Received: by 2002:a05:6358:1087:b0:cb:c9d3:cd90 with SMTP id j7csp955015rwi; Thu, 20 Oct 2022 07:09:31 -0700 (PDT) X-Google-Smtp-Source: AMsMyM4BtObsT/7d6AzPH/n6cZvfRESEIsleF/rUgmvrrC4ecYw2INu9GN8Evi91FF38j6wdP3G1 X-Received: by 2002:a17:907:1b1f:b0:72f:56db:cce9 with SMTP id mp31-20020a1709071b1f00b0072f56dbcce9mr10682381ejc.605.1666274971684; Thu, 20 Oct 2022 07:09:31 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1666274971; cv=none; d=google.com; s=arc-20160816; b=CaR9C/1uFkzXQKPrFBZOlB8DCrEG6aq0V0MTStWEEjLz2495PVvoG2eHr3JoLXI9ea UeCB/7om/X4x/4UmDyiK5IdOy+bIrgJlVNBRC5hjVYDLhc/K/eNsFvyji9JJUnB9qqGG 8e5TbqZEXCIUQdT9BZQ9KPid5yvysIN95usBCTBiCGzAfCndqjusj6rXRF6WPSXR4g3Q tFhY0M7JcCImskY9HZoz5v/vfbmiwIJtp9/BKOxCTt/ZlVjWEV9M/UY4kf0fr50wYZnH J1zqdOMsY31LyhUPVSxvDNNVcUQGcCIiXUd6XoiGhrMNgSUUaCaJ6rF3oM22iCbfhFmI XvFA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=vdEHqy/7g/Xzw7lvlwYpudeyCIss3EGR5qeyFstEMyo=; b=feAqgFe4VtO4s5Y5VnHg/UM6HJ3Qb7ZpO3SKdEJGDF68g7GIZhBb/HWVyBYRFRbRSz ONgksT6Km3PPfL3jgZj3/8afg4MGfP0joWMCzJ7YG3TivWeD/LGN2enaRZTQ/qjkecz9 d0reGyBVUo4FBbF6RohBZEWCiAasvM/ogOPAQy1FXDMUb7q3RrnAGzoGVHY/O8ZwT35s bdfM7XZ/xmvpoX9SPGkENDnjpqxP3blmrB30SCp374McmwxvQkTAG3oTpQ9b36YEHzuQ VPlcUZsFPvnxiZBvtXqLxpF/plRP97ZleEbtWyRLASGgMOKruzuBMKjFPIqn8oDC3GV3 abFg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id c14-20020a05640227ce00b0045bd55b122csi19254323ede.332.2022.10.20.07.09.06; Thu, 20 Oct 2022 07:09:31 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229994AbiJTM7M (ORCPT + 99 others); Thu, 20 Oct 2022 08:59:12 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:52600 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230308AbiJTM7B (ORCPT ); Thu, 20 Oct 2022 08:59:01 -0400 Received: from szxga02-in.huawei.com (szxga02-in.huawei.com [45.249.212.188]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id CFC5A127937; Thu, 20 Oct 2022 05:58:57 -0700 (PDT) Received: from dggemv703-chm.china.huawei.com (unknown [172.30.72.53]) by szxga02-in.huawei.com (SkyGuard) with ESMTP id 4MtSGd0RY8zVj1y; Thu, 20 Oct 2022 20:54:17 +0800 (CST) Received: from kwepemm600009.china.huawei.com (7.193.23.164) by dggemv703-chm.china.huawei.com (10.3.19.46) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.31; Thu, 20 Oct 2022 20:58:50 +0800 Received: from huawei.com (10.175.127.227) by kwepemm600009.china.huawei.com (7.193.23.164) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.31; Thu, 20 Oct 2022 20:58:49 +0800 From: Yu Kuai To: , , , , , , , CC: , , , Subject: [PATCH -nect RFC v2 2/2] block: fix uaf for bd_holder_dir Date: Thu, 20 Oct 2022 21:20:49 +0800 Message-ID: <20221020132049.3947415-3-yukuai3@huawei.com> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20221020132049.3947415-1-yukuai3@huawei.com> References: <20221020132049.3947415-1-yukuai3@huawei.com> MIME-Version: 1.0 Content-Transfer-Encoding: 7BIT Content-Type: text/plain; charset=US-ASCII X-Originating-IP: [10.175.127.227] X-ClientProxiedBy: dggems702-chm.china.huawei.com (10.3.19.179) To kwepemm600009.china.huawei.com (7.193.23.164) X-CFilter-Loop: Reflected X-Spam-Status: No, score=-4.2 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_MED, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Lifecycle of bd_holder_dir is problematic: t1: t2: // get bdev of lower disk blkdev_get_by_dev // remove lower disk del_gendisk // initial reference is released, and // bd_holder_dir can be freed kobject_put // uaf is triggered bd_link_disk_holder Fix the problem by protecting bd_holder_dir by open_mutex. Signed-off-by: Yu Kuai --- block/genhd.c | 6 +++++- block/holder.c | 19 +++++++++++++------ block/partitions/core.c | 5 ++++- 3 files changed, 22 insertions(+), 8 deletions(-) diff --git a/block/genhd.c b/block/genhd.c index 53f9c8b2690a..b3d04e79e854 100644 --- a/block/genhd.c +++ b/block/genhd.c @@ -499,6 +499,8 @@ int __must_check device_add_disk(struct device *parent, struct gendisk *disk, ret = -ENOMEM; goto out_del_integrity; } + disk->part0->holder_dir_ref = 1; + disk->slave_dir = kobject_create_and_add("slaves", &ddev->kobj); if (!disk->slave_dir) { ret = -ENOMEM; @@ -557,6 +559,8 @@ int __must_check device_add_disk(struct device *parent, struct gendisk *disk, kobject_put(disk->slave_dir); out_put_holder_dir: kobject_put(disk->part0->bd_holder_dir); + disk->part0->bd_holder_dir = NULL; + disk->part0->holder_dir_ref = 0; out_del_integrity: blk_integrity_del(disk); out_del_block_link: @@ -649,7 +653,7 @@ void del_gendisk(struct gendisk *disk) blk_unregister_queue(disk); - kobject_put(disk->part0->bd_holder_dir); + bd_put_holder_dir(disk->part0); kobject_put(disk->slave_dir); part_stat_set_all(disk->part0, 0); diff --git a/block/holder.c b/block/holder.c index 5283bc804cc1..2e28b472ba1a 100644 --- a/block/holder.c +++ b/block/holder.c @@ -1,6 +1,7 @@ // SPDX-License-Identifier: GPL-2.0-only #include #include +#include "blk.h" struct bd_holder_disk { struct list_head list; @@ -85,9 +86,19 @@ int bd_link_disk_holder(struct block_device *bdev, struct gendisk *disk) goto out_unlock; } + /* + * del_gendisk drops the initial reference to bd_holder_dir, so we need + * to keep our own here to allow for cleanup past that point. + */ + if (!bd_try_get_holder_dir(bdev)) { + ret = -ENODEV; + goto out_unlock; + } + holder = kzalloc(sizeof(*holder), GFP_KERNEL); if (!holder) { ret = -ENOMEM; + bd_put_holder_dir(bdev); goto out_unlock; } @@ -98,16 +109,12 @@ int bd_link_disk_holder(struct block_device *bdev, struct gendisk *disk) ret = __link_disk_holder(bdev, disk); if (ret) { kfree(holder); + bd_put_holder_dir(bdev); goto out_unlock; } } list_add(&holder->list, &disk->slave_bdevs); - /* - * del_gendisk drops the initial reference to bd_holder_dir, so we need - * to keep our own here to allow for cleanup past that point. - */ - kobject_get(bdev->bd_holder_dir); out_unlock: mutex_unlock(&disk->open_mutex); @@ -141,7 +148,7 @@ void bd_unlink_disk_holder(struct block_device *bdev, struct gendisk *disk) if (!WARN_ON_ONCE(holder == NULL) && !--holder->refcnt) { if (disk->slave_dir) __unlink_disk_holder(bdev, disk); - kobject_put(bdev->bd_holder_dir); + bd_put_holder_dir(bdev); list_del_init(&holder->list); kfree(holder); } diff --git a/block/partitions/core.c b/block/partitions/core.c index b8112f52d388..39a14f7c308e 100644 --- a/block/partitions/core.c +++ b/block/partitions/core.c @@ -279,7 +279,7 @@ static void delete_partition(struct block_device *part) __invalidate_device(part, true); xa_erase(&part->bd_disk->part_tbl, part->bd_partno); - kobject_put(part->bd_holder_dir); + bd_put_holder_dir(part); device_del(&part->bd_device); /* @@ -390,6 +390,7 @@ static struct block_device *add_partition(struct gendisk *disk, int partno, bdev->bd_holder_dir = kobject_create_and_add("holders", &pdev->kobj); if (!bdev->bd_holder_dir) goto out_del; + bdev->holder_dir_ref = 1; dev_set_uevent_suppress(pdev, 0); if (flags & ADDPART_FLAG_WHOLEDISK) { @@ -411,6 +412,8 @@ static struct block_device *add_partition(struct gendisk *disk, int partno, out_del: kobject_put(bdev->bd_holder_dir); + bdev->bd_holder_dir = NULL; + bdev->holder_dir_ref = 0; device_del(pdev); out_put: put_device(pdev); -- 2.31.1