Received: by 2002:a05:6358:5282:b0:b5:90e7:25cb with SMTP id g2csp3063645rwa; Mon, 22 Aug 2022 20:32:28 -0700 (PDT) X-Google-Smtp-Source: AA6agR5pFc4RilaaLvzCgcsScw7wEyi1pFxh3nNJwa8h5st0F0z6sR4ArDPUQqRHwE9FFRfa75rI X-Received: by 2002:a17:906:ef90:b0:730:9af7:5702 with SMTP id ze16-20020a170906ef9000b007309af75702mr15274769ejb.107.1661225548603; Mon, 22 Aug 2022 20:32:28 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1661225548; cv=none; d=google.com; s=arc-20160816; b=kLfJE3yPx3QLQofMff9c6k/5sBTAoA9rZ/N0snW+hTB0ANSdYyO6bpdN7euiZIxIRn bGXgAJX7BReya5axgr4eeqOXCuPC4OwAYuuMmZMdi5+O156ydySAwcgLSwTDGcpzpWU9 vn2sgOiDbIOr1gsslfaSVLiq54obZY5iL9sANO9HJBquSe8pHDCzJEFuWrNbGNY9tyQc SiWR6kINPc275hFjMBOneOSAEazUnaChGlxvBK40H82UrXyzgYCxyjNdfem3Xg9GrURH Pez1II/9OjsPH4jANUSO5AZhI5RzZkE4w6tErElTRqyu0g+dzOIHXRP8VHG/xxtqagf8 OuGw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=pFYEpTsXJmHfW6I1oKg6c4BgDdCtGcow54ssxC/v4Go=; b=kEWK8QZ08zr7FxtoCLP2KZ1jwiYeaVfeWVOF/Quys8CLrNiPtqqC6vmoezos4zT3+Y VonUuundIv4Ml4GSlCcHZ6sOa8RRfR7ne1OaIhsZPH6YeNXcUlohBJa/iJME2jjFylPp bEUn5EB7KXMMueT8appGp9Uml5lGJgWUfY8/Or3trN2qLE1ol125NI6X8WgoHaUPAb6n KtDNc+7VePM/KpM+hM05z2roVidhlCClZVN/es1SUA9LkZZ2VY/TFJdczFiFA43rZ/2W pZ+A09eTLD8MPklC7d0S86MzDrlPVhB6eF3PA3Uf01V68CqlEczf37ZQ8F86xb57YTsc Laag== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id du1-20020a17090772c100b0073d5f966b48si7924376ejc.402.2022.08.22.20.32.02; Mon, 22 Aug 2022 20:32:28 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S240064AbiHWDYl (ORCPT + 99 others); Mon, 22 Aug 2022 23:24:41 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:51914 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S239310AbiHWDYX (ORCPT ); Mon, 22 Aug 2022 23:24:23 -0400 Received: from szxga01-in.huawei.com (szxga01-in.huawei.com [45.249.212.187]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id E06B752E4B for ; Mon, 22 Aug 2022 20:24:22 -0700 (PDT) Received: from canpemm500002.china.huawei.com (unknown [172.30.72.56]) by szxga01-in.huawei.com (SkyGuard) with ESMTP id 4MBZHm3PTVzgYpk; Tue, 23 Aug 2022 11:20:52 +0800 (CST) Received: from huawei.com (10.175.124.27) by canpemm500002.china.huawei.com (7.192.104.244) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.24; Tue, 23 Aug 2022 11:24:20 +0800 From: Miaohe Lin To: , CC: , , Subject: [PATCH v2 4/6] mm, hwpoison: fix possible use-after-free in mf_dax_kill_procs() Date: Tue, 23 Aug 2022 11:23:44 +0800 Message-ID: <20220823032346.4260-5-linmiaohe@huawei.com> X-Mailer: git-send-email 2.23.0 In-Reply-To: <20220823032346.4260-1-linmiaohe@huawei.com> References: <20220823032346.4260-1-linmiaohe@huawei.com> MIME-Version: 1.0 Content-Transfer-Encoding: 7BIT Content-Type: text/plain; charset=US-ASCII X-Originating-IP: [10.175.124.27] X-ClientProxiedBy: dggems703-chm.china.huawei.com (10.3.19.180) To canpemm500002.china.huawei.com (7.192.104.244) X-CFilter-Loop: Reflected X-Spam-Status: No, score=-4.2 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_MED, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org After kill_procs(), tk will be freed without being removed from the to_kill list. In the next iteration, the freed list entry in the to_kill list will be accessed, thus leading to use-after-free issue. Adding list_del() in kill_procs() to fix the issue. Fixes: c36e20249571 ("mm: introduce mf_dax_kill_procs() for fsdax case") Signed-off-by: Miaohe Lin --- mm/memory-failure.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/mm/memory-failure.c b/mm/memory-failure.c index 1d79e693f1b9..f8262f577baf 100644 --- a/mm/memory-failure.c +++ b/mm/memory-failure.c @@ -413,7 +413,7 @@ static void kill_procs(struct list_head *to_kill, int forcekill, bool fail, { struct to_kill *tk, *next; - list_for_each_entry_safe (tk, next, to_kill, nd) { + list_for_each_entry_safe(tk, next, to_kill, nd) { if (forcekill) { /* * In case something went wrong with munmapping @@ -437,6 +437,7 @@ static void kill_procs(struct list_head *to_kill, int forcekill, bool fail, pr_err("%#lx: Cannot send advisory machine check signal to %s:%d\n", pfn, tk->tsk->comm, tk->tsk->pid); } + list_del(&tk->nd); put_task_struct(tk->tsk); kfree(tk); } -- 2.23.0