Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp23998yba; Wed, 17 Apr 2019 18:45:56 -0700 (PDT) X-Google-Smtp-Source: APXvYqw/t8YlcM4LUAgnlo99ZfOgkJHRs8dlnXmavT9YCYJY13KQFFWtoffdZXPu6yFRIeJsLcix X-Received: by 2002:a63:f707:: with SMTP id x7mr87086889pgh.343.1555551956687; Wed, 17 Apr 2019 18:45:56 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1555551956; cv=none; d=google.com; s=arc-20160816; b=qHyWBRr8Aj1ncR1wNl1mTj3RgBNp0vHDFB8uG8GMVmBoZHx6A/bTYso+DNhglQG+RZ YUiXhRg4aKX2Qcr5r8Gu+bl0/BedzgANjIjeZS7/wGJgIvesSM648LJWW+tpVkPY6A31 q4ZCY/BfGAGyrxX5uoX/2HjOCZw9reDZm00NP1IUzCAvhhBYasPPTy+FdkMJzorDe1rr 7Vd3hQfAu9rYQLR+GJfo33entnoZRP+aPy6ft9qLFyMo/AE+jswFkq0Lwfi60q8BGhuL Dwpn6bkVHAW4v1Fvd+/rbpgi/u7tUUSN+tpBK9BfaBpTTFy/Bqq85Pnm8fdF20yuvXOp zI5A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=MzjPpnoXEbsEM/B5pimFouu3ItZ7AAJKqejdoIFMMLI=; b=EZisprrva4eAc3mFoKDWNds32PMpdp2jmHWzIwPyV0jrB6dXC/L5wY2WBDGWbVSApb zidSviTkP7NUMQ7Gz1egNR5kX7+Wt6UUCE+tQVhyYKkxuZLdcWEumTPCUpslGFopFTxv mCBNtYnhCUyZBUkjmy3WyG/fzv7+wWv3HNeqjHQpZn3drodMBk5ebLXSJUugpnF+jDYN Lc8BdA3RgBKFZ2hc0DPDLGfg2E4XBQwKKbi/aWjnFV47aHJof4mWLkIZWfkQ6wk6Tnv8 z2Ang5AqKpOtpB0eo5Dm3GjO4/eonJ/iPS8jZixPYYQMuEvYebl7yZHjl1lKvXgTobbb zOrg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=MBO6Wp3o; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id q4si692071pll.127.2019.04.17.18.45.40; Wed, 17 Apr 2019 18:45:56 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=MBO6Wp3o; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2387443AbfDRBos (ORCPT + 99 others); Wed, 17 Apr 2019 21:44:48 -0400 Received: from mail-pg1-f195.google.com ([209.85.215.195]:38168 "EHLO mail-pg1-f195.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729331AbfDRBor (ORCPT ); Wed, 17 Apr 2019 21:44:47 -0400 Received: by mail-pg1-f195.google.com with SMTP id j26so393933pgl.5; Wed, 17 Apr 2019 18:44:47 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to:user-agent; bh=MzjPpnoXEbsEM/B5pimFouu3ItZ7AAJKqejdoIFMMLI=; b=MBO6Wp3oDEm+26DyRLbcD2J5evIuTXBdagfYhT4dukyZj7LKgu6r0nD1mP499TdcWR so78mannP5E4Ou3H6TRvL8u9i8RLGq3X8snZxWeRjaHG/N5G83c2ozhPgLelP3qJaJSh 9A7OXUvQFtoVcVt1Hv54waydQobr9r9ZoYqKHk8UW+N1I18s6SzJJItYMN0N87a51u4g 02oUdR2O1OOcP/9CsHfDOHWduO26tjHePxUG4wCIOPtgrDTJlHDne3qEIguOdHaGEZKl TrjJomGOJX/TRfqESYU5jdfFzu8DkpMP/Cx/PyCh4AaxP0QzeoA+EJZN7vXdOP0d74dP rwfQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to:user-agent; bh=MzjPpnoXEbsEM/B5pimFouu3ItZ7AAJKqejdoIFMMLI=; b=k70KyYjVOTVwG749jgMm8uFcjhg2j3j7SSrCdQSak3Lke5Z2VuXDBwnQ2TFOiQouHf rV6cxIcHWrV/Rwjvbu+8JZXbIhyXTT6LDwFIwEZdIzRzh5wyJ00ageRilGRRrjwydLIy RZ9dAqSRj8c00lIiG8EuLZ/CAmBRuvZYjpjGWDK8obohwEo/nypz3B6m8ThsF2FLbGHT /ojOyV57UGK5XLqrxhf/NmyXIWU9T6UcEHRhDVt9Aunc9avz7BTBQlTxauulrh4R1P6C /CGy4c4ZMpNdkWX7NSGzAdOYFOO+L1giz9UhyRpWxpQEB1SeypjDRbsKVZB/GLek909q l/VA== X-Gm-Message-State: APjAAAU3bObZus9d2WVmG7ebafZdwEFO7FetOGer3kTlM5DlI3YE9UlR weNH68SnWtvh1yxPEc63SO4= X-Received: by 2002:a63:1043:: with SMTP id 3mr85617214pgq.283.1555551886015; Wed, 17 Apr 2019 18:44:46 -0700 (PDT) Received: from localhost ([210.162.55.198]) by smtp.gmail.com with ESMTPSA id r76sm613616pfa.39.2019.04.17.18.44.44 (version=TLS1_2 cipher=ECDHE-RSA-CHACHA20-POLY1305 bits=256/256); Wed, 17 Apr 2019 18:44:44 -0700 (PDT) Date: Thu, 18 Apr 2019 01:43:21 +0000 From: "dmitry.torokhov@gmail.com" To: Mukesh Ojha Cc: linux-input@vger.kernel.org, linux-kernel@vger.kernel.org, Gaurav Kohli , Peter Hutterer , Martin Kepplinger , "Paul E. McKenney" Subject: Re: [PATCH v2] Input: uinput: Avoid Object-Already-Free with a global lock Message-ID: <20190418014321.dptin7tpxpldhsns@penguin> References: <1554883176-24318-1-git-send-email-mojha@codeaurora.org> <7299a6db-38b7-75c7-633a-00d2257eba45@codeaurora.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <7299a6db-38b7-75c7-633a-00d2257eba45@codeaurora.org> User-Agent: NeoMutt/20170113 (1.7.2) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Mukesh, On Mon, Apr 15, 2019 at 03:35:51PM +0530, Mukesh Ojha wrote: > > Hi Dmitry, > > Can you please have a look at this patch ? as this seems to reproducing > quite frequently > > Thanks, > Mukesh > > On 4/10/2019 1:29 PM, Mukesh Ojha wrote: > > uinput_destroy_device() gets called from two places. In one place, > > uinput_ioctl_handler() where it is protected under a lock > > udev->mutex but there is no protection on udev device from freeing > > inside uinput_release(). uinput_release() should be called when last file handle to the uinput instance is being dropped, so there should be no other users and thus we can't be racing with anyone. > > > > This can result in Object-Already-Free case where uinput parent > > device already got freed while a child being inserted inside it. > > That result in a double free case for parent while kernfs_put() > > being done for child in a failure path of adding a node. Can you please describe scenario in more detail? How do you free the parent device while child input device is being registered? Thanks. - Dmitry