Received: by 2002:a05:6a10:6d10:0:0:0:0 with SMTP id gq16csp783283pxb; Tue, 12 Apr 2022 13:20:42 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwHRZ40jHmGeSS5vR2B4XJGtLxUkRDs6B3gSpTCuqEhTMyPV1EixRIy1ojGygBBFh2u0SOm X-Received: by 2002:a17:903:1205:b0:151:8ae9:93ea with SMTP id l5-20020a170903120500b001518ae993eamr39405845plh.37.1649794842278; Tue, 12 Apr 2022 13:20:42 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1649794842; cv=none; d=google.com; s=arc-20160816; b=aqMxqCf6VgCAaQeT23PD6gEeSzN4wwRrGGRugcnxymfJY/A0eyRrC2FhAZblHGIB6b lWyBrzSA9weazLG8IRz9/XBaZI3OZcfM88d6O1K1yOZVWDF/WUMlh+zQnX7FO8XLqEWG a9v6zsvo+8acTIExugsuVAu91lmzClyvMRZdSGvR/16YnzyUHLLleZaPbBbKnuA9xK8F /sQTGZmFjZOjzWzfY5b9Lusw1WOC9C7gyCeVeOUm3adPXKkI77mu1i1IaISU3yw5HlA8 6bbFn9R6ZyztA9zMyEDbYpdelPKy0tqqMtnhCoP0M8dx39eOqIOvMdRNRdcLFmSYzEKk Xmtg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:content-language:subject:user-agent:mime-version :date:message-id:dkim-signature; bh=KUhDzzx2MAlPbcWv63GsQqoj7ottxYGGJAcpe5jo4VU=; b=xD3Ik40Cvt/LxKAYbbpRHoD3dFL1KZ1gz4Cf40vWpmMsnA3Qk1E0Esvs/0wZnk0eSb pQR472C5Xl9kGtCqNtLCD1olyQu8G5+bQ5DdeIGAg9Q1FnuEC4IMPLNvfSTGczYzYF7D bsEzx9zVL9hbXNO4SRb4OwNkUZbrbLKfN8dqBKD2bJuLIzS822FBhMRaJH5GO/kSAOxS pzskYbzuzFDhiDydc7Yj6/jHnr/YzbkTPQltRqroZQ4DyXqU/11nFddzss4cYAebQ0vp dHvwzCT57YwYVCKWl7aNI/Kre+cqiJ47/Om+6nY7eAQHUuXAYxrBULjw+2WSP+3wK1vM Sk7A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=kiJAUdTp; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [23.128.96.19]) by mx.google.com with ESMTPS id l11-20020a170903120b00b00153b2d16660si13342992plh.616.2022.04.12.13.20.41 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 12 Apr 2022 13:20:42 -0700 (PDT) Received-SPF: softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) client-ip=23.128.96.19; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=kiJAUdTp; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 85DFD9232F; Tue, 12 Apr 2022 13:03:13 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S242071AbiDJUZF (ORCPT + 99 others); Sun, 10 Apr 2022 16:25:05 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:56026 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S238700AbiDJUZE (ORCPT ); Sun, 10 Apr 2022 16:25:04 -0400 Received: from mail-qt1-x832.google.com (mail-qt1-x832.google.com [IPv6:2607:f8b0:4864:20::832]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id CB78E1114; Sun, 10 Apr 2022 13:22:52 -0700 (PDT) Received: by mail-qt1-x832.google.com with SMTP id q6so3869773qtn.4; Sun, 10 Apr 2022 13:22:52 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=message-id:date:mime-version:user-agent:subject:content-language:to :cc:references:from:in-reply-to:content-transfer-encoding; bh=KUhDzzx2MAlPbcWv63GsQqoj7ottxYGGJAcpe5jo4VU=; b=kiJAUdTp6mHZ9W+2FXece99XGWsE7VpOaw8f9OV6ZRad1g0CCrXRDgTzvni438b0lW pTn8CSjRLO40FtLjbyklUTktAIAV3lpJ3ZUjSnLbAy+9kM84GO7bW0pxvYknm/o60fZp tCCO7+cJuKhw7yfDPLtN3KPNq+MxDxgwymanaeXywS7/3q3SJl5TcJ/Ow+qldsCD/0ow REpLISNy6udu+k7bw5/+2nL5b4tBCm1FYbTqN65xli92jPVbewZ10BJb37a5pYAxMnrq yU1QhWICrUXKWv3vcP24Tz3f4QebzcNWLwbBBntMbFRyz9n16LHtF7713YYCw6HfZflb sexQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:message-id:date:mime-version:user-agent:subject :content-language:to:cc:references:from:in-reply-to :content-transfer-encoding; bh=KUhDzzx2MAlPbcWv63GsQqoj7ottxYGGJAcpe5jo4VU=; b=HbGe/QlclpnLdqFhv3Pbqq1aVJ143ghEjTOIxT/6DshWVkmQ8buDMESj6kDDKwYyFc /REQIxE1KOsjyKzfspklppUGqsu8i3IY8LhmLdBiT/tPzgRBSCgc+x9xUxyg/fN9gnN5 gqNl+EiGD0rj7yBoJgzMxD5YTxmD7IXKUAleJ64IZ+rITYG8ejj11XFkIq6sAaPFPXeN 7ep293Jf3Sb0gy7Q7rafCvADc2FMW5pNgfAgYFFiHZSjJgfwxwI2JHRj2VQaAscCUZal xcVfXoSZguRRcuQ0CekSWzVc9l8CAIPwbrCrqNEa882GYQh26Nr5GYTPfxpCytNbXfZw Wl2g== X-Gm-Message-State: AOAM532Fqi726xf9ppxnrDIpIEVdGcsS9+v5bLfZAb74dw7h3oGv4M3U RO5D6+nEk+4e4XBc33m+Hvk= X-Received: by 2002:ac8:4f57:0:b0:2ed:d8f:d0bc with SMTP id i23-20020ac84f57000000b002ed0d8fd0bcmr8472397qtw.280.1649622171841; Sun, 10 Apr 2022 13:22:51 -0700 (PDT) Received: from ?IPV6:2600:1700:2442:6db0:6c1b:d125:bcaa:58ab? ([2600:1700:2442:6db0:6c1b:d125:bcaa:58ab]) by smtp.gmail.com with ESMTPSA id g72-20020a379d4b000000b0069c0f9b1325sm2022549qke.21.2022.04.10.13.22.51 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Sun, 10 Apr 2022 13:22:51 -0700 (PDT) Message-ID: <069fdc56-6ac7-de79-c77e-48724ee478d3@gmail.com> Date: Sun, 10 Apr 2022 15:22:50 -0500 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Thunderbird/91.5.0 Subject: Re: [PATCH 1/1] of: overlay: of_overlay_apply() kfree() errors Content-Language: en-US To: Slawomir Stepien Cc: Rob Herring , pantelis.antoniou@konsulko.com, Slawomir Stepien , devicetree@vger.kernel.org, linux-kernel@vger.kernel.org, Geert Uytterhoeven , Alan Tull References: <20220408172103.371637-1-frowand.list@gmail.com> From: Frank Rowand In-Reply-To: Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-2.8 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,FREEMAIL_FORGED_FROMDOMAIN,FREEMAIL_FROM, HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,NICE_REPLY_A, RDNS_NONE,SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 4/9/22 01:52, Slawomir Stepien wrote: > On kwi 08, 2022 12:21, frowand.list@gmail.com wrote: >> From: Frank Rowand > > Hi Frank! > > See my one comment below. > >> Fix various kfree() issues related to of_overlay_apply(). >> - Double kfree() of fdt and tree when init_overlay_changeset() >> returns an error. >> - free_overlay_changeset() free of the root of the unflattened >> overlay (variable tree) instead of the memory that contains >> the unflattened overlay. >> - Move similar kfree()s from multiple error locations to a >> common error path (err_free_tree_unlocked:). >> >> Double kfree() >> Reported-by: Slawomir Stepien >> >> Signed-off-by: Frank Rowand >> --- >> drivers/of/overlay.c | 64 ++++++++++++++++++++++++++++---------------- >> 1 file changed, 41 insertions(+), 23 deletions(-) >> >> diff --git a/drivers/of/overlay.c b/drivers/of/overlay.c >> index d80160cf34bb..1b9a90d61496 100644 >> --- a/drivers/of/overlay.c >> +++ b/drivers/of/overlay.c >> @@ -58,6 +58,7 @@ struct fragment { >> * @id: changeset identifier >> * @ovcs_list: list on which we are located >> * @fdt: base of memory allocated to hold aligned FDT that was unflattened to create @overlay_tree >> + * @overlay_mem: the memory chunk that contains @overlay_tree >> * @overlay_tree: expanded device tree that contains the fragment nodes >> * @count: count of fragment structures >> * @fragments: fragment nodes in the overlay expanded device tree >> @@ -68,6 +69,7 @@ struct overlay_changeset { >> int id; >> struct list_head ovcs_list; >> const void *fdt; >> + const void *overlay_mem; >> struct device_node *overlay_tree; >> int count; >> struct fragment *fragments; >> @@ -720,6 +722,7 @@ static struct device_node *find_target(struct device_node *info_node) >> * init_overlay_changeset() - initialize overlay changeset from overlay tree >> * @ovcs: Overlay changeset to build >> * @fdt: base of memory allocated to hold aligned FDT that was unflattened to create @tree >> + * @tree_mem: Memory that contains @tree >> * @tree: Contains the overlay fragments and overlay fixup nodes >> * >> * Initialize @ovcs. Populate @ovcs->fragments with node information from >> @@ -730,13 +733,23 @@ static struct device_node *find_target(struct device_node *info_node) >> * detected in @tree, or -ENOSPC if idr_alloc() error. >> */ >> static int init_overlay_changeset(struct overlay_changeset *ovcs, >> - const void *fdt, struct device_node *tree) >> + const void *fdt, const void *tree_mem, struct device_node *tree) >> { >> struct device_node *node, *overlay_node; >> struct fragment *fragment; >> struct fragment *fragments; >> int cnt, id, ret; >> >> + /* >> + * Must set these fields before any error return. fdt and tree_mem >> + * will be freed by free_overlay_changeset(), which is called if >> + * init_overlay_changeset() returns an error. >> + */ >> + >> + ovcs->fdt = fdt; >> + ovcs->overlay_mem = tree_mem; >> + ovcs->overlay_tree = tree; >> + >> /* >> * Warn for some issues. Can not return -EINVAL for these until >> * of_unittest_apply_overlay() is fixed to pass these checks. >> @@ -750,9 +763,6 @@ static int init_overlay_changeset(struct overlay_changeset *ovcs, >> if (!of_node_is_root(tree)) >> pr_debug("%s() tree is not root\n", __func__); >> >> - ovcs->overlay_tree = tree; >> - ovcs->fdt = fdt; >> - >> INIT_LIST_HEAD(&ovcs->ovcs_list); >> >> of_changeset_init(&ovcs->cset); >> @@ -865,7 +875,7 @@ static void free_overlay_changeset(struct overlay_changeset *ovcs) >> * ovcs->fdt due to the policy that overlay notifiers are not allowed >> * to retain pointers into the overlay devicetree. >> */ >> - kfree(ovcs->overlay_tree); >> + kfree(ovcs->overlay_mem); >> kfree(ovcs->fdt); >> kfree(ovcs); >> } >> @@ -875,6 +885,7 @@ static void free_overlay_changeset(struct overlay_changeset *ovcs) >> * >> * of_overlay_apply() - Create and apply an overlay changeset >> * @fdt: base of memory allocated to hold the aligned FDT >> + * @tree_mem: Memory that contains @tree >> * @tree: Expanded overlay device tree >> * @ovcs_id: Pointer to overlay changeset id >> * >> @@ -913,31 +924,27 @@ static void free_overlay_changeset(struct overlay_changeset *ovcs) >> * id is returned to *ovcs_id. >> */ >> >> -static int of_overlay_apply(const void *fdt, struct device_node *tree, >> - int *ovcs_id) >> +static int of_overlay_apply(const void *fdt, void *tree_mem, >> + struct device_node *tree, int *ovcs_id) >> { >> struct overlay_changeset *ovcs; >> int ret = 0, ret_revert, ret_tmp; >> >> /* >> - * As of this point, fdt and tree belong to the overlay changeset. >> + * As of this point, fdt and tree_mem belong to the overlay changeset. >> * overlay changeset code is responsible for freeing them. >> */ >> >> if (devicetree_corrupt()) { >> pr_err("devicetree state suspect, refuse to apply overlay\n"); >> - kfree(fdt); >> - kfree(tree); >> ret = -EBUSY; >> - goto out; >> + goto err_free_tree_unlocked; >> } >> >> ovcs = kzalloc(sizeof(*ovcs), GFP_KERNEL); >> if (!ovcs) { >> - kfree(fdt); >> - kfree(tree); >> ret = -ENOMEM; >> - goto out; >> + goto err_free_tree_unlocked; >> } >> >> of_overlay_mutex_lock(); >> @@ -947,9 +954,14 @@ static int of_overlay_apply(const void *fdt, struct device_node *tree, >> if (ret) >> goto err_free_tree; >> >> - ret = init_overlay_changeset(ovcs, fdt, tree); >> + /* >> + * init_overlay_changeset() promises to add tree_mem and tree to ovcs >> + * even in the case of an early error return, so they can be freed by >> + * free_overlay_changeset(). >> + */ >> + ret = init_overlay_changeset(ovcs, fdt, tree_mem, tree); >> if (ret) >> - goto err_free_tree; >> + goto err_free_overlay_changeset; >> >> /* >> * after overlay_notify(), ovcs->overlay_tree related pointers may have >> @@ -999,7 +1011,7 @@ static int of_overlay_apply(const void *fdt, struct device_node *tree, >> >> err_free_tree: >> kfree(fdt); >> - kfree(tree); >> + kfree(tree_mem); >> >> err_free_overlay_changeset: >> free_overlay_changeset(ovcs); >> @@ -1008,9 +1020,14 @@ static int of_overlay_apply(const void *fdt, struct device_node *tree, >> mutex_unlock(&of_mutex); >> of_overlay_mutex_unlock(); >> >> -out: >> pr_debug("%s() err=%d\n", __func__, ret); >> >> + return ret; >> + >> +err_free_tree_unlocked: >> + kfree(fdt); >> + kfree(tree_mem); >> + >> return ret; >> } >> >> @@ -1019,6 +1036,7 @@ int of_overlay_fdt_apply(const void *overlay_fdt, u32 overlay_fdt_size, >> { >> void *new_fdt; >> void *new_fdt_align; >> + void *overlay_mem; >> int ret; >> u32 size; >> struct device_node *overlay_root = NULL; >> @@ -1046,18 +1064,17 @@ int of_overlay_fdt_apply(const void *overlay_fdt, u32 overlay_fdt_size, >> new_fdt_align = PTR_ALIGN(new_fdt, FDT_ALIGN_SIZE); >> memcpy(new_fdt_align, overlay_fdt, size); >> >> - of_fdt_unflatten_tree(new_fdt_align, NULL, &overlay_root); >> - if (!overlay_root) { >> + overlay_mem = of_fdt_unflatten_tree(new_fdt_align, NULL, &overlay_root); >> + if (!overlay_mem) { >> pr_err("unable to unflatten overlay_fdt\n"); >> ret = -EINVAL; >> goto out_free_new_fdt; >> } >> >> - ret = of_overlay_apply(new_fdt, overlay_root, ovcs_id); >> + ret = of_overlay_apply(new_fdt, overlay_mem, overlay_root, ovcs_id); >> if (ret < 0) { >> /* >> - * new_fdt and overlay_root now belong to the overlay >> - * changeset. >> + * new_fdt and overlay_mem now belong to the overlay changeset. >> * overlay changeset code is responsible for freeing them. >> */ >> goto out; >> @@ -1067,6 +1084,7 @@ int of_overlay_fdt_apply(const void *overlay_fdt, u32 overlay_fdt_size, >> >> >> out_free_new_fdt: >> + kfree(overlay_mem); > > There is no need to free this overlay_mem. You can end up here only when > overlay_mem is NULL. Thanks for catching this. There will be a new very different version of this patch reflecting Rob's comments. -Frank > >> kfree(new_fdt); >> >> out: >