Skip to content

Commit 3093929

Browse files
YuKuai-huaweiaxboe
authored andcommitted
blktrace: fix use after free for struct blk_trace
When tracing the whole disk, 'dropped' and 'msg' will be created under 'q->debugfs_dir' and 'bt->dir' is NULL, thus blk_trace_free() won't remove those files. What's worse, the following UAF can be triggered because of accessing stale 'dropped' and 'msg': ================================================================== BUG: KASAN: use-after-free in blk_dropped_read+0x89/0x100 Read of size 4 at addr ffff88816912f3d8 by task blktrace/1188 CPU: 27 PID: 1188 Comm: blktrace Not tainted 5.17.0-rc4-next-20220217+ #469 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS ?-20190727_073836-4 Call Trace: <TASK> dump_stack_lvl+0x34/0x44 print_address_description.constprop.0.cold+0xab/0x381 ? blk_dropped_read+0x89/0x100 ? blk_dropped_read+0x89/0x100 kasan_report.cold+0x83/0xdf ? blk_dropped_read+0x89/0x100 kasan_check_range+0x140/0x1b0 blk_dropped_read+0x89/0x100 ? blk_create_buf_file_callback+0x20/0x20 ? kmem_cache_free+0xa1/0x500 ? do_sys_openat2+0x258/0x460 full_proxy_read+0x8f/0xc0 vfs_read+0xc6/0x260 ksys_read+0xb9/0x150 ? vfs_write+0x3d0/0x3d0 ? fpregs_assert_state_consistent+0x55/0x60 ? exit_to_user_mode_prepare+0x39/0x1e0 do_syscall_64+0x35/0x80 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7fbc080d92fd Code: ce 20 00 00 75 10 b8 00 00 00 00 0f 05 48 3d 01 f0 ff ff 73 31 c3 48 83 1 RSP: 002b:00007fbb95ff9cb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000000 RAX: ffffffffffffffda RBX: 00007fbb95ff9dc0 RCX: 00007fbc080d92fd RDX: 0000000000000100 RSI: 00007fbb95ff9cc0 RDI: 0000000000000045 RBP: 0000000000000045 R08: 0000000000406299 R09: 00000000fffffffd R10: 000000000153afa0 R11: 0000000000000293 R12: 00007fbb780008c0 R13: 00007fbb78000938 R14: 0000000000608b30 R15: 00007fbb780029c8 </TASK> Allocated by task 1050: kasan_save_stack+0x1e/0x40 __kasan_kmalloc+0x81/0xa0 do_blk_trace_setup+0xcb/0x410 __blk_trace_setup+0xac/0x130 blk_trace_ioctl+0xe9/0x1c0 blkdev_ioctl+0xf1/0x390 __x64_sys_ioctl+0xa5/0xe0 do_syscall_64+0x35/0x80 entry_SYSCALL_64_after_hwframe+0x44/0xae Freed by task 1050: kasan_save_stack+0x1e/0x40 kasan_set_track+0x21/0x30 kasan_set_free_info+0x20/0x30 __kasan_slab_free+0x103/0x180 kfree+0x9a/0x4c0 __blk_trace_remove+0x53/0x70 blk_trace_ioctl+0x199/0x1c0 blkdev_common_ioctl+0x5e9/0xb30 blkdev_ioctl+0x1a5/0x390 __x64_sys_ioctl+0xa5/0xe0 do_syscall_64+0x35/0x80 entry_SYSCALL_64_after_hwframe+0x44/0xae The buggy address belongs to the object at ffff88816912f380 which belongs to the cache kmalloc-96 of size 96 The buggy address is located 88 bytes inside of 96-byte region [ffff88816912f380, ffff88816912f3e0) The buggy address belongs to the page: page:000000009a1b4e7c refcount:1 mapcount:0 mapping:0000000000000000 index:0x0f flags: 0x17ffffc0000200(slab|node=0|zone=2|lastcpupid=0x1fffff) raw: 0017ffffc0000200 ffffea00044f1100 dead000000000002 ffff88810004c780 raw: 0000000000000000 0000000000200020 00000001ffffffff 0000000000000000 page dumped because: kasan: bad access detected Memory state around the buggy address: ffff88816912f280: fa fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc ffff88816912f300: fa fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc >ffff88816912f380: fa fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc ^ ffff88816912f400: fa fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc ffff88816912f480: fa fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc ================================================================== Fixes: c0ea576 ("blktrace: remove debugfs file dentries from struct blk_trace") Signed-off-by: Yu Kuai <[email protected]> Reviewed-by: Greg Kroah-Hartman <[email protected]> Link: https://lore.kernel.org/r/[email protected] Signed-off-by: Jens Axboe <[email protected]>
1 parent b2750f1 commit 3093929

File tree

1 file changed

+18
-8
lines changed

1 file changed

+18
-8
lines changed

kernel/trace/blktrace.c

Lines changed: 18 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -310,10 +310,20 @@ static void __blk_add_trace(struct blk_trace *bt, sector_t sector, int bytes,
310310
local_irq_restore(flags);
311311
}
312312

313-
static void blk_trace_free(struct blk_trace *bt)
313+
static void blk_trace_free(struct request_queue *q, struct blk_trace *bt)
314314
{
315315
relay_close(bt->rchan);
316-
debugfs_remove(bt->dir);
316+
317+
/*
318+
* If 'bt->dir' is not set, then both 'dropped' and 'msg' are created
319+
* under 'q->debugfs_dir', thus lookup and remove them.
320+
*/
321+
if (!bt->dir) {
322+
debugfs_remove(debugfs_lookup("dropped", q->debugfs_dir));
323+
debugfs_remove(debugfs_lookup("msg", q->debugfs_dir));
324+
} else {
325+
debugfs_remove(bt->dir);
326+
}
317327
free_percpu(bt->sequence);
318328
free_percpu(bt->msg_data);
319329
kfree(bt);
@@ -335,10 +345,10 @@ static void put_probe_ref(void)
335345
mutex_unlock(&blk_probe_mutex);
336346
}
337347

338-
static void blk_trace_cleanup(struct blk_trace *bt)
348+
static void blk_trace_cleanup(struct request_queue *q, struct blk_trace *bt)
339349
{
340350
synchronize_rcu();
341-
blk_trace_free(bt);
351+
blk_trace_free(q, bt);
342352
put_probe_ref();
343353
}
344354

@@ -352,7 +362,7 @@ static int __blk_trace_remove(struct request_queue *q)
352362
return -EINVAL;
353363

354364
if (bt->trace_state != Blktrace_running)
355-
blk_trace_cleanup(bt);
365+
blk_trace_cleanup(q, bt);
356366

357367
return 0;
358368
}
@@ -572,7 +582,7 @@ static int do_blk_trace_setup(struct request_queue *q, char *name, dev_t dev,
572582
ret = 0;
573583
err:
574584
if (ret)
575-
blk_trace_free(bt);
585+
blk_trace_free(q, bt);
576586
return ret;
577587
}
578588

@@ -1616,7 +1626,7 @@ static int blk_trace_remove_queue(struct request_queue *q)
16161626

16171627
put_probe_ref();
16181628
synchronize_rcu();
1619-
blk_trace_free(bt);
1629+
blk_trace_free(q, bt);
16201630
return 0;
16211631
}
16221632

@@ -1647,7 +1657,7 @@ static int blk_trace_setup_queue(struct request_queue *q,
16471657
return 0;
16481658

16491659
free_bt:
1650-
blk_trace_free(bt);
1660+
blk_trace_free(q, bt);
16511661
return ret;
16521662
}
16531663

0 commit comments

Comments
 (0)