Received: by 10.213.65.68 with SMTP id h4csp291487imn; Fri, 23 Mar 2018 04:53:38 -0700 (PDT) X-Google-Smtp-Source: AG47ELslylkp6zFIn84/15CUOr8nktZwtZaKDc7se+PcvBQ6LdWwIB+fOZQiuXKuebkOkncyeZYy X-Received: by 2002:a17:902:8206:: with SMTP id x6-v6mr22594285pln.256.1521806018556; Fri, 23 Mar 2018 04:53:38 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1521806018; cv=none; d=google.com; s=arc-20160816; b=vlVua5QcQ1rLZshq5KUD8HS5YXc/fZArwE+x9kxj7oQDA048vkS1Yjxp4INbgoLvXc AcHqXzdRL9gA94n45HcZqYtDkBKaet2gy0I/xwBMlI+SlmO9grVwDK3WoHkhMjG8OdNW OlKnGoUlLko2lLdy7XtulAzYFCCBlVWCaaDpLmgXxinQrIyyOvGmeFJTj6oK6qPMvShz ucIejAHRmN7wJonY8dEmSAGKwjnKKi+YojJleDLXpMIApM5zbhFuCHjfYr44zZDqLMAQ vh+X+gVEmNbhbAsLVcN6fYE5q20mEaEBgnCZ/i8RG4q/XCcoznG2CUKo4rP+1k0L+R8/ p3YQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :in-reply-to:message-id:date:subject:cc:to:from :arc-authentication-results; bh=yPkrmq+5mkMJotTKA0Kmxm3kWUZ5SdUHbG4yx+LxLi8=; b=JAMEbj6mOr0jC3Sl+GYWCfzTw+Vy04IyAx/I8oXI8ACZyKFYuJT0HXJFf+4IDL+H2R uVs3/kVXeVXMkHfiLZUzrgmyaq4TV5togXgPr6r+qz13/DrU7lu5idDir1iOnjMwNRk7 3T24nHYaF7zfd/fyUpZfNlVAl0ltlUzBghghEliwWBL2m/8qM3Mur2cyHUXv/5GAd+MK 9KiMjT85owb4SIEahJC0Ks1WLJ6W/XHS+UmWHtebjrnNRKfZubl1ZfssmuOBtHj6PBi3 yYAN3QtOyTvEj6D1Ys8L7iXaIjyc1DKMsJ1/WaKgNYzBkYaGM9tWkrpTqkrYHRVUyEVz QzVw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id bj8-v6si8993671plb.306.2018.03.23.04.53.24; Fri, 23 Mar 2018 04:53:38 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754090AbeCWKCD (ORCPT + 99 others); Fri, 23 Mar 2018 06:02:03 -0400 Received: from mail.linuxfoundation.org ([140.211.169.12]:38156 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753607AbeCWKCA (ORCPT ); Fri, 23 Mar 2018 06:02:00 -0400 Received: from localhost (LFbn-1-12247-202.w90-92.abo.wanadoo.fr [90.92.61.202]) by mail.linuxfoundation.org (Postfix) with ESMTPSA id C4A7E12A4; Fri, 23 Mar 2018 10:01:59 +0000 (UTC) From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Sahara , Sasha Levin Subject: [PATCH 4.14 43/77] pty: cancel pty slave port bufs work in tty_release Date: Fri, 23 Mar 2018 10:54:17 +0100 Message-Id: <20180323094145.144270380@linuxfoundation.org> X-Mailer: git-send-email 2.16.2 In-Reply-To: <20180323094142.260022880@linuxfoundation.org> References: <20180323094142.260022880@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.14-stable review patch. If anyone has any objections, please let me know. ------------------ From: Sahara [ Upstream commit 2b022ab7542df60021ab57854b3faaaf42552eaf ] In case that CONFIG_SLUB_DEBUG is on and pty is used, races between release_one_tty and flush_to_ldisc work threads may happen and lead to use-after-free condition on tty->link->port. Because SLUB_DEBUG is turned on, freed tty->link->port is filled with POISON_FREE value. So far without SLUB_DEBUG, port was filled with zero and flush_to_ldisc could return without a problem by checking if tty is NULL. CPU 0 CPU 1 ----- ----- release_tty pty_write cancel_work_sync(tty) to = tty->link tty_kref_put(tty->link) tty_schedule_flip(to->port) << workqueue >> ... release_one_tty ... pty_cleanup ... kfree(tty->link->port) << workqueue >> flush_to_ldisc tty = READ_ONCE(port->itty) tty is 0x6b6b6b6b6b6b6b6b !!PANIC!! access tty->ldisc Unable to handle kernel paging request at virtual address 6b6b6b6b6b6b6b93 pgd = ffffffc0eb1c3000 [6b6b6b6b6b6b6b93] *pgd=0000000000000000, *pud=0000000000000000 ------------[ cut here ]------------ Kernel BUG at ffffff800851154c [verbose debug info unavailable] Internal error: Oops - BUG: 96000004 [#1] PREEMPT SMP CPU: 3 PID: 265 Comm: kworker/u8:9 Tainted: G W 3.18.31-g0a58eeb #1 Hardware name: Qualcomm Technologies, Inc. MSM 8996pro v1.1 + PMI8996 Carbide (DT) Workqueue: events_unbound flush_to_ldisc task: ffffffc0ed610ec0 ti: ffffffc0ed624000 task.ti: ffffffc0ed624000 PC is at ldsem_down_read_trylock+0x0/0x4c LR is at tty_ldisc_ref+0x24/0x4c pc : [] lr : [] pstate: 80400145 sp : ffffffc0ed627cd0 x29: ffffffc0ed627cd0 x28: 0000000000000000 x27: ffffff8009e05000 x26: ffffffc0d382cfa0 x25: 0000000000000000 x24: ffffff800a012f08 x23: 0000000000000000 x22: ffffffc0703fbc88 x21: 6b6b6b6b6b6b6b6b x20: 6b6b6b6b6b6b6b93 x19: 0000000000000000 x18: 0000000000000001 x17: 00e80000f80d6f53 x16: 0000000000000001 x15: 0000007f7d826fff x14: 00000000000000a0 x13: 0000000000000000 x12: 0000000000000109 x11: 0000000000000000 x10: 0000000000000000 x9 : ffffffc0ed624000 x8 : ffffffc0ed611580 x7 : 0000000000000000 x6 : ffffff800a42e000 x5 : 00000000000003fc x4 : 0000000003bd1201 x3 : 0000000000000001 x2 : 0000000000000001 x1 : ffffff800851004c x0 : 6b6b6b6b6b6b6b93 Signed-off-by: Sahara Signed-off-by: Greg Kroah-Hartman Signed-off-by: Sasha Levin Signed-off-by: Greg Kroah-Hartman --- drivers/tty/tty_io.c | 2 ++ 1 file changed, 2 insertions(+) --- a/drivers/tty/tty_io.c +++ b/drivers/tty/tty_io.c @@ -1481,6 +1481,8 @@ static void release_tty(struct tty_struc if (tty->link) tty->link->port->itty = NULL; tty_buffer_cancel_work(tty->port); + if (tty->link) + tty_buffer_cancel_work(tty->link->port); tty_kref_put(tty->link); tty_kref_put(tty);