lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Mon, 13 Dec 2021 17:24:00 +0800
From:   QiuLaibin <qiulaibin@...wei.com>
To:     Tejun Heo <tj@...nel.org>
CC:     <axboe@...nel.dk>, <cgroups@...r.kernel.org>,
        <linux-block@...r.kernel.org>, <linux-kernel@...r.kernel.org>
Subject: Re: [PATCH -next] blk-throttle: Set BIO_THROTTLED when bio has been
 throttled

Hi Tejun:

Thanks for your reply.
And the following is the stack of this problem:

[112105.756554] BUG: KASAN: use-after-free in blk_throtl_bio+0x12f0/0x2c70

[112105.763367] Call Trace:
[112105.763889]  dump_stack+0x9b/0xce
[112105.766343]  print_address_description.constprop.6+0x3e/0x60
[112105.778343]  kasan_report.cold.9+0x22/0x3a
[112105.780984]  blk_throtl_bio+0x12f0/0x2c70
[112105.782759]  submit_bio_checks+0x701/0x1550
[112105.803063]  submit_bio_noacct+0x83/0xc80
[112105.807930]  submit_bio+0xa7/0x330
[112105.808649]  mpage_readahead+0x380/0x500
[112105.812982]  read_pages+0x1c1/0xbf0
[112105.817575]  page_cache_ra_unbounded+0x471/0x6f0
[112105.820014]  do_page_cache_ra+0xda/0x110
[112105.824801]  ondemand_readahead+0x442/0xae0
[112105.825631]  page_cache_async_ra+0x210/0x300
[112105.826487]  generic_file_buffered_read+0x4d9/0x2130
[112105.829308]  generic_file_read_iter+0x315/0x490
[112105.831073]  blkdev_read_iter+0x113/0x1b0
[112105.831885]  aio_read+0x2ad/0x450
[112105.867371]  io_submit_one+0xc8e/0x1d60
[112105.873391]  __se_sys_io_submit+0x125/0x350
[112105.893371]  do_syscall_64+0x2d/0x40
[112105.894072]  entry_SYSCALL_64_after_hwframe+0x44/0xa9

[112105.925135] Allocated by task 26380:
[112105.925866]  kasan_save_stack+0x19/0x40
[112105.926666]  __kasan_kmalloc.constprop.2+0xc1/0xd0
[112105.927644]  kmem_cache_alloc+0x146/0x440
[112105.928704]  mempool_alloc+0x125/0x2f0
[112105.929464]  bio_alloc_bioset+0x353/0x590
[112105.930227]  mpage_alloc+0x3b/0x240
[112105.932013]  do_mpage_readpage+0xddf/0x1ef0
[112105.933302]  mpage_readahead+0x264/0x500
[112105.934092]  read_pages+0x1c1/0xbf0
[112105.934786]  page_cache_ra_unbounded+0x471/0x6f0
[112105.935731]  do_page_cache_ra+0xda/0x110
[112105.936542]  ondemand_readahead+0x442/0xae0
[112105.937391]  page_cache_async_ra+0x210/0x300
[112105.938269]  generic_file_buffered_read+0x4d9/0x2130
[112105.939542]  generic_file_read_iter+0x315/0x490
[112105.940539]  blkdev_read_iter+0x113/0x1b0
[112105.941368]  aio_read+0x2ad/0x450
[112105.942129]  io_submit_one+0xc8e/0x1d60
[112105.942895]  __se_sys_io_submit+0x125/0x350
[112105.943713]  do_syscall_64+0x2d/0x40
[112105.948600]  entry_SYSCALL_64_after_hwframe+0x44/0xa9

[112105.951025] Freed by task 0:
[112105.951575]  kasan_save_stack+0x19/0x40
[112105.952293]  kasan_set_track+0x1c/0x30
[112105.952998]  kasan_set_free_info+0x1b/0x30
[112105.953792]  __kasan_slab_free+0x111/0x160
[112105.955805]  kmem_cache_free+0x94/0x460
[112105.956724]  mempool_free+0xd6/0x320
[112105.957667]  bio_free+0xe0/0x130
[112105.958299]  bio_put+0xab/0xe0
[112105.958901]  bio_endio+0x3a6/0x5d0
[112105.959577]  blk_update_request+0x590/0x1370
[112105.964202]  scsi_end_request+0x7d/0x400
[112105.967260]  scsi_io_completion+0x1aa/0xe50
[112105.968064]  scsi_softirq_done+0x11b/0x240
[112105.968835]  blk_mq_complete_request+0xd4/0x120
[112105.969734]  scsi_mq_done+0xf0/0x200
[112105.974126]  virtscsi_vq_done+0xbc/0x150
[112105.974904]  vring_interrupt+0x179/0x390
[112105.975718]  __handle_irq_event_percpu+0xf7/0x490
[112105.976630]  handle_irq_event_percpu+0x7b/0x160
[112105.990310]  handle_irq_event+0xcc/0x170
[112105.993845]  handle_edge_irq+0x215/0xb20
[112105.994610]  common_interrupt+0x60/0x120
[112106.006560]  asm_common_interrupt+0x1e/0x40

On 2021/11/30 2:16, Tejun Heo wrote:
> Hello,
> 
> On Thu, Nov 18, 2021 at 09:15:51PM +0800, Laibin Qiu wrote:
>> 1.In current process, all bio will set the BIO_THROTTLED flag
>> after __blk_throtl_bio().
>>
>> 2.If bio needs to be throttled, it will start the timer and
>> stop submit bio directly. Bio will submit in blk_throtl_dispatch_work_fn()
>> when the timer expires. But in the current process, if bio is throttled.
>> The BIO_THROTTLED will be set to bio after timer start. If the bio
>> has been completed, it may cause use-after-free.
>>
>> Fix this by move BIO_THROTTLED set before timer set.
> 
> Have you tried reproducing and confirming the above in any way?
> 
>> diff --git a/block/blk-throttle.c b/block/blk-throttle.c
>> index 39bb6e68a9a2..ddfbff4465d5 100644
>> --- a/block/blk-throttle.c
>> +++ b/block/blk-throttle.c
>> @@ -2149,6 +2149,7 @@ bool __blk_throtl_bio(struct bio *bio)
>>   	td->nr_queued[rw]++;
>>   	throtl_add_bio_tg(bio, qn, tg);
>>   	throttled = true;
>> +	bio_set_flag(bio, BIO_THROTTLED);
>>   
>>   	/*
>>   	 * Update @tg's dispatch time and force schedule dispatch if @tg
>> @@ -2163,7 +2164,6 @@ bool __blk_throtl_bio(struct bio *bio)
>>   
>>   out_unlock:
>>   	spin_unlock_irq(&q->queue_lock);
>> -	bio_set_flag(bio, BIO_THROTTLED);
> 
> Because it seems wrong in two ways:
> 
> * This function is called synchronously on the issue path. The bio isn't
>    seen by the queue and device driver yet and nothing can race to issue it
>    before this function returns.
> 

The bio is under throttle here, this submit_bio return directly. And
current process will queue a dispatch work by 
throtl_schedule_pending_timer() to submit this bio before BIO_THROTTLED 
flag set. If the bio is completed quickly after the dispatch work is 
queued, UAF of bio will happen.

> * Now we're not setting BIO_THROTTLED when we're taking a different return
>    path through the out_unlock label and risks calling back into blk_throtl
>    again on the same bio.
> 

In my opinion, This flag can prevent the request from being throttled 
multiple times. If the request itself does not need to be throttled, the 
result of repeated entry will be the same.
If necessary, I think we can use other methods to achieve this effect 
for request does not need to be throttled.
> In general, if you think you spotted an issue, please try to trigger it in
> however way possible to confirm that the issue is real.
> 
> Thanks.
> 

Best regards

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ