Received: by 2002:a25:1506:0:0:0:0:0 with SMTP id 6csp1288994ybv; Thu, 20 Feb 2020 17:11:14 -0800 (PST) X-Google-Smtp-Source: APXvYqwacObmEWebxFh/ksJHYPiMZEuN3si6g6wTDVT/Vbtb3i5uQwbuQYuJDAP75y7lQs0dGloa X-Received: by 2002:aca:2813:: with SMTP id 19mr45446oix.76.1582247474368; Thu, 20 Feb 2020 17:11:14 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1582247474; cv=none; d=google.com; s=arc-20160816; b=EFB/Ik9Ul+e3sB9SkeoSoPIDtU6gHS5wqAy5+k/HzGBH+VhqAZ4N7QMrKceDlGUJjw HQwdhcpxfnO7sFM+08rYVLRr8kUPcFDEvHGuqSHmkGmwnh9aX8t4CmqzAMrfifSTvOR8 6I2fIz9wf/ge58EZgyH4CYeiJPTCsGVIg/wr7QkK3Gz+cPE6ztVzGXhf0NHRE0PmZrOP VI4uSO4PNWloV0SPzPPiyPboSXxoob7roM+Dm7CXYNG69lHgnzTa8Z4aKwWhXbCMUrIG FtU6aX18GC4rsVbcZ7hnnC7JH/we4NKCXdBB/gW7xpRPfzZVioXX/9FSyXNPndOVr1/q kIvw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=FMbaRhE8Xlg+e8gfJFL0zQMEcgClDiX27cTjJlb40Bc=; b=Gg5nXIEWjdrKp7bYHABKaZP5ElH8LeNduDjICwIPAhg2DWfo1dGHq4gVeMjJbShoka TDujb+sIajQ4t/AlDHNJ/A4X3s4ysRJ53y7dAeDEEz4MOZKAYLfvHif23IjkhlEkqgdP Zw+ozW9sLxOJrfk5cqoqg0W9ruxtmg2iEB3lwQXJWT4h9jkfYwUx+Z+Flw9PT7gMXMqk laGjanEmz+voq1qnqIfpFRdhKtU3EwlFn2+WYGl2/774HG2gfVevdp5SYF1k6Lr71Y2e 373KlCERsTRDzqiBiI3BmfHIAtZADAGp8qjDLQV2spIWFr4pcLYN6u5Q6bntdoqY7+fp D7Cw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=YSkqVb73; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id h203si11500oif.3.2020.02.20.17.10.46; Thu, 20 Feb 2020 17:11:14 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=YSkqVb73; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729484AbgBUBGA (ORCPT + 99 others); Thu, 20 Feb 2020 20:06:00 -0500 Received: from mail-lj1-f196.google.com ([209.85.208.196]:34781 "EHLO mail-lj1-f196.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729439AbgBUBGA (ORCPT ); Thu, 20 Feb 2020 20:06:00 -0500 Received: by mail-lj1-f196.google.com with SMTP id x7so451575ljc.1 for ; Thu, 20 Feb 2020 17:05:58 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=chromium.org; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=FMbaRhE8Xlg+e8gfJFL0zQMEcgClDiX27cTjJlb40Bc=; b=YSkqVb73r5DSVqQkay/Ui5BWA0DyeR/AuYz0xcCx9V88M+7gS80kZ1UCA2rTjEylfE iBFCpuLDoiJCoqCTbAbVyRibf9vYvC/5h1aifNOiOq2CA/wu+sHybJA5FDBgJjsNQ2jA g0IcuArCwGqX+OTG4kKIV/CazBMvVN9wGuVl4= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=FMbaRhE8Xlg+e8gfJFL0zQMEcgClDiX27cTjJlb40Bc=; b=ashDk6Cg6kei/BeNuC+wtMc6aDHoE5SdQX/WGbMEN0A7cNL8sWRMOiiJLVxQpH3fnO zAS9EZMnrXHGgDHtCDg+3/KOox9qbqcUWPPKe0Y92XMG7jI9r5vSbS0eHVMsAzkDi5mG o6xz99P7GrJ3E35cfn31uE3DHri+dm6Q6OKThYxQF/ieoxsuBkyVb3X1jRMdeFXfHLv0 IbrYN+u6C/JzkG155SKe2e1NvjbqCikVcVhiQhmhzrDuFtwMyy7gMCUyYm97Lr4IRlEE ztCo4p57Y1OglqZDMEBEFnBHJ/BSuVWNacq7Aeo8TuxG+lUqWO8LKAhr0I7NZTMbOomo o8mg== X-Gm-Message-State: APjAAAXYoEYnJBW4Ht1hWYGxCKcMWeFIRGg4rtygYgd3mJtS6lSuHNFE KNbV3EzlF1b7+Tc5fuupnjhq5kGk+kw= X-Received: by 2002:a2e:9f47:: with SMTP id v7mr20258375ljk.124.1582247157293; Thu, 20 Feb 2020 17:05:57 -0800 (PST) Received: from mail-lf1-f48.google.com (mail-lf1-f48.google.com. [209.85.167.48]) by smtp.gmail.com with ESMTPSA id h7sm631062lfj.29.2020.02.20.17.05.54 for (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Thu, 20 Feb 2020 17:05:55 -0800 (PST) Received: by mail-lf1-f48.google.com with SMTP id 83so211564lfh.9 for ; Thu, 20 Feb 2020 17:05:54 -0800 (PST) X-Received: by 2002:ac2:523c:: with SMTP id i28mr18016930lfl.104.1582247153877; Thu, 20 Feb 2020 17:05:53 -0800 (PST) MIME-Version: 1.0 References: <1580796831-18996-1-git-send-email-mkshah@codeaurora.org> <1580796831-18996-3-git-send-email-mkshah@codeaurora.org> <7db81eed-d46d-8131-f471-6f57c0335ace@codeaurora.org> <8914a4c0-db3c-371c-d875-afd4b3b6870c@codeaurora.org> In-Reply-To: <8914a4c0-db3c-371c-d875-afd4b3b6870c@codeaurora.org> From: Evan Green Date: Thu, 20 Feb 2020 17:05:15 -0800 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: [PATCH 2/3] soc: qcom: rpmh: Update rpm_msgs offset address and add list_del To: Maulik Shah Cc: Bjorn Andersson , Andy Gross , linux-arm-msm , LKML , Stephen Boyd , Doug Anderson , Rajendra Nayak , Lina Iyer , lsrao@codeaurora.org Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Feb 12, 2020 at 4:15 AM Maulik Shah wrote: > > On 2/5/2020 11:51 PM, Evan Green wrote: > > On Tue, Feb 4, 2020 at 9:12 PM Maulik Shah wrote: > >> > >> On 2/5/2020 6:01 AM, Evan Green wrote: > >>> On Mon, Feb 3, 2020 at 10:14 PM Maulik Shah wrote: > >>>> rpm_msgs are copied in continuously allocated memory during write_batch. > >>>> Update request pointer to correctly point to designated area for rpm_msgs. > >>>> > >>>> While at this also add missing list_del before freeing rpm_msgs. > >>>> > >>>> Signed-off-by: Maulik Shah > >>>> --- > >>>> drivers/soc/qcom/rpmh.c | 9 ++++++--- > >>>> 1 file changed, 6 insertions(+), 3 deletions(-) > >>>> > >>>> diff --git a/drivers/soc/qcom/rpmh.c b/drivers/soc/qcom/rpmh.c > >>>> index c3d6f00..04c7805 100644 > >>>> --- a/drivers/soc/qcom/rpmh.c > >>>> +++ b/drivers/soc/qcom/rpmh.c > >>>> @@ -65,7 +65,7 @@ struct cache_req { > >>>> struct batch_cache_req { > >>>> struct list_head list; > >>>> int count; > >>>> - struct rpmh_request rpm_msgs[]; > >>>> + struct rpmh_request *rpm_msgs; > >>>> }; > >>>> > >>>> static struct rpmh_ctrlr *get_rpmh_ctrlr(const struct device *dev) > >>>> @@ -327,8 +327,10 @@ static void invalidate_batch(struct rpmh_ctrlr *ctrlr) > >>>> unsigned long flags; > >>>> > >>>> spin_lock_irqsave(&ctrlr->cache_lock, flags); > >>>> - list_for_each_entry_safe(req, tmp, &ctrlr->batch_cache, list) > >>>> + list_for_each_entry_safe(req, tmp, &ctrlr->batch_cache, list) { > >>>> + list_del(&req->list); > >>>> kfree(req); > >>>> + } > >>>> INIT_LIST_HEAD(&ctrlr->batch_cache); > >>> Hm, I don't get it. list_for_each_entry_safe ensures you can traverse > >>> the list while freeing it behind you. ctrlr->batch_cache is now a > >>> bogus list, but is re-inited with the lock held. From my reading, > >>> there doesn't seem to be anything wrong with the current code. Can you > >>> elaborate on the bug you found? > >> Hi Evan, > >> > >> when we don't do list_del, there might be access to already freed memory. > >> Even after current item free via kfree(req), without list_del, the next > >> and prev item's pointer are still pointing to this freed region. > >> it seem best to call list_del to ensure that before freeing this area, > >> no other item in list refer to this. > > I don't think that's true. the "_safe" part of > > list_for_each_entry_safe ensures that we don't touch the ->next member > > of any node after freeing it. So I don't think there's any case where > > we could touch freed memory. The list_del still seems like needless > > code to me. > > Hmm, ok. i can drop list_del. > > see the reason below to include list_del. > > >>>> spin_unlock_irqrestore(&ctrlr->cache_lock, flags); > >>>> } > >>>> @@ -377,10 +379,11 @@ int rpmh_write_batch(const struct device *dev, enum rpmh_state state, > >>>> return -ENOMEM; > >>>> > >>>> req = ptr; > >>>> + rpm_msgs = ptr + sizeof(*req); > >>>> compls = ptr + sizeof(*req) + count * sizeof(*rpm_msgs); > >>>> > >>>> req->count = count; > >>>> - rpm_msgs = req->rpm_msgs; > >>>> + req->rpm_msgs = rpm_msgs; > >>> I don't really understand what this is fixing either, can you explain? > >> the continous memory allocated via below is for 3 items, > >> > >> ptr = kzalloc(sizeof(*req) + count * (sizeof(req->rpm_msgs[0]) + > >> sizeof(*compls)), GFP_ATOMIC); > >> > >> 1. batch_cache_req, followed by > >> 2. total count of rpmh_request, followed by > >> 3. total count of compls > >> > >> current code starts using (3) compls from proper offset in memory > >> compls = ptr + sizeof(*req) + count * sizeof(*rpm_msgs); > >> > >> however for (2) rpmh_request it does > >> > >> rpm_msgs = req->rpm_msgs; > >> > >> because of this it starts 8 byte before its designated area and overlaps > >> with (1) batch_cache_req struct's last entry. > >> this patch corrects it via below to ensure rpmh_request uses correct > >> start address in memory. > >> > >> rpm_msgs = ptr + sizeof(*req); > > I don't follow that either. The empty array declaration (or the > > GCC-specific version of it would be "struct rpmh_request > > rpm_msgs[0];") is a flexible array member, meaning the member itself > > doesn't take up any space in the struct. So, for instance, it holds > > true that &(req->rpm_msgs[0]) == (req + 1). By my reading the existing > > code is correct, and your patch just adds a needless pointer > > indirection. Check out this wikipedia entry: > > > > https://en.wikipedia.org/wiki/Flexible_array_member > Thanks Evan, > > Agree that code works even without this. > > However from the same wiki, > > >>It is common to allocate sizeof(struct) + array_len*sizeof(array > element) bytes. > > >>This is not wrong, however it may allocate a few more bytes than > necessary: > > this is what i wanted to convery above, currently it allocated 8 more > bytes than necessary. > > The reason for the change was one use after free reported in rpmh driver. > > After including this change, we have not seen this reported again. Hm, I would not expect that an allocaton of too many bytes would result in a use-after-free warning. If you still have the warning and are able to share it, I'm happy to take a look. > > I can drop this change in new revision if we don't want it. Yes, let's drop it for now. -Evan