Received: by 2002:a05:7412:a9a2:b0:e2:908c:2ebd with SMTP id o34csp946461rdh; Thu, 26 Oct 2023 23:22:23 -0700 (PDT) X-Google-Smtp-Source: AGHT+IE/j5dHNkJcxT+z9s+j4HKHU74KVtSekqJ9LB4ZbzZV92VZVkOBpawZwFvBIzwII+fDO+9N X-Received: by 2002:a67:e002:0:b0:457:e32d:1732 with SMTP id c2-20020a67e002000000b00457e32d1732mr2024833vsl.4.1698387743468; Thu, 26 Oct 2023 23:22:23 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1698387743; cv=none; d=google.com; s=arc-20160816; b=Bk96S05oaYPCf7j29HMtsk9b5rTRtzpo/tSBuPz3k7E9DfOvuR929D7RTXQLo7bQsM vIln61dZL+1YWy+8VEWjubW8qTy2V/E1uajhI8cCNO9QV+ZhD6Rc7sBDu6Go+1/i7Hrm uJX+zXuhbGQumHni39zqqMIVqqNMYdZt1aumYqdm/6HHk8/RBfPD7TGEsCCrT66tBixY vOmOqOT1+vkzI0mvKntHJI5Ia8jz+2abfV7E3R3pb/N7/uZcyAbmNzLqu90Nt29fgeJc 9vmHK/uWItJm8Vo/mFkty9LFy9DHjx5aIg97k9xxBg8Li2fagm4vJ16rXA0HByNBa1eC EOtg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:content-language:subject:user-agent:mime-version :date:message-id:dkim-signature; bh=qa/dq0zmDWiOzFsg/rd1Cz/3YUFetixgn1ucoDhzAW0=; fh=MffAGWFh5YSr9KRMCcT50ehdQTFsZ0D8OecigV7ofFg=; b=DHotbi5KunE8xkszWlSTRSQY6teZzZrviDJdjhyaHKzm62v/4LcsWPnZjTBCttF7Vi r5sxP4qclDmBlM9uDKIrmhck2F6nXJVCOFBEtreLYXNRGOeHGRdx/BFHq6QBoco3086i VaV8vpj7xh17PmaLDrOcEEWjQSMB92zP0LSkT+cgQFoDBfBybwqT/wjRKgKWEF1c27JC EmEJj1TFeoo16F9yt3PID5N/HXkp8NmEvL8np+43Y6U0DOgx9hgSSAi+xhbgxOhvRD47 JK8veXUMvnmV6vYZLmQXBqvaQM0KIz9w1dm0NfPtoZC5oQrHcQnyzofV6otPBW36CRk5 97pw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@quicinc.com header.s=qcppdkim1 header.b=OEb9Yc0Y; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.37 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=quicinc.com Return-Path: Received: from snail.vger.email (snail.vger.email. [23.128.96.37]) by mx.google.com with ESMTPS id f4-20020a256a04000000b00d9a49bac80dsi1574446ybc.53.2023.10.26.23.22.23 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 26 Oct 2023 23:22:23 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.37 as permitted sender) client-ip=23.128.96.37; Authentication-Results: mx.google.com; dkim=pass header.i=@quicinc.com header.s=qcppdkim1 header.b=OEb9Yc0Y; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.37 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=quicinc.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by snail.vger.email (Postfix) with ESMTP id 3D69880417D4; Thu, 26 Oct 2023 23:22:22 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at snail.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1345123AbjJ0GWV (ORCPT + 99 others); Fri, 27 Oct 2023 02:22:21 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:54466 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229590AbjJ0GWU (ORCPT ); Fri, 27 Oct 2023 02:22:20 -0400 Received: from mx0b-0031df01.pphosted.com (mx0b-0031df01.pphosted.com [205.220.180.131]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id B5C461A1 for ; Thu, 26 Oct 2023 23:22:17 -0700 (PDT) Received: from pps.filterd (m0279868.ppops.net [127.0.0.1]) by mx0a-0031df01.pphosted.com (8.17.1.19/8.17.1.19) with ESMTP id 39R6BA9m028292; Fri, 27 Oct 2023 06:22:10 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=quicinc.com; h=message-id : date : mime-version : subject : to : cc : references : from : in-reply-to : content-type : content-transfer-encoding; s=qcppdkim1; bh=qa/dq0zmDWiOzFsg/rd1Cz/3YUFetixgn1ucoDhzAW0=; b=OEb9Yc0YcxyAhJC8GHtcl8aWSJAgJYNgEuN0LpBX9EJaH0iIdoD0otEFf3yXVKMT8M8Z Vs0eNE1mgBZci15lzmnxr8UpZgsFGiGqGuN3zbMJWVDM0rixzvUoZUFE5qQNru718+v7 C9+srNpt3Sr6zd0KhbNgEUNfnhrLEbO32So1o3aYKvn5+Ov/q8meIDExWMjtGusDakfw grfJKLKQPrVmeIZUvyPoRWN8Qmn36H63ltv872SnxDIZBVzeGEJn283dtqfdAUZwZC3D 0VO75bLKG/HkqoKSm6dezJhD7egiSwKixLgEEeF8+b5ZIo7OxCrKfInqzsdN+6rAVp9h CQ== Received: from nasanppmta03.qualcomm.com (i-global254.qualcomm.com [199.106.103.254]) by mx0a-0031df01.pphosted.com (PPS) with ESMTPS id 3tyxqgh6wp-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Fri, 27 Oct 2023 06:22:10 +0000 Received: from nasanex01c.na.qualcomm.com (nasanex01c.na.qualcomm.com [10.45.79.139]) by NASANPPMTA03.qualcomm.com (8.17.1.5/8.17.1.5) with ESMTPS id 39R6M9v8003791 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Fri, 27 Oct 2023 06:22:09 GMT Received: from [10.214.66.81] (10.80.80.8) by nasanex01c.na.qualcomm.com (10.45.79.139) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1118.39; Thu, 26 Oct 2023 23:22:03 -0700 Message-ID: Date: Fri, 27 Oct 2023 11:52:00 +0530 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:102.0) Gecko/20100101 Thunderbird/102.13.0 Subject: Re: [PATCH] Devcoredump: fix use-after-free issue when releasing devcd device Content-Language: en-US To: Yu Wang , , , CC: , References: <20231027055521.2679-1-quic_yyuwang@quicinc.com> From: Mukesh Ojha In-Reply-To: <20231027055521.2679-1-quic_yyuwang@quicinc.com> Content-Type: text/plain; charset="UTF-8"; format=flowed Content-Transfer-Encoding: 7bit X-Originating-IP: [10.80.80.8] X-ClientProxiedBy: nasanex01a.na.qualcomm.com (10.52.223.231) To nasanex01c.na.qualcomm.com (10.45.79.139) X-QCInternal: smtphost X-Proofpoint-Virus-Version: vendor=nai engine=6200 definitions=5800 signatures=585085 X-Proofpoint-GUID: T3brrAxSP_X6_s9BgbTPzPAbTaIqf3U1 X-Proofpoint-ORIG-GUID: T3brrAxSP_X6_s9BgbTPzPAbTaIqf3U1 X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.272,Aquarius:18.0.987,Hydra:6.0.619,FMLib:17.11.176.26 definitions=2023-10-27_03,2023-10-26_01,2023-05-22_02 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 impostorscore=0 clxscore=1011 lowpriorityscore=0 mlxscore=0 priorityscore=1501 spamscore=0 phishscore=0 mlxlogscore=999 bulkscore=0 suspectscore=0 malwarescore=0 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2310240000 definitions=main-2310270056 X-Spam-Status: No, score=-5.4 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,NICE_REPLY_A, RCVD_IN_DNSWL_BLOCKED,SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (snail.vger.email [0.0.0.0]); Thu, 26 Oct 2023 23:22:22 -0700 (PDT) On 10/27/2023 11:25 AM, Yu Wang wrote: > With sample code as below, it may hit use-after-free issue when > releasing devcd device. > > struct my_coredump_state { > struct completion dump_done; > ... > }; > > static void my_coredump_free(void *data) > { > struct my_coredump_state *dump_state = data; > ... > complete(&dump_state->dump_done); > } > > static void my_dev_release(struct device *dev) > { > kfree(dev); > } > > static void my_coredump() > { > struct my_coredump_state dump_state; > struct device *new_device = > kzalloc(sizeof(*new_device), GFP_KERNEL); > > ... > new_device->release = my_dev_release; > device_initialize(new_device); > ... > device_add(new_device); > ... > init_completion(&dump_state.dump_done); > dev_coredumpm(new_device, NULL, &dump_state, datalen, GFP_KERNEL, > my_coredump_read, my_coredump_free); > wait_for_completion(&dump_state.dump_done); > device_del(new_device); > put_device(new_device); > } > > In devcoredump framework, devcd_dev_release() will be called when > releasing the devcd device, it will call the free() callback first > and try to delete the symlink in sysfs directory of the failing device. > Eventhough it has checked 'devcd->failing_dev->kobj.sd' before that, > there is no mechanism to ensure it's still available when accessing > it in kernfs_find_ns(), refer to the diagram as below: > > Thread A was waiting for 'dump_state.dump_done' at #A-1-2 after > calling dev_coredumpm(). > When thread B calling devcd->free() at #B-2-1, it wakes up > thread A from point #A-1-2, which will call device_del() to > delete the device. > If #B-2-2 comes before #A-3-1, but #B-4 comes after #A-4, it > will hit use-after-free issue when trying to access > 'devcd->failing_dev->kobj.sd'. > > #A-1-1: dev_coredumpm() > #A-1-2: wait_for_completion(&dump_state.dump_done) > #A-1-3: device_del() > #A-2: kobject_del() > #A-3-1: sysfs_remove_dir() --> set kobj->sd=NULL > #A-3-2: kernfs_put() > #A-4: kmem_cache_free() --> free kobj->sd > > #B-1: devcd_dev_release() > #B-2-1: devcd->free(devcd->data) > #B-2-2: check devcd->failing_dev->kobj.sd > #B-2-3: sysfs_delete_link() > #B-3: kernfs_remove_by_name_ns() > #B-4: kernfs_find_ns() --> access devcd->failing_dev->kobj.sd > > To fix this issue, put operations on devcd->failing_dev before > calling the free() callback in devcd_dev_release(). > > Signed-off-by: Yu Wang Awesome explanation. Reviewed-by: Mukesh Ojha -Mukesh > --- > drivers/base/devcoredump.c | 5 ++--- > 1 file changed, 2 insertions(+), 3 deletions(-) > > diff --git a/drivers/base/devcoredump.c b/drivers/base/devcoredump.c > index 91536ee05f14..35c704ddfeae 100644 > --- a/drivers/base/devcoredump.c > +++ b/drivers/base/devcoredump.c > @@ -83,9 +83,6 @@ static void devcd_dev_release(struct device *dev) > { > struct devcd_entry *devcd = dev_to_devcd(dev); > > - devcd->free(devcd->data); > - module_put(devcd->owner); > - > /* > * this seems racy, but I don't see a notifier or such on > * a struct device to know when it goes away? > @@ -95,6 +92,8 @@ static void devcd_dev_release(struct device *dev) > "devcoredump"); > > put_device(devcd->failing_dev); > + devcd->free(devcd->data); > + module_put(devcd->owner); > kfree(devcd); > } >