Commit f5cb779ba163 ("ANDROID: binder: remove waitqueue when thread exits.") fixed the use-after-free in eventpoll but aio still has the same issue because it doesn't honor the POLLFREE flag.
Add support for the POLLFREE flag to force complete iocb inline in aio_poll_wake(). A thread may use it to signal it's exit and/or request to cleanup while pending poll request. In this case, aio_poll_wake() needs to make sure it doesn't keep any reference to the queue entry before returning from wake to avoid possible use after free via poll_cancel() path.
The POLLFREE flag is no more exclusive to the epoll and is being shared with the aio. Remove comment from poll.h to avoid confusion.
This fixes a use after free issue between binder thread and aio interactions in certain sequence of events [1].
[1] https://lore.kernel.org/all/CAKUd0B_TCXRY4h1hTztfwWbNSFQqsudDLn2S_28csgWZmZA...
Fixes: f5cb779ba163 ("ANDROID: binder: remove waitqueue when thread exits.") Signed-off-by: Ramji Jiyani ramjiyani@google.com Reviewed-by: Jeff Moyer jmoyer@redhat.com Cc: stable@vger.kernel.org # 4.19+ --- Changes since v1: - Removed parenthesis around POLLFREE macro definition as per review. - Updated description to refer UAF issue discussion this patch fixes. - Updated description to remove reference to parenthesis change. - Added Reviewed-by
Changes since v2: - Added Fixes tag. - Added stable tag for backporting on 4.19+ LTS releases --- fs/aio.c | 45 ++++++++++++++++++--------------- include/uapi/asm-generic/poll.h | 2 +- 2 files changed, 26 insertions(+), 21 deletions(-)
diff --git a/fs/aio.c b/fs/aio.c index 51b08ab01dff..5d539c05df42 100644 --- a/fs/aio.c +++ b/fs/aio.c @@ -1674,6 +1674,7 @@ static int aio_poll_wake(struct wait_queue_entry *wait, unsigned mode, int sync, { struct poll_iocb *req = container_of(wait, struct poll_iocb, wait); struct aio_kiocb *iocb = container_of(req, struct aio_kiocb, poll); + struct kioctx *ctx = iocb->ki_ctx; __poll_t mask = key_to_poll(key); unsigned long flags;
@@ -1683,29 +1684,33 @@ static int aio_poll_wake(struct wait_queue_entry *wait, unsigned mode, int sync,
list_del_init(&req->wait.entry);
- if (mask && spin_trylock_irqsave(&iocb->ki_ctx->ctx_lock, flags)) { - struct kioctx *ctx = iocb->ki_ctx; + /* + * Use irqsave/irqrestore because not all filesystems (e.g. fuse) + * call this function with IRQs disabled and because IRQs have to + * be disabled before ctx_lock is obtained. + */ + if (mask & POLLFREE) { + /* Force complete iocb inline to remove refs to deleted entry */ + spin_lock_irqsave(&ctx->ctx_lock, flags); + } else if (!(mask && spin_trylock_irqsave(&ctx->ctx_lock, flags))) { + /* Can't complete iocb inline; schedule for later */ + schedule_work(&req->work); + return 1; + }
- /* - * Try to complete the iocb inline if we can. Use - * irqsave/irqrestore because not all filesystems (e.g. fuse) - * call this function with IRQs disabled and because IRQs - * have to be disabled before ctx_lock is obtained. - */ - list_del(&iocb->ki_list); - iocb->ki_res.res = mangle_poll(mask); - req->done = true; - if (iocb->ki_eventfd && eventfd_signal_allowed()) { - iocb = NULL; - INIT_WORK(&req->work, aio_poll_put_work); - schedule_work(&req->work); - } - spin_unlock_irqrestore(&ctx->ctx_lock, flags); - if (iocb) - iocb_put(iocb); - } else { + /* complete iocb inline */ + list_del(&iocb->ki_list); + iocb->ki_res.res = mangle_poll(mask); + req->done = true; + if (iocb->ki_eventfd && eventfd_signal_allowed()) { + iocb = NULL; + INIT_WORK(&req->work, aio_poll_put_work); schedule_work(&req->work); } + spin_unlock_irqrestore(&ctx->ctx_lock, flags); + if (iocb) + iocb_put(iocb); + return 1; }
diff --git a/include/uapi/asm-generic/poll.h b/include/uapi/asm-generic/poll.h index 41b509f410bf..f9c520ce4bf4 100644 --- a/include/uapi/asm-generic/poll.h +++ b/include/uapi/asm-generic/poll.h @@ -29,7 +29,7 @@ #define POLLRDHUP 0x2000 #endif
-#define POLLFREE (__force __poll_t)0x4000 /* currently only for epoll */ +#define POLLFREE (__force __poll_t)0x4000
#define POLL_BUSY_LOOP (__force __poll_t)0x8000
On Wed, Oct 06, 2021 at 10:43:11PM +0000, Ramji Jiyani wrote:
Fixes: f5cb779ba163 ("ANDROID: binder: remove waitqueue when thread exits.") Signed-off-by: Ramji Jiyani ramjiyani@google.com Reviewed-by: Jeff Moyer jmoyer@redhat.com Cc: stable@vger.kernel.org # 4.19+
The commit that this claims to be fixing is in linux-4.4.y, so either the fixes tag is wrong or the Cc stable tag is wrong. It's important to provide correct information here for backporting purposes, so please do so.
- Eric
On Wed, Oct 6, 2021 at 3:48 PM Eric Biggers ebiggers@kernel.org wrote:
On Wed, Oct 06, 2021 at 10:43:11PM +0000, Ramji Jiyani wrote:
Fixes: f5cb779ba163 ("ANDROID: binder: remove waitqueue when thread exits.") Signed-off-by: Ramji Jiyani ramjiyani@google.com Reviewed-by: Jeff Moyer jmoyer@redhat.com Cc: stable@vger.kernel.org # 4.19+
The commit that this claims to be fixing is in linux-4.4.y, so either the fixes tag is wrong or the Cc stable tag is wrong. It's important to provide correct information here for backporting purposes, so please do so.
Stable tag is correct; Fixes tag in this case is tricky.
In 4.4 only way to poll binder file was via eventpoll and since binder wasn't flagging the POLLFREE before thread exit there was an UAF. Which got fixed by the commit currently Fixes tag is referring.
Later, aio got enhanced by adding a polling feature in 4.19 [1]. That introduced one more way to poll binder files; but it did not include support for POLLFREE, so UAF exists.
Should the Fixes tag refer to Commit bfe4037e722e ("aio: implement IOCB_CMD_POLL") [2] in this case?
[1] https://lore.kernel.org/lkml/20180110155853.32348-32-hch@lst.de/ [2] https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/fs/a...
- Eric
~ Ramji
On Wed, Oct 06, 2021 at 04:28:23PM -0700, Ramji Jiyani wrote:
Should the Fixes tag refer to Commit bfe4037e722e ("aio: implement IOCB_CMD_POLL") [2] in this case?
[1] https://lore.kernel.org/lkml/20180110155853.32348-32-hch@lst.de/ [2] https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/fs/a...
That's the commit that introduced this bug, right? The binder change was earlier. So it seems the answer is yes.
- Eric
On Wed, Oct 6, 2021 at 4:34 PM Eric Biggers ebiggers@kernel.org wrote:
On Wed, Oct 06, 2021 at 04:28:23PM -0700, Ramji Jiyani wrote:
Should the Fixes tag refer to Commit bfe4037e722e ("aio: implement IOCB_CMD_POLL") [2] in this case?
[1] https://lore.kernel.org/lkml/20180110155853.32348-32-hch@lst.de/ [2] https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/fs/a...
That's the commit that introduced this bug, right? The binder change was earlier. So it seems the answer is yes.
- Eric
Thanks Eric. I'll send the v4 with exact commit where the issue start manifesting in aio with updated description and Fixes tag.
~ Ramji
linux-stable-mirror@lists.linaro.org