Received: by 2002:a05:6a10:17d3:0:0:0:0 with SMTP id hz19csp96815pxb; Wed, 14 Apr 2021 10:15:58 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzRscV48N2ibkCOKpk1LfiuQWCbO9T1lrfNxNRuX5rJ5ndFOoD93vf86Inu2/eqUl97FmD3 X-Received: by 2002:a17:902:8d83:b029:e6:508a:7b8d with SMTP id v3-20020a1709028d83b02900e6508a7b8dmr33659714plo.18.1618420558634; Wed, 14 Apr 2021 10:15:58 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1618420558; cv=none; d=google.com; s=arc-20160816; b=GC825IKNCEOax6K45dhME2F3fs1MzqL+8r7tv3Ie8zBbq1zgbBzsinW2VozKzG19rh wtBvNGSDamg43CuAv9RSpNd9qFF/FgkPhnvM4z62jlhBYon2hAg4XhYub/g5+XeZ8fKx cZPRHpjtxCMzIkkezIEqRWKD6vZu/c19pIFv+93i0cf5zpHJ3Pv0mraIrKJUewyNRxxj +DRylM799gt7WU1TSwSTBAtkhpO9qJdL3SY5ssOMMqnpQ/FQY0Kxd/HX8tD9HccXQKmC F1dbpyYUJXY2gAT7iZoDqB1ha9UU/rNWuDiirw1+vJqi/YNWtso+w7cGL70EvPijpd8w jBzA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject:dkim-signature; bh=ffL4/q8FJKqLAoFMViE/Y7jVnkDKS/hb+UJJzKpQnQI=; b=mL85U60hoN4Nd9BDaQ8wKJnYu3PVoer5aKSeisl/Ep+ifgBEC3ys71YJkLGa9AbwFr 1aQWEq1SED3EWN0fxS95kIc8sevNoE2Fooo/xqAeDP0gNrgQxSlRQtFaAXlbO+kcUTLp xKLHyfqQOOz6/724CV3VlVC/JRa9zh6ZKMJZsQXc3YEpzPBLmI2bP8tEJIKtBEtSONiV xgXb12pD2lY0Xpqe+bpgaxsDG4+B0l3yXIa1IuXCJZueDHHo3PS8G8LvuNLKgALrTQWJ q5xmV6qE9e3o+dE4GhQGy2xkSTDRnvtg2CQ1fz9syyFux8AvC28RNZruN/D4w9tbn6AG Ajtw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=google header.b=RyvpGk7z; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id gg4si175556pjb.26.2021.04.14.10.15.45; Wed, 14 Apr 2021 10:15:58 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=google header.b=RyvpGk7z; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235326AbhDNP1U (ORCPT + 99 others); Wed, 14 Apr 2021 11:27:20 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:46892 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232986AbhDNP1T (ORCPT ); Wed, 14 Apr 2021 11:27:19 -0400 Received: from mail-il1-x12d.google.com (mail-il1-x12d.google.com [IPv6:2607:f8b0:4864:20::12d]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id B6B8CC061574 for ; Wed, 14 Apr 2021 08:26:56 -0700 (PDT) Received: by mail-il1-x12d.google.com with SMTP id c18so17432028iln.7 for ; Wed, 14 Apr 2021 08:26:56 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linuxfoundation.org; s=google; h=subject:to:cc:references:from:message-id:date:user-agent :mime-version:in-reply-to:content-language:content-transfer-encoding; bh=ffL4/q8FJKqLAoFMViE/Y7jVnkDKS/hb+UJJzKpQnQI=; b=RyvpGk7zcmskmxUtK7tMu3qjq5Qc8j5Ql8wlg+4jZM85NtjDG3YorC72LitBccWzRx mhw23ZfPKPzt6TCZIwSTVCnZUDnc9Ht1+sDC5M/lE9RLcNAF6Jn680YB/J55oKBBaDj/ KsBfiLvvYyrEiR3KFog0KP1Fn0H1/ptVhn0ls= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:cc:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=ffL4/q8FJKqLAoFMViE/Y7jVnkDKS/hb+UJJzKpQnQI=; b=O+j22yO6wcUWmtseOtbonF1YsMxU4PsQqgkO3B5c0T4ObTHhiZ+dYfJo6lfYCXeGpn Wr1n41ZEycZAf3S9v4jh4OIxz7aMrR7AjjZEJllTzfyCJxW3AWASCHZ8sF4q/ZaAdcQD NXE98hw/UjfFTxv+0VtE/1ZvtOOvnOiY/80q9aPUCqFKb/7oG8y15Xl9dXfGocETe61R wXcjAZkj1RQGlLNtpOX7tWojBOgTs7y4Vfokkdr/SrsWDddbB/eHkgktGEkfldv/AMsN bkXMqMQQjLi0QaTaPqXjzjio+Y5g+bh6/YymLi/YDGZXN4rZVBf3o75q9tN7YxGl978U l6Ag== X-Gm-Message-State: AOAM533xixuP7ongMK39HUXlNWOgW2wVq+eDKupQ3sbhsp4fSpYjplf9 ZYLcrd9BBzQhU03Zsvdshne5AQ== X-Received: by 2002:a92:c904:: with SMTP id t4mr16709402ilp.263.1618414016120; Wed, 14 Apr 2021 08:26:56 -0700 (PDT) Received: from [192.168.1.112] (c-24-9-64-241.hsd1.co.comcast.net. [24.9.64.241]) by smtp.gmail.com with ESMTPSA id e17sm3220273ilq.21.2021.04.14.08.26.55 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Wed, 14 Apr 2021 08:26:55 -0700 (PDT) Subject: Re: [PATCH v3] firmware_loader: fix use-after-free in firmware_fallback_sysfs To: Luis Chamberlain , Anirudh Rayabharam , Shuah Khan Cc: Greg Kroah-Hartman , "Rafael J. Wysocki" , Junyong Sun , syzbot+de271708674e2093097b@syzkaller.appspotmail.com, linux-kernel@vger.kernel.org, Shuah Khan References: <20210414085406.1842-1-mail@anirudhrb.com> <20210414125540.GJ4332@42.do-not-panic.com> From: Shuah Khan Message-ID: <1e12bb24-9bb8-dad7-d852-02173ce41b6a@linuxfoundation.org> Date: Wed, 14 Apr 2021 09:26:55 -0600 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.7.1 MIME-Version: 1.0 In-Reply-To: <20210414125540.GJ4332@42.do-not-panic.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 4/14/21 6:55 AM, Luis Chamberlain wrote: > Shuah, a question for you toward the end here. > > On Wed, Apr 14, 2021 at 02:24:05PM +0530, Anirudh Rayabharam wrote: >> This use-after-free happens when a fw_priv object has been freed but >> hasn't been removed from the pending list (pending_fw_head). The next >> time fw_load_sysfs_fallback tries to insert into the list, it ends up >> accessing the pending_list member of the previoiusly freed fw_priv. >> >> The root cause here is that all code paths that abort the fw load >> don't delete it from the pending list. For example: >> >> _request_firmware() >> -> fw_abort_batch_reqs() >> -> fw_state_aborted() >> >> To fix this, delete the fw_priv from the list in __fw_set_state() if >> the new state is DONE or ABORTED. This way, all aborts will remove >> the fw_priv from the list. Accordingly, remove calls to list_del_init >> that were being made before calling fw_state_(aborted|done). >> >> Also, in fw_load_sysfs_fallback, don't add the fw_priv to the pending >> list if it is already aborted. Instead, just jump out and return early. >> >> Fixes: bcfbd3523f3c ("firmware: fix a double abort case with fw_load_sysfs_fallback") >> Reported-by: syzbot+de271708674e2093097b@syzkaller.appspotmail.com >> Tested-by: syzbot+de271708674e2093097b@syzkaller.appspotmail.com >> Signed-off-by: Anirudh Rayabharam >> --- >> >> Changes in v3: >> Modified the patch to incorporate suggestions by Luis Chamberlain in >> order to fix the root cause instead of applying a "band-aid" kind of >> fix. >> https://lore.kernel.org/lkml/20210403013143.GV4332@42.do-not-panic.com/ >> >> Changes in v2: >> 1. Fixed 1 error and 1 warning (in the commit message) reported by >> checkpatch.pl. The error was regarding the format for referring to >> another commit "commit ("oneline")". The warning was for line >> longer than 75 chars. >> >> --- >> drivers/base/firmware_loader/fallback.c | 8 ++++++-- >> drivers/base/firmware_loader/firmware.h | 6 +++++- >> drivers/base/firmware_loader/main.c | 2 ++ >> 3 files changed, 13 insertions(+), 3 deletions(-) >> >> diff --git a/drivers/base/firmware_loader/fallback.c b/drivers/base/firmware_loader/fallback.c >> index 91899d185e31..73581b6998b4 100644 >> --- a/drivers/base/firmware_loader/fallback.c >> +++ b/drivers/base/firmware_loader/fallback.c >> @@ -94,7 +94,6 @@ static void __fw_load_abort(struct fw_priv *fw_priv) >> if (fw_sysfs_done(fw_priv)) >> return; >> >> - list_del_init(&fw_priv->pending_list); >> fw_state_aborted(fw_priv); >> } >> >> @@ -280,7 +279,6 @@ static ssize_t firmware_loading_store(struct device *dev, >> * Same logic as fw_load_abort, only the DONE bit >> * is ignored and we set ABORT only on failure. >> */ >> - list_del_init(&fw_priv->pending_list); >> if (rc) { >> fw_state_aborted(fw_priv); >> written = rc; >> @@ -513,6 +511,11 @@ static int fw_load_sysfs_fallback(struct fw_sysfs *fw_sysfs, long timeout) >> } >> >> mutex_lock(&fw_lock); >> + if (fw_state_is_aborted(fw_priv)) { >> + mutex_unlock(&fw_lock); >> + retval = -EAGAIN; >> + goto out; >> + } > > Thanks for the quick follow up! > > This would regress commit 76098b36b5db1 ("firmware: send -EINTR on > signal abort on fallback mechanism") which I had mentioned in my follow > up email you posted a link to. It would regress it since the condition > is just being met earlier and you nullify the effort. So essentially > on Android you would make not being able to detect signal handlers > like the SIGCHLD signal sent to init, if init was the same process > dealing with the sysfs fallback firmware upload. > > The way I dealt with this in my patch was I decided to return -EINTR > in the earlier case in the hunk you added, instead of -EAGAIN. In > addition to this, later on fw_load_sysfs_fallback() when > fw_sysfs_wait_timeout() is used that would also deal with checking > for error codes on wait, and only then check if it was a signal > that cancelled things (the check for -ERESTARTSYS). We therefore > only send to userspace -EAGAIN when the wait really did hit the > timeout. > > But also note that my change added a check for > fw_state_is_aborted(fw_priv) inside fw_sysfs_wait_timeout(), > as that was a recently intended goal. > > In either case I documented well *why* we do these error checks > before sending a code to userspace on fw_sysfs_wait_timeout() since > otherwise it would be easy to regress that code, so please also > document that as I did. > > I'll re-iterate again also: > > Shuah's commit 0542ad88fbdd81bb ("firmware loader: Fix > _request_firmware_load() return val for fw load abort") also wanted to > distinguish the timeout vs -ENOMEM, but for some reason in the timeout > case -EAGAIN was being sent back to userspace. I am no longer sure if > that is a good idea, but since we started doing that at some point I > guess we want to keep that behaviour. > > Shuah, can you think of any reason to retain -EAGAIN other than you > introduced it here? If there's no real good reason I think it can > simplify the error handling here. But, we *would* change what we do > to userspace... and for that reason we may have to live with it. > As I recall the reason for this patch was to be able to differentiate between timing out vs no memory case when driver was attempting to load firmware. I wish I added why to the change log. The code seems to have changed a lot since my commit. I will take a look at the closely and let you know if this is still necessary late on today. thanks, -- Shuah