linux-ext4.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* Re: KASAN: use-after-free Read in iov_iter_alignment
       [not found] <000000000000ad9f910598bbb867@google.com>
@ 2019-12-02 21:10 ` Dave Chinner
  2019-12-02 23:11   ` Matthew Bobrowski
  2019-12-16 10:48   ` Jan Kara
  0 siblings, 2 replies; 7+ messages in thread
From: Dave Chinner @ 2019-12-02 21:10 UTC (permalink / raw)
  To: syzbot
  Cc: darrick.wong, hch, linux-fsdevel, linux-kernel, linux-xfs,
	syzkaller-bugs, linux-ext4

[cc linux-ext4@vger.kernel.org - this is reported from the new ext4
dio->iomap code]

On Mon, Dec 02, 2019 at 09:15:08AM -0800, syzbot wrote:
> Hello,
> 
> syzbot found the following crash on:
> 
> HEAD commit:    b94ae8ad Merge tag 'seccomp-v5.5-rc1' of git://git.kernel...
> git tree:       upstream
> console output: https://syzkaller.appspot.com/x/log.txt?x=135a8d7ae00000
> kernel config:  https://syzkaller.appspot.com/x/.config?x=c2e464ae414aee8c
> dashboard link: https://syzkaller.appspot.com/bug?extid=bea68382bae9490e7dd6
> compiler:       clang version 9.0.0 (/home/glider/llvm/clang
> 80fee25776c2fb61e74c1ecb1a523375c2500b69)
> syz repro:      https://syzkaller.appspot.com/x/repro.syz?x=1135cb36e00000
> C reproducer:   https://syzkaller.appspot.com/x/repro.c?x=14e90abce00000
> 
> IMPORTANT: if you fix the bug, please add the following tag to the commit:
> Reported-by: syzbot+bea68382bae9490e7dd6@syzkaller.appspotmail.com
> 
> ==================================================================
> BUG: KASAN: use-after-free in iov_iter_alignment+0x6a1/0x7b0
> lib/iov_iter.c:1225
> Read of size 4 at addr ffff888098d40f54 by task loop0/8203
> 
> CPU: 0 PID: 8203 Comm: loop0 Not tainted 5.4.0-syzkaller #0
> Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS
> Google 01/01/2011
> Call Trace:
>  __dump_stack lib/dump_stack.c:77 [inline]
>  dump_stack+0x1fb/0x318 lib/dump_stack.c:118
>  print_address_description+0x75/0x5c0 mm/kasan/report.c:374
>  __kasan_report+0x14b/0x1c0 mm/kasan/report.c:506
>  kasan_report+0x26/0x50 mm/kasan/common.c:634
>  __asan_report_load4_noabort+0x14/0x20 mm/kasan/generic_report.c:131
>  iov_iter_alignment+0x6a1/0x7b0 lib/iov_iter.c:1225
>  iomap_dio_bio_actor+0x1a7/0x11e0 fs/iomap/direct-io.c:203
>  iomap_dio_actor+0x2b4/0x4a0 fs/iomap/direct-io.c:375
>  iomap_apply+0x370/0x490 fs/iomap/apply.c:80
>  iomap_dio_rw+0x8ad/0x1010 fs/iomap/direct-io.c:493
>  ext4_dio_read_iter fs/ext4/file.c:77 [inline]
>  ext4_file_read_iter+0x834/0xc20 fs/ext4/file.c:128
>  lo_rw_aio+0xcbb/0xea0 include/linux/fs.h:1889

loopback -> ext4 direct IO, bad access on iov passed to iomap DIO
code.

>  do_req_filebacked drivers/block/loop.c:616 [inline]
>  loop_handle_cmd drivers/block/loop.c:1952 [inline]
>  loop_queue_work+0x13ab/0x2590 drivers/block/loop.c:1966
>  kthread_worker_fn+0x449/0x700 kernel/kthread.c:671
>  loop_kthread_worker_fn+0x40/0x60 drivers/block/loop.c:901
>  kthread+0x332/0x350 kernel/kthread.c:255
>  ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:352
> 
> Allocated by task 4198:
>  save_stack mm/kasan/common.c:69 [inline]
>  set_track mm/kasan/common.c:77 [inline]
>  __kasan_kmalloc+0x11c/0x1b0 mm/kasan/common.c:510
>  kasan_slab_alloc+0xf/0x20 mm/kasan/common.c:518
>  slab_post_alloc_hook mm/slab.h:584 [inline]
>  slab_alloc mm/slab.c:3319 [inline]
>  kmem_cache_alloc+0x1f5/0x2e0 mm/slab.c:3483
>  mempool_alloc_slab+0x4d/0x70 mm/mempool.c:513
>  mempool_alloc+0x104/0x5e0 mm/mempool.c:393
>  bio_alloc_bioset+0x1b0/0x5f0 block/bio.c:477
>  bio_alloc include/linux/bio.h:400 [inline]
>  mpage_alloc fs/mpage.c:79 [inline]
>  do_mpage_readpage+0x1685/0x1d10 fs/mpage.c:306
>  mpage_readpages+0x2a9/0x440 fs/mpage.c:404
>  blkdev_readpages+0x2c/0x40 fs/block_dev.c:620
>  read_pages+0xad/0x4d0 mm/readahead.c:126
>  __do_page_cache_readahead+0x480/0x530 mm/readahead.c:212
>  force_page_cache_readahead mm/readahead.c:243 [inline]
>  page_cache_sync_readahead+0x329/0x3b0 mm/readahead.c:522
>  generic_file_buffered_read+0x41d/0x2570 mm/filemap.c:2051
>  generic_file_read_iter+0xa9/0x450 mm/filemap.c:2324
>  blkdev_read_iter+0x12e/0x140 fs/block_dev.c:2039
>  call_read_iter include/linux/fs.h:1889 [inline]
>  new_sync_read fs/read_write.c:414 [inline]
>  __vfs_read+0x59e/0x730 fs/read_write.c:427
>  vfs_read+0x1dd/0x420 fs/read_write.c:461
>  ksys_read+0x117/0x220 fs/read_write.c:587
>  __do_sys_read fs/read_write.c:597 [inline]
>  __se_sys_read fs/read_write.c:595 [inline]
>  __x64_sys_read+0x7b/0x90 fs/read_write.c:595
>  do_syscall_64+0xf7/0x1c0 arch/x86/entry/common.c:294
>  entry_SYSCALL_64_after_hwframe+0x49/0xbe
> 
> Freed by task 4205:
>  save_stack mm/kasan/common.c:69 [inline]
>  set_track mm/kasan/common.c:77 [inline]
>  kasan_set_free_info mm/kasan/common.c:332 [inline]
>  __kasan_slab_free+0x12a/0x1e0 mm/kasan/common.c:471
>  kasan_slab_free+0xe/0x10 mm/kasan/common.c:480
>  __cache_free mm/slab.c:3425 [inline]
>  kmem_cache_free+0x81/0xf0 mm/slab.c:3693
>  mempool_free_slab+0x1d/0x30 mm/mempool.c:520
>  mempool_free+0xd5/0x350 mm/mempool.c:502
>  bio_put+0x38b/0x460 block/bio.c:255
>  mpage_end_io+0x2f5/0x330 fs/mpage.c:58
>  bio_endio+0x4ff/0x570 block/bio.c:1818
>  req_bio_endio block/blk-core.c:245 [inline]
>  blk_update_request+0x438/0x10d0 block/blk-core.c:1464
>  scsi_end_request+0x8c/0xa20 drivers/scsi/scsi_lib.c:579
>  scsi_io_completion+0x17c/0x1b80 drivers/scsi/scsi_lib.c:963
>  scsi_finish_command+0x3b3/0x560 drivers/scsi/scsi.c:228
>  scsi_softirq_done+0x289/0x310 drivers/scsi/scsi_lib.c:1477
>  blk_done_softirq+0x312/0x370 block/blk-softirq.c:37
>  __do_softirq+0x333/0x7c4 arch/x86/include/asm/paravirt.h:762

Looks like buffered read IO on a loopback device on an ext4 image
file, and something is being tripped over in the new ext4 direct IO
path.  Might be an iomap issue, might be an ext4 issue, but it looks
like the buffered read bio completion is running while the iov is
still being submitted...

Cheers,

Dave.
-- 
Dave Chinner
david@fromorbit.com

^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: KASAN: use-after-free Read in iov_iter_alignment
  2019-12-02 21:10 ` KASAN: use-after-free Read in iov_iter_alignment Dave Chinner
@ 2019-12-02 23:11   ` Matthew Bobrowski
  2019-12-13 11:30     ` Jan Kara
  2019-12-16 10:48   ` Jan Kara
  1 sibling, 1 reply; 7+ messages in thread
From: Matthew Bobrowski @ 2019-12-02 23:11 UTC (permalink / raw)
  To: Dave Chinner
  Cc: syzbot, darrick.wong, hch, linux-fsdevel, linux-kernel,
	linux-xfs, syzkaller-bugs, linux-ext4

On Tue, Dec 03, 2019 at 08:10:37AM +1100, Dave Chinner wrote:
> [cc linux-ext4@vger.kernel.org - this is reported from the new ext4
> dio->iomap code]
> 
> On Mon, Dec 02, 2019 at 09:15:08AM -0800, syzbot wrote:
> > Hello,
> > 
> > syzbot found the following crash on:
> > 
> > HEAD commit:    b94ae8ad Merge tag 'seccomp-v5.5-rc1' of git://git.kernel...
> > git tree:       upstream
> > console output: https://syzkaller.appspot.com/x/log.txt?x=135a8d7ae00000
> > kernel config:  https://syzkaller.appspot.com/x/.config?x=c2e464ae414aee8c
> > dashboard link: https://syzkaller.appspot.com/bug?extid=bea68382bae9490e7dd6
> > compiler:       clang version 9.0.0 (/home/glider/llvm/clang
> > 80fee25776c2fb61e74c1ecb1a523375c2500b69)
> > syz repro:      https://syzkaller.appspot.com/x/repro.syz?x=1135cb36e00000
> > C reproducer:   https://syzkaller.appspot.com/x/repro.c?x=14e90abce00000
> > 
> > IMPORTANT: if you fix the bug, please add the following tag to the commit:
> > Reported-by: syzbot+bea68382bae9490e7dd6@syzkaller.appspotmail.com
> > 
> > ==================================================================
> > BUG: KASAN: use-after-free in iov_iter_alignment+0x6a1/0x7b0
> > lib/iov_iter.c:1225
> > Read of size 4 at addr ffff888098d40f54 by task loop0/8203
> > 
> > CPU: 0 PID: 8203 Comm: loop0 Not tainted 5.4.0-syzkaller #0
> > Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS
> > Google 01/01/2011
> > Call Trace:
> >  __dump_stack lib/dump_stack.c:77 [inline]
> >  dump_stack+0x1fb/0x318 lib/dump_stack.c:118
> >  print_address_description+0x75/0x5c0 mm/kasan/report.c:374
> >  __kasan_report+0x14b/0x1c0 mm/kasan/report.c:506
> >  kasan_report+0x26/0x50 mm/kasan/common.c:634
> >  __asan_report_load4_noabort+0x14/0x20 mm/kasan/generic_report.c:131
> >  iov_iter_alignment+0x6a1/0x7b0 lib/iov_iter.c:1225
> >  iomap_dio_bio_actor+0x1a7/0x11e0 fs/iomap/direct-io.c:203
> >  iomap_dio_actor+0x2b4/0x4a0 fs/iomap/direct-io.c:375
> >  iomap_apply+0x370/0x490 fs/iomap/apply.c:80
> >  iomap_dio_rw+0x8ad/0x1010 fs/iomap/direct-io.c:493
> >  ext4_dio_read_iter fs/ext4/file.c:77 [inline]
> >  ext4_file_read_iter+0x834/0xc20 fs/ext4/file.c:128
> >  lo_rw_aio+0xcbb/0xea0 include/linux/fs.h:1889
> 
> loopback -> ext4 direct IO, bad access on iov passed to iomap DIO
> code.
> 
> >  do_req_filebacked drivers/block/loop.c:616 [inline]
> >  loop_handle_cmd drivers/block/loop.c:1952 [inline]
> >  loop_queue_work+0x13ab/0x2590 drivers/block/loop.c:1966
> >  kthread_worker_fn+0x449/0x700 kernel/kthread.c:671
> >  loop_kthread_worker_fn+0x40/0x60 drivers/block/loop.c:901
> >  kthread+0x332/0x350 kernel/kthread.c:255
> >  ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:352
> > 
> > Allocated by task 4198:
> >  save_stack mm/kasan/common.c:69 [inline]
> >  set_track mm/kasan/common.c:77 [inline]
> >  __kasan_kmalloc+0x11c/0x1b0 mm/kasan/common.c:510
> >  kasan_slab_alloc+0xf/0x20 mm/kasan/common.c:518
> >  slab_post_alloc_hook mm/slab.h:584 [inline]
> >  slab_alloc mm/slab.c:3319 [inline]
> >  kmem_cache_alloc+0x1f5/0x2e0 mm/slab.c:3483
> >  mempool_alloc_slab+0x4d/0x70 mm/mempool.c:513
> >  mempool_alloc+0x104/0x5e0 mm/mempool.c:393
> >  bio_alloc_bioset+0x1b0/0x5f0 block/bio.c:477
> >  bio_alloc include/linux/bio.h:400 [inline]
> >  mpage_alloc fs/mpage.c:79 [inline]
> >  do_mpage_readpage+0x1685/0x1d10 fs/mpage.c:306
> >  mpage_readpages+0x2a9/0x440 fs/mpage.c:404
> >  blkdev_readpages+0x2c/0x40 fs/block_dev.c:620
> >  read_pages+0xad/0x4d0 mm/readahead.c:126
> >  __do_page_cache_readahead+0x480/0x530 mm/readahead.c:212
> >  force_page_cache_readahead mm/readahead.c:243 [inline]
> >  page_cache_sync_readahead+0x329/0x3b0 mm/readahead.c:522
> >  generic_file_buffered_read+0x41d/0x2570 mm/filemap.c:2051
> >  generic_file_read_iter+0xa9/0x450 mm/filemap.c:2324
> >  blkdev_read_iter+0x12e/0x140 fs/block_dev.c:2039
> >  call_read_iter include/linux/fs.h:1889 [inline]
> >  new_sync_read fs/read_write.c:414 [inline]
> >  __vfs_read+0x59e/0x730 fs/read_write.c:427
> >  vfs_read+0x1dd/0x420 fs/read_write.c:461
> >  ksys_read+0x117/0x220 fs/read_write.c:587
> >  __do_sys_read fs/read_write.c:597 [inline]
> >  __se_sys_read fs/read_write.c:595 [inline]
> >  __x64_sys_read+0x7b/0x90 fs/read_write.c:595
> >  do_syscall_64+0xf7/0x1c0 arch/x86/entry/common.c:294
> >  entry_SYSCALL_64_after_hwframe+0x49/0xbe
> > 
> > Freed by task 4205:
> >  save_stack mm/kasan/common.c:69 [inline]
> >  set_track mm/kasan/common.c:77 [inline]
> >  kasan_set_free_info mm/kasan/common.c:332 [inline]
> >  __kasan_slab_free+0x12a/0x1e0 mm/kasan/common.c:471
> >  kasan_slab_free+0xe/0x10 mm/kasan/common.c:480
> >  __cache_free mm/slab.c:3425 [inline]
> >  kmem_cache_free+0x81/0xf0 mm/slab.c:3693
> >  mempool_free_slab+0x1d/0x30 mm/mempool.c:520
> >  mempool_free+0xd5/0x350 mm/mempool.c:502
> >  bio_put+0x38b/0x460 block/bio.c:255
> >  mpage_end_io+0x2f5/0x330 fs/mpage.c:58
> >  bio_endio+0x4ff/0x570 block/bio.c:1818
> >  req_bio_endio block/blk-core.c:245 [inline]
> >  blk_update_request+0x438/0x10d0 block/blk-core.c:1464
> >  scsi_end_request+0x8c/0xa20 drivers/scsi/scsi_lib.c:579
> >  scsi_io_completion+0x17c/0x1b80 drivers/scsi/scsi_lib.c:963
> >  scsi_finish_command+0x3b3/0x560 drivers/scsi/scsi.c:228
> >  scsi_softirq_done+0x289/0x310 drivers/scsi/scsi_lib.c:1477
> >  blk_done_softirq+0x312/0x370 block/blk-softirq.c:37
> >  __do_softirq+0x333/0x7c4 arch/x86/include/asm/paravirt.h:762
> 
> Looks like buffered read IO on a loopback device on an ext4 image
> file, and something is being tripped over in the new ext4 direct IO
> path.  Might be an iomap issue, might be an ext4 issue, but it looks
> like the buffered read bio completion is running while the iov is
> still being submitted...

Thanks Dave.

I will take a look at this when I get home this evening and see
whether I can pinpoint what's going on here...

/M

^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: KASAN: use-after-free Read in iov_iter_alignment
  2019-12-02 23:11   ` Matthew Bobrowski
@ 2019-12-13 11:30     ` Jan Kara
  2019-12-15 10:24       ` Matthew Bobrowski
  0 siblings, 1 reply; 7+ messages in thread
From: Jan Kara @ 2019-12-13 11:30 UTC (permalink / raw)
  To: Matthew Bobrowski
  Cc: Dave Chinner, syzbot, darrick.wong, hch, linux-fsdevel,
	linux-kernel, linux-xfs, syzkaller-bugs, linux-ext4

On Tue 03-12-19 10:11:20, Matthew Bobrowski wrote:
> On Tue, Dec 03, 2019 at 08:10:37AM +1100, Dave Chinner wrote:
> > [cc linux-ext4@vger.kernel.org - this is reported from the new ext4
> > dio->iomap code]
> > 
> > On Mon, Dec 02, 2019 at 09:15:08AM -0800, syzbot wrote:
> > > Hello,
> > > 
> > > syzbot found the following crash on:
> > > 
> > > HEAD commit:    b94ae8ad Merge tag 'seccomp-v5.5-rc1' of git://git.kernel...
> > > git tree:       upstream
> > > console output: https://syzkaller.appspot.com/x/log.txt?x=135a8d7ae00000
> > > kernel config:  https://syzkaller.appspot.com/x/.config?x=c2e464ae414aee8c
> > > dashboard link: https://syzkaller.appspot.com/bug?extid=bea68382bae9490e7dd6
> > > compiler:       clang version 9.0.0 (/home/glider/llvm/clang
> > > 80fee25776c2fb61e74c1ecb1a523375c2500b69)
> > > syz repro:      https://syzkaller.appspot.com/x/repro.syz?x=1135cb36e00000
> > > C reproducer:   https://syzkaller.appspot.com/x/repro.c?x=14e90abce00000
> > > 
> > > IMPORTANT: if you fix the bug, please add the following tag to the commit:
> > > Reported-by: syzbot+bea68382bae9490e7dd6@syzkaller.appspotmail.com
> > > 
> > > ==================================================================
> > > BUG: KASAN: use-after-free in iov_iter_alignment+0x6a1/0x7b0
> > > lib/iov_iter.c:1225
> > > Read of size 4 at addr ffff888098d40f54 by task loop0/8203
> > > 
> > > CPU: 0 PID: 8203 Comm: loop0 Not tainted 5.4.0-syzkaller #0
> > > Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS
> > > Google 01/01/2011
> > > Call Trace:
> > >  __dump_stack lib/dump_stack.c:77 [inline]
> > >  dump_stack+0x1fb/0x318 lib/dump_stack.c:118
> > >  print_address_description+0x75/0x5c0 mm/kasan/report.c:374
> > >  __kasan_report+0x14b/0x1c0 mm/kasan/report.c:506
> > >  kasan_report+0x26/0x50 mm/kasan/common.c:634
> > >  __asan_report_load4_noabort+0x14/0x20 mm/kasan/generic_report.c:131
> > >  iov_iter_alignment+0x6a1/0x7b0 lib/iov_iter.c:1225
> > >  iomap_dio_bio_actor+0x1a7/0x11e0 fs/iomap/direct-io.c:203
> > >  iomap_dio_actor+0x2b4/0x4a0 fs/iomap/direct-io.c:375
> > >  iomap_apply+0x370/0x490 fs/iomap/apply.c:80
> > >  iomap_dio_rw+0x8ad/0x1010 fs/iomap/direct-io.c:493
> > >  ext4_dio_read_iter fs/ext4/file.c:77 [inline]
> > >  ext4_file_read_iter+0x834/0xc20 fs/ext4/file.c:128
> > >  lo_rw_aio+0xcbb/0xea0 include/linux/fs.h:1889
> > 
> > loopback -> ext4 direct IO, bad access on iov passed to iomap DIO
> > code.
> > 
> > >  do_req_filebacked drivers/block/loop.c:616 [inline]
> > >  loop_handle_cmd drivers/block/loop.c:1952 [inline]
> > >  loop_queue_work+0x13ab/0x2590 drivers/block/loop.c:1966
> > >  kthread_worker_fn+0x449/0x700 kernel/kthread.c:671
> > >  loop_kthread_worker_fn+0x40/0x60 drivers/block/loop.c:901
> > >  kthread+0x332/0x350 kernel/kthread.c:255
> > >  ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:352
> > > 
> > > Allocated by task 4198:
> > >  save_stack mm/kasan/common.c:69 [inline]
> > >  set_track mm/kasan/common.c:77 [inline]
> > >  __kasan_kmalloc+0x11c/0x1b0 mm/kasan/common.c:510
> > >  kasan_slab_alloc+0xf/0x20 mm/kasan/common.c:518
> > >  slab_post_alloc_hook mm/slab.h:584 [inline]
> > >  slab_alloc mm/slab.c:3319 [inline]
> > >  kmem_cache_alloc+0x1f5/0x2e0 mm/slab.c:3483
> > >  mempool_alloc_slab+0x4d/0x70 mm/mempool.c:513
> > >  mempool_alloc+0x104/0x5e0 mm/mempool.c:393
> > >  bio_alloc_bioset+0x1b0/0x5f0 block/bio.c:477
> > >  bio_alloc include/linux/bio.h:400 [inline]
> > >  mpage_alloc fs/mpage.c:79 [inline]
> > >  do_mpage_readpage+0x1685/0x1d10 fs/mpage.c:306
> > >  mpage_readpages+0x2a9/0x440 fs/mpage.c:404
> > >  blkdev_readpages+0x2c/0x40 fs/block_dev.c:620
> > >  read_pages+0xad/0x4d0 mm/readahead.c:126
> > >  __do_page_cache_readahead+0x480/0x530 mm/readahead.c:212
> > >  force_page_cache_readahead mm/readahead.c:243 [inline]
> > >  page_cache_sync_readahead+0x329/0x3b0 mm/readahead.c:522
> > >  generic_file_buffered_read+0x41d/0x2570 mm/filemap.c:2051
> > >  generic_file_read_iter+0xa9/0x450 mm/filemap.c:2324
> > >  blkdev_read_iter+0x12e/0x140 fs/block_dev.c:2039
> > >  call_read_iter include/linux/fs.h:1889 [inline]
> > >  new_sync_read fs/read_write.c:414 [inline]
> > >  __vfs_read+0x59e/0x730 fs/read_write.c:427
> > >  vfs_read+0x1dd/0x420 fs/read_write.c:461
> > >  ksys_read+0x117/0x220 fs/read_write.c:587
> > >  __do_sys_read fs/read_write.c:597 [inline]
> > >  __se_sys_read fs/read_write.c:595 [inline]
> > >  __x64_sys_read+0x7b/0x90 fs/read_write.c:595
> > >  do_syscall_64+0xf7/0x1c0 arch/x86/entry/common.c:294
> > >  entry_SYSCALL_64_after_hwframe+0x49/0xbe
> > > 
> > > Freed by task 4205:
> > >  save_stack mm/kasan/common.c:69 [inline]
> > >  set_track mm/kasan/common.c:77 [inline]
> > >  kasan_set_free_info mm/kasan/common.c:332 [inline]
> > >  __kasan_slab_free+0x12a/0x1e0 mm/kasan/common.c:471
> > >  kasan_slab_free+0xe/0x10 mm/kasan/common.c:480
> > >  __cache_free mm/slab.c:3425 [inline]
> > >  kmem_cache_free+0x81/0xf0 mm/slab.c:3693
> > >  mempool_free_slab+0x1d/0x30 mm/mempool.c:520
> > >  mempool_free+0xd5/0x350 mm/mempool.c:502
> > >  bio_put+0x38b/0x460 block/bio.c:255
> > >  mpage_end_io+0x2f5/0x330 fs/mpage.c:58
> > >  bio_endio+0x4ff/0x570 block/bio.c:1818
> > >  req_bio_endio block/blk-core.c:245 [inline]
> > >  blk_update_request+0x438/0x10d0 block/blk-core.c:1464
> > >  scsi_end_request+0x8c/0xa20 drivers/scsi/scsi_lib.c:579
> > >  scsi_io_completion+0x17c/0x1b80 drivers/scsi/scsi_lib.c:963
> > >  scsi_finish_command+0x3b3/0x560 drivers/scsi/scsi.c:228
> > >  scsi_softirq_done+0x289/0x310 drivers/scsi/scsi_lib.c:1477
> > >  blk_done_softirq+0x312/0x370 block/blk-softirq.c:37
> > >  __do_softirq+0x333/0x7c4 arch/x86/include/asm/paravirt.h:762
> > 
> > Looks like buffered read IO on a loopback device on an ext4 image
> > file, and something is being tripped over in the new ext4 direct IO
> > path.  Might be an iomap issue, might be an ext4 issue, but it looks
> > like the buffered read bio completion is running while the iov is
> > still being submitted...
> 
> Thanks Dave.
> 
> I will take a look at this when I get home this evening and see
> whether I can pinpoint what's going on here...

Any luck in diagnosing this Matthew?

								Honza
-- 
Jan Kara <jack@suse.com>
SUSE Labs, CR

^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: KASAN: use-after-free Read in iov_iter_alignment
  2019-12-13 11:30     ` Jan Kara
@ 2019-12-15 10:24       ` Matthew Bobrowski
  2019-12-16 10:32         ` Jan Kara
  0 siblings, 1 reply; 7+ messages in thread
From: Matthew Bobrowski @ 2019-12-15 10:24 UTC (permalink / raw)
  To: Jan Kara
  Cc: Dave Chinner, syzbot, darrick.wong, hch, linux-fsdevel,
	linux-kernel, linux-xfs, syzkaller-bugs, linux-ext4

On Fri, Dec 13, 2019 at 12:30:30PM +0100, Jan Kara wrote:
> On Tue 03-12-19 10:11:20, Matthew Bobrowski wrote:
> > On Tue, Dec 03, 2019 at 08:10:37AM +1100, Dave Chinner wrote:
> > > [cc linux-ext4@vger.kernel.org - this is reported from the new ext4
> > > dio->iomap code]
> > > 
> > > On Mon, Dec 02, 2019 at 09:15:08AM -0800, syzbot wrote:
> > > > Hello,
> > > > 
> > > > syzbot found the following crash on:
> > > > 
> > > > HEAD commit:    b94ae8ad Merge tag 'seccomp-v5.5-rc1' of git://git.kernel...
> > > > git tree:       upstream
> > > > console output: https://syzkaller.appspot.com/x/log.txt?x=135a8d7ae00000
> > > > kernel config:  https://syzkaller.appspot.com/x/.config?x=c2e464ae414aee8c
> > > > dashboard link: https://syzkaller.appspot.com/bug?extid=bea68382bae9490e7dd6
> > > > compiler:       clang version 9.0.0 (/home/glider/llvm/clang
> > > > 80fee25776c2fb61e74c1ecb1a523375c2500b69)
> > > > syz repro:      https://syzkaller.appspot.com/x/repro.syz?x=1135cb36e00000
> > > > C reproducer:   https://syzkaller.appspot.com/x/repro.c?x=14e90abce00000
> > > > 
> > > > IMPORTANT: if you fix the bug, please add the following tag to the commit:
> > > > Reported-by: syzbot+bea68382bae9490e7dd6@syzkaller.appspotmail.com
> > > > 
> > > > ==================================================================
> > > > BUG: KASAN: use-after-free in iov_iter_alignment+0x6a1/0x7b0
> > > > lib/iov_iter.c:1225
> > > > Read of size 4 at addr ffff888098d40f54 by task loop0/8203
> > > > 
> > > > CPU: 0 PID: 8203 Comm: loop0 Not tainted 5.4.0-syzkaller #0
> > > > Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS
> > > > Google 01/01/2011
> > > > Call Trace:
> > > >  __dump_stack lib/dump_stack.c:77 [inline]
> > > >  dump_stack+0x1fb/0x318 lib/dump_stack.c:118
> > > >  print_address_description+0x75/0x5c0 mm/kasan/report.c:374
> > > >  __kasan_report+0x14b/0x1c0 mm/kasan/report.c:506
> > > >  kasan_report+0x26/0x50 mm/kasan/common.c:634
> > > >  __asan_report_load4_noabort+0x14/0x20 mm/kasan/generic_report.c:131
> > > >  iov_iter_alignment+0x6a1/0x7b0 lib/iov_iter.c:1225
> > > >  iomap_dio_bio_actor+0x1a7/0x11e0 fs/iomap/direct-io.c:203
> > > >  iomap_dio_actor+0x2b4/0x4a0 fs/iomap/direct-io.c:375
> > > >  iomap_apply+0x370/0x490 fs/iomap/apply.c:80
> > > >  iomap_dio_rw+0x8ad/0x1010 fs/iomap/direct-io.c:493
> > > >  ext4_dio_read_iter fs/ext4/file.c:77 [inline]
> > > >  ext4_file_read_iter+0x834/0xc20 fs/ext4/file.c:128
> > > >  lo_rw_aio+0xcbb/0xea0 include/linux/fs.h:1889
> > > 
> > > loopback -> ext4 direct IO, bad access on iov passed to iomap DIO
> > > code.
> > > 
> > > >  do_req_filebacked drivers/block/loop.c:616 [inline]
> > > >  loop_handle_cmd drivers/block/loop.c:1952 [inline]
> > > >  loop_queue_work+0x13ab/0x2590 drivers/block/loop.c:1966
> > > >  kthread_worker_fn+0x449/0x700 kernel/kthread.c:671
> > > >  loop_kthread_worker_fn+0x40/0x60 drivers/block/loop.c:901
> > > >  kthread+0x332/0x350 kernel/kthread.c:255
> > > >  ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:352
> > > > 
> > > > Allocated by task 4198:
> > > >  save_stack mm/kasan/common.c:69 [inline]
> > > >  set_track mm/kasan/common.c:77 [inline]
> > > >  __kasan_kmalloc+0x11c/0x1b0 mm/kasan/common.c:510
> > > >  kasan_slab_alloc+0xf/0x20 mm/kasan/common.c:518
> > > >  slab_post_alloc_hook mm/slab.h:584 [inline]
> > > >  slab_alloc mm/slab.c:3319 [inline]
> > > >  kmem_cache_alloc+0x1f5/0x2e0 mm/slab.c:3483
> > > >  mempool_alloc_slab+0x4d/0x70 mm/mempool.c:513
> > > >  mempool_alloc+0x104/0x5e0 mm/mempool.c:393
> > > >  bio_alloc_bioset+0x1b0/0x5f0 block/bio.c:477
> > > >  bio_alloc include/linux/bio.h:400 [inline]
> > > >  mpage_alloc fs/mpage.c:79 [inline]
> > > >  do_mpage_readpage+0x1685/0x1d10 fs/mpage.c:306
> > > >  mpage_readpages+0x2a9/0x440 fs/mpage.c:404
> > > >  blkdev_readpages+0x2c/0x40 fs/block_dev.c:620
> > > >  read_pages+0xad/0x4d0 mm/readahead.c:126
> > > >  __do_page_cache_readahead+0x480/0x530 mm/readahead.c:212
> > > >  force_page_cache_readahead mm/readahead.c:243 [inline]
> > > >  page_cache_sync_readahead+0x329/0x3b0 mm/readahead.c:522
> > > >  generic_file_buffered_read+0x41d/0x2570 mm/filemap.c:2051
> > > >  generic_file_read_iter+0xa9/0x450 mm/filemap.c:2324
> > > >  blkdev_read_iter+0x12e/0x140 fs/block_dev.c:2039
> > > >  call_read_iter include/linux/fs.h:1889 [inline]
> > > >  new_sync_read fs/read_write.c:414 [inline]
> > > >  __vfs_read+0x59e/0x730 fs/read_write.c:427
> > > >  vfs_read+0x1dd/0x420 fs/read_write.c:461
> > > >  ksys_read+0x117/0x220 fs/read_write.c:587
> > > >  __do_sys_read fs/read_write.c:597 [inline]
> > > >  __se_sys_read fs/read_write.c:595 [inline]
> > > >  __x64_sys_read+0x7b/0x90 fs/read_write.c:595
> > > >  do_syscall_64+0xf7/0x1c0 arch/x86/entry/common.c:294
> > > >  entry_SYSCALL_64_after_hwframe+0x49/0xbe
> > > > 
> > > > Freed by task 4205:
> > > >  save_stack mm/kasan/common.c:69 [inline]
> > > >  set_track mm/kasan/common.c:77 [inline]
> > > >  kasan_set_free_info mm/kasan/common.c:332 [inline]
> > > >  __kasan_slab_free+0x12a/0x1e0 mm/kasan/common.c:471
> > > >  kasan_slab_free+0xe/0x10 mm/kasan/common.c:480
> > > >  __cache_free mm/slab.c:3425 [inline]
> > > >  kmem_cache_free+0x81/0xf0 mm/slab.c:3693
> > > >  mempool_free_slab+0x1d/0x30 mm/mempool.c:520
> > > >  mempool_free+0xd5/0x350 mm/mempool.c:502
> > > >  bio_put+0x38b/0x460 block/bio.c:255
> > > >  mpage_end_io+0x2f5/0x330 fs/mpage.c:58
> > > >  bio_endio+0x4ff/0x570 block/bio.c:1818
> > > >  req_bio_endio block/blk-core.c:245 [inline]
> > > >  blk_update_request+0x438/0x10d0 block/blk-core.c:1464
> > > >  scsi_end_request+0x8c/0xa20 drivers/scsi/scsi_lib.c:579
> > > >  scsi_io_completion+0x17c/0x1b80 drivers/scsi/scsi_lib.c:963
> > > >  scsi_finish_command+0x3b3/0x560 drivers/scsi/scsi.c:228
> > > >  scsi_softirq_done+0x289/0x310 drivers/scsi/scsi_lib.c:1477
> > > >  blk_done_softirq+0x312/0x370 block/blk-softirq.c:37
> > > >  __do_softirq+0x333/0x7c4 arch/x86/include/asm/paravirt.h:762
> > > 
> > > Looks like buffered read IO on a loopback device on an ext4 image
> > > file, and something is being tripped over in the new ext4 direct IO
> > > path.  Might be an iomap issue, might be an ext4 issue, but it looks
> > > like the buffered read bio completion is running while the iov is
> > > still being submitted...
> > 
> > Thanks Dave.
> > 
> > I will take a look at this when I get home this evening and see
> > whether I can pinpoint what's going on here...
> 
> Any luck in diagnosing this Matthew?

No, not yet. I just purchased my first home and I'm not far out from
my wedding day, so I've had my hands tied behind by back doing all
that crap. I will try get to it sometime this week.

/M


^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: KASAN: use-after-free Read in iov_iter_alignment
  2019-12-15 10:24       ` Matthew Bobrowski
@ 2019-12-16 10:32         ` Jan Kara
  0 siblings, 0 replies; 7+ messages in thread
From: Jan Kara @ 2019-12-16 10:32 UTC (permalink / raw)
  To: Matthew Bobrowski
  Cc: Jan Kara, Dave Chinner, syzbot, darrick.wong, hch, linux-fsdevel,
	linux-kernel, linux-xfs, syzkaller-bugs, linux-ext4

On Sun 15-12-19 21:24:24, Matthew Bobrowski wrote:
> On Fri, Dec 13, 2019 at 12:30:30PM +0100, Jan Kara wrote:
> > On Tue 03-12-19 10:11:20, Matthew Bobrowski wrote:
> > > On Tue, Dec 03, 2019 at 08:10:37AM +1100, Dave Chinner wrote:
> > > > [cc linux-ext4@vger.kernel.org - this is reported from the new ext4
> > > > dio->iomap code]
> > > > 
> > > > On Mon, Dec 02, 2019 at 09:15:08AM -0800, syzbot wrote:
> > > > > Hello,
> > > > > 
> > > > > syzbot found the following crash on:
> > > > > 
> > > > > HEAD commit:    b94ae8ad Merge tag 'seccomp-v5.5-rc1' of git://git.kernel...
> > > > > git tree:       upstream
> > > > > console output: https://syzkaller.appspot.com/x/log.txt?x=135a8d7ae00000
> > > > > kernel config:  https://syzkaller.appspot.com/x/.config?x=c2e464ae414aee8c
> > > > > dashboard link: https://syzkaller.appspot.com/bug?extid=bea68382bae9490e7dd6
> > > > > compiler:       clang version 9.0.0 (/home/glider/llvm/clang
> > > > > 80fee25776c2fb61e74c1ecb1a523375c2500b69)
> > > > > syz repro:      https://syzkaller.appspot.com/x/repro.syz?x=1135cb36e0000
> > > > > C reproducer:   https://syzkaller.appspot.com/x/repro.c?x=14e90abce00000
> > > > > 
> > > > > IMPORTANT: if you fix the bug, please add the following tag to the commit:
> > > > > Reported-by: syzbot+bea68382bae9490e7dd6@syzkaller.appspotmail.com
> > > > > 
> > > > > ==================================================================
> > > > > BUG: KASAN: use-after-free in iov_iter_alignment+0x6a1/0x7b0
> > > > > lib/iov_iter.c:1225
> > > > > Read of size 4 at addr ffff888098d40f54 by task loop0/8203
> > > > > 
> > > > > CPU: 0 PID: 8203 Comm: loop0 Not tainted 5.4.0-syzkaller #0
> > > > > Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS
> > > > > Google 01/01/2011
> > > > > Call Trace:
> > > > >  __dump_stack lib/dump_stack.c:77 [inline]
> > > > >  dump_stack+0x1fb/0x318 lib/dump_stack.c:118
> > > > >  print_address_description+0x75/0x5c0 mm/kasan/report.c:374
> > > > >  __kasan_report+0x14b/0x1c0 mm/kasan/report.c:506
> > > > >  kasan_report+0x26/0x50 mm/kasan/common.c:634
> > > > >  __asan_report_load4_noabort+0x14/0x20 mm/kasan/generic_report.c:131
> > > > >  iov_iter_alignment+0x6a1/0x7b0 lib/iov_iter.c:1225
> > > > >  iomap_dio_bio_actor+0x1a7/0x11e0 fs/iomap/direct-io.c:203
> > > > >  iomap_dio_actor+0x2b4/0x4a0 fs/iomap/direct-io.c:375
> > > > >  iomap_apply+0x370/0x490 fs/iomap/apply.c:80
> > > > >  iomap_dio_rw+0x8ad/0x1010 fs/iomap/direct-io.c:493
> > > > >  ext4_dio_read_iter fs/ext4/file.c:77 [inline]
> > > > >  ext4_file_read_iter+0x834/0xc20 fs/ext4/file.c:128
> > > > >  lo_rw_aio+0xcbb/0xea0 include/linux/fs.h:1889
> > > > 
> > > > loopback -> ext4 direct IO, bad access on iov passed to iomap DIO
> > > > code.
> > > > 
> > > > >  do_req_filebacked drivers/block/loop.c:616 [inline]
> > > > >  loop_handle_cmd drivers/block/loop.c:1952 [inline]
> > > > >  loop_queue_work+0x13ab/0x2590 drivers/block/loop.c:1966
> > > > >  kthread_worker_fn+0x449/0x700 kernel/kthread.c:671
> > > > >  loop_kthread_worker_fn+0x40/0x60 drivers/block/loop.c:901
> > > > >  kthread+0x332/0x350 kernel/kthread.c:255
> > > > >  ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:352
> > > > > 
> > > > > Allocated by task 4198:
> > > > >  save_stack mm/kasan/common.c:69 [inline]
> > > > >  set_track mm/kasan/common.c:77 [inline]
> > > > >  __kasan_kmalloc+0x11c/0x1b0 mm/kasan/common.c:510
> > > > >  kasan_slab_alloc+0xf/0x20 mm/kasan/common.c:518
> > > > >  slab_post_alloc_hook mm/slab.h:584 [inline]
> > > > >  slab_alloc mm/slab.c:3319 [inline]
> > > > >  kmem_cache_alloc+0x1f5/0x2e0 mm/slab.c:3483
> > > > >  mempool_alloc_slab+0x4d/0x70 mm/mempool.c:513
> > > > >  mempool_alloc+0x104/0x5e0 mm/mempool.c:393
> > > > >  bio_alloc_bioset+0x1b0/0x5f0 block/bio.c:477
> > > > >  bio_alloc include/linux/bio.h:400 [inline]
> > > > >  mpage_alloc fs/mpage.c:79 [inline]
> > > > >  do_mpage_readpage+0x1685/0x1d10 fs/mpage.c:306
> > > > >  mpage_readpages+0x2a9/0x440 fs/mpage.c:404
> > > > >  blkdev_readpages+0x2c/0x40 fs/block_dev.c:620
> > > > >  read_pages+0xad/0x4d0 mm/readahead.c:126
> > > > >  __do_page_cache_readahead+0x480/0x530 mm/readahead.c:212
> > > > >  force_page_cache_readahead mm/readahead.c:243 [inline]
> > > > >  page_cache_sync_readahead+0x329/0x3b0 mm/readahead.c:522
> > > > >  generic_file_buffered_read+0x41d/0x2570 mm/filemap.c:2051
> > > > >  generic_file_read_iter+0xa9/0x450 mm/filemap.c:2324
> > > > >  blkdev_read_iter+0x12e/0x140 fs/block_dev.c:2039
> > > > >  call_read_iter include/linux/fs.h:1889 [inline]
> > > > >  new_sync_read fs/read_write.c:414 [inline]
> > > > >  __vfs_read+0x59e/0x730 fs/read_write.c:427
> > > > >  vfs_read+0x1dd/0x420 fs/read_write.c:461
> > > > >  ksys_read+0x117/0x220 fs/read_write.c:587
> > > > >  __do_sys_read fs/read_write.c:597 [inline]
> > > > >  __se_sys_read fs/read_write.c:595 [inline]
> > > > >  __x64_sys_read+0x7b/0x90 fs/read_write.c:595
> > > > >  do_syscall_64+0xf7/0x1c0 arch/x86/entry/common.c:294
> > > > >  entry_SYSCALL_64_after_hwframe+0x49/0xbe
> > > > > 
> > > > > Freed by task 4205:
> > > > >  save_stack mm/kasan/common.c:69 [inline]
> > > > >  set_track mm/kasan/common.c:77 [inline]
> > > > >  kasan_set_free_info mm/kasan/common.c:332 [inline]
> > > > >  __kasan_slab_free+0x12a/0x1e0 mm/kasan/common.c:471
> > > > >  kasan_slab_free+0xe/0x10 mm/kasan/common.c:480
> > > > >  __cache_free mm/slab.c:3425 [inline]
> > > > >  kmem_cache_free+0x81/0xf0 mm/slab.c:3693
> > > > >  mempool_free_slab+0x1d/0x30 mm/mempool.c:520
> > > > >  mempool_free+0xd5/0x350 mm/mempool.c:502
> > > > >  bio_put+0x38b/0x460 block/bio.c:255
> > > > >  mpage_end_io+0x2f5/0x330 fs/mpage.c:58
> > > > >  bio_endio+0x4ff/0x570 block/bio.c:1818
> > > > >  req_bio_endio block/blk-core.c:245 [inline]
> > > > >  blk_update_request+0x438/0x10d0 block/blk-core.c:1464
> > > > >  scsi_end_request+0x8c/0xa20 drivers/scsi/scsi_lib.c:579
> > > > >  scsi_io_completion+0x17c/0x1b80 drivers/scsi/scsi_lib.c:963
> > > > >  scsi_finish_command+0x3b3/0x560 drivers/scsi/scsi.c:228
> > > > >  scsi_softirq_done+0x289/0x310 drivers/scsi/scsi_lib.c:1477
> > > > >  blk_done_softirq+0x312/0x370 block/blk-softirq.c:37
> > > > >  __do_softirq+0x333/0x7c4 arch/x86/include/asm/paravirt.h:762
> > > > 
> > > > Looks like buffered read IO on a loopback device on an ext4 image
> > > > file, and something is being tripped over in the new ext4 direct IO
> > > > path.  Might be an iomap issue, might be an ext4 issue, but it looks
> > > > like the buffered read bio completion is running while the iov is
> > > > still being submitted...
> > > 
> > > Thanks Dave.
> > > 
> > > I will take a look at this when I get home this evening and see
> > > whether I can pinpoint what's going on here...
> > 
> > Any luck in diagnosing this Matthew?
> 
> No, not yet. I just purchased my first home and I'm not far out from
> my wedding day, so I've had my hands tied behind by back doing all
> that crap. I will try get to it sometime this week.

Sure, no problem, I'll try to find some time to look into this as well.
Congratulations to your marriage BTW :)

								Honza
-- 
Jan Kara <jack@suse.com>
SUSE Labs, CR

^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: KASAN: use-after-free Read in iov_iter_alignment
  2019-12-02 21:10 ` KASAN: use-after-free Read in iov_iter_alignment Dave Chinner
  2019-12-02 23:11   ` Matthew Bobrowski
@ 2019-12-16 10:48   ` Jan Kara
  2019-12-16 10:58     ` Jan Kara
  1 sibling, 1 reply; 7+ messages in thread
From: Jan Kara @ 2019-12-16 10:48 UTC (permalink / raw)
  To: Dave Chinner
  Cc: syzbot, darrick.wong, hch, linux-fsdevel, linux-kernel,
	linux-xfs, syzkaller-bugs, linux-ext4, David Howells

On Tue 03-12-19 08:10:37, Dave Chinner wrote:
> [cc linux-ext4@vger.kernel.org - this is reported from the new ext4
> dio->iomap code]
> 
> On Mon, Dec 02, 2019 at 09:15:08AM -0800, syzbot wrote:
> > Hello,
> > 
> > syzbot found the following crash on:
> > 
> > HEAD commit:    b94ae8ad Merge tag 'seccomp-v5.5-rc1' of git://git.kernel...
> > git tree:       upstream
> > console output: https://syzkaller.appspot.com/x/log.txt?x=135a8d7ae00000
> > kernel config:  https://syzkaller.appspot.com/x/.config?x=c2e464ae414aee8c
> > dashboard link: https://syzkaller.appspot.com/bug?extid=bea68382bae9490e7dd6
> > compiler:       clang version 9.0.0 (/home/glider/llvm/clang
> > 80fee25776c2fb61e74c1ecb1a523375c2500b69)
> > syz repro:      https://syzkaller.appspot.com/x/repro.syz?x=1135cb36e00000
> > C reproducer:   https://syzkaller.appspot.com/x/repro.c?x=14e90abce00000
> > 
> > IMPORTANT: if you fix the bug, please add the following tag to the commit:
> > Reported-by: syzbot+bea68382bae9490e7dd6@syzkaller.appspotmail.com
> > 
> > ==================================================================
> > BUG: KASAN: use-after-free in iov_iter_alignment+0x6a1/0x7b0
> > lib/iov_iter.c:1225
> > Read of size 4 at addr ffff888098d40f54 by task loop0/8203
> > 
> > CPU: 0 PID: 8203 Comm: loop0 Not tainted 5.4.0-syzkaller #0
> > Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS
> > Google 01/01/2011
> > Call Trace:
> >  __dump_stack lib/dump_stack.c:77 [inline]
> >  dump_stack+0x1fb/0x318 lib/dump_stack.c:118
> >  print_address_description+0x75/0x5c0 mm/kasan/report.c:374
> >  __kasan_report+0x14b/0x1c0 mm/kasan/report.c:506
> >  kasan_report+0x26/0x50 mm/kasan/common.c:634
> >  __asan_report_load4_noabort+0x14/0x20 mm/kasan/generic_report.c:131
> >  iov_iter_alignment+0x6a1/0x7b0 lib/iov_iter.c:1225
> >  iomap_dio_bio_actor+0x1a7/0x11e0 fs/iomap/direct-io.c:203
> >  iomap_dio_actor+0x2b4/0x4a0 fs/iomap/direct-io.c:375
> >  iomap_apply+0x370/0x490 fs/iomap/apply.c:80
> >  iomap_dio_rw+0x8ad/0x1010 fs/iomap/direct-io.c:493
> >  ext4_dio_read_iter fs/ext4/file.c:77 [inline]
> >  ext4_file_read_iter+0x834/0xc20 fs/ext4/file.c:128
> >  lo_rw_aio+0xcbb/0xea0 include/linux/fs.h:1889
> 
> loopback -> ext4 direct IO, bad access on iov passed to iomap DIO
> code.
> 
> >  do_req_filebacked drivers/block/loop.c:616 [inline]
> >  loop_handle_cmd drivers/block/loop.c:1952 [inline]
> >  loop_queue_work+0x13ab/0x2590 drivers/block/loop.c:1966
> >  kthread_worker_fn+0x449/0x700 kernel/kthread.c:671
> >  loop_kthread_worker_fn+0x40/0x60 drivers/block/loop.c:901
> >  kthread+0x332/0x350 kernel/kthread.c:255
> >  ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:352
> > 
> > Allocated by task 4198:
> >  save_stack mm/kasan/common.c:69 [inline]
> >  set_track mm/kasan/common.c:77 [inline]
> >  __kasan_kmalloc+0x11c/0x1b0 mm/kasan/common.c:510
> >  kasan_slab_alloc+0xf/0x20 mm/kasan/common.c:518
> >  slab_post_alloc_hook mm/slab.h:584 [inline]
> >  slab_alloc mm/slab.c:3319 [inline]
> >  kmem_cache_alloc+0x1f5/0x2e0 mm/slab.c:3483
> >  mempool_alloc_slab+0x4d/0x70 mm/mempool.c:513
> >  mempool_alloc+0x104/0x5e0 mm/mempool.c:393
> >  bio_alloc_bioset+0x1b0/0x5f0 block/bio.c:477
> >  bio_alloc include/linux/bio.h:400 [inline]
> >  mpage_alloc fs/mpage.c:79 [inline]
> >  do_mpage_readpage+0x1685/0x1d10 fs/mpage.c:306
> >  mpage_readpages+0x2a9/0x440 fs/mpage.c:404
> >  blkdev_readpages+0x2c/0x40 fs/block_dev.c:620
> >  read_pages+0xad/0x4d0 mm/readahead.c:126
> >  __do_page_cache_readahead+0x480/0x530 mm/readahead.c:212
> >  force_page_cache_readahead mm/readahead.c:243 [inline]
> >  page_cache_sync_readahead+0x329/0x3b0 mm/readahead.c:522
> >  generic_file_buffered_read+0x41d/0x2570 mm/filemap.c:2051
> >  generic_file_read_iter+0xa9/0x450 mm/filemap.c:2324
> >  blkdev_read_iter+0x12e/0x140 fs/block_dev.c:2039
> >  call_read_iter include/linux/fs.h:1889 [inline]
> >  new_sync_read fs/read_write.c:414 [inline]
> >  __vfs_read+0x59e/0x730 fs/read_write.c:427
> >  vfs_read+0x1dd/0x420 fs/read_write.c:461
> >  ksys_read+0x117/0x220 fs/read_write.c:587
> >  __do_sys_read fs/read_write.c:597 [inline]
> >  __se_sys_read fs/read_write.c:595 [inline]
> >  __x64_sys_read+0x7b/0x90 fs/read_write.c:595
> >  do_syscall_64+0xf7/0x1c0 arch/x86/entry/common.c:294
> >  entry_SYSCALL_64_after_hwframe+0x49/0xbe
> > 
> > Freed by task 4205:
> >  save_stack mm/kasan/common.c:69 [inline]
> >  set_track mm/kasan/common.c:77 [inline]
> >  kasan_set_free_info mm/kasan/common.c:332 [inline]
> >  __kasan_slab_free+0x12a/0x1e0 mm/kasan/common.c:471
> >  kasan_slab_free+0xe/0x10 mm/kasan/common.c:480
> >  __cache_free mm/slab.c:3425 [inline]
> >  kmem_cache_free+0x81/0xf0 mm/slab.c:3693
> >  mempool_free_slab+0x1d/0x30 mm/mempool.c:520
> >  mempool_free+0xd5/0x350 mm/mempool.c:502
> >  bio_put+0x38b/0x460 block/bio.c:255
> >  mpage_end_io+0x2f5/0x330 fs/mpage.c:58
> >  bio_endio+0x4ff/0x570 block/bio.c:1818
> >  req_bio_endio block/blk-core.c:245 [inline]
> >  blk_update_request+0x438/0x10d0 block/blk-core.c:1464
> >  scsi_end_request+0x8c/0xa20 drivers/scsi/scsi_lib.c:579
> >  scsi_io_completion+0x17c/0x1b80 drivers/scsi/scsi_lib.c:963
> >  scsi_finish_command+0x3b3/0x560 drivers/scsi/scsi.c:228
> >  scsi_softirq_done+0x289/0x310 drivers/scsi/scsi_lib.c:1477
> >  blk_done_softirq+0x312/0x370 block/blk-softirq.c:37
> >  __do_softirq+0x333/0x7c4 arch/x86/include/asm/paravirt.h:762
> 
> Looks like buffered read IO on a loopback device on an ext4 image
> file, and something is being tripped over in the new ext4 direct IO
> path.  Might be an iomap issue, might be an ext4 issue, but it looks
> like the buffered read bio completion is running while the iov is
> still being submitted...

Looking a bit more into this, I'm pretty sure this is caused by commit
8cefc107ca54c "pipe: Use head and tail pointers for the ring, not cursor
and length". The pipe dereference it has added to iov_iter_alignment() is
just bogus for all iter types except for pipes. I'll send a fix.

								Honza
-- 
Jan Kara <jack@suse.com>
SUSE Labs, CR

^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: KASAN: use-after-free Read in iov_iter_alignment
  2019-12-16 10:48   ` Jan Kara
@ 2019-12-16 10:58     ` Jan Kara
  0 siblings, 0 replies; 7+ messages in thread
From: Jan Kara @ 2019-12-16 10:58 UTC (permalink / raw)
  To: Dave Chinner
  Cc: syzbot, darrick.wong, hch, linux-fsdevel, linux-kernel,
	linux-xfs, syzkaller-bugs, linux-ext4, David Howells

[-- Attachment #1: Type: text/plain, Size: 1836 bytes --]

On Mon 16-12-19 11:48:36, Jan Kara wrote:
> On Tue 03-12-19 08:10:37, Dave Chinner wrote:
> > [cc linux-ext4@vger.kernel.org - this is reported from the new ext4
> > dio->iomap code]
> > 
> > On Mon, Dec 02, 2019 at 09:15:08AM -0800, syzbot wrote:
> > > Hello,
> > > 
> > > syzbot found the following crash on:
> > > 
> > > HEAD commit:    b94ae8ad Merge tag 'seccomp-v5.5-rc1' of git://git.kernel...
> > > git tree:       upstream
> > > console output: https://syzkaller.appspot.com/x/log.txt?x=135a8d7ae00000
> > > kernel config:  https://syzkaller.appspot.com/x/.config?x=c2e464ae414aee8c
> > > dashboard link: https://syzkaller.appspot.com/bug?extid=bea68382bae9490e7dd6
> > > compiler:       clang version 9.0.0 (/home/glider/llvm/clang
> > > 80fee25776c2fb61e74c1ecb1a523375c2500b69)
> > > syz repro:      https://syzkaller.appspot.com/x/repro.syz?x=1135cb36e00000
> > > C reproducer:   https://syzkaller.appspot.com/x/repro.c?x=14e90abce00000
> > > 
> > > IMPORTANT: if you fix the bug, please add the following tag to the commit:
> > > Reported-by: syzbot+bea68382bae9490e7dd6@syzkaller.appspotmail.com
> > > 
...

> > Looks like buffered read IO on a loopback device on an ext4 image
> > file, and something is being tripped over in the new ext4 direct IO
> > path.  Might be an iomap issue, might be an ext4 issue, but it looks
> > like the buffered read bio completion is running while the iov is
> > still being submitted...
> 
> Looking a bit more into this, I'm pretty sure this is caused by commit
> 8cefc107ca54c "pipe: Use head and tail pointers for the ring, not cursor
> and length". The pipe dereference it has added to iov_iter_alignment() is
> just bogus for all iter types except for pipes. I'll send a fix.

For reference the fix I've sent is attached.

								Honza

-- 
Jan Kara <jack@suse.com>
SUSE Labs, CR

[-- Attachment #2: 0001-pipe-Fix-bogus-dereference-in-iov_iter_alignment.patch --]
[-- Type: text/x-patch, Size: 1348 bytes --]

From bc27e20fdd29b97b45015e1443128b4d3ff9455e Mon Sep 17 00:00:00 2001
From: Jan Kara <jack@suse.cz>
Date: Mon, 16 Dec 2019 11:44:14 +0100
Subject: [PATCH] pipe: Fix bogus dereference in iov_iter_alignment()

We cannot look at 'i->pipe' unless we know the iter is a pipe. Move the
ring_size load to a branch in iov_iter_alignment() where we've already
checked the iter is a pipe to avoid bogus dereference.

Reported-by: syzbot+bea68382bae9490e7dd6@syzkaller.appspotmail.com
Fixes: 8cefc107ca54 ("pipe: Use head and tail pointers for the ring, not cursor and length")
Signed-off-by: Jan Kara <jack@suse.cz>
---
 lib/iov_iter.c | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

 Al, David, not sure who's going to merge this so sending to both :).

								Honza

diff --git a/lib/iov_iter.c b/lib/iov_iter.c
index fb29c02c6a3c..51595bf3af85 100644
--- a/lib/iov_iter.c
+++ b/lib/iov_iter.c
@@ -1222,11 +1222,12 @@ EXPORT_SYMBOL(iov_iter_discard);
 
 unsigned long iov_iter_alignment(const struct iov_iter *i)
 {
-	unsigned int p_mask = i->pipe->ring_size - 1;
 	unsigned long res = 0;
 	size_t size = i->count;
 
 	if (unlikely(iov_iter_is_pipe(i))) {
+		unsigned int p_mask = i->pipe->ring_size - 1;
+
 		if (size && i->iov_offset && allocated(&i->pipe->bufs[i->head & p_mask]))
 			return size | i->iov_offset;
 		return size;
-- 
2.16.4


^ permalink raw reply related	[flat|nested] 7+ messages in thread

end of thread, other threads:[~2019-12-16 10:58 UTC | newest]

Thread overview: 7+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
     [not found] <000000000000ad9f910598bbb867@google.com>
2019-12-02 21:10 ` KASAN: use-after-free Read in iov_iter_alignment Dave Chinner
2019-12-02 23:11   ` Matthew Bobrowski
2019-12-13 11:30     ` Jan Kara
2019-12-15 10:24       ` Matthew Bobrowski
2019-12-16 10:32         ` Jan Kara
2019-12-16 10:48   ` Jan Kara
2019-12-16 10:58     ` Jan Kara

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).