Received: by 2002:a05:6a10:1287:0:0:0:0 with SMTP id d7csp12987pxv; Wed, 21 Jul 2021 14:06:10 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwfIDMMoHaJLG1pzC4TotJ4v3/gpSKGJ1rs2HmFJqNMaIKFof7JHQDWvg0XnQR2YdYfYDxw X-Received: by 2002:a6b:fe06:: with SMTP id x6mr28170517ioh.38.1626901570257; Wed, 21 Jul 2021 14:06:10 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1626901570; cv=pass; d=google.com; s=arc-20160816; b=HJ+z0voZlmuYpG37vnHgcY6kfBN04cEyfC050MMF9vpcH8abJVnaDEZjyGepH4MRer uaM9VHAsxvBo2Eg9KdyZnQnMx8hECT3yDacAhzxHKita3PwABQwVosEPHGU+95dFp5nW ka462czI4hoYFsZtCL7HS39ATag8wbFqfCEFp49JuvO67JG3QsRw4zkcc8UJvl54DcBU pxMUvTepV2iOb2WFTFKfSmLol4cRxp2smUBt+2Voc0RHJEhiVOCWLpm6HtVmZg0fYsbY +nLkyYc/bFOdxy01XeVROCj2K4PoicPPPthxdod1VR/kdJFfFczUp8hUdGVpFawRB6Fj L6Gw== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=pwWyWf9iTLLSqSZtxuDpebrahwhVdTamxCNml8XhKcA=; b=Ydwhc5UoyPgK1T8Jp9co5z7D4v+T45492MstiBfAbdsIMTexzvIq1SMa8xpzVlEE2s K5clBPMRFbXC5LEqcCFTiUsDfZovZ+UQvhEXDtYUHOpGc8kJ4mc3mJTztDX+1nhLowp9 d78qjTdeKfFTYhWRgt6G3Y42nrPbUvZOZwfvCdkJFhtKrNqGj9FNQ/l5WHoZLnkO44iq ehM4MAhXvYPnKt6Q5WisxQY+fSPJ7MYZXBuBnGM4GPjdlXktFDz1YePWsWx1iT26PdKe ukJeYARUNuIE4ljLtoI662qnhDbtRNBZEDrNXQthAJUtrqH6rRx8ID8rvOfLFvcv9qRQ zzbQ== ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@anirudhrb.com header.s=zoho header.b=RkgBHz32; arc=pass (i=1 spf=pass spfdomain=anirudhrb.com dkim=pass dkdomain=anirudhrb.com dmarc=pass fromdomain=anirudhrb.com>); spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id y9si19738111ilv.11.2021.07.21.14.05.58; Wed, 21 Jul 2021 14:06:10 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@anirudhrb.com header.s=zoho header.b=RkgBHz32; arc=pass (i=1 spf=pass spfdomain=anirudhrb.com dkim=pass dkdomain=anirudhrb.com dmarc=pass fromdomain=anirudhrb.com>); spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S239502AbhGUSUw (ORCPT + 99 others); Wed, 21 Jul 2021 14:20:52 -0400 Received: from sender4-of-o53.zoho.com ([136.143.188.53]:21344 "EHLO sender4-of-o53.zoho.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S239505AbhGUSUu (ORCPT ); Wed, 21 Jul 2021 14:20:50 -0400 ARC-Seal: i=1; a=rsa-sha256; t=1626894083; cv=none; d=zohomail.com; s=zohoarc; b=Bn+Y8kMwqOlqp7mA0OwMCjSR2/kRCHRFZyjznGVH0RrakS+uZDHaVlN/mGLw/qEtqaO+9tPHYqJn+vRvk28DyYI69Nh/K2WN4XmHWircaBQXLFsdYNG9IrRnowszcbZf2XZ9RWi/H58F2pcPce3QpgarkMXlutG5UId/J1NtOXA= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1626894083; h=Content-Transfer-Encoding:Cc:Date:From:In-Reply-To:MIME-Version:Message-ID:References:Subject:To; bh=pwWyWf9iTLLSqSZtxuDpebrahwhVdTamxCNml8XhKcA=; b=flmzsuYVqZjizLp+1FAOJLSiN2lc4VODyx3MH2smsePz7fkNFqpPAJyvQad4q0rwSZJRB6B3walhR58OHOAd0LbhgUUJyFf9pN0dmXy5dmu6aKWHisB3hIXZJPze20myKFHA5vNzACxlPIBBtY3hrE7LvlfKxNdsI6nibbJ7hmA= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass header.i=anirudhrb.com; spf=pass smtp.mailfrom=mail@anirudhrb.com; dmarc=pass header.from= DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; t=1626894083; s=zoho; d=anirudhrb.com; i=mail@anirudhrb.com; h=From:To:Cc:Subject:Date:Message-Id:In-Reply-To:References:MIME-Version:Content-Transfer-Encoding; bh=pwWyWf9iTLLSqSZtxuDpebrahwhVdTamxCNml8XhKcA=; b=RkgBHz32zC5Sg9HMF2+jkefJ/qzAYkP7awAJRUoRHnX4naIygXoM/SJ81A8Zx9+e A2tH3YBuA/WJ0YnT1EtMSqER4vpizbfRLphTvAD3o1UShPEni4IBx4ad57nwzsy+IZr 9VzobHiDLtsNyxk26gKmANTss0Z2ZveAn2yKz/Tg= Received: from localhost.localdomain (106.51.105.64 [106.51.105.64]) by mx.zohomail.com with SMTPS id 1626894078842163.29940161512548; Wed, 21 Jul 2021 12:01:18 -0700 (PDT) From: Anirudh Rayabharam To: mcgrof@kernel.org, gregkh@linuxfoundation.org, rafael@kernel.org, skhan@linuxfoundation.org Cc: Anirudh Rayabharam , linux-kernel@vger.kernel.org, linux-kernel-mentees@lists.linuxfoundation.org, syzbot+de271708674e2093097b@syzkaller.appspotmail.com Subject: [PATCH v5 2/2] firmware_loader: fix use-after-free in firmware_fallback_sysfs Date: Thu, 22 Jul 2021 00:30:14 +0530 Message-Id: <20210721190014.2313-3-mail@anirudhrb.com> X-Mailer: git-send-email 2.26.2 In-Reply-To: <20210721190014.2313-1-mail@anirudhrb.com> References: <20210721190014.2313-1-mail@anirudhrb.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-ZohoMailClient: External Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This use-after-free happens when a fw_priv object has been freed but hasn't been removed from the pending list (pending_fw_head). The next time fw_load_sysfs_fallback tries to insert into the list, it ends up accessing the pending_list member of the previoiusly freed fw_priv. The root cause here is that all code paths that abort the fw load don't delete it from the pending list. For example: _request_firmware() -> fw_abort_batch_reqs() -> fw_state_aborted() To fix this, delete the fw_priv from the list in __fw_set_state() if the new state is DONE or ABORTED. This way, all aborts will remove the fw_priv from the list. Accordingly, remove calls to list_del_init that were being made before calling fw_state_(aborted|done). Also, in fw_load_sysfs_fallback, don't add the fw_priv to the pending list if it is already aborted. Instead, just jump out and return early. Fixes: bcfbd3523f3c ("firmware: fix a double abort case with fw_load_sysfs_fallback") Reported-by: syzbot+de271708674e2093097b@syzkaller.appspotmail.com Tested-by: syzbot+de271708674e2093097b@syzkaller.appspotmail.com Signed-off-by: Anirudh Rayabharam --- drivers/base/firmware_loader/fallback.c | 10 +++++++--- drivers/base/firmware_loader/firmware.h | 6 +++++- drivers/base/firmware_loader/main.c | 2 ++ 3 files changed, 14 insertions(+), 4 deletions(-) diff --git a/drivers/base/firmware_loader/fallback.c b/drivers/base/firmware_loader/fallback.c index bc25bb5d1ed6..f244c7b89ba5 100644 --- a/drivers/base/firmware_loader/fallback.c +++ b/drivers/base/firmware_loader/fallback.c @@ -115,10 +115,9 @@ static void __fw_load_abort(struct fw_priv *fw_priv) * There is a small window in which user can write to 'loading' * between loading done and disappearance of 'loading' */ - if (fw_sysfs_done(fw_priv)) + if (fw_state_is_aborted(fw_priv) || fw_sysfs_done(fw_priv)) return; - list_del_init(&fw_priv->pending_list); fw_state_aborted(fw_priv); } @@ -304,7 +303,6 @@ static ssize_t firmware_loading_store(struct device *dev, * Same logic as fw_load_abort, only the DONE bit * is ignored and we set ABORT only on failure. */ - list_del_init(&fw_priv->pending_list); if (rc) { fw_state_aborted(fw_priv); written = rc; @@ -537,6 +535,11 @@ static int fw_load_sysfs_fallback(struct fw_sysfs *fw_sysfs, long timeout) } mutex_lock(&fw_lock); + if (fw_state_is_aborted(fw_priv)) { + mutex_unlock(&fw_lock); + retval = -EINTR; + goto out; + } list_add(&fw_priv->pending_list, &pending_fw_head); mutex_unlock(&fw_lock); @@ -556,6 +559,7 @@ static int fw_load_sysfs_fallback(struct fw_sysfs *fw_sysfs, long timeout) mutex_unlock(&fw_lock); } +out: device_del(f_dev); err_put_dev: put_device(f_dev); diff --git a/drivers/base/firmware_loader/firmware.h b/drivers/base/firmware_loader/firmware.h index 63bd29fdcb9c..36bdb413c998 100644 --- a/drivers/base/firmware_loader/firmware.h +++ b/drivers/base/firmware_loader/firmware.h @@ -117,8 +117,12 @@ static inline void __fw_state_set(struct fw_priv *fw_priv, WRITE_ONCE(fw_st->status, status); - if (status == FW_STATUS_DONE || status == FW_STATUS_ABORTED) + if (status == FW_STATUS_DONE || status == FW_STATUS_ABORTED) { +#ifdef CONFIG_FW_LOADER_USER_HELPER + list_del_init(&fw_priv->pending_list); +#endif complete_all(&fw_st->completion); + } } static inline void fw_state_aborted(struct fw_priv *fw_priv) diff --git a/drivers/base/firmware_loader/main.c b/drivers/base/firmware_loader/main.c index 4fdb8219cd08..68c549d71230 100644 --- a/drivers/base/firmware_loader/main.c +++ b/drivers/base/firmware_loader/main.c @@ -783,8 +783,10 @@ static void fw_abort_batch_reqs(struct firmware *fw) return; fw_priv = fw->priv; + mutex_lock(&fw_lock); if (!fw_state_is_aborted(fw_priv)) fw_state_aborted(fw_priv); + mutex_unlock(&fw_lock); } /* called from request_firmware() and request_firmware_work_func() */ -- 2.26.2