mirror of
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/
synced 2025-04-20 05:08:28 +09:00

syzbot reported a slab-out-of-bounds Read in isofs_fh_to_parent. [1] The handle_bytes value passed in by the reproducing program is equal to 12. In handle_to_path(), only 12 bytes of memory are allocated for the structure file_handle->f_handle member, which causes an out-of-bounds access when accessing the member parent_block of the structure isofs_fid in isofs, because accessing parent_block requires at least 16 bytes of f_handle. Here, fh_len is used to indirectly confirm that the value of handle_bytes is greater than 3 before accessing parent_block. [1] BUG: KASAN: slab-out-of-bounds in isofs_fh_to_parent+0x1b8/0x210 fs/isofs/export.c:183 Read of size 4 at addr ffff0000cc030d94 by task syz-executor215/6466 CPU: 1 UID: 0 PID: 6466 Comm: syz-executor215 Not tainted 6.14.0-rc7-syzkaller-ga2392f333575 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 Call trace: show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:466 (C) __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0xe4/0x150 lib/dump_stack.c:120 print_address_description mm/kasan/report.c:408 [inline] print_report+0x198/0x550 mm/kasan/report.c:521 kasan_report+0xd8/0x138 mm/kasan/report.c:634 __asan_report_load4_noabort+0x20/0x2c mm/kasan/report_generic.c:380 isofs_fh_to_parent+0x1b8/0x210 fs/isofs/export.c:183 exportfs_decode_fh_raw+0x2dc/0x608 fs/exportfs/expfs.c:523 do_handle_to_path+0xa0/0x198 fs/fhandle.c:257 handle_to_path fs/fhandle.c:385 [inline] do_handle_open+0x8cc/0xb8c fs/fhandle.c:403 __do_sys_open_by_handle_at fs/fhandle.c:443 [inline] __se_sys_open_by_handle_at fs/fhandle.c:434 [inline] __arm64_sys_open_by_handle_at+0x80/0x94 fs/fhandle.c:434 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:744 el0t_64_sync_handler+0x84/0x108 arch/arm64/kernel/entry-common.c:762 el0t_64_sync+0x198/0x19c arch/arm64/kernel/entry.S:600 Allocated by task 6466: kasan_save_stack mm/kasan/common.c:47 [inline] kasan_save_track+0x40/0x78 mm/kasan/common.c:68 kasan_save_alloc_info+0x40/0x50 mm/kasan/generic.c:562 poison_kmalloc_redzone mm/kasan/common.c:377 [inline] __kasan_kmalloc+0xac/0xc4 mm/kasan/common.c:394 kasan_kmalloc include/linux/kasan.h:260 [inline] __do_kmalloc_node mm/slub.c:4294 [inline] __kmalloc_noprof+0x32c/0x54c mm/slub.c:4306 kmalloc_noprof include/linux/slab.h:905 [inline] handle_to_path fs/fhandle.c:357 [inline] do_handle_open+0x5a4/0xb8c fs/fhandle.c:403 __do_sys_open_by_handle_at fs/fhandle.c:443 [inline] __se_sys_open_by_handle_at fs/fhandle.c:434 [inline] __arm64_sys_open_by_handle_at+0x80/0x94 fs/fhandle.c:434 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:744 el0t_64_sync_handler+0x84/0x108 arch/arm64/kernel/entry-common.c:762 el0t_64_sync+0x198/0x19c arch/arm64/kernel/entry.S:600 Reported-by: syzbot+4d7cd7dd0ce1aa8d5c65@syzkaller.appspotmail.com Closes: https://syzkaller.appspot.com/bug?extid=4d7cd7dd0ce1aa8d5c65 Tested-by: syzbot+4d7cd7dd0ce1aa8d5c65@syzkaller.appspotmail.com CC: stable@vger.kernel.org Fixes: 1da177e4c3f4 ("Linux-2.6.12-rc2") Signed-off-by: Edward Adam Davis <eadavis@qq.com> Signed-off-by: Jan Kara <jack@suse.cz> Link: https://patch.msgid.link/tencent_9C8CB8A7E7C6C512C7065DC98B6EDF6EC606@qq.com
194 lines
5.2 KiB
C
194 lines
5.2 KiB
C
// SPDX-License-Identifier: GPL-2.0
|
|
/*
|
|
* fs/isofs/export.c
|
|
*
|
|
* (C) 2004 Paul Serice - The new inode scheme requires switching
|
|
* from iget() to iget5_locked() which means
|
|
* the NFS export operations have to be hand
|
|
* coded because the default routines rely on
|
|
* iget().
|
|
*
|
|
* The following files are helpful:
|
|
*
|
|
* Documentation/filesystems/nfs/exporting.rst
|
|
* fs/exportfs/expfs.c.
|
|
*/
|
|
|
|
#include "isofs.h"
|
|
|
|
static struct dentry *
|
|
isofs_export_iget(struct super_block *sb,
|
|
unsigned long block,
|
|
unsigned long offset,
|
|
__u32 generation)
|
|
{
|
|
struct inode *inode;
|
|
|
|
if (block == 0)
|
|
return ERR_PTR(-ESTALE);
|
|
inode = isofs_iget(sb, block, offset);
|
|
if (IS_ERR(inode))
|
|
return ERR_CAST(inode);
|
|
if (generation && inode->i_generation != generation) {
|
|
iput(inode);
|
|
return ERR_PTR(-ESTALE);
|
|
}
|
|
return d_obtain_alias(inode);
|
|
}
|
|
|
|
/* This function is surprisingly simple. The trick is understanding
|
|
* that "child" is always a directory. So, to find its parent, you
|
|
* simply need to find its ".." entry, normalize its block and offset,
|
|
* and return the underlying inode. See the comments for
|
|
* isofs_normalize_block_and_offset(). */
|
|
static struct dentry *isofs_export_get_parent(struct dentry *child)
|
|
{
|
|
unsigned long parent_block = 0;
|
|
unsigned long parent_offset = 0;
|
|
struct inode *child_inode = d_inode(child);
|
|
struct iso_inode_info *e_child_inode = ISOFS_I(child_inode);
|
|
struct iso_directory_record *de = NULL;
|
|
struct buffer_head * bh = NULL;
|
|
struct dentry *rv = NULL;
|
|
|
|
/* "child" must always be a directory. */
|
|
if (!S_ISDIR(child_inode->i_mode)) {
|
|
printk(KERN_ERR "isofs: isofs_export_get_parent(): "
|
|
"child is not a directory!\n");
|
|
rv = ERR_PTR(-EACCES);
|
|
goto out;
|
|
}
|
|
|
|
/* It is an invariant that the directory offset is zero. If
|
|
* it is not zero, it means the directory failed to be
|
|
* normalized for some reason. */
|
|
if (e_child_inode->i_iget5_offset != 0) {
|
|
printk(KERN_ERR "isofs: isofs_export_get_parent(): "
|
|
"child directory not normalized!\n");
|
|
rv = ERR_PTR(-EACCES);
|
|
goto out;
|
|
}
|
|
|
|
/* The child inode has been normalized such that its
|
|
* i_iget5_block value points to the "." entry. Fortunately,
|
|
* the ".." entry is located in the same block. */
|
|
parent_block = e_child_inode->i_iget5_block;
|
|
|
|
/* Get the block in question. */
|
|
bh = sb_bread(child_inode->i_sb, parent_block);
|
|
if (bh == NULL) {
|
|
rv = ERR_PTR(-EACCES);
|
|
goto out;
|
|
}
|
|
|
|
/* This is the "." entry. */
|
|
de = (struct iso_directory_record*)bh->b_data;
|
|
|
|
/* The ".." entry is always the second entry. */
|
|
parent_offset = (unsigned long)isonum_711(de->length);
|
|
de = (struct iso_directory_record*)(bh->b_data + parent_offset);
|
|
|
|
/* Verify it is in fact the ".." entry. */
|
|
if ((isonum_711(de->name_len) != 1) || (de->name[0] != 1)) {
|
|
printk(KERN_ERR "isofs: Unable to find the \"..\" "
|
|
"directory for NFS.\n");
|
|
rv = ERR_PTR(-EACCES);
|
|
goto out;
|
|
}
|
|
|
|
/* Normalize */
|
|
isofs_normalize_block_and_offset(de, &parent_block, &parent_offset);
|
|
|
|
rv = d_obtain_alias(isofs_iget(child_inode->i_sb, parent_block,
|
|
parent_offset));
|
|
out:
|
|
if (bh)
|
|
brelse(bh);
|
|
return rv;
|
|
}
|
|
|
|
static int
|
|
isofs_export_encode_fh(struct inode *inode,
|
|
__u32 *fh32,
|
|
int *max_len,
|
|
struct inode *parent)
|
|
{
|
|
struct iso_inode_info * ei = ISOFS_I(inode);
|
|
int len = *max_len;
|
|
int type = 1;
|
|
__u16 *fh16 = (__u16*)fh32;
|
|
|
|
/*
|
|
* WARNING: max_len is 5 for NFSv2. Because of this
|
|
* limitation, we use the lower 16 bits of fh32[1] to hold the
|
|
* offset of the inode and the upper 16 bits of fh32[1] to
|
|
* hold the offset of the parent.
|
|
*/
|
|
if (parent && (len < 5)) {
|
|
*max_len = 5;
|
|
return FILEID_INVALID;
|
|
} else if (len < 3) {
|
|
*max_len = 3;
|
|
return FILEID_INVALID;
|
|
}
|
|
|
|
len = 3;
|
|
fh32[0] = ei->i_iget5_block;
|
|
fh16[2] = (__u16)ei->i_iget5_offset; /* fh16 [sic] */
|
|
fh16[3] = 0; /* avoid leaking uninitialized data */
|
|
fh32[2] = inode->i_generation;
|
|
if (parent) {
|
|
struct iso_inode_info *eparent;
|
|
eparent = ISOFS_I(parent);
|
|
fh32[3] = eparent->i_iget5_block;
|
|
fh16[3] = (__u16)eparent->i_iget5_offset; /* fh16 [sic] */
|
|
fh32[4] = parent->i_generation;
|
|
len = 5;
|
|
type = 2;
|
|
}
|
|
*max_len = len;
|
|
return type;
|
|
}
|
|
|
|
struct isofs_fid {
|
|
u32 block;
|
|
u16 offset;
|
|
u16 parent_offset;
|
|
u32 generation;
|
|
u32 parent_block;
|
|
u32 parent_generation;
|
|
};
|
|
|
|
static struct dentry *isofs_fh_to_dentry(struct super_block *sb,
|
|
struct fid *fid, int fh_len, int fh_type)
|
|
{
|
|
struct isofs_fid *ifid = (struct isofs_fid *)fid;
|
|
|
|
if (fh_len < 3 || fh_type > 2)
|
|
return NULL;
|
|
|
|
return isofs_export_iget(sb, ifid->block, ifid->offset,
|
|
ifid->generation);
|
|
}
|
|
|
|
static struct dentry *isofs_fh_to_parent(struct super_block *sb,
|
|
struct fid *fid, int fh_len, int fh_type)
|
|
{
|
|
struct isofs_fid *ifid = (struct isofs_fid *)fid;
|
|
|
|
if (fh_len < 2 || fh_type != 2)
|
|
return NULL;
|
|
|
|
return isofs_export_iget(sb,
|
|
fh_len > 3 ? ifid->parent_block : 0,
|
|
ifid->parent_offset,
|
|
fh_len > 4 ? ifid->parent_generation : 0);
|
|
}
|
|
|
|
const struct export_operations isofs_export_ops = {
|
|
.encode_fh = isofs_export_encode_fh,
|
|
.fh_to_dentry = isofs_fh_to_dentry,
|
|
.fh_to_parent = isofs_fh_to_parent,
|
|
.get_parent = isofs_export_get_parent,
|
|
};
|