Received: by 2002:ac2:464d:0:0:0:0:0 with SMTP id s13csp3669489lfo; Mon, 23 May 2022 10:54:30 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyAeFB5dSqW3mzIBnIlRXYB9Lb6VMmzWwBirUZhxZn1M91CMUv+cxYQO/VrMk7WeJ5VddJa X-Received: by 2002:a63:241:0:b0:3c5:fc11:ab56 with SMTP id 62-20020a630241000000b003c5fc11ab56mr21442732pgc.193.1653328470525; Mon, 23 May 2022 10:54:30 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1653328470; cv=none; d=google.com; s=arc-20160816; b=bEOaCIwjY0tnBDWSzg1dIN8vOkF+5GYbKDwpjm6XanYC2X3kVrdUmm7xuR9pig8zMC oIg5n/QyaLQZYuHc0tngb6KNMdEmhDeAtoykKRiF8pKZnVeyeyLGxAPTNx8fHXLn5Psn b3yOVahDWjdKRY09KuYGSeIovnyiZnF7PdD6UpLQJE8+Bdq2lLhRYIALR7aYO2Cptqot L5hYfvG5TBjWBX4FXE8tw+my7NhCstQKemhDoFOsNy5h+LDNf4skjPx2Yjxf0IhO6mH8 84+mNvrWkyBsOHa27FpOOihxEPKJSd+cQxI+RzI0Br6a1HWlzOSpoG6sltPpv8Ch65XI 6NBQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=sjjniFPLgeX1q7JwSZ+bKdc2EHuDQzQu93J/f0Ez+IU=; b=YitRZhhYOIUeH5jOIntK7psDwSFsdiVLe6PAOAHJ64qbIQi7QyChZQFRwjMXXq3IIA zHWxmEML6wa/MKDjzo3xLX3yNkzfWLB7kIiScIwkM87SmmS/L8SGdpCF4yJHKy8mqD86 elr943YpGqkUjxgXDZ+lRLjyZpfZbqgEIdEqpUUiYr+EfB1ETKY7f7JTRo3T5Pg9Lhqq 34tj31kGSNvjAm7uqZF6PcJIwaOIuCi+D12eCy1RDCjoGWUo3cXu9BftQKbjeahEv4xr mfjSIDa4V9YL3x8vPoEXhZWdXnFiKEKf3jmGh0ddnsOASyLxTEC+1LCD1r7lrGj4xMMy wvmw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=gzjHEAeZ; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [23.128.96.19]) by mx.google.com with ESMTPS id c20-20020a170902b69400b00161a06e7f53si10451023pls.292.2022.05.23.10.54.29 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 23 May 2022 10:54:30 -0700 (PDT) Received-SPF: softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) client-ip=23.128.96.19; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=gzjHEAeZ; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 1BF071D0C3; Mon, 23 May 2022 10:51:15 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S243886AbiEWRrY (ORCPT + 99 others); Mon, 23 May 2022 13:47:24 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:38804 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S242990AbiEWR2Q (ORCPT ); Mon, 23 May 2022 13:28:16 -0400 Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id D34778DDFA; Mon, 23 May 2022 10:25:02 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id 4E847B81201; Mon, 23 May 2022 17:24:18 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id AE0F4C385A9; Mon, 23 May 2022 17:24:16 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1653326657; bh=cexE1aFde1gdOEfAfUUm4v7S/Vt5OzCWmuXeGZWXGpA=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=gzjHEAeZMmWmYXDUwbURDwpJFPC0VjUW/lsvcNwD2Y2sndAN5MGqtUKAne8XPTQR9 zcHDM7miOX8X7RkYdgo89XbEHbKknukq/9atcIMJTUgha1QnOrikpfZn990SyIfsUR tAez/EKEPuwPDbscm5sN1sYvQ2wXankYxBeEkMBM= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Vincent Whitchurch , Alexandre Belloni , Sasha Levin Subject: [PATCH 5.17 019/158] rtc: fix use-after-free on device removal Date: Mon, 23 May 2022 19:02:56 +0200 Message-Id: <20220523165833.811345525@linuxfoundation.org> X-Mailer: git-send-email 2.36.1 In-Reply-To: <20220523165830.581652127@linuxfoundation.org> References: <20220523165830.581652127@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-2.6 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,RDNS_NONE,SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Vincent Whitchurch [ Upstream commit c8fa17d9f08a448184f03d352145099b5beb618e ] If the irqwork is still scheduled or running while the RTC device is removed, a use-after-free occurs in rtc_timer_do_work(). Cleanup the timerqueue and ensure the work is stopped to fix this. BUG: KASAN: use-after-free in mutex_lock+0x94/0x110 Write of size 8 at addr ffffff801d846338 by task kworker/3:1/41 Workqueue: events rtc_timer_do_work Call trace: mutex_lock+0x94/0x110 rtc_timer_do_work+0xec/0x630 process_one_work+0x5fc/0x1344 ... Allocated by task 551: kmem_cache_alloc_trace+0x384/0x6e0 devm_rtc_allocate_device+0xf0/0x574 devm_rtc_device_register+0x2c/0x12c ... Freed by task 572: kfree+0x114/0x4d0 rtc_device_release+0x64/0x80 device_release+0x8c/0x1f4 kobject_put+0x1c4/0x4b0 put_device+0x20/0x30 devm_rtc_release_device+0x1c/0x30 devm_action_release+0x54/0x90 release_nodes+0x124/0x310 devres_release_group+0x170/0x240 i2c_device_remove+0xd8/0x314 ... Last potentially related work creation: insert_work+0x5c/0x330 queue_work_on+0xcc/0x154 rtc_set_time+0x188/0x5bc rtc_dev_ioctl+0x2ac/0xbd0 ... Signed-off-by: Vincent Whitchurch Signed-off-by: Alexandre Belloni Link: https://lore.kernel.org/r/20211210160951.7718-1-vincent.whitchurch@axis.com Signed-off-by: Sasha Levin --- drivers/rtc/class.c | 9 +++++++++ 1 file changed, 9 insertions(+) diff --git a/drivers/rtc/class.c b/drivers/rtc/class.c index 4b460c61f1d8..40d504dac1a9 100644 --- a/drivers/rtc/class.c +++ b/drivers/rtc/class.c @@ -26,6 +26,15 @@ struct class *rtc_class; static void rtc_device_release(struct device *dev) { struct rtc_device *rtc = to_rtc_device(dev); + struct timerqueue_head *head = &rtc->timerqueue; + struct timerqueue_node *node; + + mutex_lock(&rtc->ops_lock); + while ((node = timerqueue_getnext(head))) + timerqueue_del(head, node); + mutex_unlock(&rtc->ops_lock); + + cancel_work_sync(&rtc->irqwork); ida_simple_remove(&rtc_ida, rtc->id); mutex_destroy(&rtc->ops_lock); -- 2.35.1