Linux kernel mirror (for testing) git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
kernel os linux

io_uring: Fix registered ring file refcount leak

Currently, io_uring_unreg_ringfd() (which cleans up registered rings) is
only called on exit, but __io_uring_free (which frees the tctx in which the
registered ring pointers are stored) is also called on execve (via
begin_new_exec -> io_uring_task_cancel -> __io_uring_cancel ->
io_uring_cancel_generic -> __io_uring_free).

This means: A process going through execve while having registered rings
will leak references to the rings' `struct file`.

Fix it by zapping registered rings on execve(). This is implemented by
moving the io_uring_unreg_ringfd() from io_uring_files_cancel() into its
callee __io_uring_cancel(), which is called from io_uring_task_cancel() on
execve.

This could probably be exploited *on 32-bit kernels* by leaking 2^32
references to the same ring, because the file refcount is stored in a
pointer-sized field and get_file() doesn't have protection against
refcount overflow, just a WARN_ONCE(); but on 64-bit it should have no
impact beyond a memory leak.

Cc: stable@vger.kernel.org
Fixes: e7a6c00dc77a ("io_uring: add support for registering ring file descriptors")
Signed-off-by: Jann Horn <jannh@google.com>
Link: https://lore.kernel.org/r/20241218-uring-reg-ring-cleanup-v1-1-8f63e999045b@google.com
Signed-off-by: Jens Axboe <axboe@kernel.dk>

authored by

Jann Horn and committed by
Jens Axboe
12d90811 020b40f3

+2 -3
+1 -3
include/linux/io_uring.h
··· 15 15 16 16 static inline void io_uring_files_cancel(void) 17 17 { 18 - if (current->io_uring) { 19 - io_uring_unreg_ringfd(); 18 + if (current->io_uring) 20 19 __io_uring_cancel(false); 21 - } 22 20 } 23 21 static inline void io_uring_task_cancel(void) 24 22 {
+1
io_uring/io_uring.c
··· 3214 3214 3215 3215 void __io_uring_cancel(bool cancel_all) 3216 3216 { 3217 + io_uring_unreg_ringfd(); 3217 3218 io_uring_cancel_generic(cancel_all, NULL); 3218 3219 } 3219 3220