Received: by 2002:a05:6a10:c604:0:0:0:0 with SMTP id y4csp485949pxt; Thu, 12 Aug 2021 03:10:17 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxRWXOPCgqXWXeViTNzoZj6KZMJxh5snwIchZh0snclw5byGLkiU63Ot5rhxJ1jz3OnXtI8 X-Received: by 2002:a05:6e02:78d:: with SMTP id q13mr2340302ils.262.1628763017521; Thu, 12 Aug 2021 03:10:17 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1628763017; cv=none; d=google.com; s=arc-20160816; b=FlHt5FatEQFFjsyoisXRj8xO+hXGJr1iaDziWIM7Q/QJ0vTwsDU1mrivML7WYMZnDD FRySUJDKKzBF80NTg5MRaOB+pN54557kuPY7C7wLh+tTHWgYrzTgE1gxJss6q9H2H1z9 i8sva2YCrSaZXO3sDOJBr8oA65JLREL2hpeLoMalWLcItg7bv79UO4gTJeXK1bA+O93j NIM2wYq2HX8uLz/BFGFQ6XWDUQmhgEpvfyBlg/S864sRGxT4aAV0P6CYRtf9eZRXXFx4 JLwqz3VhnPxNeK8z4GjL6PBC9JlSx4VpoHbIObG9hrirJhCG76rJIspEilqyiIFecos/ IHEA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject:dkim-signature; bh=tf7xAURtCOwH3Y40n33NRhchLFsigaBEgUnQpYCj/rY=; b=ZMQo+M/MiJ4rvsVD7ms/OPBK4fFTatwN/OLCTwhc8VdBhGlMxePiFnpx+BwWfGv930 ke6/lIIY0KzdBeoItL5pedtPwCOQrztXJB8oduKmvjkPS9pr14qheusq8HXM+4K62LFE xraMm1bJi1N8k0m0nALvEQ07ZDPLgZju+FFbKo/wWVp25OxcM79MvGgffP3orQ6oRs8E b+1fZQGaCkEroqC/quGTxDUgH91t0ZQZ7SaTnmgJh3HXFI4bz7XDCsJioI6PCNgxvjBj EKa9rS53RpnpC4RmJV5iGgZAxywatAR9rKlc6uW7UNtJLw3A5y4I8iuco5ypmANtIbxM eNwg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=gnxWP2cS; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id n5si2979630ilk.136.2021.08.12.03.10.07; Thu, 12 Aug 2021 03:10:17 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=gnxWP2cS; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235098AbhHLJnH (ORCPT + 99 others); Thu, 12 Aug 2021 05:43:07 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:38772 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234949AbhHLJnG (ORCPT ); Thu, 12 Aug 2021 05:43:06 -0400 Received: from mail-lf1-x129.google.com (mail-lf1-x129.google.com [IPv6:2a00:1450:4864:20::129]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id BA739C061765; Thu, 12 Aug 2021 02:42:41 -0700 (PDT) Received: by mail-lf1-x129.google.com with SMTP id w20so12346219lfu.7; Thu, 12 Aug 2021 02:42:41 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=subject:to:cc:references:from:message-id:date:user-agent :mime-version:in-reply-to:content-language:content-transfer-encoding; bh=tf7xAURtCOwH3Y40n33NRhchLFsigaBEgUnQpYCj/rY=; b=gnxWP2cSKbYc7CdxPIKzIgjKo+RRNKvcCjbopRTkJP0SADoOhtkyugvYoiYsH2H10Y pE0YHZ9sTJJxDDZjtIqjTy4jAwY29laRQpDPs3RwedNRIbeOBepXzNjfmaQBot3QW//e 5gBHcqYwUI9RGRK/UN0VqMJQaqGQQiM7DYyWPFDuFl/4MZhUo/b5q9kI75T3LDkklTs2 HdiBjHYe91xnSYo5BAyDCP0vCso5Jyy6b3r0TcDq5e/1EX8+ivzlEpbdmNwWJ6Zxd6qN 9b8Hxpdbi5WC8h+AX3OGaAF4Lyl9Rf9hHQqRR49H8NWs7CrzdWx83SSrhSnJc85vZbe/ 9GUA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:cc:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=tf7xAURtCOwH3Y40n33NRhchLFsigaBEgUnQpYCj/rY=; b=gcOorMrbxZ+giLeWw3J4nCRJEMQNQXAAD6xP1k0Jb9yxsr+EokY1ttqSbXAMUi/aI4 9Fwq1tGvc6ggfhTJMvyAAoH1jt57f0HqNCLZNFJNcXaQeVoPocw5bkBX43oz+pmKxofB JD+U4coEDjNqtQb08zq5Dt6+MUyr7V9JOSjbAHFvYeOvx1N3kJ9BQktRZZ+M2Mcyl2B0 N5/doEkNt7CqhpOiiZZRjreVFQIaMKIB7O3TzESEu9+gHNp6fkOYgLxY8SHLz2VgdLJ3 +445Z6ViaFNnCFcqOXrFEnl4yqSKqYRyi1inXYSSaz8eDDuy59Twd0RkI/2ftvrwdNhI 6NhA== X-Gm-Message-State: AOAM530P+sLvRoQYbTb7ksWmkCYWNwiFJV2Cywp941JjHLaXu3PDd8FD Z8je1SVwktLz1NhxqsJrxaA= X-Received: by 2002:a19:5e0e:: with SMTP id s14mr1991995lfb.534.1628761359660; Thu, 12 Aug 2021 02:42:39 -0700 (PDT) Received: from [192.168.1.11] ([46.235.67.232]) by smtp.gmail.com with ESMTPSA id e21sm223581lfq.240.2021.08.12.02.42.38 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Thu, 12 Aug 2021 02:42:39 -0700 (PDT) Subject: Re: [PATCH] block: nbd: add sanity check for first_minor To: josef@toxicpanda.com, axboe@kernel.dk Cc: hch@lst.de, linux-block@vger.kernel.org, nbd@other.debian.org, linux-kernel@vger.kernel.org, syzbot+9937dc42271cd87d4b98@syzkaller.appspotmail.com References: <20210812091501.22648-1-paskripkin@gmail.com> From: Pavel Skripkin Message-ID: <7f9a6877-12d9-0177-d09a-6522e5a557ec@gmail.com> Date: Thu, 12 Aug 2021 12:42:38 +0300 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.12.0 MIME-Version: 1.0 In-Reply-To: <20210812091501.22648-1-paskripkin@gmail.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 8/12/21 12:15 PM, Pavel Skripkin wrote: > Syzbot hit WARNING in internal_create_group(). The problem was in > too big disk->first_minor. > > disk->first_minor is initialized by value, which comes from userspace > and there wasn't any sanity checks about value correctness. It can cause > duplicate creation of sysfs files/links, because disk->first_minor will > be passed to MKDEV() which causes truncation to byte. Since maximum > minor value is 0xff, let's check if first_minor is correct minor number. > > NOTE: the root case of the reported warning was in wrong error handling > in register_disk(), but we can avoid passing knowingly wrong values to > sysfs API, because sysfs error messages can confuse users. For example: > user passed 1048576 as index, but sysfs complains about duplicate > creation of /dev/block/43:0. It's not obvious how 1048576 becomes 0. > Log and reproducer for above example can be found on syzkaller bug > report page. > > Link: https://syzkaller.appspot.com/bug?id=03c2ae9146416edf811958d5fd7acfab75b143d1 > Fixes: b0d9111a2d53 ("nbd: use an idr to keep track of nbd devices") > Reported-by: syzbot+9937dc42271cd87d4b98@syzkaller.appspotmail.com > Signed-off-by: Pavel Skripkin > --- > drivers/block/nbd.c | 10 ++++++++++ > 1 file changed, 10 insertions(+) > > diff --git a/drivers/block/nbd.c b/drivers/block/nbd.c > index c38317979f74..600e9bab5d43 100644 > --- a/drivers/block/nbd.c > +++ b/drivers/block/nbd.c > @@ -1725,7 +1725,17 @@ static int nbd_dev_add(int index) > refcount_set(&nbd->refs, 1); > INIT_LIST_HEAD(&nbd->list); > disk->major = NBD_MAJOR; > + > + /* Too big first_minor can cause duplicate creation of > + * sysfs files/links, since first_minor will be truncated to > + * byte in __device_add_disk(). > + */ > disk->first_minor = index << part_shift; > + if (disk->first_minor > 0xff) { > + err = -EINVAL; > + goto out_free_idr; > + } > + > disk->minors = 1 << part_shift; > disk->fops = &nbd_fops; > disk->private_data = nbd; > Fun thing: I got a reply to this email from nsd-public@police.gov.hk, which is Hong Kong Police office email. Does anyone know what is going on? :) It's a bit scary... With regards, Pavel Skripkin