Received: by 2002:a05:6358:3188:b0:123:57c1:9b43 with SMTP id q8csp20585731rwd; Thu, 29 Jun 2023 04:32:26 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ4mYteyq+EGOVoVzA/uI0wRUqTT8x7ZKtYrRxsD5SobRhh4vMDRzfliznKj21Nv3pngFunH X-Received: by 2002:a05:6e02:542:b0:345:8373:4ca7 with SMTP id i2-20020a056e02054200b0034583734ca7mr18308592ils.20.1688038346407; Thu, 29 Jun 2023 04:32:26 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1688038346; cv=none; d=google.com; s=arc-20160816; b=SLV3UxDl044aEz7ejeYO+5AU86R6eHpjxb/4HLMz4aKMdFeErFHMI5r/2CHJ5dzRRh PNKepYskK4IA2o7aHXeF4jl/hHeLmV16Prwd8dwqfPt3rr3UDn+lQ5vGztG7EKFBKMTQ idWRBczIsO3Ctg6K4yPsiVG5OHL/V1NP0Q2v2Zp2gIy1mb35H0wkse/iNH7Y0SI62BIm aveoOsmQ6x1s2YPE8Jyi5ysZZt7Lve8bdoDgFLC8/AOYTdhnzc9L1rrncCUqR/Ss0v7y xqM2d265ssMxNnQqfmIKa4OdA/nQfEv2eHU5FfoCfkcH3ZMbLXSFB6PdDYePeXtZFXZ3 bpOQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=n0ZalJ8CwT0Qa/KI9rQ2+go46JXaq5PStumr44YU9v4=; fh=0DMpdfOC64+/LQM4pStofkM1+AZ/+nOibkY3+0Kfi4I=; b=iNX8J1S8IE7wPAN/PFUmWdrj4PsZQw4H4wPg5GDOH2EtphCSSW7R0JDHLye+M8hSJD rsH9WpqfAhwWr7QIcL+/sH9sgytOf9vE3PjpoJ39uqzLtSOCaOu4c46zKCA9bwk298tR kTDUFJLv4Kz0j7fsw5MNEm4JSPxleKFnYjDbisZ4HOCFscpD2ST+qD3Zqvn5AwttARXR In6XsmsA28QS8zEugRLUuH5kf8C2073f/n7bHp0qFg74u/M+aLNTFc6yZw2okTBpv2sO wwlf+5HyEBkXx/cTpmElBBExO7+pjrnAY0cDZiQ6gIm3SL/k7jOxhaHcSNoxvg3v1HIz q6sg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=E8Oxyg5B; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id r188-20020a632bc5000000b0054fdafd5b45si10657340pgr.740.2023.06.29.04.32.13; Thu, 29 Jun 2023 04:32:26 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=E8Oxyg5B; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231464AbjF2LL6 (ORCPT + 99 others); Thu, 29 Jun 2023 07:11:58 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:38164 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229632AbjF2LL5 (ORCPT ); Thu, 29 Jun 2023 07:11:57 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [IPv6:2604:1380:4641:c500::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 77DE510CF for ; Thu, 29 Jun 2023 04:11:56 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 107EB6152E for ; Thu, 29 Jun 2023 11:11:56 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id EF5C8C433C8; Thu, 29 Jun 2023 11:11:53 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1688037115; bh=VUq5wpykOeodhWHpM5uazmYCwD2kcysVzjLarP25WIc=; h=From:To:Cc:Subject:Date:From; b=E8Oxyg5B/nnKPM9CazNmkaa6z91zIuTK432RCxu9aD8jfz2gC7fnyl/OExidvtOKG 5duMRnXNzn6HRxOARKZ8xTqnYQ8wxlIPRaJqVimA3Pf14Kbuz7J0uRkD7ADVclrYf8 jlfaikLJPWkJGDbmX0BwjozgC8hB5Cf+UhHOqCekDyBA/iGMCsPBXCJmtE/pX0nxzw optZ6sqaXrYmzYsL5fmjpZiQPg3vq2jOF3I6thpYO5CT47+8IVJxh1ST+tVnxme5mG 3jc/YyJTXqVzJ76hybFeqyeNjob+ZQA5pLuMIdL9+0DpovKOY+ZoNi023Xe6kqPPYT zmDitRVR4ZP9g== From: Chao Yu To: jaegeuk@kernel.org Cc: linux-f2fs-devel@lists.sourceforge.net, linux-kernel@vger.kernel.org, Chao Yu , syzbot+12cb4425b22169b52036@syzkaller.appspotmail.com Subject: [PATCH] f2fs: fix to do sanity check on direct node in truncate_dnode() Date: Thu, 29 Jun 2023 19:11:44 +0800 Message-Id: <20230629111144.3582787-1-chao@kernel.org> X-Mailer: git-send-email 2.40.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-4.4 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_MED, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org syzbot reports below bug: BUG: KASAN: slab-use-after-free in f2fs_truncate_data_blocks_range+0x122a/0x14c0 fs/f2fs/file.c:574 Read of size 4 at addr ffff88802a25c000 by task syz-executor148/5000 CPU: 1 PID: 5000 Comm: syz-executor148 Not tainted 6.4.0-rc7-syzkaller-00041-ge660abd551f1 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xd9/0x150 lib/dump_stack.c:106 print_address_description.constprop.0+0x2c/0x3c0 mm/kasan/report.c:351 print_report mm/kasan/report.c:462 [inline] kasan_report+0x11c/0x130 mm/kasan/report.c:572 f2fs_truncate_data_blocks_range+0x122a/0x14c0 fs/f2fs/file.c:574 truncate_dnode+0x229/0x2e0 fs/f2fs/node.c:944 f2fs_truncate_inode_blocks+0x64b/0xde0 fs/f2fs/node.c:1154 f2fs_do_truncate_blocks+0x4ac/0xf30 fs/f2fs/file.c:721 f2fs_truncate_blocks+0x7b/0x300 fs/f2fs/file.c:749 f2fs_truncate.part.0+0x4a5/0x630 fs/f2fs/file.c:799 f2fs_truncate include/linux/fs.h:825 [inline] f2fs_setattr+0x1738/0x2090 fs/f2fs/file.c:1006 notify_change+0xb2c/0x1180 fs/attr.c:483 do_truncate+0x143/0x200 fs/open.c:66 handle_truncate fs/namei.c:3295 [inline] do_open fs/namei.c:3640 [inline] path_openat+0x2083/0x2750 fs/namei.c:3791 do_filp_open+0x1ba/0x410 fs/namei.c:3818 do_sys_openat2+0x16d/0x4c0 fs/open.c:1356 do_sys_open fs/open.c:1372 [inline] __do_sys_creat fs/open.c:1448 [inline] __se_sys_creat fs/open.c:1442 [inline] __x64_sys_creat+0xcd/0x120 fs/open.c:1442 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x39/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcd The root cause is, inodeA references inodeB via inodeB's ino, once inodeA is truncated, it calls truncate_dnode() to truncate data blocks in inodeB's node page, it traverse mapping data from node->i.i_addr[0] to node->i.i_addr[ADDRS_PER_BLOCK() - 1], result in out-of-boundary access. This patch fixes to add sanity check on dnode page in truncate_dnode(), so that, it can help to avoid triggering such issue, and once it encounters such issue, it will record newly introduced ERROR_INVALID_NODE_REFERENCE error into superblock, later fsck can detect such issue and try repairing. Also, it removes f2fs_truncate_data_blocks() for cleanup due to the function has only one caller, and uses f2fs_truncate_data_blocks_range() instead. Reported-and-tested-by: syzbot+12cb4425b22169b52036@syzkaller.appspotmail.com Closes: https://lore.kernel.org/linux-f2fs-devel/000000000000f3038a05fef867f8@google.com Signed-off-by: Chao Yu --- fs/f2fs/f2fs.h | 1 - fs/f2fs/file.c | 5 ----- fs/f2fs/node.c | 14 ++++++++++++-- include/linux/f2fs_fs.h | 1 + 4 files changed, 13 insertions(+), 8 deletions(-) diff --git a/fs/f2fs/f2fs.h b/fs/f2fs/f2fs.h index 10a463f984a4..a4a6a5efcb48 100644 --- a/fs/f2fs/f2fs.h +++ b/fs/f2fs/f2fs.h @@ -3464,7 +3464,6 @@ static inline bool __is_valid_data_blkaddr(block_t blkaddr) * file.c */ int f2fs_sync_file(struct file *file, loff_t start, loff_t end, int datasync); -void f2fs_truncate_data_blocks(struct dnode_of_data *dn); int f2fs_do_truncate_blocks(struct inode *inode, u64 from, bool lock); int f2fs_truncate_blocks(struct inode *inode, u64 from, bool lock); int f2fs_truncate(struct inode *inode); diff --git a/fs/f2fs/file.c b/fs/f2fs/file.c index 3356f6502c70..743420b1ab57 100644 --- a/fs/f2fs/file.c +++ b/fs/f2fs/file.c @@ -630,11 +630,6 @@ void f2fs_truncate_data_blocks_range(struct dnode_of_data *dn, int count) dn->ofs_in_node, nr_free); } -void f2fs_truncate_data_blocks(struct dnode_of_data *dn) -{ - f2fs_truncate_data_blocks_range(dn, ADDRS_PER_BLOCK(dn->inode)); -} - static int truncate_partial_data_page(struct inode *inode, u64 from, bool cache_only) { diff --git a/fs/f2fs/node.c b/fs/f2fs/node.c index 3e1fa564db8f..ee2e1dd64f25 100644 --- a/fs/f2fs/node.c +++ b/fs/f2fs/node.c @@ -925,6 +925,7 @@ static int truncate_node(struct dnode_of_data *dn) static int truncate_dnode(struct dnode_of_data *dn) { + struct f2fs_sb_info *sbi = F2FS_I_SB(dn->inode); struct page *page; int err; @@ -932,16 +933,25 @@ static int truncate_dnode(struct dnode_of_data *dn) return 1; /* get direct node */ - page = f2fs_get_node_page(F2FS_I_SB(dn->inode), dn->nid); + page = f2fs_get_node_page(sbi, dn->nid); if (PTR_ERR(page) == -ENOENT) return 1; else if (IS_ERR(page)) return PTR_ERR(page); + if (IS_INODE(page) || ino_of_node(page) != dn->inode->i_ino) { + f2fs_err(sbi, "incorrect node reference, ino: %lu, nid: %u, ino_of_node: %u", + dn->inode->i_ino, dn->nid, ino_of_node(page)); + set_sbi_flag(sbi, SBI_NEED_FSCK); + f2fs_handle_error(sbi, ERROR_INVALID_NODE_REFERENCE); + f2fs_put_page(page, 1); + return -EFSCORRUPTED; + } + /* Make dnode_of_data for parameter */ dn->node_page = page; dn->ofs_in_node = 0; - f2fs_truncate_data_blocks(dn); + f2fs_truncate_data_blocks_range(dn, ADDRS_PER_BLOCK(dn->inode)); err = truncate_node(dn); if (err) { f2fs_put_page(page, 1); diff --git a/include/linux/f2fs_fs.h b/include/linux/f2fs_fs.h index 4638f7b2f96f..c58f1ce2217e 100644 --- a/include/linux/f2fs_fs.h +++ b/include/linux/f2fs_fs.h @@ -103,6 +103,7 @@ enum f2fs_error { ERROR_INCONSISTENT_SIT, ERROR_CORRUPTED_VERITY_XATTR, ERROR_CORRUPTED_XATTR, + ERROR_INVALID_NODE_REFERENCE, ERROR_MAX, }; -- 2.40.1