonEBrEBpenSZkb8ZQlzMJ 1siZt5mwY9y+S9p/vLvqW16VACizhYoZLmr1zug0ZhyIoU/UzbNvyug4xG0Z5ph8UMNy IUzI95VzihjrX2ciqyDR/osbNKM5R/ayI7r3qaA/3ONCeqU6d4ES/N9YaF4VdhJqOeUP 5nxAWfQ91/6wIRBJv4GUfgdn1hyKXo8UFxkBDO8MZ8sCvpwQj6MM/3HdTxBOkFkYpZj7 UyYA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Dcv5kUiE; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id f12si12926586edl.157.2020.06.23.14.01.20; Tue, 23 Jun 2020 14:01:43 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Dcv5kUiE; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2390959AbgFWUkc (ORCPT + 99 others); Tue, 23 Jun 2020 16:40:32 -0400 Received: from mail.kernel.org ([198.145.29.99]:36528 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2392229AbgFWUka (ORCPT ); Tue, 23 Jun 2020 16:40:30 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 0F2C52053B; Tue, 23 Jun 2020 20:40:28 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1592944829; bh=8C0qYZRp2nMNQzJmlTrpk8LQ/2JNVPCalkgNJ/+eiJk=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=Dcv5kUiEAULtsShru82Ir6s5OpvoNT02Gsnguco9alLCOGGOQSLghInkYaNv6OUe2 cp6ZCX6aAjnLo8Ccsnf24MBcbhV6ILg8Qk+hoyxI9DD/hX5AOyW/qM9UJW0XRWtQSw t2eQwxLDfkX0UA2fNUrDujbPFbQTOux/2yg0DPoY= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Bob Peterson , Andreas Gruenbacher , Sasha Levin Subject: [PATCH 4.19 142/206] gfs2: fix use-after-free on transaction ail lists Date: Tue, 23 Jun 2020 21:57:50 +0200 Message-Id: <20200623195323.968867013@linuxfoundation.org> X-Mailer: git-send-email 2.27.0 In-Reply-To: <20200623195316.864547658@linuxfoundation.org> References: <20200623195316.864547658@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Bob Peterson [ Upstream commit 83d060ca8d90fa1e3feac227f995c013100862d3 ] Before this patch, transactions could be merged into the system transaction by function gfs2_merge_trans(), but the transaction ail lists were never merged. Because the ail flushing mechanism can run separately, bd elements can be attached to the transaction's buffer list during the transaction (trans_add_meta, etc) but quickly moved to its ail lists. Later, in function gfs2_trans_end, the transaction can be freed (by gfs2_trans_end) while it still has bd elements queued to its ail lists, which can cause it to either lose track of the bd elements altogether (memory leak) or worse, reference the bd elements after the parent transaction has been freed. Although I've not seen any serious consequences, the problem becomes apparent with the previous patch's addition of: gfs2_assert_warn(sdp, list_empty(&tr->tr_ail1_list)); to function gfs2_trans_free(). This patch adds logic into gfs2_merge_trans() to move the merged transaction's ail lists to the sdp transaction. This prevents the use-after-free. To do this properly, we need to hold the ail lock, so we pass sdp into the function instead of the transaction itself. Signed-off-by: Bob Peterson Signed-off-by: Andreas Gruenbacher Signed-off-by: Sasha Levin --- fs/gfs2/log.c | 11 +++++++++-- 1 file changed, 9 insertions(+), 2 deletions(-) diff --git a/fs/gfs2/log.c b/fs/gfs2/log.c index d3f0612e33471..06752db213d21 100644 --- a/fs/gfs2/log.c +++ b/fs/gfs2/log.c @@ -877,8 +877,10 @@ void gfs2_log_flush(struct gfs2_sbd *sdp, struct gfs2_glock *gl, u32 flags) * @new: New transaction to be merged */ -static void gfs2_merge_trans(struct gfs2_trans *old, struct gfs2_trans *new) +static void gfs2_merge_trans(struct gfs2_sbd *sdp, struct gfs2_trans *new) { + struct gfs2_trans *old = sdp->sd_log_tr; + WARN_ON_ONCE(!test_bit(TR_ATTACHED, &old->tr_flags)); old->tr_num_buf_new += new->tr_num_buf_new; @@ -890,6 +892,11 @@ static void gfs2_merge_trans(struct gfs2_trans *old, struct gfs2_trans *new) list_splice_tail_init(&new->tr_databuf, &old->tr_databuf); list_splice_tail_init(&new->tr_buf, &old->tr_buf); + + spin_lock(&sdp->sd_ail_lock); + list_splice_tail_init(&new->tr_ail1_list, &old->tr_ail1_list); + list_splice_tail_init(&new->tr_ail2_list, &old->tr_ail2_list); + spin_unlock(&sdp->sd_ail_lock); } static void log_refund(struct gfs2_sbd *sdp, struct gfs2_trans *tr) @@ -901,7 +908,7 @@ static void log_refund(struct gfs2_sbd *sdp, struct gfs2_trans *tr) gfs2_log_lock(sdp); if (sdp->sd_log_tr) { - gfs2_merge_trans(sdp->sd_log_tr, tr); + gfs2_merge_trans(sdp, tr); } else if (tr->tr_num_buf_new || tr->tr_num_databuf_new) { gfs2_assert_withdraw(sdp, test_bit(TR_ALLOCED, &tr->tr_flags)); sdp->sd_log_tr = tr; -- 2.25.1