public inbox for [email protected]
 help / color / mirror / Atom feed
* [PATCH] io_uring: fix possible use after free to sqd
@ 2020-10-15  9:13 Xiaoguang Wang
  2020-10-15 10:01 ` Stefano Garzarella
  0 siblings, 1 reply; 5+ messages in thread
From: Xiaoguang Wang @ 2020-10-15  9:13 UTC (permalink / raw)
  To: io-uring; +Cc: axboe, joseph.qi, Xiaoguang Wang

Reading codes finds a possible use after free issue to sqd:
          thread1              |       thread2
==> io_attach_sq_data()        |
===> sqd = ctx_attach->sq_data;|
                               | ==> io_put_sq_data()
                               | ===> refcount_dec_and_test(&sqd->refs)
                               |     If sqd->refs is zero, will free sqd.
                               |
===> refcount_inc(&sqd->refs); |
                               |
                               | ====> kfree(sqd);
===> now use after free to sqd |

Use refcount_inc_not_zero() to fix this issue.

Signed-off-by: Xiaoguang Wang <[email protected]>
---
 fs/io_uring.c | 6 +++++-
 1 file changed, 5 insertions(+), 1 deletion(-)

diff --git a/fs/io_uring.c b/fs/io_uring.c
index 33b5cf18bb51..48e230feb704 100644
--- a/fs/io_uring.c
+++ b/fs/io_uring.c
@@ -6868,7 +6868,11 @@ static struct io_sq_data *io_attach_sq_data(struct io_uring_params *p)
 		return ERR_PTR(-EINVAL);
 	}
 
-	refcount_inc(&sqd->refs);
+	if (!refcount_inc_not_zero(&sqd->refs)) {
+		fdput(f);
+		return ERR_PTR(-EINVAL);
+	}
+
 	fdput(f);
 	return sqd;
 }
-- 
2.17.2


^ permalink raw reply related	[flat|nested] 5+ messages in thread

* Re: [PATCH] io_uring: fix possible use after free to sqd
  2020-10-15  9:13 [PATCH] io_uring: fix possible use after free to sqd Xiaoguang Wang
@ 2020-10-15 10:01 ` Stefano Garzarella
  2020-10-15 10:46   ` Xiaoguang Wang
  0 siblings, 1 reply; 5+ messages in thread
From: Stefano Garzarella @ 2020-10-15 10:01 UTC (permalink / raw)
  To: Xiaoguang Wang; +Cc: io-uring, axboe, joseph.qi

On Thu, Oct 15, 2020 at 05:13:35PM +0800, Xiaoguang Wang wrote:
> Reading codes finds a possible use after free issue to sqd:
>           thread1              |       thread2
> ==> io_attach_sq_data()        |
> ===> sqd = ctx_attach->sq_data;|
>                                | ==> io_put_sq_data()
>                                | ===> refcount_dec_and_test(&sqd->refs)
>                                |     If sqd->refs is zero, will free sqd.
>                                |
> ===> refcount_inc(&sqd->refs); |
>                                |
>                                | ====> kfree(sqd);
> ===> now use after free to sqd |
> 

IIUC the io_attach_sq_data() is called only during the setup of an
io_uring context, before that the fd is returned to the user space.

So, I'm not sure a second thread can call io_put_sq_data() while the
first thread is in io_attach_sq_data().

Can you check if this situation can really happen?

Thanks,
Stefano

> Use refcount_inc_not_zero() to fix this issue.
> 
> Signed-off-by: Xiaoguang Wang <[email protected]>
> ---
>  fs/io_uring.c | 6 +++++-
>  1 file changed, 5 insertions(+), 1 deletion(-)
> 
> diff --git a/fs/io_uring.c b/fs/io_uring.c
> index 33b5cf18bb51..48e230feb704 100644
> --- a/fs/io_uring.c
> +++ b/fs/io_uring.c
> @@ -6868,7 +6868,11 @@ static struct io_sq_data *io_attach_sq_data(struct io_uring_params *p)
>  		return ERR_PTR(-EINVAL);
>  	}
>  
> -	refcount_inc(&sqd->refs);
> +	if (!refcount_inc_not_zero(&sqd->refs)) {
> +		fdput(f);
> +		return ERR_PTR(-EINVAL);
> +	}
> +
>  	fdput(f);
>  	return sqd;
>  }
> -- 
> 2.17.2
> 


^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: [PATCH] io_uring: fix possible use after free to sqd
  2020-10-15 10:01 ` Stefano Garzarella
@ 2020-10-15 10:46   ` Xiaoguang Wang
  2020-10-15 11:07     ` Stefano Garzarella
  0 siblings, 1 reply; 5+ messages in thread
From: Xiaoguang Wang @ 2020-10-15 10:46 UTC (permalink / raw)
  To: Stefano Garzarella; +Cc: io-uring, axboe, joseph.qi

hi,

> On Thu, Oct 15, 2020 at 05:13:35PM +0800, Xiaoguang Wang wrote:
>> Reading codes finds a possible use after free issue to sqd:
>>            thread1              |       thread2
>> ==> io_attach_sq_data()        |
>> ===> sqd = ctx_attach->sq_data;|
>>                                 | ==> io_put_sq_data()
>>                                 | ===> refcount_dec_and_test(&sqd->refs)
>>                                 |     If sqd->refs is zero, will free sqd.
>>                                 |
>> ===> refcount_inc(&sqd->refs); |
>>                                 |
>>                                 | ====> kfree(sqd);
>> ===> now use after free to sqd |
>>
> 
> IIUC the io_attach_sq_data() is called only during the setup of an
> io_uring context, before that the fd is returned to the user space.
Sorry I didn't make it clear in commit message.
In io_attach_sq_data(), we'll try to attach to a previous io_uring instance
indicated by p->wq_fd, this p->wq_fd could be closed independently.

Regards,
Xiaoguang Wang
> 
> So, I'm not sure a second thread can call io_put_sq_data() while the
> first thread is in io_attach_sq_data().
> 
> Can you check if this situation can really happen?
> 
> Thanks,
> Stefano
> 
>> Use refcount_inc_not_zero() to fix this issue.
>>
>> Signed-off-by: Xiaoguang Wang <[email protected]>
>> ---
>>   fs/io_uring.c | 6 +++++-
>>   1 file changed, 5 insertions(+), 1 deletion(-)
>>
>> diff --git a/fs/io_uring.c b/fs/io_uring.c
>> index 33b5cf18bb51..48e230feb704 100644
>> --- a/fs/io_uring.c
>> +++ b/fs/io_uring.c
>> @@ -6868,7 +6868,11 @@ static struct io_sq_data *io_attach_sq_data(struct io_uring_params *p)
>>   		return ERR_PTR(-EINVAL);
>>   	}
>>   
>> -	refcount_inc(&sqd->refs);
>> +	if (!refcount_inc_not_zero(&sqd->refs)) {
>> +		fdput(f);
>> +		return ERR_PTR(-EINVAL);
>> +	}
>> +
>>   	fdput(f);
>>   	return sqd;
>>   }
>> -- 
>> 2.17.2
>>

^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: [PATCH] io_uring: fix possible use after free to sqd
  2020-10-15 10:46   ` Xiaoguang Wang
@ 2020-10-15 11:07     ` Stefano Garzarella
  2020-10-15 11:24       ` Xiaoguang Wang
  0 siblings, 1 reply; 5+ messages in thread
From: Stefano Garzarella @ 2020-10-15 11:07 UTC (permalink / raw)
  To: Xiaoguang Wang; +Cc: io-uring, axboe, joseph.qi

On Thu, Oct 15, 2020 at 06:46:34PM +0800, Xiaoguang Wang wrote:
> hi閿涳拷
> 
> > On Thu, Oct 15, 2020 at 05:13:35PM +0800, Xiaoguang Wang wrote:
> > > Reading codes finds a possible use after free issue to sqd:
> > >            thread1              |       thread2
> > > ==> io_attach_sq_data()        |
> > > ===> sqd = ctx_attach->sq_data;|
> > >                                 | ==> io_put_sq_data()
> > >                                 | ===> refcount_dec_and_test(&sqd->refs)
> > >                                 |     If sqd->refs is zero, will free sqd.
> > >                                 |
> > > ===> refcount_inc(&sqd->refs); |
> > >                                 |
> > >                                 | ====> kfree(sqd);
> > > ===> now use after free to sqd |
> > > 
> > 
> > IIUC the io_attach_sq_data() is called only during the setup of an
> > io_uring context, before that the fd is returned to the user space.
> Sorry I didn't make it clear in commit message.
> In io_attach_sq_data(), we'll try to attach to a previous io_uring instance
> indicated by p->wq_fd, this p->wq_fd could be closed independently.

Thanks to clarify! Got it.

Also in this case, IIUC io_put_sq_data() is called only when
io_uring_release() is invoked on the previous io_uring instance.

Since we are taking a reference with fdget at the begin of io_attach_sq_data()
and we release this reference only at the end of io_attach_sq_data(),
can io_put_sq_data() runs in another thread while we have the reference?

Thanks,
Stefano

> 
> Regards,
> Xiaoguang Wang
> > 
> > So, I'm not sure a second thread can call io_put_sq_data() while the
> > first thread is in io_attach_sq_data().
> > 
> > Can you check if this situation can really happen?
> > 
> > Thanks,
> > Stefano
> > 
> > > Use refcount_inc_not_zero() to fix this issue.
> > > 
> > > Signed-off-by: Xiaoguang Wang <[email protected]>
> > > ---
> > >   fs/io_uring.c | 6 +++++-
> > >   1 file changed, 5 insertions(+), 1 deletion(-)
> > > 
> > > diff --git a/fs/io_uring.c b/fs/io_uring.c
> > > index 33b5cf18bb51..48e230feb704 100644
> > > --- a/fs/io_uring.c
> > > +++ b/fs/io_uring.c
> > > @@ -6868,7 +6868,11 @@ static struct io_sq_data *io_attach_sq_data(struct io_uring_params *p)
> > >   		return ERR_PTR(-EINVAL);
> > >   	}
> > > -	refcount_inc(&sqd->refs);
> > > +	if (!refcount_inc_not_zero(&sqd->refs)) {
> > > +		fdput(f);
> > > +		return ERR_PTR(-EINVAL);
> > > +	}
> > > +
> > >   	fdput(f);
> > >   	return sqd;
> > >   }
> > > -- 
> > > 2.17.2
> > > 
> 


^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: [PATCH] io_uring: fix possible use after free to sqd
  2020-10-15 11:07     ` Stefano Garzarella
@ 2020-10-15 11:24       ` Xiaoguang Wang
  0 siblings, 0 replies; 5+ messages in thread
From: Xiaoguang Wang @ 2020-10-15 11:24 UTC (permalink / raw)
  To: Stefano Garzarella; +Cc: io-uring, axboe, joseph.qi

> On Thu, Oct 15, 2020 at 06:46:34PM +0800, Xiaoguang Wang wrote:
>> hi閿涳拷
>>
>>> On Thu, Oct 15, 2020 at 05:13:35PM +0800, Xiaoguang Wang wrote:
>>>> Reading codes finds a possible use after free issue to sqd:
>>>>             thread1              |       thread2
>>>> ==> io_attach_sq_data()        |
>>>> ===> sqd = ctx_attach->sq_data;|
>>>>                                  | ==> io_put_sq_data()
>>>>                                  | ===> refcount_dec_and_test(&sqd->refs)
>>>>                                  |     If sqd->refs is zero, will free sqd.
>>>>                                  |
>>>> ===> refcount_inc(&sqd->refs); |
>>>>                                  |
>>>>                                  | ====> kfree(sqd);
>>>> ===> now use after free to sqd |
>>>>
>>>
>>> IIUC the io_attach_sq_data() is called only during the setup of an
>>> io_uring context, before that the fd is returned to the user space.
>> Sorry I didn't make it clear in commit message.
>> In io_attach_sq_data(), we'll try to attach to a previous io_uring instance
>> indicated by p->wq_fd, this p->wq_fd could be closed independently.
> 
> Thanks to clarify! Got it.
> 
> Also in this case, IIUC io_put_sq_data() is called only when
> io_uring_release() is invoked on the previous io_uring instance.
> 
> Since we are taking a reference with fdget at the begin of io_attach_sq_data()
> and we release this reference only at the end of io_attach_sq_data(),
> can io_put_sq_data() runs in another thread while we have the reference?
Oh, right, thanks. Jens, you can ignore this patch, thanks.

Regards,
Xiaoguang Wang

> 
> Thanks,
> Stefano
> 
>>
>> Regards,
>> Xiaoguang Wang
>>>
>>> So, I'm not sure a second thread can call io_put_sq_data() while the
>>> first thread is in io_attach_sq_data().
>>>
>>> Can you check if this situation can really happen?
>>>
>>> Thanks,
>>> Stefano
>>>
>>>> Use refcount_inc_not_zero() to fix this issue.
>>>>
>>>> Signed-off-by: Xiaoguang Wang <[email protected]>
>>>> ---
>>>>    fs/io_uring.c | 6 +++++-
>>>>    1 file changed, 5 insertions(+), 1 deletion(-)
>>>>
>>>> diff --git a/fs/io_uring.c b/fs/io_uring.c
>>>> index 33b5cf18bb51..48e230feb704 100644
>>>> --- a/fs/io_uring.c
>>>> +++ b/fs/io_uring.c
>>>> @@ -6868,7 +6868,11 @@ static struct io_sq_data *io_attach_sq_data(struct io_uring_params *p)
>>>>    		return ERR_PTR(-EINVAL);
>>>>    	}
>>>> -	refcount_inc(&sqd->refs);
>>>> +	if (!refcount_inc_not_zero(&sqd->refs)) {
>>>> +		fdput(f);
>>>> +		return ERR_PTR(-EINVAL);
>>>> +	}
>>>> +
>>>>    	fdput(f);
>>>>    	return sqd;
>>>>    }
>>>> -- 
>>>> 2.17.2
>>>>
>>

^ permalink raw reply	[flat|nested] 5+ messages in thread

end of thread, other threads:[~2020-10-15 11:25 UTC | newest]

Thread overview: 5+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2020-10-15  9:13 [PATCH] io_uring: fix possible use after free to sqd Xiaoguang Wang
2020-10-15 10:01 ` Stefano Garzarella
2020-10-15 10:46   ` Xiaoguang Wang
2020-10-15 11:07     ` Stefano Garzarella
2020-10-15 11:24       ` Xiaoguang Wang

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox