[PATCH] ubifs: Fix read out-of-bounds in ubifs_jnl_write_inode()
Zhihao Cheng
chengzhihao1 at huawei.com
Wed Dec 23 01:59:38 EST 2020
在 2020/12/23 14:28, Chengsong Ke 写道:
Reviewed-by: Zhihao Cheng <chengzhihao1 at huawei.com>
> From: kechengsong <kechengsong at huawei.com>
>
> ubifs_jnl_write_inode() probably cause read out-of-bounds in some situation.
> There is kasan stack:
> [ 336.432159] BUG: KASAN: slab-out-of-bounds in ecc_sw_hamming_calculate+0x1dc/0x7d0
> [ 336.433634] Read of size 4 at addr ffff888019612ff8 by task kworker/u8:4/135
> [ 336.434605]
> [ 336.434830] CPU: 1 PID: 135 Comm: kworker/u8:4 Not tainted 5.10.0-11826-gaf2a097952f3-dirty #338
> [ 336.436050] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS ?-20190727_073836-buildvm-ppc64le-16.ppc.fedoraproject.org-3.fc31 04/01/2014
> [ 336.437876] Workqueue: writeback wb_workfn (flush-ubifs_0_0)
> [ 336.438670] Call Trace:
> [ 336.439021] ? dump_stack+0xdd/0x126
> [ 336.439513] ? print_address_description.constprop.0+0x2c/0x3c0
> [ 336.440308] ? _raw_write_lock_irqsave+0x140/0x140
> [ 336.440921] ? ecc_sw_hamming_calculate+0x1dc/0x7d0
> [ 336.441546] ? ecc_sw_hamming_calculate+0x1dc/0x7d0
> [ 336.442186] ? kasan_report.cold+0x5d/0xd8
> [ 336.442711] ? nand_reset_op+0x280/0x310
> [ 336.443218] ? ecc_sw_hamming_calculate+0x1dc/0x7d0
> [ 336.443842] ? __asan_load4+0x77/0x120
> [ 336.444334] ? ecc_sw_hamming_calculate+0x1dc/0x7d0
> [ 336.444963] ? nand_ecc_sw_hamming_calculate+0x6c/0x80
> [ 336.445619] ? rawnand_sw_hamming_calculate+0x12/0x20
> [ 336.446263] ? nand_write_page_swecc+0xa9/0x160
> [ 336.446849] ? nand_do_write_ops+0x390/0x830
> [ 336.447406] ? __writeback_single_inode+0x6cc/0x880
> [ 336.448041] ? nand_write_oob+0x78/0x100
> [ 336.448568] ? mtd_write_oob_std+0xe2/0x160
> [ 336.449127] ? mtd_write_oob+0xec/0x1b0
> [ 336.449679] ? mtd_write+0x92/0xf0
> [ 336.450128] ? mtd_write_oob+0x1b0/0x1b0
> [ 336.450633] ? ubi_self_check_all_ff+0x82/0x2e0 [ubi]
> [ 336.451328] ? __list_add_valid+0x2b/0x130
> [ 336.451865] ? ubi_io_write+0x2c2/0xa90 [ubi]
> [ 336.452472] ? _raw_read_lock_irq+0x90/0x90
> [ 336.453078] ? kmem_cache_alloc_trace+0x465/0x8b0
> [ 336.453749] ? do_sync_erase+0x350/0x350 [ubi]
> [ 336.454430] ? __kasan_check_write+0x20/0x30
> [ 336.455050] ? down_write+0xf2/0x190
> [ 336.455569] ? down_write_killable+0x1b0/0x1b0
> [ 336.456221] ? check_mapping+0x2c/0x590 [ubi]
> [ 336.456890] ? ubi_eba_write_leb+0x58a/0xfa0 [ubi]
> [ 336.457618] ? __kmalloc+0x490/0x910
> [ 336.458142] ? ubifs_jnl_write_inode.cold+0x6f/0x878 [ubifs]
> [ 336.459033] ? writeback_sb_inodes+0x3a9/0x9a0
> [ 336.459672] ? __writeback_inodes_wb+0xc8/0x170
> [ 336.460330] ? wb_writeback+0x637/0x700
> [ 336.460882] ? wb_workfn+0x8af/0xb80
> [ 336.461398] ? process_one_work+0x467/0x9f0
> [ 336.462004] ? worker_thread+0x34d/0x8e0
> [ 336.462582] ? kthread+0x204/0x280
> [ 336.463047] ? ret_from_fork+0x1f/0x30
> [ 336.463570] ? create_prof_cpu_mask+0x30/0x30
> [ 336.464185] ? ubi_eba_read_leb_sg+0x1f0/0x1f0 [ubi]
> [ 336.464917] ? hrtimer_active+0x9b/0x100
> [ 336.465468] ? ubi_leb_write+0x22c/0x2f0 [ubi]
> [ 336.466130] ? ubifs_leb_write+0xf2/0x1b0 [ubifs]
> [ 336.466851] ? ubifs_wbuf_write_nolock+0x412/0x1280 [ubifs]
> [ 336.467686] ? write_head+0xdf/0x1c0 [ubifs]
> [ 336.468355] ? ubifs_jnl_write_inode.cold+0x3ec/0x878 [ubifs]
> [ 336.469183] ? ret_from_fork+0x1e/0x30
> [ 336.469707] ? ubifs_jnl_write_data+0x660/0x660 [ubifs]
> [ 336.470497] ? unwind_next_frame+0x247/0xca0
> [ 336.471095] ? ret_from_fork+0x1f/0x30
> [ 336.471574] ? fprop_reflect_period_percpu.isra.0+0x1f/0x1b0
> [ 336.472335] ? generic_writepages+0x93/0x140
> [ 336.472933] ? __kasan_check_write+0x20/0x30
> [ 336.473526] ? mutex_lock+0xa6/0x110
> [ 336.474031] ? __mutex_lock_slowpath+0x30/0x30
> [ 336.474662] ? ubifs_write_inode+0x1c3/0x290 [ubifs]
> [ 336.475446] ? __writeback_single_inode+0x6cc/0x880
> [ 336.476155] ? wbc_attach_and_unlock_inode+0x2b6/0x400
> [ 336.476891] ? writeback_sb_inodes+0x3a9/0x9a0
> [ 336.477528] ? write_inode_now+0x1e0/0x1e0
> [ 336.478119] ? __writeback_inodes_wb+0xc8/0x170
> [ 336.478770] ? wb_writeback+0x637/0x700
> [ 336.479326] ? __writeback_inodes_wb+0x170/0x170
> [ 336.479992] ? current_work+0xa0/0xa0
> [ 336.480524] ? _find_next_bit.constprop.0+0x3e/0x140
> [ 336.481241] ? find_next_bit+0x18/0x30
> [ 336.481780] ? cpumask_next+0x2f/0x40
> [ 336.482312] ? wb_workfn+0x8af/0xb80
> [ 336.482832] ? update_cfs_group+0x1e/0x1b0
> [ 336.483421] ? inode_wait_for_writeback+0x60/0x60
> [ 336.484106] ? schedule+0xb7/0x240
> [ 336.484595] ? finish_task_switch+0x14e/0x9a0
> [ 336.485225] ? __kasan_check_write+0x20/0x30
> [ 336.485841] ? __schedule+0x6f4/0x1600
> [ 336.486382] ? __kasan_check_read+0x1d/0x30
> [ 336.486981] ? read_word_at_a_time+0x16/0x30
> [ 336.487594] ? process_one_work+0x467/0x9f0
> [ 336.488198] ? worker_thread+0x34d/0x8e0
> [ 336.488762] ? rescuer_thread+0x820/0x820
> [ 336.489344] ? kthread+0x204/0x280
> [ 336.489839] ? kthread_bind+0x50/0x50
> [ 336.490367] ? ret_from_fork+0x1f/0x30
> [ 336.490913]
> [ 336.491138] Allocated by task 135:
> [ 336.491629] kasan_save_stack+0x23/0x60
> [ 336.492189] __kasan_kmalloc.constprop.0+0x10b/0x120
> [ 336.492898] kasan_kmalloc+0xd/0x20
> [ 336.493401] __kmalloc+0x490/0x910
> [ 336.493890] ubifs_jnl_write_inode.cold+0x6f/0x878 [ubifs]
> [ 336.494744] ubifs_write_inode+0x1c3/0x290 [ubifs]
> [ 336.495500] __writeback_single_inode+0x6cc/0x880
> [ 336.496179] writeback_sb_inodes+0x3a9/0x9a0
> [ 336.496791] __writeback_inodes_wb+0xc8/0x170
> [ 336.497417] wb_writeback+0x637/0x700
> [ 336.497949] wb_workfn+0x8af/0xb80
> [ 336.498440] process_one_work+0x467/0x9f0
> [ 336.499023] worker_thread+0x34d/0x8e0
> [ 336.499567] kthread+0x204/0x280
> [ 336.500050] ret_from_fork+0x1f/0x30
> [ 336.500570]
> [ 336.500793] The buggy address belongs to the object at ffff888019612000
> [ 336.500793] which belongs to the cache kmalloc-4k of size 4096
> [ 336.502550] The buggy address is located 4088 bytes inside of
> [ 336.502550] 4096-byte region [ffff888019612000, ffff888019613000)
> [ 336.504231] The buggy address belongs to the page:
> [ 336.504917] page:000000003204ded8 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x19610
> [ 336.506234] head:000000003204ded8 order:3 compound_mapcount:0 compound_pincount:0
> [ 336.507293] flags: 0x1fffff80010200(slab|head)
> [ 336.507934] raw: 001fffff80010200 ffffea0000667000 0000000200000002 ffff888010842140
> [ 336.509038] raw: 0000000000000000 0000000080040004 00000001ffffffff ffff88801956e3c1
> [ 336.510132] page dumped because: kasan: bad access detected
> [ 336.510923] pages's memcg:ffff88801956e3c1
> [ 336.511509]
> [ 336.511730] Memory state around the buggy address:
> [ 336.512421] ffff888019612e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> [ 336.513446] ffff888019612f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> [ 336.514468] >ffff888019612f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01
> [ 336.515494] ^
> [ 336.516506] ffff888019613000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
> [ 336.517535] ffff888019613080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
> [ 336.518560] ==================================================================
>
> The memory area allocated in ubifs_jnl_write_inode() is not aligned with 8 bytes:
> ino_start = ino = kmalloc(write_len, GFP_NOFS);
>
> When ino_start passed into write_head -> ubifs_wbuf_write_nolock:
> n = aligned_len >> c->max_write_shift;
> if (n) {
> n <<= c->max_write_shift;
> err = ubifs_leb_write(c, wbuf->lnum, buf + written, wbuf->offs, n);
> // Read oob occurs here, read n bytes from buf, and buf is passed from @ino_start which is
> // not 8 bytes aligned(write_len < n). Program read (n - write_len) more bytes.
> }
>
> Reproducer:
> 0. config KASAN && apply print.patch
> 1. mount ubifs on /root/temp
> 2. run test.sh
> 3. cd /root/temp && ls // change atime for link_file
> 4. wait 1~2 minutes
>
> Cc: <stable at vger.kernel.org>
> Fixes: 1e51764a3c2ac0 ("UBIFS: add new flash file system")
> Link: https://bugzilla.kernel.org/show_bug.cgi?id=210865
>
> Signed-off-by: Chengsong Ke <kechengsong at huawei.com>
> ---
> fs/ubifs/io.c | 11 +++++++++--
> 1 file changed, 9 insertions(+), 2 deletions(-)
>
> diff --git a/fs/ubifs/io.c b/fs/ubifs/io.c
> index 00b61dba62b7..6b9d550341e5 100644
> --- a/fs/ubifs/io.c
> +++ b/fs/ubifs/io.c
> @@ -836,13 +836,20 @@ int ubifs_wbuf_write_nolock(struct ubifs_wbuf *wbuf, void *buf, int len)
> n <<= c->max_write_shift;
> dbg_io("write %d bytes to LEB %d:%d", n, wbuf->lnum,
> wbuf->offs);
> - err = ubifs_leb_write(c, wbuf->lnum, buf + written,
> +
> + memcpy(wbuf->buf, buf + written, min(len, n));
> + if (n > len) {
> + ubifs_assert(c, n - len < 8);
> + ubifs_pad(c, wbuf->buf + len, n - len);
> + }
> +
> + err = ubifs_leb_write(c, wbuf->lnum, wbuf->buf,
> wbuf->offs, n);
> if (err)
> goto out;
> wbuf->offs += n;
> aligned_len -= n;
> - len -= n;
> + len -= min(len, n);
> written += n;
> }
>
>
More information about the linux-mtd
mailing list