Received: by 2002:a05:7412:a9a2:b0:e2:908c:2ebd with SMTP id o34csp1074787rdh; Fri, 27 Oct 2023 04:12:34 -0700 (PDT) X-Google-Smtp-Source: AGHT+IF8no9uX8uwVejRGDais41ccw4ixv4gIciKwJX6YQLWkZ6OktdAtDEPe5QkuBeyYtloB5yf X-Received: by 2002:a05:6870:1588:b0:1e9:8ab9:11cd with SMTP id j8-20020a056870158800b001e98ab911cdmr3101321oab.45.1698405153710; Fri, 27 Oct 2023 04:12:33 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1698405153; cv=none; d=google.com; s=arc-20160816; b=T/VKelsc1iOFaS9XG1McFPK9GSaaTjrLcOnXKD4+X0ov3ARqqiQwtkxOB+KjoOZsCu d+iy14ajaWVih813GhuU0byV1/v4kJdTIeu86OWCaD/RZyI5kVySgORrGkFfp5xMeKPM CulkaV9s3iDg6Shmlwd1ZXxzgRic2v8RzR+PUTkmaRmLJBkWxTC8hcv2VMXdur++5o0Q XvPjj4Cb76oLJVueXW1cYOgqWCv4fNrk3goFclza2ZfH/rw2yJOfO1vKxPN/djK0Irj5 ZCbyNUs14OcvVAf5BFFfR8SEmAgT+vmiC2wAq92LFlTaRVdvD7xFUEJFL+qTlKOz6IbM ZX+w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=pdVYGStVlVhC+cJ2VDIigygQ3QY6fWBbUX9GmQCLEL0=; fh=toXUYqGPmqt8E+jCPP/hhtAqg6oRv9pWZyiYYTs/Eb4=; b=ruDIfzdw+UA7wMBt8oYUI4Nw9pCQwq48Z1bPs0almSH5kzKwJz3/SSs/9ZCc3u179Y bXVBjkLczu73kPVo6wfgkZ9r2vOFRfhgWW2ap+7B6Kibm0deruhIjUnlkMrFoWAHDldC I35YVBLJLUdowFz7I16JqEClwlzmiHXKoQo2kRSj+2aR1SGPTZePWxA+1P0Fkzt8FCwB Aqynh3GdwoNalqLHO3zc35xMDFVpbjMaShNwEqPimBR6lJE04Xs52R4nID2Q1DCoTlyB FV04zbSQ0Gm3XiD/vEs8JsjR4HRuXulUh4aFxk/MjesJk2v30rSs5mJ0pEq+rBrNg1F/ fQHw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=1r+k+tzU; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:7 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from snail.vger.email (snail.vger.email. [2620:137:e000::3:7]) by mx.google.com with ESMTPS id i187-20020a256dc4000000b00d9cb53e5194si1679363ybc.681.2023.10.27.04.12.32 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 27 Oct 2023 04:12:33 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:7 as permitted sender) client-ip=2620:137:e000::3:7; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=1r+k+tzU; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:7 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by snail.vger.email (Postfix) with ESMTP id 76E3082F349A; Fri, 27 Oct 2023 04:12:20 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at snail.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1345747AbjJ0LMQ (ORCPT + 99 others); Fri, 27 Oct 2023 07:12:16 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:53486 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1345727AbjJ0LMO (ORCPT ); Fri, 27 Oct 2023 07:12:14 -0400 Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 268C2194 for ; Fri, 27 Oct 2023 04:12:12 -0700 (PDT) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 46FE4C433C8; Fri, 27 Oct 2023 11:12:11 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1698405131; bh=5SfLpsNjYKsmFGqhrTveGezl3NSTwchqI/ptUgfCG6Y=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=1r+k+tzUq4hL0SGIGwLFtCbwT6E2Q8/lK7YWA+N4NypNE+hblQqnGmsdc2ICMfTym aYWQaAGyY7OEEWykxxxBmEZtCMsN/iw786HzKRwTgDcTIsWA0cdYL86JN9hTpIdULs TQo4FBreXYwEPZUFogzuhyHTmIZtfyu20SVjWJXQ= Date: Fri, 27 Oct 2023 13:12:08 +0200 From: Greg KH To: Yu Wang Cc: johannes@sipsolutions.net, rafael@kernel.org, linux-kernel@vger.kernel.org, kernel@quicinc.com Subject: Re: [PATCH] Devcoredump: fix use-after-free issue when releasing devcd device Message-ID: <2023102757-spree-unruly-dcd6@gregkh> References: <20231027055521.2679-1-quic_yyuwang@quicinc.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20231027055521.2679-1-quic_yyuwang@quicinc.com> X-Spam-Status: No, score=-4.4 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_MED, SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (snail.vger.email [0.0.0.0]); Fri, 27 Oct 2023 04:12:20 -0700 (PDT) On Thu, Oct 26, 2023 at 10:55:21PM -0700, Yu Wang wrote: > With sample code as below, it may hit use-after-free issue when > releasing devcd device. > > struct my_coredump_state { > struct completion dump_done; > ... > }; > > static void my_coredump_free(void *data) > { > struct my_coredump_state *dump_state = data; > ... > complete(&dump_state->dump_done); > } > > static void my_dev_release(struct device *dev) > { > kfree(dev); > } > > static void my_coredump() > { > struct my_coredump_state dump_state; > struct device *new_device = > kzalloc(sizeof(*new_device), GFP_KERNEL); > > ... > new_device->release = my_dev_release; > device_initialize(new_device); > ... > device_add(new_device); > ... > init_completion(&dump_state.dump_done); > dev_coredumpm(new_device, NULL, &dump_state, datalen, GFP_KERNEL, > my_coredump_read, my_coredump_free); > wait_for_completion(&dump_state.dump_done); > device_del(new_device); > put_device(new_device); > } > > In devcoredump framework, devcd_dev_release() will be called when > releasing the devcd device, it will call the free() callback first > and try to delete the symlink in sysfs directory of the failing device. > Eventhough it has checked 'devcd->failing_dev->kobj.sd' before that, > there is no mechanism to ensure it's still available when accessing > it in kernfs_find_ns(), refer to the diagram as below: > > Thread A was waiting for 'dump_state.dump_done' at #A-1-2 after > calling dev_coredumpm(). > When thread B calling devcd->free() at #B-2-1, it wakes up > thread A from point #A-1-2, which will call device_del() to > delete the device. > If #B-2-2 comes before #A-3-1, but #B-4 comes after #A-4, it > will hit use-after-free issue when trying to access > 'devcd->failing_dev->kobj.sd'. > > #A-1-1: dev_coredumpm() > #A-1-2: wait_for_completion(&dump_state.dump_done) > #A-1-3: device_del() > #A-2: kobject_del() > #A-3-1: sysfs_remove_dir() --> set kobj->sd=NULL > #A-3-2: kernfs_put() > #A-4: kmem_cache_free() --> free kobj->sd > > #B-1: devcd_dev_release() > #B-2-1: devcd->free(devcd->data) > #B-2-2: check devcd->failing_dev->kobj.sd > #B-2-3: sysfs_delete_link() > #B-3: kernfs_remove_by_name_ns() > #B-4: kernfs_find_ns() --> access devcd->failing_dev->kobj.sd > > To fix this issue, put operations on devcd->failing_dev before > calling the free() callback in devcd_dev_release(). > > Signed-off-by: Yu Wang > --- > drivers/base/devcoredump.c | 5 ++--- > 1 file changed, 2 insertions(+), 3 deletions(-) Also, what commit id does this fix? thanks, greg k-h