Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp5287358ybl; Tue, 14 Jan 2020 06:34:32 -0800 (PST) X-Google-Smtp-Source: APXvYqxggXzZRpia/DE4TAiGnbPMTNQ4Sa6/VhW+x6/ZV2R+XjnjbeZKVRUrs4uUv3IAKgbciPXr X-Received: by 2002:aca:d0c:: with SMTP id 12mr17226205oin.26.1579012472598; Tue, 14 Jan 2020 06:34:32 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1579012472; cv=none; d=google.com; s=arc-20160816; b=oGeGMDYyawp/0JJLCxkHUTzZ7KfziUJL+yG9mYaAVRJp6rs145Tp9AL4pMc7AKPUdR /6GEzGBaxqzj3maRI6CUzUn+ZMYbzPv1Bh4IEQy9ekso2wCIWQG7McMcR5r61fBO4yR5 cPWeWhETKmP6CbDex9YSAuH4nB3A4RwGRnWwW4ElMMwMMcoIJ1rRknGo030j8XHzIlso YnvdD0fOFAvvSAyaIZ7iigqmijTFVVDWw1QV3VMsJONB16EKRvqQTTW74aRouowT4OvH EuvKmD2sVWa1nkq8iZ5HBqSbsOv+BLOA2UCaWQrDZ2yISCtn2UotmnsUXxDSEeUKBMbq 5lYw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=vTPSCV5nsPH6nD0RLGqeEhYEWAv82ErxNsx+mCZbvEI=; b=r2mgR82Dvc2oLhloacaFlSXWnSkbO3qRQl69ONgn+hgKkUnpSlCmBbnkFnrT/41R0N n60l38J+EjyPz6cLEazWLTsRzmCbuCK0JhOBgYcgiL3DVqWLIry1RT/ggqEWskR+arph Jo8wiFOV0bVUi5ZIsPqwKVa21ESQbUNgSbqdXNnHCxtKZga8MDzVvo0UliTKqTF1KlYL QlhJyxu9aBVnGNZLxzD3bahkET8E5jRpeTADEWKn0AXSznXQ6mnoPPQ2ATX9PlFdGKVv Y8Ut5sTizL/WcIMPWq6WQYClI4h5bKRdDIVwFKwAST+6W3KhkvTCelS9ZmiN2TRmW+wp 0+gA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id q7si7804179otn.108.2020.01.14.06.34.20; Tue, 14 Jan 2020 06:34:32 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728932AbgANOdZ (ORCPT + 99 others); Tue, 14 Jan 2020 09:33:25 -0500 Received: from mx2.suse.de ([195.135.220.15]:49890 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725994AbgANOdZ (ORCPT ); Tue, 14 Jan 2020 09:33:25 -0500 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx2.suse.de (Postfix) with ESMTP id 1DC9CBAFA; Tue, 14 Jan 2020 14:33:22 +0000 (UTC) From: Richard Palethorpe To: linux-can@vger.kernel.org Cc: Richard Palethorpe , syzbot+017e491ae13c0068598a@syzkaller.appspotmail.com, Wolfgang Grandegger , Marc Kleine-Budde , "David S. Miller" , Tyler Hall , netdev@vger.kernel.org, linux-kernel@vger.kernel.org, syzkaller@googlegroups.com Subject: [PATCH] can, slip: Protect tty->disc_data access with RCU Date: Tue, 14 Jan 2020 15:32:44 +0100 Message-Id: <20200114143244.20739-1-rpalethorpe@suse.com> X-Mailer: git-send-email 2.24.0 In-Reply-To: <0000000000002b81b70590a83ad7@google.com> References: <0000000000002b81b70590a83ad7@google.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org write_wakeup can happen in parallel with close where tty->disc_data is set to NULL. So we a) need to check if tty->disc_data is NULL and b) ensure it is an atomic operation. Otherwise accessing tty->disc_data could result in a NULL pointer deref or access to some random location. This problem was found by Syzkaller on slcan, but the same issue appears to exist in slip where slcan was copied from. A fix which didn't use RCU was posted by Hillf Danton. Fixes: 661f7fda21b1 ("slip: Fix deadlock in write_wakeup") Fixes: a8e83b17536a ("slcan: Port write_wakeup deadlock fix from slip") Reported-by: syzbot+017e491ae13c0068598a@syzkaller.appspotmail.com Signed-off-by: Richard Palethorpe Cc: Wolfgang Grandegger Cc: Marc Kleine-Budde Cc: "David S. Miller" Cc: Tyler Hall Cc: netdev@vger.kernel.org Cc: linux-kernel@vger.kernel.org Cc: syzkaller@googlegroups.com --- Note, that mabye RCU should also applied to receive_buf as that also happens in interrupt context. So if the pointer assignment is split by the compiler then sl may point somewhere unexpected? drivers/net/can/slcan.c | 11 +++++++++-- drivers/net/slip/slip.c | 11 +++++++++-- 2 files changed, 18 insertions(+), 4 deletions(-) diff --git a/drivers/net/can/slcan.c b/drivers/net/can/slcan.c index 2e57122f02fb..ee029aae69d4 100644 --- a/drivers/net/can/slcan.c +++ b/drivers/net/can/slcan.c @@ -344,7 +344,14 @@ static void slcan_transmit(struct work_struct *work) */ static void slcan_write_wakeup(struct tty_struct *tty) { - struct slcan *sl = tty->disc_data; + struct slcan *sl; + + rcu_read_lock(); + sl = rcu_dereference(tty->disc_data); + rcu_read_unlock(); + + if (!sl) + return; schedule_work(&sl->tx_work); } @@ -644,7 +651,7 @@ static void slcan_close(struct tty_struct *tty) return; spin_lock_bh(&sl->lock); - tty->disc_data = NULL; + rcu_assign_pointer(tty->disc_data, NULL); sl->tty = NULL; spin_unlock_bh(&sl->lock); diff --git a/drivers/net/slip/slip.c b/drivers/net/slip/slip.c index 2a91c192659f..dfed9f0b8646 100644 --- a/drivers/net/slip/slip.c +++ b/drivers/net/slip/slip.c @@ -452,7 +452,14 @@ static void slip_transmit(struct work_struct *work) */ static void slip_write_wakeup(struct tty_struct *tty) { - struct slip *sl = tty->disc_data; + struct slip *sl; + + rcu_read_lock(); + sl = rcu_dereference(tty->disc_data); + rcu_read_unlock(); + + if (!sl) + return; schedule_work(&sl->tx_work); } @@ -882,7 +889,7 @@ static void slip_close(struct tty_struct *tty) return; spin_lock_bh(&sl->lock); - tty->disc_data = NULL; + rcu_assign_pointer(tty->disc_data, NULL); sl->tty = NULL; spin_unlock_bh(&sl->lock); -- 2.24.0