public inbox for bpf@vger.kernel.org
 help / color / mirror / Atom feed
From: "Alexei Starovoitov" <alexei.starovoitov@gmail.com>
To: "Al Viro" <viro@zeniv.linux.org.uk>, "Eulgyu Kim" <eulgyukim@snu.ac.kr>
Cc: <brauner@kernel.org>, <jack@suse.cz>,
	<linux-fsdevel@vger.kernel.org>, <linux-kernel@vger.kernel.org>,
	<byoungyoung@snu.ac.kr>, <jjy600901@snu.ac.kr>,
	"Alexei Starovoitov" <ast@kernel.org>,
	"KaFai Wan" <kafai.wan@linux.dev>,
	"Yonghong Song" <yonghong.song@linux.dev>, <bpf@vger.kernel.org>,
	"Al Viro" <viro@ftp.linux.org.uk>
Subject: Re: [BUG] KASAN: slab-use-after-free in link_path_walk
Date: Thu, 23 Apr 2026 18:06:28 -0700	[thread overview]
Message-ID: <DI0ZDDJQHSXI.2CMCJQ908T1KV@gmail.com> (raw)
In-Reply-To: <20260423043906.GN3518998@ZenIV>

On Wed Apr 22, 2026 at 9:39 PM PDT, Al Viro wrote:
> On Thu, Apr 23, 2026 at 10:39:16AM +0900, Eulgyu Kim wrote:
>
>> We suspect there is a race condition between vfs_rmdir() and may_lookup()
>> on the BPF pseudo filesystem. It seems that while link_path_walk() is walking
>> a path, its call to may_lookup() checks permissions on the current directory
>> inode through nd->inode, and vfs_rmdir() can remove that same directory and
>> trigger inode destruction, leading to a use-after-free.
>
> Not really.  What happens is that bpf does prompt freeing of struct inode, instead
> of having it done with RCU delay.  Everything else is a result of that.
>
> What's going on there?  It used to be in ->free_inode(); who had moved that into
> ->destroy_inode(), why had that been done, who had ACKed that and how have I
> missed the discussions on fsdevel?
>
> <digs>
>
> commit 4f375ade6aa9f37fd72d7a78682f639772089eed
> Author: KaFai Wan <kafai.wan@linux.dev>
> Date:   Wed Oct 8 18:26:26 2025 +0800
>  
>      bpf: Avoid RCU context warning when unpinning htab with internal structs
>
> [blocking stuff done from RCU-delayed callback, so let's make everything prompt,
> whaddya mean, what was the delay for?]
>
> Reported-by: Le Chen <tom2cat@sjtu.edu.cn>
> Closes: https://lore.kernel.org/all/1444123482.1827743.1750996347470.JavaMail.zimbra@sjtu.edu.cn/
> Fixes: 68134668c17f ("bpf: Add map side support for bpf timers.")
> Suggested-by: Alexei Starovoitov <ast@kernel.org>
> Signed-off-by: KaFai Wan <kafai.wan@linux.dev>
> Acked-by: Yonghong Song <yonghong.song@linux.dev>
> Link: https://lore.kernel.org/r/20251008102628.808045-2-kafai.wan@linux.dev
> Signed-off-by: Alexei Starovoitov <ast@kernel.org>
>
> OK, that answers some of that...  <looks the posting up>
> To: ast@kernel.org, daniel@iogearbox.net, andrii@kernel.org,
> 	martin.lau@linux.dev, eddyz87@gmail.com, song@kernel.org,
> 	yonghong.song@linux.dev, john.fastabend@gmail.com,
> 	kpsingh@kernel.org, sdf@fomichev.me, haoluo@google.com,
> 	jolsa@kernel.org, shuah@kernel.org, kafai.wan@linux.dev,
> 	toke@redhat.com, linux-kernel@vger.kernel.org,
> 	bpf@vger.kernel.org, linux-kselftest@vger.kernel.org
>
> ... right, that probably answers the last one.  Incidentally, that commit has
> brought back the old bug with cached symlink bodies getting freed without RCU delay.
> It is possible that it was discussed on fsdevel at some point and I'd missed it
> there, but...
>
> Folks, the rules are simple:
> 	* anything that might be accessed in RCU mode (inode very much included
> for objects that are visible in the tree) must be freed after RCU delay; that's
> what ->free_inode() is for.
> 	* anything that can't be freed in such context should either be
> dealt with in ->destroy_inode() (if it isn't needed for RCU-exposed methods)
> or, if it really is needed for those, done via schedule_work() or equivalent
> done by ->destroy_inode().
>
> Seeing that bpffs has the grand total of zero RCU-exposed methods (no ->d_compare(),
> no ->d_hash(), no ->permission(), no ->d_revalidate(), no ->get_link()) I would
> guess that it's the case of "have your bpf_any_put() done promptly, leave freeing
> the inode and cached symlink body RCU-delayed".  Something like the delta below
> (completely untested):
>
> diff --git a/kernel/bpf/inode.c b/kernel/bpf/inode.c
> index 25c06a011825..bd052a8e89a9 100644
> --- a/kernel/bpf/inode.c
> +++ b/kernel/bpf/inode.c
> @@ -762,14 +762,26 @@ static int bpf_show_options(struct seq_file *m, struct dentry *root)
>  	return 0;
>  }
>  
> +// this is done promptly
>  static void bpf_destroy_inode(struct inode *inode)
>  {
>  	enum bpf_type type;
>  
> -	if (S_ISLNK(inode->i_mode))
> -		kfree(inode->i_link);
> +	// better done here, since it's blocking and we'd need
> +	// to use something like schedule_work() to do it from
> +	// ->free_inode(); since this stuff doesn't need to
> +	// be delayed, doing it here is less headache.
>  	if (!bpf_inode_type(inode, &type))
>  		bpf_any_put(inode->i_private, type);
> +}
> +
> +// ... and this is done with RCU delay; anything that might be accessed
> +// by RCU pathwalk (like, you know, inode and symlink contents) should be
> +// dealt with here
> +static void bpf_free_inode(struct inode *inode)
> +{
> +	if (S_ISLNK(inode->i_mode))
> +		kfree(inode->i_link);
>  	free_inode_nonrcu(inode);
>  }
>  
> @@ -778,6 +790,7 @@ const struct super_operations bpf_super_ops = {
>  	.drop_inode	= inode_just_drop,
>  	.show_options	= bpf_show_options,
>  	.destroy_inode	= bpf_destroy_inode,
> +	.free_inode	= bpf_free_inode,
>  };

Thanks for the fix.
Feel free to take it into your tree directly.

      parent reply	other threads:[~2026-04-24  1:06 UTC|newest]

Thread overview: 3+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
     [not found] <20260423013916.1589029-1-eulgyukim@snu.ac.kr>
2026-04-23  4:39 ` [BUG] KASAN: slab-use-after-free in link_path_walk Al Viro
2026-04-23  5:19   ` Al Viro
2026-04-24  1:06   ` Alexei Starovoitov [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=DI0ZDDJQHSXI.2CMCJQ908T1KV@gmail.com \
    --to=alexei.starovoitov@gmail.com \
    --cc=ast@kernel.org \
    --cc=bpf@vger.kernel.org \
    --cc=brauner@kernel.org \
    --cc=byoungyoung@snu.ac.kr \
    --cc=eulgyukim@snu.ac.kr \
    --cc=jack@suse.cz \
    --cc=jjy600901@snu.ac.kr \
    --cc=kafai.wan@linux.dev \
    --cc=linux-fsdevel@vger.kernel.org \
    --cc=linux-kernel@vger.kernel.org \
    --cc=viro@ftp.linux.org.uk \
    --cc=viro@zeniv.linux.org.uk \
    --cc=yonghong.song@linux.dev \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox