bpf: Fix use-after-free of bpf_link when priming half-fails
authorAndrii Nakryiko <andriin@fb.com>
Fri, 1 May 2020 18:56:22 +0000 (11:56 -0700)
committerAlexei Starovoitov <ast@kernel.org>
Fri, 1 May 2020 22:13:05 +0000 (15:13 -0700)
commit138c67677ff5ac0bce7131033c39d52a81e87a60
tree2c02575c961a943cc4ca46c9c126ea42a5b76453
parentbeecf11bc2188067824591612151c4dc6ec383c7
bpf: Fix use-after-free of bpf_link when priming half-fails

If bpf_link_prime() succeeds to allocate new anon file, but then fails to
allocate ID for it, link priming is considered to be failed and user is
supposed ot be able to directly kfree() bpf_link, because it was never exposed
to user-space.

But at that point file already keeps a pointer to bpf_link and will eventually
call bpf_link_release(), so if bpf_link was kfree()'d by caller, that would
lead to use-after-free.

Fix this by first allocating ID and only then allocating file. Adding ID to
link_idr is ok, because link at that point still doesn't have its ID set, so
no user-space process can create a new FD for it.

Fixes: a3b80e107894 ("bpf: Allocate ID for bpf_link")
Reported-by: syzbot+39b64425f91b5aab714d@syzkaller.appspotmail.com
Suggested-by: Martin KaFai Lau <kafai@fb.com>
Signed-off-by: Andrii Nakryiko <andriin@fb.com>
Signed-off-by: Alexei Starovoitov <ast@kernel.org>
Acked-by: Martin KaFai Lau <kafai@fb.com>
Link: https://lore.kernel.org/bpf/20200501185622.3088964-1-andriin@fb.com
kernel/bpf/syscall.c