Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp861253yba; Wed, 24 Apr 2019 10:47:24 -0700 (PDT) X-Google-Smtp-Source: APXvYqwgxO7PeoHMTfYNrb7GQxyYyjK6P36qOJg2yZkhCFSSQyFOKurbnoksqdNDCMUOEUrAhrEI X-Received: by 2002:a17:902:f215:: with SMTP id gn21mr23386754plb.146.1556128044427; Wed, 24 Apr 2019 10:47:24 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1556128044; cv=none; d=google.com; s=arc-20160816; b=gqGnGKBrAK3ZFlKYGMFo8mJg/raNUZ3nV2fg5sUBDa+o5S1S3BWLje2S0WQpPOIM2w hbgMuCp0Coe1ZsrvjO7asfUYytHHvQeWZNaGajAYcWvDjr8QJMVE004+kTmlJsxF55ST SNWraPSS7rF0tKzY/tBHqUvafrCuuVL/BAM0zSwFuggTV6WE2DZpzW7GMNAYzB6UGiYW gPf/03jEn7JkDczqpopWDS2pGm7jtC2nK/gpeTAm/azRPMA4xDcV1Ve8s+jv14By96fv aUiu6Nr+fXv0fNbaH4ZNiopNOFxbqfwCkxyhSous6VBNPN0GkKdIlJoqyDfKzKdHOXob NAzA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=BUWa6c0WgSK+cBsq0fz9q3fCtfCZRmhCZREWp0t4pFA=; b=Ohm5ULlbQo27CERntecwxa2gK4GayjkM0oiCrSUDa7BHYHF38EbqEleHqiaDp86fN5 o/ByJCRd+p6rPsLw2lPjCBSAe3CHf2KDdE/Rs0uOtFq9zuhzU8E0VtAU6ZkRtfST0nT4 BuU3VtBG/Kp1M/dHHjqYo1bmGi+Y59peoAe1EkiL5DJp5J6Z/AAGkAUy81qt7q4shr/c rIhA4MzPjvBRhosii2w4yDA5QEtv3ZgtKL2JuDB6kLYrHhy+2mJ6iuI2Ao3gtXJW5vc0 Q8JomCMicCE3vQ5W3IFfa9cmxx/GB6pkJICIIQp3EJAoxpBCqZ7zvrfF/RF36R3pCTWl bdhA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=C5JZptDh; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id k9si19779013pfb.251.2019.04.24.10.47.09; Wed, 24 Apr 2019 10:47:24 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=C5JZptDh; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2392050AbfDXRpk (ORCPT + 99 others); Wed, 24 Apr 2019 13:45:40 -0400 Received: from mail.kernel.org ([198.145.29.99]:60202 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2390294AbfDXRdR (ORCPT ); Wed, 24 Apr 2019 13:33:17 -0400 Received: from localhost (62-193-50-229.as16211.net [62.193.50.229]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 5A69B2077C; Wed, 24 Apr 2019 17:33:15 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1556127195; bh=CRdJ3pd3VirtgKj+DY5akZXhB2PtyGjOh3T0rDq6gP4=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=C5JZptDhunGbdMkZaNY4qBmVsbzK4YUuG37itFgw+ZBoaUzHJL9ZQ+DnfRVy87l84 YGKg2j+YmS8+x33R+wfKmig3vRvqfHzGJjNtKlamPhQcukD14RzgKhFsHDzXDBMFf3 x/pyA9LZDZJ2Zr/NbVm4mA6n4IP9BGGeFRZLmCPY= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, syzbot+48df349490c36f9f54ab@syzkaller.appspotmail.com, Takashi Iwai Subject: [PATCH 4.19 53/96] ALSA: core: Fix card races between register and disconnect Date: Wed, 24 Apr 2019 19:09:58 +0200 Message-Id: <20190424170923.375236980@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190424170919.829037226@linuxfoundation.org> References: <20190424170919.829037226@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Takashi Iwai commit 2a3f7221acddfe1caa9ff09b3a8158c39b2fdeac upstream. There is a small race window in the card disconnection code that allows the registration of another card with the very same card id. This leads to a warning in procfs creation as caught by syzkaller. The problem is that we delete snd_cards and snd_cards_lock entries at the very beginning of the disconnection procedure. This makes the slot available to be assigned for another card object while the disconnection procedure is being processed. Then it becomes possible to issue a procfs registration with the existing file name although we check the conflict beforehand. The fix is simply to move the snd_cards and snd_cards_lock clearances at the end of the disconnection procedure. The references to these entries are merely either from the global proc files like /proc/asound/cards or from the card registration / disconnection, so it should be fine to shift at the very end. Reported-by: syzbot+48df349490c36f9f54ab@syzkaller.appspotmail.com Cc: Signed-off-by: Takashi Iwai Signed-off-by: Greg Kroah-Hartman --- sound/core/init.c | 18 +++++++++--------- 1 file changed, 9 insertions(+), 9 deletions(-) --- a/sound/core/init.c +++ b/sound/core/init.c @@ -407,14 +407,7 @@ int snd_card_disconnect(struct snd_card card->shutdown = 1; spin_unlock(&card->files_lock); - /* phase 1: disable fops (user space) operations for ALSA API */ - mutex_lock(&snd_card_mutex); - snd_cards[card->number] = NULL; - clear_bit(card->number, snd_cards_lock); - mutex_unlock(&snd_card_mutex); - - /* phase 2: replace file->f_op with special dummy operations */ - + /* replace file->f_op with special dummy operations */ spin_lock(&card->files_lock); list_for_each_entry(mfile, &card->files_list, list) { /* it's critical part, use endless loop */ @@ -430,7 +423,7 @@ int snd_card_disconnect(struct snd_card } spin_unlock(&card->files_lock); - /* phase 3: notify all connected devices about disconnection */ + /* notify all connected devices about disconnection */ /* at this point, they cannot respond to any calls except release() */ #if IS_ENABLED(CONFIG_SND_MIXER_OSS) @@ -446,6 +439,13 @@ int snd_card_disconnect(struct snd_card device_del(&card->card_dev); card->registered = false; } + + /* disable fops (user space) operations for ALSA API */ + mutex_lock(&snd_card_mutex); + snd_cards[card->number] = NULL; + clear_bit(card->number, snd_cards_lock); + mutex_unlock(&snd_card_mutex); + #ifdef CONFIG_PM wake_up(&card->power_sleep); #endif