Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp605089pxj; Thu, 10 Jun 2021 08:23:17 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyb37aiwi6Yxcp33x1ctNW0jg+ouszBJjdxh4ydVuKfeiWRDidMs7ap6hN1oJiAooJO3FfH X-Received: by 2002:a50:bb6a:: with SMTP id y97mr5421822ede.345.1623338597346; Thu, 10 Jun 2021 08:23:17 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1623338597; cv=none; d=google.com; s=arc-20160816; b=nvTzqXLbJYZvJJJaK/EsmY5GrRNcMjH/UprleU9DB5A/3i5nXdIYqo2qf+Ik2CfmCw Y27HQyLl5VLrmezzPwG8ciq43P+UaE7BEzMfO2gnrK4IbjVy+HV9/ZgnXhKA4Yy+vfxo J0kaSuKcRb1zBZ7/VjmLtDvw6VQnk2HbEgbVtmmTNy6uZEmO0ITTEyFFJSeZnDiDAEt0 VTeqmyN/T8CH2FByBGHEUN+Jc9QQ/YcOWgWsze8BRstx9XdWBZo23Ch9Exn82df1kqeJ 8ExtjIqlAZ826l2dGWh+XfOgscVtngxTSMzXEMQj/M0DxQIqsGpvhdt0YGszDHFAJ82Z U9NQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :to:subject:dkim-signature; bh=FuMYH+W4A5O7+Tews5dUBZThHa9L7Mfi17lH81DY2zM=; b=ycqFxVPdOKrUKaYuFFPFZdQBgBgH9+bV15ove0RHaVSH8fi2RkcZE0Z/qTrd3lGXVp 2DO9aNI4xWzsl1Ni4rfmW5T+RBWMl3Xog/NvPL2lDlAcgLIPdLzlyRP7EY2GF6qINU50 uNszBaWbIrqI6SEZSz+Md9zOTUDw6ODwDmK8MqeWdPYkLnAEJvzfj5eO2RsJ/shofg8O 58iwjh2aKLpH81+OO3n0K3cgJ1gpizTnnX625cMXl0JlyMfspkGCMm/zhfMlCddwZ0R8 qmC6+JQxBZsjY7I6oj3wy7qjycM3qKCiHbTuWyBUvS/c8G4h+3l4InXOE4njnsFSgQlA 2XWA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=geW08CQP; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id l18si2421725ejr.283.2021.06.10.08.22.52; Thu, 10 Jun 2021 08:23:17 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=geW08CQP; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231424AbhFJPXu (ORCPT + 99 others); Thu, 10 Jun 2021 11:23:50 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:57446 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230287AbhFJPXu (ORCPT ); Thu, 10 Jun 2021 11:23:50 -0400 Received: from mail-pl1-x62c.google.com (mail-pl1-x62c.google.com [IPv6:2607:f8b0:4864:20::62c]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 90FF5C061574 for ; Thu, 10 Jun 2021 08:21:44 -0700 (PDT) Received: by mail-pl1-x62c.google.com with SMTP id e7so1199847plj.7 for ; Thu, 10 Jun 2021 08:21:44 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=subject:to:references:from:message-id:date:user-agent:mime-version :in-reply-to:content-language:content-transfer-encoding; bh=FuMYH+W4A5O7+Tews5dUBZThHa9L7Mfi17lH81DY2zM=; b=geW08CQPQBOVBMMTrnm4QUFNszNlWY3MoOiwGTuxU4NxJ7MI2P5D3oCLIMfMw0dMy+ x+MAOJ9JGVdJiaP1cAH7u2dY8eX8FzNnaEPEresoL8Y0KlYO/JAWlw9i0Pap8ssR4A8h pXah6TYAeLM6CpQIP4weQ4x92R5zT/1f8OHYjrFFyL2CAJ6jpBTnuxhLsHs2o/UQCBvr LscT4VJWLKBGredrdp958uDKi4IuaIIuZrliAXNigqpz7BebZtMAOc2k1Uz8XzPE5JcG wrlGJe8bndU79Igoq2Yb2IcvMCqi1Nag+DNg47+6VQVynXTqVvEdK5F1KDX6wljdI0Td AnJQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=FuMYH+W4A5O7+Tews5dUBZThHa9L7Mfi17lH81DY2zM=; b=jM6r0tXa57H1QZFh6jFKVxUiUwCJGevtohoIaciCsdEzKgaW49//JH3bnDipZs8HKg 4z8dKjHa4BFINqCZaBzpr0ZoZ0ANXSd+epzf/n2F8B+AJt926g+m2qAdYEiqsJNz7+KT luMtiUtA15CYnUWILj1pX5X3dlqazKN5ZokQJVVEr4dt2PtdtT41CCMvcz97RIZlOgkd XCus2Vs74E/zubKwl5UQX1PojFWbD3Dt32JC/GKCb09tPpX8oLvAHyhzI3qZUsL2FX/W o4FqM90BnvAA09H7BDSkP1l9cu7wKT4vMAdUEbI/gI0EicyAKNJK8kXiMgBjZMXnF2iF b/eA== X-Gm-Message-State: AOAM530gg4ig7IgWhVPJF9VR0yAqnRdmupIecqOB930JzJZSSSAkuWdF pVJ+qdq4ITc2KbU0gmtWAMQ= X-Received: by 2002:a17:90a:1b8f:: with SMTP id w15mr3847687pjc.101.1623338504011; Thu, 10 Jun 2021 08:21:44 -0700 (PDT) Received: from [192.168.1.237] ([118.200.190.93]) by smtp.gmail.com with ESMTPSA id d92sm2920355pjk.38.2021.06.10.08.21.40 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Thu, 10 Jun 2021 08:21:43 -0700 (PDT) Subject: Re: [PATCH] drm: Lock pointer access in drm_master_release() To: maarten.lankhorst@linux.intel.com, mripard@kernel.org, tzimmermann@suse.de, airlied@linux.ie, dri-devel@lists.freedesktop.org, linux-kernel@vger.kernel.org, skhan@linuxfoundation.org, gregkh@linuxfoundation.org, linux-kernel-mentees@lists.linuxfoundation.org, Dan Carpenter References: <20210609092119.173590-1-desmondcheongzx@gmail.com> From: Desmond Cheong Zhi Xi Message-ID: Date: Thu, 10 Jun 2021 23:21:39 +0800 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.8.1 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=windows-1252; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 10/6/21 6:10 pm, Daniel Vetter wrote: > On Wed, Jun 09, 2021 at 05:21:19PM +0800, Desmond Cheong Zhi Xi wrote: >> This patch eliminates the following smatch warning: >> drivers/gpu/drm/drm_auth.c:320 drm_master_release() warn: unlocked access 'master' (line 318) expected lock '&dev->master_mutex' >> >> The 'file_priv->master' field should be protected by the mutex lock to >> '&dev->master_mutex'. This is because other processes can concurrently >> modify this field and free the current 'file_priv->master' >> pointer. This could result in a use-after-free error when 'master' is >> dereferenced in subsequent function calls to >> 'drm_legacy_lock_master_cleanup()' or to 'drm_lease_revoke()'. >> >> An example of a scenario that would produce this error can be seen >> from a similar bug in 'drm_getunique()' that was reported by Syzbot: >> https://syzkaller.appspot.com/bug?id=148d2f1dfac64af52ffd27b661981a540724f803 >> >> In the Syzbot report, another process concurrently acquired the >> device's master mutex in 'drm_setmaster_ioctl()', then overwrote >> 'fpriv->master' in 'drm_new_set_master()'. The old value of >> 'fpriv->master' was subsequently freed before the mutex was unlocked. >> >> Reported-by: Dan Carpenter >> Signed-off-by: Desmond Cheong Zhi Xi > > Thanks a lot. I've done an audit of this code, and I found another > potential problem in drm_is_current_master. The callers from drm_auth.c > hold the dev->master_mutex, but all the external ones dont. I think we > need to split this into a _locked function for use within drm_auth.c, and > the exported one needs to grab the dev->master_mutex while it's checking > master status. Ofc there will still be races, those are ok, but right now > we run the risk of use-after free problems in drm_lease_owner. > > Are you up to do that fix too? > Hi Daniel, Thanks for the pointer, I'm definitely up for it! > I think the drm_lease.c code also needs an audit, there we'd need to make > sure that we hold hold either the lock or a full master reference to avoid > the use-after-free issues here. > I'd be happy to look into drm_lease.c as well. > Patch merged to drm-misc-fixes with cc: stable. > -Daniel > >> --- >> drivers/gpu/drm/drm_auth.c | 3 ++- >> 1 file changed, 2 insertions(+), 1 deletion(-) >> >> diff --git a/drivers/gpu/drm/drm_auth.c b/drivers/gpu/drm/drm_auth.c >> index f00e5abdbbf4..b59b26a71ad5 100644 >> --- a/drivers/gpu/drm/drm_auth.c >> +++ b/drivers/gpu/drm/drm_auth.c >> @@ -315,9 +315,10 @@ int drm_master_open(struct drm_file *file_priv) >> void drm_master_release(struct drm_file *file_priv) >> { >> struct drm_device *dev = file_priv->minor->dev; >> - struct drm_master *master = file_priv->master; >> + struct drm_master *master; >> >> mutex_lock(&dev->master_mutex); >> + master = file_priv->master; >> if (file_priv->magic) >> idr_remove(&file_priv->master->magic_map, file_priv->magic); >> >> -- >> 2.25.1 >> > From what I can see, there are other places in the kernel that could use the _locked version of drm_is_current_master as well, such as drm_mode_getfb in drm_framebuffer.c. I'll take a closer look, and if the changes make sense I'll prepare a patch series for them. Best wishes, Desmond