Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp1682673pxj; Wed, 19 May 2021 11:22:09 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyHXhQ5mc2G3JoJeRklCejqkAUKqY0V9lXkOlBq0PHxfjmckBxv2XSEMSSOBVw1fD80PRpF X-Received: by 2002:a05:6e02:b41:: with SMTP id f1mr389174ilu.212.1621448528934; Wed, 19 May 2021 11:22:08 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1621448528; cv=pass; d=google.com; s=arc-20160816; b=z4gl1y7JKoVc2fpXoSY45tJRdZiSmrKI+dpX5SGWLrNILcfIc3YHFOdJv57nznU8sv 1xjyFSBjm48dbuvTROGkus9cgdr0y/pSlctgjVdBatgDPYlZj0m6X3CdFGVRtMisodoL xLHC/WXoMOvej1wFx1A44XvDr6D06DdWp04Z3FFfInXW+rkiY2n5bP8YtG31w+png3IY 5dF+QJM6jxpV2qdexKXAu6iOrLy3o0/XdwGH25EhFGLiKUDFu+cg4lbpTRFYMVW6kF2K dmsnme+qrWC+yayrMm3EUECWqkhwUiOt+8pXwbiwqGOoGOY8iUSb2qoUkj7sxd7UmA3p 9ktQ== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=vJOx0LsN4oUgeCzm53vdAdK6bmIUgZ9plelHuxRXUtk=; b=z5sAGFH5Mfabf5sTVhlpE33Kk07jVeAlXLioynyqYyv/ry/urDh1TyRpD/nN0biZjm qW616uaivm6Je0+0vRN14qeS2sGWtIsGfcuZsZxO+NK0YGncBMIfZUnbcFgJmm4E9p+z Ou32zZmhz9D64XSPgsS9bkaDn3tbiIrce+k5ejz40CtNr4IMMTb4untPhpI525suRFqk D669wxbBH4CcbDQwXPUakjTdYelI26rhMAz3vLcERX6aEmtDEF6nBNwW5WjGnBnCSnBT SJu80uLivgRI1J7xYTgyfY8y9T8qrRiGql7kBCGRzFvyu7U/4ysnvSHSXWyedvdbuyh0 yCCA== ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@anirudhrb.com header.s=zoho header.b=DHYu5HH3; arc=pass (i=1 spf=pass spfdomain=anirudhrb.com dkim=pass dkdomain=anirudhrb.com dmarc=pass fromdomain=anirudhrb.com>); spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id g10si27146556iow.86.2021.05.19.11.21.56; Wed, 19 May 2021 11:22:08 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@anirudhrb.com header.s=zoho header.b=DHYu5HH3; arc=pass (i=1 spf=pass spfdomain=anirudhrb.com dkim=pass dkdomain=anirudhrb.com dmarc=pass fromdomain=anirudhrb.com>); spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1344206AbhERQCF (ORCPT + 99 others); Tue, 18 May 2021 12:02:05 -0400 Received: from sender4-of-o53.zoho.com ([136.143.188.53]:21373 "EHLO sender4-of-o53.zoho.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S244966AbhERQCE (ORCPT ); Tue, 18 May 2021 12:02:04 -0400 ARC-Seal: i=1; a=rsa-sha256; t=1621353629; cv=none; d=zohomail.com; s=zohoarc; b=irg3ZPOtMgeRx6XusheVJQzLEZqwUPBNZu/J+TGeTdTczCFSzYgiI8eWgc7gxqfhulFRg2fgXizcQ1lsLKnMYRcZLccEjVd/0f1OqnvGz5Blmuxs8UvHOE276krXQTs+dv+eBtqctApMjn4iisyPRHUMU9DY3JvUVLyDXh+cK3M= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1621353629; h=Content-Transfer-Encoding:Cc:Date:From:MIME-Version:Message-ID:Subject:To; bh=vJOx0LsN4oUgeCzm53vdAdK6bmIUgZ9plelHuxRXUtk=; b=h+HSc0w2uqTf+HU7Z/3z/TjjyF1fdlZbLF9M+dlpytQG7oNPsEm2mOXV9B+w7NdozJw3kFa1Ydtr6SPP61b94lpJ1KxPL3jwDCizVZ0d5RkfE/OAf6bvbUqrg7YRxE+hIfNKezn0KzE9SFYvw0SNfmbZOk1FoQywbyHg9Y+Kb3w= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass header.i=anirudhrb.com; spf=pass smtp.mailfrom=mail@anirudhrb.com; dmarc=pass header.from= DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; t=1621353629; s=zoho; d=anirudhrb.com; i=mail@anirudhrb.com; h=From:To:Cc:Subject:Date:Message-Id:MIME-Version:Content-Transfer-Encoding; bh=vJOx0LsN4oUgeCzm53vdAdK6bmIUgZ9plelHuxRXUtk=; b=DHYu5HH3GbPVWXtn+kgyPRk3BbmyXov845baT5Q/RgFg40JIfPFXpZQKw/IalrEF 7LLv7MiCG75Rpmrg7oYySSlWnM78U02mc1RgVYuWEoar5l0c1tQn8YAd/oTVk7hN/53 2Bf1YSflYFTgOcsTIVcDTLwVQL5pRr9St8clbb70= Received: from localhost.localdomain (49.207.58.139 [49.207.58.139]) by mx.zohomail.com with SMTPS id 1621353596707742.6825298609377; Tue, 18 May 2021 08:59:56 -0700 (PDT) From: Anirudh Rayabharam To: Luis Chamberlain , Greg Kroah-Hartman , "Rafael J. Wysocki" , Junyong Sun Cc: linux-kernel-mentees@lists.linuxfoundation.org, Anirudh Rayabharam , syzbot+de271708674e2093097b@syzkaller.appspotmail.com, linux-kernel@vger.kernel.org Subject: [PATCH v4] firmware_loader: fix use-after-free in firmware_fallback_sysfs Date: Tue, 18 May 2021 21:29:20 +0530 Message-Id: <20210518155921.4181-1-mail@anirudhrb.com> X-Mailer: git-send-email 2.26.2 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-ZohoMailClient: External Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This use-after-free happens when a fw_priv object has been freed but hasn't been removed from the pending list (pending_fw_head). The next time fw_load_sysfs_fallback tries to insert into the list, it ends up accessing the pending_list member of the previoiusly freed fw_priv. The root cause here is that all code paths that abort the fw load don't delete it from the pending list. For example: _request_firmware() -> fw_abort_batch_reqs() -> fw_state_aborted() To fix this, delete the fw_priv from the list in __fw_set_state() if the new state is DONE or ABORTED. This way, all aborts will remove the fw_priv from the list. Accordingly, remove calls to list_del_init that were being made before calling fw_state_(aborted|done)(). Also, in fw_load_sysfs_fallback, don't add the fw_priv to the list if it is already aborted. Instead, just jump out and return early. Fixes: bcfbd3523f3c ("firmware: fix a double abort case with fw_load_sysfs_fallback") Reported-by: syzbot+de271708674e2093097b@syzkaller.appspotmail.com Tested-by: syzbot+de271708674e2093097b@syzkaller.appspotmail.com Signed-off-by: Anirudh Rayabharam --- Changes in v4: Documented the reasons behind the error codes returned from fw_sysfs_wait_timeout() as suggested by Luis Chamberlain. Changes in v3: Modified the patch to incorporate suggestions by Luis Chamberlain in order to fix the root cause instead of applying a "band-aid" kind of fix. https://lore.kernel.org/lkml/20210403013143.GV4332@42.do-not-panic.com/ Changes in v2: 1. Fixed 1 error and 1 warning (in the commit message) reported by checkpatch.pl. The error was regarding the format for referring to another commit "commit ("oneline")". The warning was for line longer than 75 chars. --- drivers/base/firmware_loader/fallback.c | 46 ++++++++++++++++++------- drivers/base/firmware_loader/firmware.h | 6 +++- drivers/base/firmware_loader/main.c | 2 ++ 3 files changed, 40 insertions(+), 14 deletions(-) diff --git a/drivers/base/firmware_loader/fallback.c b/drivers/base/firmware_loader/fallback.c index 91899d185e31..f244c7b89ba5 100644 --- a/drivers/base/firmware_loader/fallback.c +++ b/drivers/base/firmware_loader/fallback.c @@ -70,7 +70,31 @@ static inline bool fw_sysfs_loading(struct fw_priv *fw_priv) static inline int fw_sysfs_wait_timeout(struct fw_priv *fw_priv, long timeout) { - return __fw_state_wait_common(fw_priv, timeout); + int ret = __fw_state_wait_common(fw_priv, timeout); + + /* + * A signal could be sent to abort a wait. Consider Android's init + * gettting a SIGCHLD, which in turn was the same process issuing the + * sysfs store call for the fallback. In such cases we want to be able + * to tell apart in userspace when a signal caused a failure on the + * wait. In such cases we'd get -ERESTARTSYS. + * + * Likewise though another race can happen and abort the load earlier. + * + * In either case the situation is interrupted so we just inform + * userspace of that and we end things right away. + * + * When we really time out just tell userspace it should try again, + * perhaps later. + */ + if (ret == -ERESTARTSYS || fw_state_is_aborted(fw_priv)) + ret = -EINTR; + else if (ret == -ETIMEDOUT) + ret = -EAGAIN; + else if (fw_priv->is_paged_buf && !fw_priv->data) + ret = -ENOMEM; + + return ret; } struct fw_sysfs { @@ -91,10 +115,9 @@ static void __fw_load_abort(struct fw_priv *fw_priv) * There is a small window in which user can write to 'loading' * between loading done and disappearance of 'loading' */ - if (fw_sysfs_done(fw_priv)) + if (fw_state_is_aborted(fw_priv) || fw_sysfs_done(fw_priv)) return; - list_del_init(&fw_priv->pending_list); fw_state_aborted(fw_priv); } @@ -280,7 +303,6 @@ static ssize_t firmware_loading_store(struct device *dev, * Same logic as fw_load_abort, only the DONE bit * is ignored and we set ABORT only on failure. */ - list_del_init(&fw_priv->pending_list); if (rc) { fw_state_aborted(fw_priv); written = rc; @@ -513,6 +535,11 @@ static int fw_load_sysfs_fallback(struct fw_sysfs *fw_sysfs, long timeout) } mutex_lock(&fw_lock); + if (fw_state_is_aborted(fw_priv)) { + mutex_unlock(&fw_lock); + retval = -EINTR; + goto out; + } list_add(&fw_priv->pending_list, &pending_fw_head); mutex_unlock(&fw_lock); @@ -526,20 +553,13 @@ static int fw_load_sysfs_fallback(struct fw_sysfs *fw_sysfs, long timeout) } retval = fw_sysfs_wait_timeout(fw_priv, timeout); - if (retval < 0 && retval != -ENOENT) { + if (retval < 0) { mutex_lock(&fw_lock); fw_load_abort(fw_sysfs); mutex_unlock(&fw_lock); } - if (fw_state_is_aborted(fw_priv)) { - if (retval == -ERESTARTSYS) - retval = -EINTR; - else - retval = -EAGAIN; - } else if (fw_priv->is_paged_buf && !fw_priv->data) - retval = -ENOMEM; - +out: device_del(f_dev); err_put_dev: put_device(f_dev); diff --git a/drivers/base/firmware_loader/firmware.h b/drivers/base/firmware_loader/firmware.h index 63bd29fdcb9c..36bdb413c998 100644 --- a/drivers/base/firmware_loader/firmware.h +++ b/drivers/base/firmware_loader/firmware.h @@ -117,8 +117,12 @@ static inline void __fw_state_set(struct fw_priv *fw_priv, WRITE_ONCE(fw_st->status, status); - if (status == FW_STATUS_DONE || status == FW_STATUS_ABORTED) + if (status == FW_STATUS_DONE || status == FW_STATUS_ABORTED) { +#ifdef CONFIG_FW_LOADER_USER_HELPER + list_del_init(&fw_priv->pending_list); +#endif complete_all(&fw_st->completion); + } } static inline void fw_state_aborted(struct fw_priv *fw_priv) diff --git a/drivers/base/firmware_loader/main.c b/drivers/base/firmware_loader/main.c index 4fdb8219cd08..68c549d71230 100644 --- a/drivers/base/firmware_loader/main.c +++ b/drivers/base/firmware_loader/main.c @@ -783,8 +783,10 @@ static void fw_abort_batch_reqs(struct firmware *fw) return; fw_priv = fw->priv; + mutex_lock(&fw_lock); if (!fw_state_is_aborted(fw_priv)) fw_state_aborted(fw_priv); + mutex_unlock(&fw_lock); } /* called from request_firmware() and request_firmware_work_func() */ -- 2.26.2