Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp5845121rwb; Mon, 14 Nov 2022 10:14:02 -0800 (PST) X-Google-Smtp-Source: AA0mqf7uqi9oPXZ3SWoR06wU0dhMAf/dzr+YfKHP45itpjuLo+bAlPnCT3IgfcMW74y/9rdR0xWc X-Received: by 2002:aa7:c90b:0:b0:467:4b3d:f2ed with SMTP id b11-20020aa7c90b000000b004674b3df2edmr12258172edt.101.1668449642412; Mon, 14 Nov 2022 10:14:02 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1668449642; cv=none; d=google.com; s=arc-20160816; b=M0kkKHRQrexMKSKoWeguGavZ7U3Thl0IlkC1w4eHjfJ5OL3Ln8ITLKAxp4WKMjv66Z M4Ru/6eACiLY7uYSFycdWhiIESfhOZ9UpK5mHe5UoWZZH+lyVbCAuzBjvDRgrJN44OnZ kWw5PcMgtIhZQyb08eW3fvzqC4YEYYlk7QP/040I6yglcm6z8GdFO2pdL5ygIPD4yglc Y0wFJLNhSHDfM7Io9E8nF5VWAV8tQL4QmKh0hpdp9YcZ6WrfQebffKk+oWkWZ6se/N4q HPmDadqVMvsl5d+WqQoPt7blBwdl/QhS8HVMcrTrAlV8iMjx3mqntS7uPOuknsJFPnka 25AQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date :dkim-signature; bh=0AbqeNjaOsfiur3EYmMvtppUkxv/c9hWLInJdz5fSNI=; b=iowYL1yZigGsh7Tmv6JvDGm5hXGoTciTEyxS+WAmd5Q5jCvaSGGeCMmUIW+qrPoIu4 SkS+trqUziCT5Mz5ykPmOHIeENDDfBdLWXfdt/r5tVhNXlNviD+Zn8zSxqG+KiOOgePV ZYDWyvA0Gff4Xoi3/gNmFPWtj8djDJ4lhmS6QRtlYP6SkE1KSv43H0Bqtuza8rlbdcRS Z8CWas/eO5YxT8N8XdAyJNY4YG/mzmSr8zkPFjSUezCuiwaMdmBq+5ihw0l0gyCl92we zV6mCboSQOXhX8ErkXcP8S882DbdDDaVZms2N3jcUToGQGKK9J0MzEXMobkmWYRGhsb/ 2q7g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@infradead.org header.s=bombadil.20210309 header.b=qAg4f+Si; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id m10-20020a056402510a00b004674af16d57si8917428edd.490.2022.11.14.10.13.40; Mon, 14 Nov 2022 10:14:02 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@infradead.org header.s=bombadil.20210309 header.b=qAg4f+Si; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236156AbiKNRek (ORCPT + 88 others); Mon, 14 Nov 2022 12:34:40 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:37964 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S237647AbiKNRef (ORCPT ); Mon, 14 Nov 2022 12:34:35 -0500 Received: from bombadil.infradead.org (bombadil.infradead.org [IPv6:2607:7c80:54:3::133]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 0CC271EC4D for ; Mon, 14 Nov 2022 09:34:32 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=infradead.org; s=bombadil.20210309; h=Sender:In-Reply-To:Content-Type: MIME-Version:References:Message-ID:Subject:Cc:To:From:Date:Reply-To: Content-Transfer-Encoding:Content-ID:Content-Description; bh=0AbqeNjaOsfiur3EYmMvtppUkxv/c9hWLInJdz5fSNI=; b=qAg4f+SiUWc1XAegbUvYM7xbs4 PQIly/SAzQH9hvm9d+t+jby3vzp1Hln/1iKCYXVBnnPCoPmPWjssKKPXVXTAJjMQ4BuQ70Ul/sYW4 x0tF6oorZqHWQXv6rUnOYFlr61mr+7uX80U0fE1TYdgFGN/2RK9KrT7uT/dYcZ09+x8beWc9o6Ekt yyEa6hyKyXOFCphWFKBafGLg5sXxDRNeQFm6u376mCwVD5N/Ypt7lLVFeQyrTbgR7QlcwJLHRjq3N m/tpOgiPHtUEBI0JeQ+aSoO+aFL7eCWNQqy2uqulQIcyxNeSL4r1yQOEvTfWB7VS/SJZQ7Jn3Wajr oIPJSX2A==; Received: from mcgrof by bombadil.infradead.org with local (Exim 4.94.2 #2 (Red Hat Linux)) id 1oudLc-003GLi-4w; Mon, 14 Nov 2022 17:34:16 +0000 Date: Mon, 14 Nov 2022 09:34:16 -0800 From: Luis Chamberlain To: Tejun Heo , Matthieu Castet , Stanislaw Gruszka , dmitry.torokhov@gmail.com, ming.lei@redhat.com Cc: Hillf Danton , syzbot , linux-kernel@vger.kernel.org, syzkaller-bugs@googlegroups.com, mcgrof@kernel.org Subject: Re: [syzbot] KASAN: use-after-free Read in kernfs_next_descendant_post (2) Message-ID: References: <000000000000c183f505eb721745@google.com> <20221021225228.1750-1-hdanton@sina.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: Sender: Luis Chamberlain X-Spam-Status: No, score=-4.0 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_EF,HEADER_FROM_DIFFERENT_DOMAINS, RCVD_IN_DNSWL_MED,SPF_HELO_NONE,SPF_NONE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Oct 31, 2022 at 12:53:00PM -1000, Tejun Heo wrote: > (cc'ing Luis for firmware loader and quoting the whole body) > > On Sat, Oct 22, 2022 at 06:52:28AM +0800, Hillf Danton wrote: > > On 20 Oct 2022 00:15:40 -0700 > > > syzbot has found a reproducer for the following issue on: > > > > > > HEAD commit: 55be6084c8e0 Merge tag 'timers-core-2022-10-05' of git://g.. > > > git tree: upstream > > > console+strace: https://syzkaller.appspot.com/x/log.txt?x=1449d53c880000 > > > kernel config: https://syzkaller.appspot.com/x/.config?x=df75278aabf0681a > > > dashboard link: https://syzkaller.appspot.com/bug?extid=6bc35f3913193fe7f0d3 > > > compiler: gcc (Debian 10.2.1-6) 10.2.1 20210110, GNU ld (GNU Binutils for Debian) 2.35.2 > > > syz repro: https://syzkaller.appspot.com/x/repro.syz?x=14e01c72880000 > > > C reproducer: https://syzkaller.appspot.com/x/repro.c?x=1128908c880000 > > > > See if the change to ueagle driver alone can survive syzbot test. > > > > #syz test https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git aae703b02f92 > > > > --- a/include/linux/netdevice.h > > +++ b/include/linux/netdevice.h > > @@ -3663,8 +3663,9 @@ static inline bool netif_attr_test_online(unsigned long j, > > static inline unsigned int netif_attrmask_next(int n, const unsigned long *srcp, > > unsigned int nr_bits) > > { > > - /* n is a prior cpu */ > > - cpu_max_bits_warn(n + 1, nr_bits); > > + /* -1 is a legal arg here. */ > > + if (n != -1) > > + cpu_max_bits_warn(n, nr_bits); > > > > if (srcp) > > return find_next_bit(srcp, nr_bits, n + 1); > > @@ -3685,8 +3686,9 @@ static inline int netif_attrmask_next_and(int n, const unsigned long *src1p, > > const unsigned long *src2p, > > unsigned int nr_bits) > > { > > - /* n is a prior cpu */ > > - cpu_max_bits_warn(n + 1, nr_bits); > > + /* -1 is a legal arg here. */ > > + if (n != -1) > > + cpu_max_bits_warn(n, nr_bits); > > > > if (src1p && src2p) > > return find_next_and_bit(src1p, src2p, nr_bits, n + 1); > > --- a/drivers/usb/atm/ueagle-atm.c > > +++ b/drivers/usb/atm/ueagle-atm.c > > @@ -597,9 +597,8 @@ static int uea_send_modem_cmd(struct usb > > } > > > > static void uea_upload_pre_firmware(const struct firmware *fw_entry, > > - void *context) > > + struct usb_device *usb) > > { > > - struct usb_device *usb = context; > > const u8 *pfw; > > u8 value; > > u32 crc = 0; > > @@ -679,6 +678,7 @@ static int uea_load_firmware(struct usb_ > > { > > int ret; > > char *fw_name = EAGLE_FIRMWARE; > > + const struct firmware *fw; > > > > uea_enters(usb); > > uea_info(usb, "pre-firmware device, uploading firmware\n"); > > @@ -701,13 +701,13 @@ static int uea_load_firmware(struct usb_ > > break; > > } > > > > - ret = request_firmware_nowait(THIS_MODULE, 1, fw_name, &usb->dev, > > - GFP_KERNEL, usb, > > - uea_upload_pre_firmware); > > + ret = request_firmware(&fw, fw_name, &usb->dev); > > if (ret) > > uea_err(usb, "firmware %s is not available\n", fw_name); > > - else > > + else { > > uea_info(usb, "loading firmware %s\n", fw_name); > > + uea_upload_pre_firmware(fw, usb); > > + } > > > > uea_leaves(usb); > > return ret; > > So, the problem is that while request_firmware_nowait() inc's the ref on the > device, if the device gets removed later, having a ref isn't sufficient for > adding stuff to the device. A relatively easy solution would be putting > these firmware load work items into its own workqueue and flushing it on > device removal path. Luis, what do you think? Since we *can* remove a device after we get a module reference and since fw_cache_is_setup() tries to use the device before get_device() (even though this is not the issue reported), I think perhaps the fix below may be generic and best. It would seem this 2After doing this, I considered simply removing the try_module_get() but a module which is not respnsible for creating a device is allowed to request firmware for an arbitrary device, and so that simplification should not be possible. This would fix 0cfc1e1e7b534 ("firmware loader: fix device lifetime") since v3.7 but as that commit mentions, there were issues even prior to this get_device() and so this fix is the proper solution to the reported issue in that commit. This issue would the date back to f8a4bd3456b98 ("firmware loader: embed device into firmware_priv structure") since v2.6.36. Please re-test and let me know if this fixes the issue reported. diff --git a/drivers/base/firmware_loader/main.c b/drivers/base/firmware_loader/main.c index 7c3590fd97c2..177d5767ad3b 100644 --- a/drivers/base/firmware_loader/main.c +++ b/drivers/base/firmware_loader/main.c @@ -1141,18 +1141,20 @@ request_firmware_nowait( const char *name, struct device *device, gfp_t gfp, void *context, void (*cont)(const struct firmware *fw, void *context)) { + int err = -ENOMEM; struct firmware_work *fw_work; + if (get_device(device)) + return -ENODEV; + fw_work = kzalloc(sizeof(struct firmware_work), gfp); if (!fw_work) - return -ENOMEM; + goto err_out; fw_work->module = module; fw_work->name = kstrdup_const(name, gfp); - if (!fw_work->name) { - kfree(fw_work); - return -ENOMEM; - } + if (!fw_work->name) + goto err_out_free_work; fw_work->device = device; fw_work->context = context; fw_work->cont = cont; @@ -1160,21 +1162,26 @@ request_firmware_nowait( (uevent ? FW_OPT_UEVENT : FW_OPT_USERHELPER); if (!uevent && fw_cache_is_setup(device, name)) { - kfree_const(fw_work->name); - kfree(fw_work); - return -EOPNOTSUPP; + err = -EOPNOTSUPP; + goto err_out_free_name; } if (!try_module_get(module)) { - kfree_const(fw_work->name); - kfree(fw_work); - return -EFAULT; + err = -EFAULT; + goto err_out_free_name; } - get_device(fw_work->device); INIT_WORK(&fw_work->work, request_firmware_work_func); schedule_work(&fw_work->work); return 0; + +err_out_free_name: + kfree_const(fw_work->name); +err_out_free_work: + kfree(fw_work); +err_out: + put_device(device); + return err; } EXPORT_SYMBOL(request_firmware_nowait);