Received: by 2002:a05:6358:11c7:b0:104:8066:f915 with SMTP id i7csp2039465rwl; Thu, 6 Apr 2023 05:11:19 -0700 (PDT) X-Google-Smtp-Source: AKy350ZeMiq4hUR0CGoOYnL0ZL/06IvoRkVXo2wOMHRFL9En8f3bHXli9D5Zzn5Owm5yHsIDtBo3 X-Received: by 2002:a05:6a20:b88:b0:d6:26a3:98d with SMTP id i8-20020a056a200b8800b000d626a3098dmr2290555pzh.46.1680783079479; Thu, 06 Apr 2023 05:11:19 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1680783079; cv=none; d=google.com; s=arc-20160816; b=M+cj5jhCq+VUK9Mb/f54q7kjys5dHtCwcRlIg6RALuMhxMC80tc8EOR2awcHop46W2 HAxiE7RroOIAzpYUAcr29m8VWM/LAldZUsLuLdzmLYjeGptkntITFlW7MIFB7CXisGB8 F8Xx9mPMjUOu/C3ofwC1K1h72QqHaWC2CxWeHIAcrBnIv/B0pGdigkOBsBD6TMhGqdIg ykHMm6FW3o/BOT8ctnIdcniET84iNtgpjK8JtUmAOxRgFoeNVpRmqiaPsL8pxD8DXcs9 Cas09sVzDnHBLzB+xTlZrxE79bDISpOyTzQBTMnb8Ekp5o5clZfkj3wtB21UP94j8P5j 6jCQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to :mime-version:user-agent:date:message-id:from:references:cc:to :subject; bh=kbGlwQVBkW6necjn74VB8RU38fo7lrxBsv3ixIH25r4=; b=AaYcTVmLrX5vyDHgK8vAWUsk3UH+CBW+ZolbuHyAfn8wqXyOo8rV/7n1e31C5WMhiL ts0yO+9PXmoptjhKtUOqlS6H42mkNvTLLe9aWhdYHt1OynEwbfe02iT9ZOFyOQ0M71ze XTDuvV+36lL44qWW7AGKqC7VMb1+On/3DNAtq1/HmPeO+ZaHqvB+0ahAaex9WN24TLnV VxPjSrxOSdZj181LKonHGpgLJYCbvBkF1dKjPiG361dcK2qZ67FqL6XzBPyYwIBzgvt8 jHXMQ/fWdIqbBjJ0ilkBqtGMqu/ihUtfoWf2KNJvkmTwyquuSmyA0oqbBm1x1B093chr 5GpQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id 202-20020a6219d3000000b00625108d5b7esi1341513pfz.103.2023.04.06.05.11.01; Thu, 06 Apr 2023 05:11:19 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236785AbjDFMJ6 (ORCPT + 99 others); Thu, 6 Apr 2023 08:09:58 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:47848 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S236953AbjDFMJs (ORCPT ); Thu, 6 Apr 2023 08:09:48 -0400 Received: from szxga08-in.huawei.com (szxga08-in.huawei.com [45.249.212.255]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 4081C30EF for ; Thu, 6 Apr 2023 05:09:44 -0700 (PDT) Received: from kwepemm600013.china.huawei.com (unknown [172.30.72.54]) by szxga08-in.huawei.com (SkyGuard) with ESMTP id 4Psfjy0sZmz17RBp; Thu, 6 Apr 2023 19:42:14 +0800 (CST) Received: from [10.174.178.46] (10.174.178.46) by kwepemm600013.china.huawei.com (7.193.23.68) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.23; Thu, 6 Apr 2023 19:45:39 +0800 Subject: Re: [PATCH 1/2] ubi: fix slab-out-of-bounds in ubi_eba_get_ldesc+0xfb/0x130 To: ZhaoLong Wang , , , CC: , , References: <20230406071331.1247429-1-wangzhaolong1@huawei.com> <20230406071331.1247429-2-wangzhaolong1@huawei.com> From: Zhihao Cheng Message-ID: Date: Thu, 6 Apr 2023 19:45:38 +0800 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:68.0) Gecko/20100101 Thunderbird/68.5.0 MIME-Version: 1.0 In-Reply-To: <20230406071331.1247429-2-wangzhaolong1@huawei.com> Content-Type: text/plain; charset="gbk"; format=flowed Content-Transfer-Encoding: 7bit X-Originating-IP: [10.174.178.46] X-ClientProxiedBy: dggems704-chm.china.huawei.com (10.3.19.181) To kwepemm600013.china.huawei.com (7.193.23.68) X-CFilter-Loop: Reflected X-Spam-Status: No, score=-4.5 required=5.0 tests=NICE_REPLY_A, RCVD_IN_DNSWL_MED,RCVD_IN_MSPIKE_H2,SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi > From: Guo Xuenan > > When using ioctl interface to resize ubi volume, ubi_resize_volume will > resize eba table first, but not change vol->reserved_pebs in the same > atomic context which may cause concurrency access eba table. > > For example, When user do shrink ubi volume A calling ubi_resize_volume, > while the other thread is writing (volume B) and triggering wear-leveling, > which may calling ubi_write_fastmap, under these circumstances, KASAN may > report: slab-out-of-bounds in ubi_eba_get_ldesc+0xfb/0x130. > > The main work of this patch include: > 1. fix races in ubi_resize_volume and ubi_update_fastmap, to avoid > eba_tbl read out of bounds. first, we make eba_tbl and reserved_pebs > updating under the protect of vol->volumes_lock. second, rollback > volume in case of resize failure. Also mention that for volume > shrinking failure, since part of volume has been shrunk and unmapped, > there is no need to recover {rsvd/avail}_pebs. > 2. fix some memleak in error path of ubi_resize_volume when destroy > new_eba_tbl. > > ================================================================== > BUG: KASAN: slab-out-of-bounds in ubi_eba_get_ldesc+0xfb/0x130 [ubi] > Read of size 4 at addr ffff88800f43f570 by task kworker/u16:0/7 > CPU: 0 PID: 7 Comm: kworker/u16:0 Not tainted 5.16.0-rc7 #3 > Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.13.0-1ubuntu1.1 04/01/2014 > Workqueue: writeback wb_workfn (flush-ubifs_0_0) > Call Trace: > > dump_stack_lvl+0x4d/0x66 > print_address_description.constprop.0+0x41/0x60 > kasan_report.cold+0x83/0xdf > ubi_eba_get_ldesc+0xfb/0x130 [ubi] > ubi_update_fastmap.cold+0x60f/0xc7d [ubi] > ubi_wl_get_peb+0x25b/0x4f0 [ubi] > try_write_vid_and_data+0x9a/0x4d0 [ubi] > ubi_eba_write_leb+0x7e4/0x17d0 [ubi] > ubi_leb_map+0x1a0/0x2c0 [ubi] > ubifs_leb_map+0x139/0x270 [ubifs] > ubifs_add_bud_to_log+0xb40/0xf30 [ubifs] > make_reservation+0x86e/0xb00 [ubifs] > ubifs_jnl_write_data+0x430/0x9d0 [ubifs] > do_writepage+0x1d1/0x550 [ubifs] > ubifs_writepage+0x37c/0x670 [ubifs] > __writepage+0x67/0x170 > write_cache_pages+0x259/0xa90 > do_writepages+0x277/0x5d0 > __writeback_single_inode+0xb8/0x850 > writeback_sb_inodes+0x4b3/0xb20 > __writeback_inodes_wb+0xc1/0x220 > wb_writeback+0x59f/0x740 > wb_workfn+0x6d0/0xca0 > process_one_work+0x711/0xfc0 > worker_thread+0x95/0xd00 > kthread+0x3a6/0x490 > ret_from_fork+0x1f/0x30 > > > Allocated by task 711: > kasan_save_stack+0x1e/0x50 > __kasan_kmalloc+0x81/0xa0 > ubi_eba_create_table+0x88/0x1a0 [ubi] > ubi_resize_volume.cold+0x175/0xae7 [ubi] > ubi_cdev_ioctl+0x57f/0x1a60 [ubi] > __x64_sys_ioctl+0x13a/0x1c0 > do_syscall_64+0x35/0x80 > entry_SYSCALL_64_after_hwframe+0x44/0xae > > Last potentially related work creation: > kasan_save_stack+0x1e/0x50 > __kasan_record_aux_stack+0xb7/0xc0 > call_rcu+0xd6/0x1000 > blk_stat_free_callback+0x28/0x30 > blk_release_queue+0x8a/0x2e0 > kobject_put+0x186/0x4c0 > scsi_device_dev_release_usercontext+0x620/0xbd0 > execute_in_process_context+0x2f/0x120 > device_release+0xa4/0x240 > kobject_put+0x186/0x4c0 > put_device+0x20/0x30 > __scsi_remove_device+0x1c3/0x300 > scsi_probe_and_add_lun+0x2140/0x2eb0 > __scsi_scan_target+0x1f2/0xbb0 > scsi_scan_channel+0x11b/0x1a0 > scsi_scan_host_selected+0x24c/0x310 > do_scsi_scan_host+0x1e0/0x250 > do_scan_async+0x45/0x490 > async_run_entry_fn+0xa2/0x530 > process_one_work+0x711/0xfc0 > worker_thread+0x95/0xd00 > kthread+0x3a6/0x490 > ret_from_fork+0x1f/0x30 > The buggy address belongs to the object at ffff88800f43f500 > which belongs to the cache kmalloc-128 of size 128 > The buggy address is located 112 bytes inside of > 128-byte region [ffff88800f43f500, ffff88800f43f580) > The buggy address belongs to the page: > page:ffffea00003d0f00 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xf43c > head:ffffea00003d0f00 order:2 compound_mapcount:0 compound_pincount:0 > flags: 0x1fffff80010200(slab|head|node=0|zone=1|lastcpupid=0x1fffff) > raw: 001fffff80010200 ffffea000046ba08 ffffea0000457208 ffff88810004d1c0 > raw: 0000000000000000 0000000000190019 00000001ffffffff 0000000000000000 > page dumped because: kasan: bad access detected > Memory state around the buggy address: > ffff88800f43f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc > ffff88800f43f480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc >> ffff88800f43f500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc > ^ > ffff88800f43f580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc > ffff88800f43f600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc > > The following steps can used to reproduce: > Process 1: write and trigger ubi wear-leveling > ubimkvol /dev/ubi0 -s 5000MiB -N v1 > ubimkvol /dev/ubi0 -s 2000MiB -N v2 > ubimkvol /dev/ubi0 -s 10MiB -N v3 > mount -t ubifs /dev/ubi0_0 /mnt/ubifs > while true; > do > filename=/mnt/ubifs/$((RANDOM)) > dd if=/dev/random of=${filename} bs=1M count=$((RANDOM % 1000)) > rm -rf ${filename} > sync /mnt/ubifs/ > done > > Process 2: do random resize > struct ubi_rsvol_req req; > req.vol_id = 1; > req.bytes = (rand() % 50) * 512KB; > ioctl(fd, UBI_IOCRSVOL, &req); > > Signed-off-by: Guo Xuenan > Signed-off-by: ZhaoLong Wang > --- > drivers/mtd/ubi/vmt.c | 24 +++++++++++++++++------- > 1 file changed, 17 insertions(+), 7 deletions(-) > > diff --git a/drivers/mtd/ubi/vmt.c b/drivers/mtd/ubi/vmt.c > index 2c867d16f89f..97294def01eb 100644 > --- a/drivers/mtd/ubi/vmt.c > +++ b/drivers/mtd/ubi/vmt.c > @@ -408,6 +408,7 @@ int ubi_resize_volume(struct ubi_volume_desc *desc, int reserved_pebs) > struct ubi_device *ubi = vol->ubi; > struct ubi_vtbl_record vtbl_rec; > struct ubi_eba_table *new_eba_tbl = NULL; > + struct ubi_eba_table *old_eba_tbl = NULL; > int vol_id = vol->vol_id; > > if (ubi->ro_mode) > @@ -453,10 +454,13 @@ int ubi_resize_volume(struct ubi_volume_desc *desc, int reserved_pebs) > err = -ENOSPC; > goto out_free; > } > + > ubi->avail_pebs -= pebs; > ubi->rsvd_pebs += pebs; > ubi_eba_copy_table(vol, new_eba_tbl, vol->reserved_pebs); > - ubi_eba_replace_table(vol, new_eba_tbl); > + old_eba_tbl = vol->eba_tbl; > + vol->eba_tbl = new_eba_tbl; > + vol->reserved_pebs = reserved_pebs; > spin_unlock(&ubi->volumes_lock); > } > > @@ -471,7 +475,9 @@ int ubi_resize_volume(struct ubi_volume_desc *desc, int reserved_pebs) > ubi->avail_pebs -= pebs; > ubi_update_reserved(ubi); > ubi_eba_copy_table(vol, new_eba_tbl, reserved_pebs); > - ubi_eba_replace_table(vol, new_eba_tbl); > + old_eba_tbl = vol->eba_tbl; > + vol->eba_tbl = new_eba_tbl; > + vol->reserved_pebs = reserved_pebs; > spin_unlock(&ubi->volumes_lock); > } > > @@ -493,7 +499,6 @@ int ubi_resize_volume(struct ubi_volume_desc *desc, int reserved_pebs) > if (err) > goto out_acc; > > - vol->reserved_pebs = reserved_pebs; > if (vol->vol_type == UBI_DYNAMIC_VOLUME) { > vol->used_ebs = reserved_pebs; > vol->last_eb_bytes = vol->usable_leb_size; > @@ -501,19 +506,24 @@ int ubi_resize_volume(struct ubi_volume_desc *desc, int reserved_pebs) > (long long)vol->used_ebs * vol->usable_leb_size; > } > > + /* destroy old table */ > + ubi_eba_destroy_table(old_eba_tbl); > ubi_volume_notify(ubi, vol, UBI_VOLUME_RESIZED); > self_check_volumes(ubi); > return err; > > out_acc: > + spin_lock(&ubi->volumes_lock); > + vol->reserved_pebs = reserved_pebs - pebs; > if (pebs > 0) { > - spin_lock(&ubi->volumes_lock); > ubi->rsvd_pebs -= pebs; > ubi->avail_pebs += pebs; > - spin_unlock(&ubi->volumes_lock); > + ubi_eba_copy_table(vol, old_eba_tbl, vol->reserved_pebs); > + } else { > + ubi_eba_copy_table(vol, old_eba_tbl, reserved_pebs); > } > - return err; > - > + vol->eba_tbl = old_eba_tbl; > + spin_unlock(&ubi->volumes_lock); > out_free: > ubi_eba_destroy_table(new_eba_tbl); > return err; > Besides that, it's better to protect 'vol->eba_tbl->entries' assignment like: diff --git a/drivers/mtd/ubi/eba.c b/drivers/mtd/ubi/eba.c index 403b79d6efd5..5ae0c1bc6f41 100644 --- a/drivers/mtd/ubi/eba.c +++ b/drivers/mtd/ubi/eba.c @@ -1450,7 +1450,9 @@ int ubi_eba_copy_leb(struct ubi_device *ubi, int from, int to, } ubi_assert(vol->eba_tbl->entries[lnum].pnum == from); + spin_lock(&ubi->volumes_lock); vol->eba_tbl->entries[lnum].pnum = to; + spin_unlock(&ubi->volumes_lock); out_unlock_buf: mutex_unlock(&ubi->buf_mutex); Otherwise, a race between wear_leveling_work and shrinking volume could happen: ubi_resize_volume wear_leveling_worker ubi_eba_copy_table(vol, new_eba_tbl, reserved_pebs); vol->eba_tbl->entries[lnum].pnum = to; // update old eba_tbl vol->eba_tbl = new_eba_tbl