Received: by 2002:a25:86ce:0:0:0:0:0 with SMTP id y14csp1615990ybm; Thu, 23 May 2019 04:10:47 -0700 (PDT) X-Google-Smtp-Source: APXvYqzOGNxCcvh9jDtaj2+5xtzcl83EiPkY/bGTo90WuWimYPJ23e3kmiPmELW+6u0/YQX2i9eu X-Received: by 2002:a63:9d8d:: with SMTP id i135mr96632669pgd.245.1558609847785; Thu, 23 May 2019 04:10:47 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1558609847; cv=none; d=google.com; s=arc-20160816; b=qeameAYT8PhTX0naKl63XwBDr/6jL5qM8E5W2LGBucw5HRTEIbPMFwst2vr9I3VqAS pzBHyr5RnEUcucgx6hZyLVvJJLFyQJmkUGsaNY41mrwlhqI0Dp5y6MfHvlVPXltjJmli d29VAMO9fdykXs8JHk9tiRgp9fZuA5x17GcucYX2RhdEX94xUvVYvDlj5GOCkxRl0R8J A0oL9ok14N1g7BNGMQl6qjbbWn7Rj8/T2ELFcoK5dXiX501mvrKmy33Li7zA3SsctJkT +ujhMv/DLCsB6T3lhtrl1Zl/zPUPOvMXY3NCX3Y3wLzWaehtq1VaHO0+00WYpqaEUmne bf0g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=To0ram9JkhunwyTbLTM3eVLb4XPoEx4YKJaDtdArM3M=; b=tLqCKuYw7CE2bXLHU8fuXoXI4WGlSH7u1Wlj5E7CbVjoBw6Uh3sPE7iGrro2EGhcrI 0Z/Yl14M9rm5DK4us++2mQ8Zm15GJaR9wbLPbZ02Ofg+BS9LwgSx87Y0BKEEJ0hT60yz hz1pZHcj7BD3pA6/DxrRI7pDLpRvTmo+uXBk/Wx8qAl3FdMs4mWF+3OolPICQQjzZ4r2 kpkUPqS+61QhaCPOx2pRVgQKJfvGcl2NpoeL1EMgHX/Ecytrt4QNSork6hLOKnyz1CoW RnLHB8XVYA6hlpXUPgx2rHeEeRPpt58rkiZwO09JhKp9G7ca4efMAYgVVeivmPbSycsp H8sA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d24si29606119pgm.405.2019.05.23.04.10.30; Thu, 23 May 2019 04:10:47 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729762AbfEWLJO (ORCPT + 99 others); Thu, 23 May 2019 07:09:14 -0400 Received: from mx1.redhat.com ([209.132.183.28]:47758 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726429AbfEWLJO (ORCPT ); Thu, 23 May 2019 07:09:14 -0400 Received: from smtp.corp.redhat.com (int-mx03.intmail.prod.int.phx2.redhat.com [10.5.11.13]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 856CF3082B4B; Thu, 23 May 2019 11:09:09 +0000 (UTC) Received: from dhcp40-158.desklab.eng.bos.redhat.com (unknown [10.19.40.160]) by smtp.corp.redhat.com (Postfix) with ESMTP id B0A5060A9A; Thu, 23 May 2019 11:09:07 +0000 (UTC) From: tcamuso To: dri-devel@lists.freedesktop.org, linux-kernel@vger.kernel.org Cc: airlied@linux.ie, daniel@ffwll.ch, tcamuso@redhat.com, dkwon@redhat.com Subject: [PATCH] drm: assure aux_dev is nonzero before using it Date: Thu, 23 May 2019 07:09:05 -0400 Message-Id: <20190523110905.22445-1-tcamuso@redhat.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Scanned-By: MIMEDefang 2.79 on 10.5.11.13 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.45]); Thu, 23 May 2019 11:09:14 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From Daniel Kwon The system was crashed due to invalid memory access while trying to access auxiliary device. crash> bt PID: 9863 TASK: ffff89d1bdf11040 CPU: 1 COMMAND: "ipmitool" #0 [ffff89cedd7f3868] machine_kexec at ffffffffb0663674 #1 [ffff89cedd7f38c8] __crash_kexec at ffffffffb071cf62 #2 [ffff89cedd7f3998] crash_kexec at ffffffffb071d050 #3 [ffff89cedd7f39b0] oops_end at ffffffffb0d6d758 #4 [ffff89cedd7f39d8] no_context at ffffffffb0d5bcde #5 [ffff89cedd7f3a28] __bad_area_nosemaphore at ffffffffb0d5bd75 #6 [ffff89cedd7f3a78] bad_area at ffffffffb0d5c085 #7 [ffff89cedd7f3aa0] __do_page_fault at ffffffffb0d7080c #8 [ffff89cedd7f3b10] do_page_fault at ffffffffb0d70905 #9 [ffff89cedd7f3b40] page_fault at ffffffffb0d6c758 [exception RIP: drm_dp_aux_dev_get_by_minor+0x3d] RIP: ffffffffc0a589bd RSP: ffff89cedd7f3bf0 RFLAGS: 00010246 RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffff89cedd7f3fd8 RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffffffc0a613e0 RBP: ffff89cedd7f3bf8 R8: ffff89f1bcbabbd0 R9: 0000000000000000 R10: ffff89f1be7a1cc0 R11: 0000000000000000 R12: 0000000000000000 R13: ffff89f1b32a2830 R14: ffff89d18fadfa00 R15: 0000000000000000 ORIG_RAX: ffffffffffffffff CS: 0010 SS: 0018 RIP: 00002b45f0d80d30 RSP: 00007ffc416066a0 RFLAGS: 00010246 RAX: 0000000000000002 RBX: 000056062e212d80 RCX: 00007ffc41606810 RDX: 0000000000000000 RSI: 0000000000000002 RDI: 00007ffc41606ec0 RBP: 0000000000000000 R8: 000056062dfed229 R9: 00002b45f0cdf14d R10: 0000000000000002 R11: 0000000000000246 R12: 00007ffc41606ec0 R13: 00007ffc41606ed0 R14: 00007ffc41606ee0 R15: 0000000000000000 ORIG_RAX: 0000000000000002 CS: 0033 SS: 002b ---------------------------------------------------------------------------- It was trying to open '/dev/ipmi0', but as no entry in aux_dir, it returned NULL from 'idr_find()'. This drm_dp_aux_dev_get_by_minor() should have done a check on this, but had failed to do it. ---------------------------------------------------------------------------- /usr/src/debug/kernel-3.10.0-957.12.1.el7/linux-3.10.0-957.12.1.el7.x86_64/include/linux/idr.h: 114 114 struct idr_layer *hint = rcu_dereference_raw(idr->hint); 0xffffffffc0a58998 : mov 0x8a41(%rip),%rax # 0xffffffffc0a613e0 /usr/src/debug/kernel-3.10.0-957.12.1.el7/linux-3.10.0-957.12.1.el7.x86_64/include/linux/idr.h: 116 116 if (hint && (id & ~IDR_MASK) == hint->prefix) 117 return rcu_dereference_raw(hint->ary[id & IDR_MASK]); 0xffffffffc0a5899f : test %rax,%rax 0xffffffffc0a589a2 : je 0xffffffffc0a589ac 0xffffffffc0a589a4 : mov %ebx,%edx 0xffffffffc0a589a6 : xor %dl,%dl 0xffffffffc0a589a8 : cmp (%rax),%edx 0xffffffffc0a589aa : je 0xffffffffc0a589f0 /usr/src/debug/kernel-3.10.0-957.12.1.el7/linux-3.10.0-957.12.1.el7.x86_64/include/linux/idr.h: 119 119 return idr_find_slowpath(idr, id); 0xffffffffc0a589ac : mov %ebx,%esi 0xffffffffc0a589ae : mov $0xffffffffc0a613e0,%rdi 0xffffffffc0a589b5 : callq 0xffffffffb09771b0 0xffffffffc0a589ba : mov %rax,%rbx /usr/src/debug/kernel-3.10.0-957.12.1.el7/linux-3.10.0-957.12.1.el7.x86_64/arch/x86/include/asm/atomic.h: 25 25 return ACCESS_ONCE((v)->counter); 0xffffffffc0a589bd : mov 0x18(%rbx),%edx crash> struct file.f_path 0xffff89d18fadfa00 f_path = { mnt = 0xffff89f23feaa620, dentry = 0xffff89f1be7a1cc0 } crash> files -d 0xffff89f1be7a1cc0 DENTRY INODE SUPERBLK TYPE PATH ffff89f1be7a1cc0 ffff89f1b32a2830 ffff89d293aa8800 CHR /dev/ipmi0 crash> struct inode.i_rdev ffff89f1b32a2830 i_rdev = 0xf200000 crash> eval (0xfffff & 0xf200000) hexadecimal: 0 decimal: 0 octal: 0 binary: 0000000000000000000000000000000000000000000000000000000000000000 ---------------------------------------------------------------------------- As the index value was 0 and aux_idr had value 0 for all, it can have value NULL from idr_find() function, but the below function doesn't check and just tries to use it. ---------------------------------------------------------------------------- crash> aux_idr aux_idr = $8 = { hint = 0x0, top = 0x0, id_free = 0x0, layers = 0x0, id_free_cnt = 0x0, cur = 0x0, lock = { { rlock = { raw_lock = { val = { counter = 0x0 } } } } } } crash> edis -f drm_dp_aux_dev_get_by_minor /usr/src/debug/kernel-3.10.0-957.12.1.el7/linux-3.10.0-957.12.1.el7.x86_64/drivers/gpu/drm/drm_dp_aux_dev.c: 57 56 static struct drm_dp_aux_dev *drm_dp_aux_dev_get_by_minor(unsigned index) 57 { 58 struct drm_dp_aux_dev *aux_dev = NULL; 59 60 mutex_lock(&aux_idr_mutex); 61 aux_dev = idr_find(&aux_idr, index); 62 if (!kref_get_unless_zero(&aux_dev->refcount)) 63 aux_dev = NULL; 64 mutex_unlock(&aux_idr_mutex); 65 66 return aux_dev; 67 } ---------------------------------------------------------------------------- To avoid this kinds of situation, we should make a safeguard for the returned value. Changing the line 62 with the below would do. 62 if (aux_dev && !kref_get_unless_zero(&aux_dev->refcount)) ^^^^^^^^^^ From Tony Camuso I built a patched kernel for several architectures. Booted the kernel, and ran the following for 100 iterations. rmmod ipmi kmods to remove /dev/ipmi0. Invoked ipmitool insmod ipmi kmods Did not see any crashes or call traces. Suggested-by: Daniel Kwon Signed-off-by: Tony Camuso --- drivers/gpu/drm/drm_dp_aux_dev.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/gpu/drm/drm_dp_aux_dev.c b/drivers/gpu/drm/drm_dp_aux_dev.c index 0e4f25d63fd2d..0b11210c882ee 100644 --- a/drivers/gpu/drm/drm_dp_aux_dev.c +++ b/drivers/gpu/drm/drm_dp_aux_dev.c @@ -60,7 +60,7 @@ static struct drm_dp_aux_dev *drm_dp_aux_dev_get_by_minor(unsigned index) mutex_lock(&aux_idr_mutex); aux_dev = idr_find(&aux_idr, index); - if (!kref_get_unless_zero(&aux_dev->refcount)) + if (aux_dev && !kref_get_unless_zero(&aux_dev->refcount)) aux_dev = NULL; mutex_unlock(&aux_idr_mutex); -- 2.20.1