Received: by 10.213.65.68 with SMTP id h4csp222363imn; Fri, 23 Mar 2018 03:14:39 -0700 (PDT) X-Google-Smtp-Source: AG47ELuk5xxZqi/6hW+cQpq+6B0j+qHsoaXsSsBckgGrabUYG5Juckwkg8VFZ13Thkord21/TeNt X-Received: by 2002:a17:902:3181:: with SMTP id x1-v6mr11525405plb.338.1521800079811; Fri, 23 Mar 2018 03:14:39 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1521800079; cv=none; d=google.com; s=arc-20160816; b=QDUcAj0YJAAv1vg0Kq+DFCLUeha8xbDTzasyYP/IWP20yqDqp/AarLosyCRlKyyPC+ wDmcJihILD+gUIzkuphnp/rilkWi9Tdhs+K54rFU9tKA8ALK3aIwsG7qBJlbU+a1dmhh iL5ImoYaoKNfLCBYyCKD5xmT5U5t3xCXVB3HIamkWX/F4dY5KCUIEnKVFLVKW5Jjd8Ov oZH3PeL+QZ4Eupdaa76qOTjWex+qEPbh9RvcA/icGwT/OM29G16mBK6vxBIcRGzT9qvg B5uOvy1hu03cweCVtDohYLnMqt3irt1f7sAN3iU8X04aMEuArVpWZ+zIKl+3l8zhdhQ/ xe1w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :in-reply-to:message-id:date:subject:cc:to:from :arc-authentication-results; bh=lvuuIswoaj0OWZ0T9r0mcqpZ6G23Tm/hvbQQLRcIezU=; b=cGxS9mp5oyabB9t8XVJeXvhQIQFYHId8Ng2BjJ/U8qsHBGNmNsydpf6wxjWeYKbuc/ 1kyhLPQBsGiZyHvdpywG8FYrRgPH05aVs8nbogz8xgweJEGSy2lqX36x7M++hINaK6LV nPfn0Tdr8PKzV779Cgzc/xb2MDcvgzWlXLxcPq8GQLwpBa+MhkYKwMK+SAfYQ0JJU+LF c4KeTItxOcJlSqDfb5KdCTVHt+TnnSNOhVCHDUGBogtINjxIFo3xZyP48pJascfMSBB5 OAM4+2I+wdu8TOPiWXp5pDcoOaCO54aHWbshYKZrzx9uRfRUEiROT8pnvQItIHXqC1/r FCwA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id i8si5873291pgt.279.2018.03.23.03.14.25; Fri, 23 Mar 2018 03:14:39 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S933174AbeCWKMT (ORCPT + 99 others); Fri, 23 Mar 2018 06:12:19 -0400 Received: from mail.linuxfoundation.org ([140.211.169.12]:44210 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932478AbeCWKMP (ORCPT ); Fri, 23 Mar 2018 06:12:15 -0400 Received: from localhost (LFbn-1-12247-202.w90-92.abo.wanadoo.fr [90.92.61.202]) by mail.linuxfoundation.org (Postfix) with ESMTPSA id 22D1D10D8; Fri, 23 Mar 2018 10:12:14 +0000 (UTC) From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Sahara , Sasha Levin Subject: [PATCH 4.9 159/177] pty: cancel pty slave port bufs work in tty_release Date: Fri, 23 Mar 2018 10:54:47 +0100 Message-Id: <20180323094212.200792318@linuxfoundation.org> X-Mailer: git-send-email 2.16.2 In-Reply-To: <20180323094205.090519271@linuxfoundation.org> References: <20180323094205.090519271@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.9-stable review patch. If anyone has any objections, please let me know. ------------------ From: Sahara [ Upstream commit 2b022ab7542df60021ab57854b3faaaf42552eaf ] In case that CONFIG_SLUB_DEBUG is on and pty is used, races between release_one_tty and flush_to_ldisc work threads may happen and lead to use-after-free condition on tty->link->port. Because SLUB_DEBUG is turned on, freed tty->link->port is filled with POISON_FREE value. So far without SLUB_DEBUG, port was filled with zero and flush_to_ldisc could return without a problem by checking if tty is NULL. CPU 0 CPU 1 ----- ----- release_tty pty_write cancel_work_sync(tty) to = tty->link tty_kref_put(tty->link) tty_schedule_flip(to->port) << workqueue >> ... release_one_tty ... pty_cleanup ... kfree(tty->link->port) << workqueue >> flush_to_ldisc tty = READ_ONCE(port->itty) tty is 0x6b6b6b6b6b6b6b6b !!PANIC!! access tty->ldisc Unable to handle kernel paging request at virtual address 6b6b6b6b6b6b6b93 pgd = ffffffc0eb1c3000 [6b6b6b6b6b6b6b93] *pgd=0000000000000000, *pud=0000000000000000 ------------[ cut here ]------------ Kernel BUG at ffffff800851154c [verbose debug info unavailable] Internal error: Oops - BUG: 96000004 [#1] PREEMPT SMP CPU: 3 PID: 265 Comm: kworker/u8:9 Tainted: G W 3.18.31-g0a58eeb #1 Hardware name: Qualcomm Technologies, Inc. MSM 8996pro v1.1 + PMI8996 Carbide (DT) Workqueue: events_unbound flush_to_ldisc task: ffffffc0ed610ec0 ti: ffffffc0ed624000 task.ti: ffffffc0ed624000 PC is at ldsem_down_read_trylock+0x0/0x4c LR is at tty_ldisc_ref+0x24/0x4c pc : [] lr : [] pstate: 80400145 sp : ffffffc0ed627cd0 x29: ffffffc0ed627cd0 x28: 0000000000000000 x27: ffffff8009e05000 x26: ffffffc0d382cfa0 x25: 0000000000000000 x24: ffffff800a012f08 x23: 0000000000000000 x22: ffffffc0703fbc88 x21: 6b6b6b6b6b6b6b6b x20: 6b6b6b6b6b6b6b93 x19: 0000000000000000 x18: 0000000000000001 x17: 00e80000f80d6f53 x16: 0000000000000001 x15: 0000007f7d826fff x14: 00000000000000a0 x13: 0000000000000000 x12: 0000000000000109 x11: 0000000000000000 x10: 0000000000000000 x9 : ffffffc0ed624000 x8 : ffffffc0ed611580 x7 : 0000000000000000 x6 : ffffff800a42e000 x5 : 00000000000003fc x4 : 0000000003bd1201 x3 : 0000000000000001 x2 : 0000000000000001 x1 : ffffff800851004c x0 : 6b6b6b6b6b6b6b93 Signed-off-by: Sahara Signed-off-by: Greg Kroah-Hartman Signed-off-by: Sasha Levin Signed-off-by: Greg Kroah-Hartman --- drivers/tty/tty_io.c | 2 ++ 1 file changed, 2 insertions(+) --- a/drivers/tty/tty_io.c +++ b/drivers/tty/tty_io.c @@ -1702,6 +1702,8 @@ static void release_tty(struct tty_struc if (tty->link) tty->link->port->itty = NULL; tty_buffer_cancel_work(tty->port); + if (tty->link) + tty_buffer_cancel_work(tty->link->port); tty_kref_put(tty->link); tty_kref_put(tty);