Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754279AbdCHU20 (ORCPT ); Wed, 8 Mar 2017 15:28:26 -0500 Received: from mx0b-001b2d01.pphosted.com ([148.163.158.5]:56199 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1753829AbdCHU2Y (ORCPT ); Wed, 8 Mar 2017 15:28:24 -0500 Subject: Re: [tpmdd-devel] [PATCH] vTPM: Fix missing NULL check From: "Hon Ching(Vicky) Lo" To: Jason Gunthorpe Cc: tpmdd-devel@lists.sourceforge.net, Ashley Lai , linux-kernel@vger.kernel.org, stable@vger.kernel.org, Peter Huewe In-Reply-To: <20170308171729.GC16709@obsidianresearch.com> References: <1488839535-11822-1-git-send-email-honclo@linux.vnet.ibm.com> <20170306231946.GA23953@obsidianresearch.com> <1488946363.15595.17.camel@vtpm2014.ibm.com> <20170308171729.GC16709@obsidianresearch.com> Content-Type: text/plain; charset="UTF-8" Date: Wed, 08 Mar 2017 15:28:11 -0500 Mime-Version: 1.0 X-Mailer: Evolution 2.32.3 (2.32.3-34.el6) Content-Transfer-Encoding: 7bit X-TM-AS-MML: disable x-cbid: 17030820-0024-0000-0000-000003AF82C5 X-IBM-AV-DETECTION: SAVI=unused REMOTE=unused XFE=unused x-cbparentid: 17030820-0025-0000-0000-0000112CDC7F Message-Id: <1489004891.15595.37.camel@vtpm2014.ibm.com> X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10432:,, definitions=2017-03-08_15:,, signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 spamscore=0 suspectscore=2 malwarescore=0 phishscore=0 adultscore=0 bulkscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1702020001 definitions=main-1703080159 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1652 Lines: 47 On Wed, 2017-03-08 at 10:17 -0700, Jason Gunthorpe wrote: > On Tue, Mar 07, 2017 at 11:12:43PM -0500, Hon Ching(Vicky) Lo wrote: > > On Mon, 2017-03-06 at 16:19 -0700, Jason Gunthorpe wrote: > > > > Also, how does locking work here? Does the vio core prevent > > > tpm_ibmvtpm_get_desired_dma and tpm_ibmvtpm_remove from running > > > concurrently? > > > > No, vio core doesn't prevent tpm_ibmvtpm_get_desired_dma and tpm_ibmvtpm_remove > > from running concurrently. > > > > vio_bus_probe calls vio_cmo_bus_probe which calls tpm_ibmvtpm_get_desired_dma. > > tpm_ibmvtpm_get_desired_dma is called before the code enters critical section. > > > > There is no locking mechanism around tpm_ibmvtpm_remove in vio_bus_remove. > > > > What's the concern here? > > tpm_ibmvtpm_remove makes the pointer that tpm_ibmvtpm_get_desired_dma > is accessing invalid, so some kind of locking is technically required > so that the two things do not create a use after free race: > I don't think we need to worry about locking in this specific case. tpm_ibmvtpm_get_desired_dma was designed to return a default value in the case when the chip is not available. There is a locking mechanism between the probe and the remove at vio level. The 'get_desired_dma' is called before acquiring a lock within the probe code is rather a design than a bug. Vicky > > > + /* For tpm_ibmvtpm_get_desired_dma */ > > > + dev_set_drvdata(&vdev->dev, NULL); > > > kfree(ibmvtpm); > > Eg with the kfree above. > > It may be that the driver core prevents probe/remove from running > concurrently and things are fine, but this is something to confirm.. > > Jason >