Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp1175302imu; Thu, 22 Nov 2018 11:29:16 -0800 (PST) X-Google-Smtp-Source: AFSGD/WpR4FrmLSLwXbugPuvnXQkLC1D52amZOHuVJ5hIKjiQkiggpqB1hKef9uDa2SSwUSOzP6y X-Received: by 2002:a63:8e43:: with SMTP id k64mr11144172pge.346.1542914955936; Thu, 22 Nov 2018 11:29:15 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1542914955; cv=none; d=google.com; s=arc-20160816; b=xVm2pD8bI5Q8zlwHs/uY/5md+p4p9MP81ZF49Ang/FZS6rjAg3ucU+B7xwhJ04Or5v 1OLxcsc0koHLyTovwYtPVn7VmRsFxSVKKHqfv480ehOy7r3hxhgkevdQI15K/YZT5O5n hk5v1IVGrC0RQOtSdSZPr0kHFjG+sH1oubkw1VrgM4/YRZtEYm53DxKuFKCH8gH3Ih7j EdflvlpLNCsnZ1Zi9PIyrMxjuH9oRCgoyWnQ/l4d0rknF3z3/+b/o4nC7mcEgE37i1kd CQ7aLHAWj062KqoE6XnXqNPzhOqABfWp1Q/Whro3xDypkaPpanQjHADXxU4+q9+uQ2rV ZmlQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=j5eYpOii00Yp+lqkn7vDJSCZ8zL0+Wrn7/f4YZbRXUI=; b=CQHCPeEva74pgPMMWNWwQLVGYA+Ftt2jRTEMX3f0FBDe/GSb6vmwGM9brkqbqOOwDF 4AfAhY4Ze0Ewile4wpqMgO1c6ZJ3Yll46QIgbaEc1GtLnHxv0YYMtF3JXVi5UcwZYFAL tVHh0twByA8xdstA5aafZuN1qDLZxtntsgMbql6C3ywMrGrKrbEbO7gGg76lB2dx+/GM pDA7APtjGZMoExqMSmZsl1BHtD/48IK694ymEGzPiiVp/hFnfXPB1ZSb9VQjqKQsX3zt ZLQQdT9O3f0hO4Iy1lziLaKKrdx6ziZ3XVPH6Z6/I/Cbxb21gj1v0f2sCHhQncKIgOGz DFBQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=temperror (no key for signature) header.i=@correia.cc header.s=google header.b="NeXn/Fq+"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id v69si48547652pgd.284.2018.11.22.11.28.45; Thu, 22 Nov 2018 11:29:15 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=temperror (no key for signature) header.i=@correia.cc header.s=google header.b="NeXn/Fq+"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2389468AbeKVQLp (ORCPT + 99 others); Thu, 22 Nov 2018 11:11:45 -0500 Received: from mail-qk1-f193.google.com ([209.85.222.193]:39714 "EHLO mail-qk1-f193.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2389300AbeKVQLo (ORCPT ); Thu, 22 Nov 2018 11:11:44 -0500 Received: by mail-qk1-f193.google.com with SMTP id q70so6232499qkh.6 for ; Wed, 21 Nov 2018 21:33:57 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=correia.cc; s=google; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=j5eYpOii00Yp+lqkn7vDJSCZ8zL0+Wrn7/f4YZbRXUI=; b=NeXn/Fq+8yZxNdiRqZ/y1l0fxqFbg6fXN+f/vxX8HnG2BQsqCdH9OmA5R+2Oazvcmv DpdkyREoGgIH2Ys4kUFZTaiCIRDPrkCdfExvTbQ4Bom9F3iwaQBsogsqpW/wN4e0aCWO tHikhRXUkcNW2cQB2iVF742/wUFLWtjB3VZlk= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=j5eYpOii00Yp+lqkn7vDJSCZ8zL0+Wrn7/f4YZbRXUI=; b=C9N0Vbg1aYcNrWDHPUxNu2IFU2Uvp33RzbUhdKDNjSDw401Jas9mNyhtUnDbIn5d4R U9hPBaXSNY4DwzKKdTPpioVsnwpX8mwKaNCT9gR28YDY7LMgEchzsQ/4tliGQX5fKNqU +/BOtpBhKPCMnWJj3h5Bv0mrS9MwFB/I6/hG5Yhrp+7kzVNTd+bYqM6ZwCaXTaIFwSaj z3lPx91QWRVFzxbulIdgy4T04M3ebXma5+Br3RgIXxAvo2MuAmCZ+StvHkW+QDIgTXbH KAXY5p/aXSdd2TUgjaBwbCiVDhTQfgc5lDObMrAtGlG7/9B6l9WMcupY5539I9X54duZ JGaw== X-Gm-Message-State: AA+aEWbrTdPsufI9gWTb2GBW1KJttn39Az2rbWg6iVxyBtLre4TkYJij aMOvmTSQGp67llj7Kmt3/2Tvyg== X-Received: by 2002:ae9:eb96:: with SMTP id b144mr8267423qkg.127.1542864836472; Wed, 21 Nov 2018 21:33:56 -0800 (PST) Received: from localhost.localdomain ([177.19.68.176]) by smtp.googlemail.com with ESMTPSA id y14sm21600585qkb.2.2018.11.21.21.33.53 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Wed, 21 Nov 2018 21:33:55 -0800 (PST) From: Sergio Correia To: maarten.lankhorst@linux.intel.com Cc: maxime.ripard@bootlin.com, sean@poorly.run, airlied@linux.ie, dri-devel@lists.freedesktop.org, linux-kernel@vger.kernel.org, sergio@correia.cc, daniel@ffwll.ch Subject: [PATCH v2] drm: set is_master to 0 upon drm_new_set_master() failure Date: Thu, 22 Nov 2018 02:33:29 -0300 Message-Id: <20181122053329.2692-1-sergio@correia.cc> X-Mailer: git-send-email 2.19.1 In-Reply-To: <20181118235720.3150-1-sergio@correia.cc> References: <20181118235720.3150-1-sergio@correia.cc> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org When drm_new_set_master() fails, set is_master to 0, to prevent a possible NULL pointer deref. Here is a problematic flow: we check is_master in drm_is_current_master(), then proceed to call drm_lease_owner() passing master. If we do not restore is_master status when drm_new_set_master() fails, we may have a situation in which is_master will be 1 and master itself, NULL, leading to the deref of a NULL pointer in drm_lease_owner(). This fixes the following OOPS, observed on an ArchLinux running a 4.19.2 kernel: [ 97.804282] BUG: unable to handle kernel NULL pointer dereference at 0000000000000080 [ 97.807224] PGD 0 P4D 0 [ 97.807224] Oops: 0000 [#1] PREEMPT SMP NOPTI [ 97.807224] CPU: 0 PID: 1348 Comm: xfwm4 Tainted: P OE 4.19.2-arch1-1-ARCH #1 [ 97.807224] Hardware name: To Be Filled By O.E.M. To Be Filled By O.E.M./AB350 Pro4, BIOS P5.10 10/16/2018 [ 97.807224] RIP: 0010:drm_lease_owner+0xd/0x20 [drm] [ 97.807224] Code: 83 c4 18 5b 5d c3 b8 ea ff ff ff eb e2 b8 ed ff ff ff eb db e8 b4 ca 68 fb 0f 1f 40 00 0f 1f 44 00 00 48 89 f8 eb 03 48 89 d0 <48> 8b 90 80 00 00 00 48 85 d2 75 f1 c3 66 0f 1f 44 00 00 0f 1f 44 [ 97.807224] RSP: 0018:ffffb8cf08e07bb0 EFLAGS: 00010202 [ 97.807224] RAX: 0000000000000000 RBX: ffff9cf0f2586c00 RCX: ffff9cf0f2586c88 [ 97.807224] RDX: ffff9cf0ddbd8000 RSI: 0000000000000000 RDI: 0000000000000000 [ 97.807224] RBP: ffff9cf1040e9800 R08: 0000000000000000 R09: 0000000000000000 [ 97.807224] R10: ffffdeb30fd5d680 R11: ffffdeb30f5d6808 R12: ffff9cf1040e9888 [ 97.807224] R13: 0000000000000000 R14: dead000000000200 R15: ffff9cf0f2586cc8 [ 97.807224] FS: 00007f4145513180(0000) GS:ffff9cf10ea00000(0000) knlGS:0000000000000000 [ 97.807224] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 97.807224] CR2: 0000000000000080 CR3: 00000003d7548000 CR4: 00000000003406f0 [ 97.807224] Call Trace: [ 97.807224] drm_is_current_master+0x1a/0x30 [drm] [ 97.807224] drm_master_release+0x3e/0x130 [drm] [ 97.807224] drm_file_free.part.0+0x2be/0x2d0 [drm] [ 97.807224] drm_open+0x1ba/0x1e0 [drm] [ 97.807224] drm_stub_open+0xaf/0xe0 [drm] [ 97.807224] chrdev_open+0xa3/0x1b0 [ 97.807224] ? cdev_put.part.0+0x20/0x20 [ 97.807224] do_dentry_open+0x132/0x340 [ 97.807224] path_openat+0x2d1/0x14e0 [ 97.807224] ? mem_cgroup_commit_charge+0x7a/0x520 [ 97.807224] do_filp_open+0x93/0x100 [ 97.807224] ? __check_object_size+0x102/0x189 [ 97.807224] ? _raw_spin_unlock+0x16/0x30 [ 97.807224] do_sys_open+0x186/0x210 [ 97.807224] do_syscall_64+0x5b/0x170 [ 97.807224] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 97.807224] RIP: 0033:0x7f4147b07976 [ 97.807224] Code: 89 54 24 08 e8 7b f4 ff ff 8b 74 24 0c 48 8b 3c 24 41 89 c0 44 8b 54 24 08 b8 01 01 00 00 89 f2 48 89 fe bf 9c ff ff ff 0f 05 <48> 3d 00 f0 ff ff 77 30 44 89 c7 89 44 24 08 e8 a6 f4 ff ff 8b 44 [ 97.807224] RSP: 002b:00007ffcced96ca0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 97.807224] RAX: ffffffffffffffda RBX: 00005619d5037f80 RCX: 00007f4147b07976 [ 97.807224] RDX: 0000000000000002 RSI: 00005619d46b969c RDI: 00000000ffffff9c [ 98.040039] RBP: 0000000000000024 R08: 0000000000000000 R09: 0000000000000000 [ 98.040039] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000024 [ 98.040039] R13: 0000000000000012 R14: 00005619d5035950 R15: 0000000000000012 [ 98.040039] Modules linked in: nct6775 hwmon_vid algif_skcipher af_alg nls_iso8859_1 nls_cp437 vfat fat uvcvideo videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 videobuf2_common arc4 videodev media snd_usb_audio snd_hda_codec_hdmi snd_usbmidi_lib snd_rawmidi snd_seq_device mousedev input_leds iwlmvm mac80211 snd_hda_codec_realtek snd_hda_codec_generic snd_hda_intel snd_hda_codec edac_mce_amd kvm_amd snd_hda_core kvm iwlwifi snd_hwdep r8169 wmi_bmof cfg80211 snd_pcm irqbypass snd_timer snd libphy soundcore pinctrl_amd rfkill pcspkr sp5100_tco evdev gpio_amdpt k10temp mac_hid i2c_piix4 wmi pcc_cpufreq acpi_cpufreq vboxnetflt(OE) vboxnetadp(OE) vboxpci(OE) vboxdrv(OE) msr sg crypto_user ip_tables x_tables ext4 crc32c_generic crc16 mbcache jbd2 fscrypto uas usb_storage dm_crypt hid_generic usbhid hid [ 98.040039] dm_mod raid1 md_mod sd_mod crct10dif_pclmul crc32_pclmul crc32c_intel ghash_clmulni_intel pcbc ahci libahci aesni_intel aes_x86_64 libata crypto_simd cryptd glue_helper ccp xhci_pci rng_core scsi_mod xhci_hcd nvidia_drm(POE) drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops drm agpgart nvidia_uvm(POE) nvidia_modeset(POE) nvidia(POE) ipmi_devintf ipmi_msghandler [ 98.040039] CR2: 0000000000000080 [ 98.040039] ---[ end trace 3b65093b6fe62b2f ]--- [ 98.040039] RIP: 0010:drm_lease_owner+0xd/0x20 [drm] [ 98.040039] Code: 83 c4 18 5b 5d c3 b8 ea ff ff ff eb e2 b8 ed ff ff ff eb db e8 b4 ca 68 fb 0f 1f 40 00 0f 1f 44 00 00 48 89 f8 eb 03 48 89 d0 <48> 8b 90 80 00 00 00 48 85 d2 75 f1 c3 66 0f 1f 44 00 00 0f 1f 44 [ 98.040039] RSP: 0018:ffffb8cf08e07bb0 EFLAGS: 00010202 [ 98.040039] RAX: 0000000000000000 RBX: ffff9cf0f2586c00 RCX: ffff9cf0f2586c88 [ 98.040039] RDX: ffff9cf0ddbd8000 RSI: 0000000000000000 RDI: 0000000000000000 [ 98.040039] RBP: ffff9cf1040e9800 R08: 0000000000000000 R09: 0000000000000000 [ 98.040039] R10: ffffdeb30fd5d680 R11: ffffdeb30f5d6808 R12: ffff9cf1040e9888 [ 98.040039] R13: 0000000000000000 R14: dead000000000200 R15: ffff9cf0f2586cc8 [ 98.040039] FS: 00007f4145513180(0000) GS:ffff9cf10ea00000(0000) knlGS:0000000000000000 [ 98.040039] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 98.040039] CR2: 0000000000000080 CR3: 00000003d7548000 CR4: 00000000003406f0 Signed-off-by: Sergio Correia --- v1 -> v2: 1) former title: drm: restore is_master upon failure in drm_new_set_master() 2) add WARN_ON at the beginning of drm_new_set_master() 3) set is_master unconditionally to 0, upon failure in drm_new_set_master() drivers/gpu/drm/drm_auth.c | 2 ++ 1 file changed, 2 insertions(+) diff --git a/drivers/gpu/drm/drm_auth.c b/drivers/gpu/drm/drm_auth.c index d9c0f7573905..1669c42c40ed 100644 --- a/drivers/gpu/drm/drm_auth.c +++ b/drivers/gpu/drm/drm_auth.c @@ -142,6 +142,7 @@ static int drm_new_set_master(struct drm_device *dev, struct drm_file *fpriv) lockdep_assert_held_once(&dev->master_mutex); + WARN_ON(fpriv->is_master); old_master = fpriv->master; fpriv->master = drm_master_create(dev); if (!fpriv->master) { @@ -170,6 +171,7 @@ static int drm_new_set_master(struct drm_device *dev, struct drm_file *fpriv) /* drop references and restore old master on failure */ drm_master_put(&fpriv->master); fpriv->master = old_master; + fpriv->is_master = 0; return ret; } -- 2.19.1