[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <CAH2r5mukjH30zhxGTiJmvfRYJEFgsTd-U+CpwmYs=7aUJPS1=g@mail.gmail.com>
Date: Fri, 11 Jul 2025 16:10:13 -0500
From: Steve French <smfrench@...il.com>
To: Paulo Alcantara <pc@...guebit.org>
Cc: Wang Zhaolong <wangzhaolong@...weicloud.com>, sfrench@...ba.org, pshilov@...rosoft.com,
aaptel@...e.com, linux-cifs@...r.kernel.org, samba-technical@...ts.samba.org,
linux-kernel@...r.kernel.org
Subject: Re: [PATCH V2] smb: client: fix use-after-free in cifs_oplock_break
Good catch. I had missed the patch because it was tagged by gmail as 'spam'
Merged into cifs-2.6.git for-next
On Fri, Jul 11, 2025 at 9:50 AM Paulo Alcantara <pc@...guebit.org> wrote:
>
> Wang Zhaolong <wangzhaolong@...weicloud.com> writes:
>
> > A race condition can occur in cifs_oplock_break() leading to a
> > use-after-free of the cinode structure when unmounting:
> >
> > cifs_oplock_break()
> > _cifsFileInfo_put(cfile)
> > cifsFileInfo_put_final()
> > cifs_sb_deactive()
> > [last ref, start releasing sb]
> > kill_sb()
> > kill_anon_super()
> > generic_shutdown_super()
> > evict_inodes()
> > dispose_list()
> > evict()
> > destroy_inode()
> > call_rcu(&inode->i_rcu, i_callback)
> > spin_lock(&cinode->open_file_lock) <- OK
> > [later] i_callback()
> > cifs_free_inode()
> > kmem_cache_free(cinode)
> > spin_unlock(&cinode->open_file_lock) <- UAF
> > cifs_done_oplock_break(cinode) <- UAF
> >
> > The issue occurs when umount has already released its reference to the
> > superblock. When _cifsFileInfo_put() calls cifs_sb_deactive(), this
> > releases the last reference, triggering the immediate cleanup of all
> > inodes under RCU. However, cifs_oplock_break() continues to access the
> > cinode after this point, resulting in use-after-free.
> >
> > Fix this by holding an extra reference to the superblock during the
> > entire oplock break operation. This ensures that the superblock and
> > its inodes remain valid until the oplock break completes.
> >
> > Link: https://bugzilla.kernel.org/show_bug.cgi?id=220309
> > Fixes: b98749cac4a6 ("CIFS: keep FileInfo handle live during oplock break")
> > Signed-off-by: Wang Zhaolong <wangzhaolong@...weicloud.com>
> > ---
> > fs/smb/client/file.c | 10 +++++++++-
> > 1 file changed, 9 insertions(+), 1 deletion(-)
>
> Reviewed-by: Paulo Alcantara (Red Hat) <pc@...guebit.org>
>
--
Thanks,
Steve
Powered by blists - more mailing lists