Received: by 2002:a05:6a10:5bc5:0:0:0:0 with SMTP id os5csp218875pxb; Fri, 15 Oct 2021 04:15:34 -0700 (PDT) X-Google-Smtp-Source: ABdhPJy+Rq+bCj93PYdsbbGj0LEoxEAKjjIXmykCfc6iS6ztbml3oZIR/7qLulXCurrBGxe/6RjY X-Received: by 2002:a62:3606:0:b0:445:38d5:98bf with SMTP id d6-20020a623606000000b0044538d598bfmr11116469pfa.4.1634296534224; Fri, 15 Oct 2021 04:15:34 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1634296534; cv=none; d=google.com; s=arc-20160816; b=GIWNacE5Z10gAciHW0e0Q40mOxeerI88skh6Yzf2+nvHGH6JVOmOPrgwKeUz5cYdDl BtWtQvYonhbSXvNLAhqFx+pmMboALKKu+OJxSRx1VFP0txnt89kAvkS552L6T7nJIxiE P8vcvUEeaqEaJZ7zrZwtepmglulv+klIAiWsG2BfIJ3WAdTRBXsCJ2RUoF8DsnZnpPk2 V5gCVMOqOvMB6TYDzu3YwqsVeraGr0uTarzyKGyR7D4Z6yc2eNrpH2dee8bXM7X8VTV4 csx8iDJbeTXye60VqUC7JYGfnHVVgtoP6ZXwlQQCW3mWn3XpvZ0zc8LpHu4r7aO1QHAG YfLA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=pX8/uEgGdSQLb9i+cNLoBmtK6QCySSxanDA/gGRJYKY=; b=zwDIdqLNCt8EaGE5cy+2ZoGsA3azQ+21LA7DksL02MZOCMjK++VdAiRLSwZAQejabU jPv/2o/3HVEU0XVA1+507AKjNXkI/DzTa9WJs/VuljXZIWUpa76hnkEVcrEP9QRrfrxT xyh12ryD0nI4EOuGt3u4TnrYx6qGcSlefLD55AGc5XqrXWktXCymL+XGKa0lgKmoEEIm F8lE1rZ+Li1SOPuDwdcM0bAXuSK1lT3qoMvqFkNurAl+aYiUFG70E5D5re+skTeHKiPS Za0UN+NDCzVj2MeHgVv4NivmhrIpjnXjPkBMkV+ipDfYEm6L6UNQNWbmA2uursK8fnsh u6Qw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=huawei.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id r5si14267482pjm.44.2021.10.15.04.15.18; Fri, 15 Oct 2021 04:15:34 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=huawei.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232707AbhJOCsI (ORCPT + 99 others); Thu, 14 Oct 2021 22:48:08 -0400 Received: from szxga01-in.huawei.com ([45.249.212.187]:13741 "EHLO szxga01-in.huawei.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229819AbhJOCsH (ORCPT ); Thu, 14 Oct 2021 22:48:07 -0400 Received: from dggeml757-chm.china.huawei.com (unknown [172.30.72.56]) by szxga01-in.huawei.com (SkyGuard) with ESMTP id 4HVrFc49GLzWrHF; Fri, 15 Oct 2021 10:44:20 +0800 (CST) Received: from localhost.localdomain (10.175.104.82) by dggeml757-chm.china.huawei.com (10.1.199.137) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.2308.8; Fri, 15 Oct 2021 10:45:59 +0800 From: Ziyang Xuan To: , CC: , , , Subject: [PATCH v2] thermal/core: fix a UAF bug in __thermal_cooling_device_register() Date: Fri, 15 Oct 2021 10:45:04 +0800 Message-ID: <20211015024504.947520-1-william.xuanziyang@huawei.com> X-Mailer: git-send-email 2.25.1 MIME-Version: 1.0 Content-Transfer-Encoding: 7BIT Content-Type: text/plain; charset=US-ASCII X-Originating-IP: [10.175.104.82] X-ClientProxiedBy: dggems701-chm.china.huawei.com (10.3.19.178) To dggeml757-chm.china.huawei.com (10.1.199.137) X-CFilter-Loop: Reflected Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org When device_register() return failed, program will goto out_kfree_type to release 'cdev->device' by put_device(). That will call thermal_release() to free 'cdev'. But the follow-up processes access 'cdev' continually. That trggers the UAF bug. ==================================================================== BUG: KASAN: use-after-free in __thermal_cooling_device_register+0x75b/0xa90 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.13.0-1ubuntu1.1 04/01/2014 Call Trace: dump_stack_lvl+0xe2/0x152 print_address_description.constprop.0+0x21/0x140 ? __thermal_cooling_device_register+0x75b/0xa90 kasan_report.cold+0x7f/0x11b ? __thermal_cooling_device_register+0x75b/0xa90 __thermal_cooling_device_register+0x75b/0xa90 ? memset+0x20/0x40 ? __sanitizer_cov_trace_pc+0x1d/0x50 ? __devres_alloc_node+0x130/0x180 devm_thermal_of_cooling_device_register+0x67/0xf0 max6650_probe.cold+0x557/0x6aa ...... Freed by task 258: kasan_save_stack+0x1b/0x40 kasan_set_track+0x1c/0x30 kasan_set_free_info+0x20/0x30 __kasan_slab_free+0x109/0x140 kfree+0x117/0x4c0 thermal_release+0xa0/0x110 device_release+0xa7/0x240 kobject_put+0x1ce/0x540 put_device+0x20/0x30 __thermal_cooling_device_register+0x731/0xa90 devm_thermal_of_cooling_device_register+0x67/0xf0 max6650_probe.cold+0x557/0x6aa [max6650] Do not use 'cdev' again after put_device() to fix the problem like doing in thermal_zone_device_register(). Fixes: 584837618100 ("thermal/drivers/core: Use a char pointer for the cooling device name") Signed-off-by: Ziyang Xuan Reported-by: kernel test robot Reported-by: kernel test robot --- drivers/thermal/thermal_core.c | 7 ++++--- 1 file changed, 4 insertions(+), 3 deletions(-) diff --git a/drivers/thermal/thermal_core.c b/drivers/thermal/thermal_core.c index 97ef9b040b84..d2c196b298c1 100644 --- a/drivers/thermal/thermal_core.c +++ b/drivers/thermal/thermal_core.c @@ -888,7 +888,7 @@ __thermal_cooling_device_register(struct device_node *np, { struct thermal_cooling_device *cdev; struct thermal_zone_device *pos = NULL; - int ret; + int id, ret; if (!ops || !ops->get_max_state || !ops->get_cur_state || !ops->set_cur_state) @@ -901,7 +901,7 @@ __thermal_cooling_device_register(struct device_node *np, ret = ida_simple_get(&thermal_cdev_ida, 0, 0, GFP_KERNEL); if (ret < 0) goto out_kfree_cdev; - cdev->id = ret; + cdev->id = id = ret; cdev->type = kstrdup(type ? type : "", GFP_KERNEL); if (!cdev->type) { @@ -942,8 +942,9 @@ __thermal_cooling_device_register(struct device_node *np, out_kfree_type: kfree(cdev->type); put_device(&cdev->device); + cdev = NULL; out_ida_remove: - ida_simple_remove(&thermal_cdev_ida, cdev->id); + ida_simple_remove(&thermal_cdev_ida, id); out_kfree_cdev: kfree(cdev); return ERR_PTR(ret); -- 2.25.1