From: Luis Henriques <lhenriques@suse.com>
To: Jeff Layton <jlayton@kernel.org>
Cc: Sage Weil <sage@redhat.com>, "Ilya Dryomov" <idryomov@gmail.com>,
ceph-devel@vger.kernel.org, linux-kernel@vger.kernel.org
Subject: Re: [PATCH] ceph: Fix use-after-free in __ceph_remove_cap
Date: Mon, 21 Oct 2019 15:51:27 +0100 [thread overview]
Message-ID: <87a79unocw.fsf@suse.com> (raw)
In-Reply-To: <a68eeb81a5b193be2da49b83dfedce7d2782fb40.camel@kernel.org>
Jeff Layton <jlayton@kernel.org> writes:
> On Thu, 2019-10-17 at 15:46 +0100, Luis Henriques wrote:
>> KASAN reports a use-after-free when running xfstest generic/531, with the
>> following trace:
>>
>> [ 293.903362] kasan_report+0xe/0x20
>> [ 293.903365] rb_erase+0x1f/0x790
>> [ 293.903370] __ceph_remove_cap+0x201/0x370
>> [ 293.903375] __ceph_remove_caps+0x4b/0x70
>> [ 293.903380] ceph_evict_inode+0x4e/0x360
>> [ 293.903386] evict+0x169/0x290
>> [ 293.903390] __dentry_kill+0x16f/0x250
>> [ 293.903394] dput+0x1c6/0x440
>> [ 293.903398] __fput+0x184/0x330
>> [ 293.903404] task_work_run+0xb9/0xe0
>> [ 293.903410] exit_to_usermode_loop+0xd3/0xe0
>> [ 293.903413] do_syscall_64+0x1a0/0x1c0
>> [ 293.903417] entry_SYSCALL_64_after_hwframe+0x44/0xa9
>>
>> This happens because __ceph_remove_cap() may queue a cap release
>> (__ceph_queue_cap_release) which can be scheduled before that cap is
>> removed from the inode list with
>>
>> rb_erase(&cap->ci_node, &ci->i_caps);
>>
>> And, when this finally happens, the use-after-free will occur.
>>
>> This can be fixed by protecting the rb_erase with the s_cap_lock spinlock,
>> which is used by ceph_send_cap_releases(), before the cap is freed.
>>
>> Signed-off-by: Luis Henriques <lhenriques@suse.com>
>> ---
>> fs/ceph/caps.c | 4 ++--
>> 1 file changed, 2 insertions(+), 2 deletions(-)
>>
>> diff --git a/fs/ceph/caps.c b/fs/ceph/caps.c
>> index d3b9c9d5c1bd..21ee38cabe98 100644
>> --- a/fs/ceph/caps.c
>> +++ b/fs/ceph/caps.c
>> @@ -1089,13 +1089,13 @@ void __ceph_remove_cap(struct ceph_cap *cap, bool queue_release)
>> }
>> cap->cap_ino = ci->i_vino.ino;
>>
>> - spin_unlock(&session->s_cap_lock);
>> -
>> /* remove from inode list */
>> rb_erase(&cap->ci_node, &ci->i_caps);
>> if (ci->i_auth_cap == cap)
>> ci->i_auth_cap = NULL;
>>
>> + spin_unlock(&session->s_cap_lock);
>> +
>> if (removed)
>> ceph_put_cap(mdsc, cap);
>>
>
> Is there any reason we need to wait until this point to remove it from
> the rbtree? ISTM that we ought to just do that at the beginning of the
> function, before we take the s_cap_lock.
That sounds good to me, at least at a first glace. I spent some time
looking for any possible issues in the code, and even run a few tests.
However, looking at git log I found commit f818a73674c5 ("ceph: fix cap
removal races"), which moved that rb_erase from the beginning of the
function to it's current position. So, unless the race mentioned in
this commit has disappeared in the meantime (which is possible, this
commit is from 2010!), this rbtree operation shouldn't be changed.
And I now wonder if my patch isn't introducing a race too...
__ceph_remove_cap() is supposed to always be called with the session
mutex held, except for the ceph_evict_inode() path. Which is where I'm
seeing the UAF. So, maybe what's missing here is the s_mutex. Hmm...
Cheers,
--
Luis
next prev parent reply other threads:[~2019-10-21 14:51 UTC|newest]
Thread overview: 9+ messages / expand[flat|nested] mbox.gz Atom feed top
2019-10-17 14:46 [PATCH] ceph: Fix use-after-free in __ceph_remove_cap Luis Henriques
2019-10-21 12:38 ` Jeff Layton
2019-10-21 14:51 ` Luis Henriques [this message]
[not found] ` <CAAM7YA=dg8ufUWqrD_V8pSdvxrnU+knOW4uW4io_b=Lwjhpg5Q@mail.gmail.com>
2019-10-22 13:47 ` Luis Henriques
2019-10-23 10:29 ` Luis Henriques
2019-10-23 18:47 ` Jeff Layton
2019-10-25 13:05 ` [PATCH v2] " Luis Henriques
2019-10-27 12:31 ` Jeff Layton
2019-10-28 9:18 ` Luis Henriques
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=87a79unocw.fsf@suse.com \
--to=lhenriques@suse.com \
--cc=ceph-devel@vger.kernel.org \
--cc=idryomov@gmail.com \
--cc=jlayton@kernel.org \
--cc=linux-kernel@vger.kernel.org \
--cc=sage@redhat.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox