Received: by 2002:a05:6358:4e97:b0:b3:742d:4702 with SMTP id ce23csp4955946rwb; Wed, 17 Aug 2022 08:38:10 -0700 (PDT) X-Google-Smtp-Source: AA6agR5rK+cQ4sAzRPIXwTQsFRJ3iXBB4V/WEObQAsbYiVHMr2NoVXoaSCRwfUjFehmpK5d68U3A X-Received: by 2002:a05:6402:51d4:b0:43d:9c8e:2617 with SMTP id r20-20020a05640251d400b0043d9c8e2617mr24599745edd.146.1660750689996; Wed, 17 Aug 2022 08:38:09 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1660750689; cv=none; d=google.com; s=arc-20160816; b=KOdaSRQYrqBMKvRTZvnTJm2YRBLnwx4WXijsNMdTfd6zWoPfSuWu0ivutje1DaH7ty YrgrteCbr69VtN0dJmlbipI1YvxMwjrHkgJhb8tJiTWPcAOfqRF1TJw0t8tHr7mza4ws WcHruVw9vmfY+dwE7ZDKLiRhuRLOxGFopsDtFiDam6bgn/LeTj2uRcek41cgi9UkpMgd J5vlD+f8kqZpIcpI7gvuzlDabMhY+aOxR5g2I01QwR0w+feLBXAKNDl0mH52vpWAtvN0 eU6O0QaqVG0eH825n8k+Quthw3adB/PUx4iJ1b5ZfwO1O55W0g2i4u3WDyLru1xKkVQ4 nvMw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date :dkim-signature; bh=WtsfTpO10I2ZK8vFQPpo9DxkDvYTT/yJN+heAiZTZXI=; b=Ov7oCwHyJ/oTlE/TZKCKW0IsepMX895T9eZvpkAcRaf7i24dxPntb/RQfRKKpNoFGm l3/H0JkMx690AodttjALmxhwBkkvuJiyVKHdcG2oIQwWUnRYPRbcWfAxJQd/cEvvYblH k8oDbDSVHY0R4b/AG5BdtupkZz/AJqHrxw6+2Ihd115PuXPfD/mLlGoCQolY1jIl3rcE rRzhyMNqcSXx8MU2Lu9StixZ4UnM7T8q5LEJ1EbdoZqxFhh6ZivQwLa8CBlgzNjxtY0h mzIfmRRtmpGheCQzB6QIHutATGW7xcyHuoImg4VJrHxNBaMr6JGyEK+hVj1k35vV5zmo AdTg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linux.org.uk header.s=zeniv-20220401 header.b=GO2vADmB; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=zeniv.linux.org.uk Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id hg3-20020a1709072cc300b0073872f387f1si5649490ejc.244.2022.08.17.08.37.43; Wed, 17 Aug 2022 08:38:09 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linux.org.uk header.s=zeniv-20220401 header.b=GO2vADmB; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=zeniv.linux.org.uk Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S237711AbiHQPVc (ORCPT + 99 others); Wed, 17 Aug 2022 11:21:32 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:53694 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S239810AbiHQPV2 (ORCPT ); Wed, 17 Aug 2022 11:21:28 -0400 Received: from zeniv.linux.org.uk (zeniv.linux.org.uk [IPv6:2a03:a000:7:0:5054:ff:fe1c:15ff]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 5476E78207 for ; Wed, 17 Aug 2022 08:21:27 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=linux.org.uk; s=zeniv-20220401; h=Sender:In-Reply-To:Content-Type: MIME-Version:References:Message-ID:Subject:Cc:To:From:Date:Reply-To: Content-Transfer-Encoding:Content-ID:Content-Description; bh=WtsfTpO10I2ZK8vFQPpo9DxkDvYTT/yJN+heAiZTZXI=; b=GO2vADmBKsECuNthUvzfdCzAhr pAdeA388YWxFtJIy1WCpDbzxBybj+clguL/G0s9eZT6mkp8eTOqsRb96RNuaZ6/g/G91aJBUbJU8f 7eyom1H6Lv4XYyNSW5Ya3ihwVcHGYqGdM+m4zgoPeFsUgq0W9gXmaa6pnMaH2N5CnE7ZNiHMcgN2L ztFMMSLRHNuP+GiPzwZuNeTth6LBt64q7QYHxYnorJDxW/iHxf14A+Bt+3hmOLvF9GESwrQjHjCCc U8267o8/jI4HFcuKah5yf3XLTJ0qonNgD0kj54VLGTtkZFym7jeg7NtX7BJbK4ssgXd5CRy8NS3Xp 0noLZMsg==; Received: from viro by zeniv.linux.org.uk with local (Exim 4.95 #2 (Red Hat Linux)) id 1oOKr1-005PIZ-M6; Wed, 17 Aug 2022 15:21:11 +0000 Date: Wed, 17 Aug 2022 16:21:11 +0100 From: Al Viro To: Christian Brauner Cc: Greg Kroah-Hartman , Dongliang Mu , Dongliang Mu , Arve =?iso-8859-1?B?SGr4bm5lduVn?= , Todd Kjos , Martijn Coenen , Joel Fernandes , Carlos Llamas , Suren Baghdasaryan , Kees Cook , syzkaller , linux-kernel Subject: Re: [PATCH] binderfs: rework superblock destruction Message-ID: References: <20220817130306.96978-1-brauner@kernel.org> <20220817140149.pfakskeyxkqcot54@wittgenstein> <20220817145144.mbcbvpepusdvrds4@wittgenstein> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20220817145144.mbcbvpepusdvrds4@wittgenstein> Sender: Al Viro X-Spam-Status: No, score=-2.0 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_EF,SPF_HELO_NONE,SPF_NONE,T_SCC_BODY_TEXT_LINE, URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Aug 17, 2022 at 04:51:44PM +0200, Christian Brauner wrote: > diff --git a/arch/s390/hypfs/inode.c b/arch/s390/hypfs/inode.c > index 5c97f48cea91..d7d275ef132f 100644 > --- a/arch/s390/hypfs/inode.c > +++ b/arch/s390/hypfs/inode.c > @@ -329,9 +329,8 @@ static void hypfs_kill_super(struct super_block *sb) > hypfs_delete_tree(sb->s_root); > if (sb_info && sb_info->update_file) > hypfs_remove(sb_info->update_file); > - kfree(sb->s_fs_info); > - sb->s_fs_info = NULL; > kill_litter_super(sb); > + kfree(sb->s_fs_info); UAF, that - *sb gets freed by the time you try to fetch sb->s_fs_info... Fetch the pointer first, then destroy the object you've fetched it from, then free what it points to... > diff --git a/fs/devpts/inode.c b/fs/devpts/inode.c > index 4f25015aa534..78a9095e1748 100644 > --- a/fs/devpts/inode.c > +++ b/fs/devpts/inode.c > @@ -509,10 +509,10 @@ static void devpts_kill_sb(struct super_block *sb) > { > struct pts_fs_info *fsi = DEVPTS_SB(sb); > > + kill_litter_super(sb); > if (fsi) > ida_destroy(&fsi->allocated_ptys); > kfree(fsi); > - kill_litter_super(sb); > } > That one's fine. > static struct file_system_type devpts_fs_type = { > diff --git a/fs/ramfs/inode.c b/fs/ramfs/inode.c > index bc66d0173e33..bff49294e037 100644 > --- a/fs/ramfs/inode.c > +++ b/fs/ramfs/inode.c > @@ -280,8 +280,10 @@ int ramfs_init_fs_context(struct fs_context *fc) > > static void ramfs_kill_sb(struct super_block *sb) > { > - kfree(sb->s_fs_info); > + struct ramfs_fs_info *fsi = sb->s_fs_info; > + > kill_litter_super(sb); > + kfree(fsi); > } Cosmetical, really - see another posting in the same thread. > static struct file_system_type ramfs_fs_type = > diff --git a/security/selinux/selinuxfs.c b/security/selinux/selinuxfs.c > index 8fcdd494af27..fb1dae422d93 100644 > --- a/security/selinux/selinuxfs.c > +++ b/security/selinux/selinuxfs.c > @@ -96,9 +96,8 @@ static int selinux_fs_info_create(struct super_block *sb) > return 0; > } > > -static void selinux_fs_info_free(struct super_block *sb) > +static void selinux_fs_info_free(struct selinux_fs_info *fsi) > { > - struct selinux_fs_info *fsi = sb->s_fs_info; > int i; > > if (fsi) { > @@ -107,8 +106,7 @@ static void selinux_fs_info_free(struct super_block *sb) > kfree(fsi->bool_pending_names); > kfree(fsi->bool_pending_values); > } > - kfree(sb->s_fs_info); > - sb->s_fs_info = NULL; > + kfree(fsi); > } > > #define SEL_INITCON_INO_OFFSET 0x01000000 > @@ -2180,7 +2178,7 @@ static int sel_fill_super(struct super_block *sb, struct fs_context *fc) > pr_err("SELinux: %s: failed while creating inodes\n", > __func__); > > - selinux_fs_info_free(sb); > + selinux_fs_info_free(fsi); > > return ret; > } > @@ -2202,8 +2200,10 @@ static int sel_init_fs_context(struct fs_context *fc) > > static void sel_kill_sb(struct super_block *sb) > { > - selinux_fs_info_free(sb); > + struct selinux_fs_info *fsi = sb->s_fs_info; > + > kill_litter_super(sb); > + selinux_fs_info_free(fsi); > } A real bug, but an incomplete fix - you've just gotten yourself a double-free; failure in sel_fill_super() has no need to do selinux_fs_info_free() now.