Received: by 2002:a25:ad19:0:0:0:0:0 with SMTP id y25csp10939379ybi; Thu, 25 Jul 2019 07:21:30 -0700 (PDT) X-Google-Smtp-Source: APXvYqy/QUsyRqHGmwfuXe3JSI39REYzFqYPHuqVxx5hmfiVG60W/WSrdvEIXmjSgDJmQrnzSRrO X-Received: by 2002:a65:6691:: with SMTP id b17mr71232736pgw.217.1564064489823; Thu, 25 Jul 2019 07:21:29 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1564064489; cv=none; d=google.com; s=arc-20160816; b=hoYZgSZd2//LSxgZKgHMQ65NkKg8DNprV4DWtnYPIaBpzJcAVwyTrE3myup5DBpnnU pStsKxbXjvzl0wRZn/tCnbvbXWd/8XZIYlUliXytNipsERLSsZNTcLHVm5HTzDcz7407 yC4YkU57Ryq9PrxZnyJvOyZVnXhjukDEV9lJdZcBY3FncF4m8dLL7irSbaurwZKPea0U q9qZV7HCqZ79FJQUI3hc635ZMVARe0toqbRNZPWg334iFvHiLM92B4OcEKCj3r9Kz9WB O0KbxldQFSK6q8QVXQIBDvpDS/8SyePTSUWSK23Ht1MOEaP0j+1YBOoPvXJO6Y9EHAPY pf5Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=10NbAq3ew2g0u7Wq8NpQ4FiaGRKnRywYXu5HbzQlHK4=; b=mJ4vENCtAafrpLZoiTp91VN1ZULGriLsza9EDS1HBJBeAl+I6y8QvTuxgcPN5dDQSk yRKZ1bOHhlFwXQSi8Z2sGXHlcPD7jPTuenjiSE9vO0E+YXrxFMvTVzm+If7BpGSubR9F siygNAguw0wVYmmSwHlBe3FhFq+yYtnwUk/MY0h1fcVt2RAW+7nKbvI1KEV69xw5lUW9 /+ZmpkIuYEUnrIsrW2yz1aM1WTBV1Eg/GNbHSpoLJtJz+sNga1XFly9E1f16XSnvjz9j cFS1E8aXUfydkySuNyNfeOmYWmBzW+ik3JIGZl/mOuoCIOXVV0VGIGjzVMH0Skq6sL9a A2Ug== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=TvLTWijU; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id t9si16820514pjw.22.2019.07.25.07.21.14; Thu, 25 Jul 2019 07:21:29 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=TvLTWijU; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2389971AbfGYNk4 (ORCPT + 99 others); Thu, 25 Jul 2019 09:40:56 -0400 Received: from mail.kernel.org ([198.145.29.99]:48022 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2389517AbfGYNkz (ORCPT ); Thu, 25 Jul 2019 09:40:55 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 806F82238C; Thu, 25 Jul 2019 13:40:53 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1564062054; bh=v5sWoulUvldzGiOsgbKp2r7jvhpx6oFDCJA2OLMs4IM=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=TvLTWijUsYQ1xdi3ZbGLwUrE/VvSsaw4K0A+PFuqh+X97/y6Dojp2zSb23vfUZ35x WqibDTfHCvV5Mj66q1WEtxzP2e4zsuVVw9kii87psB29jOaFjuG/aAPNULXNngD0dE RwObRl6rcM1XZrMi1f9mula1ztARi645EgrZs3lg= Date: Thu, 25 Jul 2019 15:40:51 +0200 From: Greg KH To: Prateek Sood Cc: Muchun Song , rafael@kernel.org, mojha@codeaurora.org, benh@kernel.crashing.org, gkohli@codeaurora.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH v6] driver core: Fix use-after-free and double free on glue directory Message-ID: <20190725134051.GC11115@kroah.com> References: <20190724160006.21013-1-smuchun@gmail.com> <8cf0bd10-5ae4-b1aa-abf3-c5d2a0f3a214@codeaurora.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <8cf0bd10-5ae4-b1aa-abf3-c5d2a0f3a214@codeaurora.org> User-Agent: Mutt/1.12.1 (2019-06-15) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Jul 25, 2019 at 11:52:24AM +0530, Prateek Sood wrote: > On 7/24/19 9:30 PM, Muchun Song wrote: > > There is a race condition between removing glue directory and adding a new > > device under the glue directory. It can be reproduced in following test: > > > > path 1: Add the child device under glue dir > > device_add() > > get_device_parent() > > mutex_lock(&gdp_mutex); > > .... > > /*find parent from glue_dirs.list*/ > > list_for_each_entry(k, &dev->class->p->glue_dirs.list, entry) > > if (k->parent == parent_kobj) { > > kobj = kobject_get(k); > > break; > > } > > .... > > mutex_unlock(&gdp_mutex); > > .... > > .... > > kobject_add() > > kobject_add_internal() > > create_dir() > > sysfs_create_dir_ns() > > if (kobj->parent) > > parent = kobj->parent->sd; > > .... > > kernfs_create_dir_ns(parent) > > kernfs_new_node() > > kernfs_get(parent) > > .... > > /* link in */ > > rc = kernfs_add_one(kn); > > if (!rc) > > return kn; > > > > kernfs_put(kn) > > .... > > repeat: > > kmem_cache_free(kn) > > kn = parent; > > > > if (kn) { > > if (atomic_dec_and_test(&kn->count)) > > goto repeat; > > } > > .... > > > > path2: Remove last child device under glue dir > > device_del() > > cleanup_glue_dir() > > mutex_lock(&gdp_mutex); > > if (!kobject_has_children(glue_dir)) > > kobject_del(glue_dir); > > kobject_put(glue_dir); > > mutex_unlock(&gdp_mutex); > > > > Before path2 remove last child device under glue dir, If path1 add a new > > device under glue dir, the glue_dir kobject reference count will be > > increase to 2 via kobject_get(k) in get_device_parent(). And path1 has > > been called kernfs_new_node(), but not call kernfs_get(parent). > > Meanwhile, path2 call kobject_del(glue_dir) beacause 0 is returned by > > kobject_has_children(). This result in glue_dir->sd is freed and it's > > reference count will be 0. Then path1 call kernfs_get(parent) will trigger > > a warning in kernfs_get()(WARN_ON(!atomic_read(&kn->count))) and increase > > it's reference count to 1. Because glue_dir->sd is freed by path2, the next > > call kernfs_add_one() by path1 will fail(This is also use-after-free) > > and call atomic_dec_and_test() to decrease reference count. Because the > > reference count is decremented to 0, it will also call kmem_cache_free() > > to free glue_dir->sd again. This will result in double free. > > > > In order to avoid this happening, we also should make sure that kernfs_node > > for glue_dir is released in path2 only when refcount for glue_dir kobj is > > 1 to fix this race. > > > > The following calltrace is captured in kernel 4.14 with the following patch > > applied: > > > > commit 726e41097920 ("drivers: core: Remove glue dirs from sysfs earlier") > > > > -------------------------------------------------------------------------- > > [ 3.633703] WARNING: CPU: 4 PID: 513 at .../fs/kernfs/dir.c:494 > > Here is WARN_ON(!atomic_read(&kn->count) in kernfs_get(). > > .... > > [ 3.633986] Call trace: > > [ 3.633991] kernfs_create_dir_ns+0xa8/0xb0 > > [ 3.633994] sysfs_create_dir_ns+0x54/0xe8 > > [ 3.634001] kobject_add_internal+0x22c/0x3f0 > > [ 3.634005] kobject_add+0xe4/0x118 > > [ 3.634011] device_add+0x200/0x870 > > [ 3.634017] _request_firmware+0x958/0xc38 > > [ 3.634020] request_firmware_into_buf+0x4c/0x70 > > .... > > [ 3.634064] kernel BUG at .../mm/slub.c:294! > > Here is BUG_ON(object == fp) in set_freepointer(). > > .... > > [ 3.634346] Call trace: > > [ 3.634351] kmem_cache_free+0x504/0x6b8 > > [ 3.634355] kernfs_put+0x14c/0x1d8 > > [ 3.634359] kernfs_create_dir_ns+0x88/0xb0 > > [ 3.634362] sysfs_create_dir_ns+0x54/0xe8 > > [ 3.634366] kobject_add_internal+0x22c/0x3f0 > > [ 3.634370] kobject_add+0xe4/0x118 > > [ 3.634374] device_add+0x200/0x870 > > [ 3.634378] _request_firmware+0x958/0xc38 > > [ 3.634381] request_firmware_into_buf+0x4c/0x70 > > -------------------------------------------------------------------------- > > > > Fixes: 726e41097920 ("drivers: core: Remove glue dirs from sysfs earlier") > > > > Signed-off-by: Muchun Song > > Reviewed-by: Mukesh Ojha > > --- > > > > Change in v6: > > 1. Remove hardcoding "1 " > > Change in v5: > > 1. Revert to the v1 fix. > > 2. Add some comment to explain why we need do this in > > cleanup_glue_dir(). > > Change in v4: > > 1. Add some kerneldoc comment. > > 2. Remove unlock_if_glue_dir(). > > 3. Rename get_device_parent_locked_if_glue_dir() to > > get_device_parent_locked. > > 4. Update commit message. > > Change in v3: > > Add change log. > > Change in v2: > > Fix device_move() also. > > > > drivers/base/core.c | 57 ++++++++++++++++++++++++++++++++++++++++++++- > > 1 file changed, 56 insertions(+), 1 deletion(-) > > > > diff --git a/drivers/base/core.c b/drivers/base/core.c > > index 4aeaa0c92bda..49bcb01e44cd 100644 > > --- a/drivers/base/core.c > > +++ b/drivers/base/core.c > > @@ -1820,12 +1820,67 @@ static inline struct kobject *get_glue_dir(struct device *dev) > > */ > > static void cleanup_glue_dir(struct device *dev, struct kobject *glue_dir) > > { > > + unsigned int ref; > > + > > /* see if we live in a "glue" directory */ > > if (!live_in_glue_dir(glue_dir, dev)) > > return; > > > > mutex_lock(&gdp_mutex); > > - if (!kobject_has_children(glue_dir)) > > + /** > > + * There is a race condition between removing glue directory > > + * and adding a new device under the glue directory. > > + * > > + * path 1: Add the child device under glue dir > > + * device_add() > > + * get_device_parent() > > + * mutex_lock(&gdp_mutex); > > + * .... > > + * list_for_each_entry(k, &dev->class->p->glue_dirs.list, > > + * entry) > > + * if (k->parent == parent_kobj) { > > + * kobj = kobject_get(k); > > + * break; > > + * } > > + * .... > > + * mutex_unlock(&gdp_mutex); > > + * .... > > + * .... > > + * kobject_add() > > + * kobject_add_internal() > > + * create_dir() > > + * .... > > + * if (kobj->parent) > > + * parent = kobj->parent->sd; > > + * .... > > + * kernfs_create_dir_ns(parent) > > + * .... > > + * > > + * path2: Remove last child device under glue dir > > + * device_del() > > + * cleanup_glue_dir() > > + * .... > > + * mutex_lock(&gdp_mutex); > > + * if (!kobject_has_children(glue_dir)) > > + * kobject_del(glue_dir); > > + * .... > > + * mutex_unlock(&gdp_mutex); > > + * > > + * Before path2 remove last child device under glue dir, if path1 add > > + * a new device under glue dir, the glue_dir kobject reference count > > + * will be increase to 2 via kobject_get(k) in get_device_parent(). > > + * And path1 has been called kernfs_create_dir_ns(). Meanwhile, > > + * path2 call kobject_del(glue_dir) beacause 0 is returned by > > + * kobject_has_children(). This result in glue_dir->sd is freed. > > + * Then the path1 will see a stale "empty" but still potentially used > > + * glue dir around. > > + * > > + * In order to avoid this happening, we also should make sure that > > + * kernfs_node for glue_dir is released in path2 only when refcount > > + * for glue_dir kobj is 1. > > + */ > > + ref = kref_read(&glue_dir->kref); > > + if (!kobject_has_children(glue_dir) && !--ref) > > kobject_del(glue_dir); > > kobject_put(glue_dir); > > mutex_unlock(&gdp_mutex); > > > > I would recommend to describe the issue as done in patch > https://lkml.org/lkml/2019/5/1/3 > > It helps in visualizing the race condition. I agree, that email shows how this can be made much more "obvious". Muchun, can you fix that up please? thanks, greg k-h