Received: by 2002:a05:7412:a9a2:b0:e2:908c:2ebd with SMTP id o34csp1667599rdh; Sat, 28 Oct 2023 02:21:28 -0700 (PDT) X-Google-Smtp-Source: AGHT+IH+obODVZHR2O1Xd/SBqv8ggLRPGTuciE+OuHDEP+acbnDMq9vJNxjM3OB6m6yNYK2M/Gv8 X-Received: by 2002:a05:6808:313:b0:3ad:ff3e:d25c with SMTP id i19-20020a056808031300b003adff3ed25cmr5500846oie.53.1698484888611; Sat, 28 Oct 2023 02:21:28 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1698484888; cv=none; d=google.com; s=arc-20160816; b=1EZOjIJPXAIn20q3x29K+ueCeJHiwq5Ua7uPqpvFEfWd0INUosKrpMX81zZP9rEkDM CamicYq+MLpzIk6S/LEF3otAJhFKXqgcA9cniv1hbbOoL5iKo6H90uP2YhuT6FCeADxO 2/R9/ZjifC2PYehR5elAT5F4Gpj4rL8TIYawe2REeMtkkcV3rERrlPsxoWltXxyyMsd4 OZb9p1iGZfvyzN0ZR7r10jCm9xgGVHNWCvJZg3LthwUqkyyW4eJChkKp6Z6C+SO/XE+3 DsjYkcPLWwjIXR6jT51DyypEgzoK0sWoouzCHSGeiMXqVZSUt2+H0S/oZXzqddFF/HxO kkBA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:references :cc:to:from:content-language:subject:user-agent:mime-version:date :message-id:dkim-signature; bh=DgYGGqF+qVVYIYEoe4B5BqWT4HJb1lY/XVlj3SH5pgc=; fh=MffAGWFh5YSr9KRMCcT50ehdQTFsZ0D8OecigV7ofFg=; b=w39dS4vzscdbuIkqqwuDgmsqiPKNXQ7fXbU9xN0pvJfUGLDcDfqB2wh7uQ8AhlduGf 4A5wQLu4IFNf+UPgHAnjB3NnMh7Z6WlWLfF7XZ/U5SNWtq/APM/v+VvVkR3r9oiKzRb1 wDvfsrc3by7/AZ7DU2xjbVFibhMRAiljSuEDlX8WgPpmCyN9TAS/pp9N+mN//VBNozaH 6P1hkGeW1SYFKfgJtHwlaVP5wdq1cbJLMjCUAJMId/95wpvu2N8g/oOQ6fjcWQlAgTll VOnZUIVuTmRNkeJ2fDckjnKUfQcGtV85V7gDKwf8LCBFOFHCNJHJy1m2Q94yzWpNLc8i o+7w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@quicinc.com header.s=qcppdkim1 header.b="jx2d/hYl"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:8 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=quicinc.com Return-Path: Received: from fry.vger.email (fry.vger.email. [2620:137:e000::3:8]) by mx.google.com with ESMTPS id j25-20020a635959000000b005b92b8e70e9si2293671pgm.301.2023.10.28.02.21.28 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 28 Oct 2023 02:21:28 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:8 as permitted sender) client-ip=2620:137:e000::3:8; Authentication-Results: mx.google.com; dkim=pass header.i=@quicinc.com header.s=qcppdkim1 header.b="jx2d/hYl"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:8 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=quicinc.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by fry.vger.email (Postfix) with ESMTP id BA6FC80C7762; Sat, 28 Oct 2023 02:21:25 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at fry.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229645AbjJ1JVN (ORCPT + 99 others); Sat, 28 Oct 2023 05:21:13 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:33744 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229579AbjJ1JVL (ORCPT ); Sat, 28 Oct 2023 05:21:11 -0400 Received: from mx0a-0031df01.pphosted.com (mx0a-0031df01.pphosted.com [205.220.168.131]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 471C8C6 for ; Sat, 28 Oct 2023 02:21:08 -0700 (PDT) Received: from pps.filterd (m0279865.ppops.net [127.0.0.1]) by mx0a-0031df01.pphosted.com (8.17.1.19/8.17.1.19) with ESMTP id 39S9IgBG002274; Sat, 28 Oct 2023 09:20:54 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=quicinc.com; h=message-id : date : mime-version : subject : from : to : cc : references : in-reply-to : content-type : content-transfer-encoding; s=qcppdkim1; bh=DgYGGqF+qVVYIYEoe4B5BqWT4HJb1lY/XVlj3SH5pgc=; b=jx2d/hYl7JYU+ny1dngT6Q9BiGpuV6smJmxLpugsz1p6nHNRJ2bSom5AVf6dSyJzJJhP DFNnNnF1Z9SV9hZ8C0sknyCsWsPR1herOcXgSJa6joriDTSx/Q7aCnlBnJPdB0aXwo8+ +5iLBPNnpMk7OZe/FH/qU+J45lZvs8lXtohtDQzkIIwJp3MMGhm0pqfs4xKjCI+gySFm f+6fADqURQioUg95pc33W020ksjk8KKqmRUsv1jHi7YfUndhUtmZHb6Z5JQ3NZ1Ovaqh Ry/nPrHvjedFJ36dQa9Ott0NVoD21ym9zrMdpjOkTwbbIG1oW0WKbaT0pbOgfqtg/5sd yQ== Received: from nasanppmta03.qualcomm.com (i-global254.qualcomm.com [199.106.103.254]) by mx0a-0031df01.pphosted.com (PPS) with ESMTPS id 3u0s8yrfm3-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Sat, 28 Oct 2023 09:20:54 +0000 Received: from nasanex01c.na.qualcomm.com (nasanex01c.na.qualcomm.com [10.45.79.139]) by NASANPPMTA03.qualcomm.com (8.17.1.5/8.17.1.5) with ESMTPS id 39S9KrGX015402 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Sat, 28 Oct 2023 09:20:53 GMT Received: from [10.216.57.41] (10.80.80.8) by nasanex01c.na.qualcomm.com (10.45.79.139) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1118.39; Sat, 28 Oct 2023 02:20:47 -0700 Message-ID: <867877cc-ea3d-31e9-97ba-0764e1f05b9e@quicinc.com> Date: Sat, 28 Oct 2023 14:50:44 +0530 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:102.0) Gecko/20100101 Thunderbird/102.13.0 Subject: Re: [PATCH] Devcoredump: fix use-after-free issue when releasing devcd device Content-Language: en-US From: Mukesh Ojha To: Yu Wang , , , CC: , References: <20231027055521.2679-1-quic_yyuwang@quicinc.com> In-Reply-To: Content-Type: text/plain; charset="UTF-8"; format=flowed Content-Transfer-Encoding: 8bit X-Originating-IP: [10.80.80.8] X-ClientProxiedBy: nasanex01a.na.qualcomm.com (10.52.223.231) To nasanex01c.na.qualcomm.com (10.45.79.139) X-QCInternal: smtphost X-Proofpoint-Virus-Version: vendor=nai engine=6200 definitions=5800 signatures=585085 X-Proofpoint-GUID: 4ktEh3FOOOPl9J3NMjo5er8JeGnZvQk_ X-Proofpoint-ORIG-GUID: 4ktEh3FOOOPl9J3NMjo5er8JeGnZvQk_ X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.272,Aquarius:18.0.987,Hydra:6.0.619,FMLib:17.11.176.26 definitions=2023-10-28_06,2023-10-27_01,2023-05-22_02 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 clxscore=1015 adultscore=0 suspectscore=0 spamscore=0 mlxlogscore=999 mlxscore=0 malwarescore=0 phishscore=0 priorityscore=1501 lowpriorityscore=0 bulkscore=0 impostorscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2310240000 definitions=main-2310280070 X-Spam-Status: No, score=-4.2 required=5.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI, NICE_REPLY_A,SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on fry.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (fry.vger.email [0.0.0.0]); Sat, 28 Oct 2023 02:21:25 -0700 (PDT) On 10/27/2023 11:52 AM, Mukesh Ojha wrote: > > > On 10/27/2023 11:25 AM, Yu Wang wrote: >> With sample code as below, it may hit use-after-free issue when >> releasing devcd device. >> >>      struct my_coredump_state { >>          struct completion dump_done; >>          ... >>      }; >> >>      static void my_coredump_free(void *data) >>      { >>          struct my_coredump_state *dump_state = data; >>          ... >>          complete(&dump_state->dump_done); >>      } >> >>      static void my_dev_release(struct device *dev) >>      { >>          kfree(dev); >>      } >> >>      static void my_coredump() >>      { >>          struct my_coredump_state dump_state; >>          struct device *new_device = >>              kzalloc(sizeof(*new_device), GFP_KERNEL); >> >>          ... >>          new_device->release = my_dev_release; >>          device_initialize(new_device); >>          ... >>          device_add(new_device); >>          ... >>          init_completion(&dump_state.dump_done); >>          dev_coredumpm(new_device, NULL, &dump_state, datalen, >> GFP_KERNEL, >>                        my_coredump_read, my_coredump_free); >>          wait_for_completion(&dump_state.dump_done); >>          device_del(new_device); >>          put_device(new_device); >>      } >> >> In devcoredump framework, devcd_dev_release() will be called when >> releasing the devcd device, it will call the free() callback first >> and try to delete the symlink in sysfs directory of the failing device. >> Eventhough it has checked 'devcd->failing_dev->kobj.sd' before that, >> there is no mechanism to ensure it's still available when accessing >> it in kernfs_find_ns(), refer to the diagram as below: >> >>      Thread A was waiting for 'dump_state.dump_done' at #A-1-2 after >>      calling dev_coredumpm(). >>      When thread B calling devcd->free() at #B-2-1, it wakes up >>      thread A from point #A-1-2, which will call device_del() to >>      delete the device. >>      If #B-2-2 comes before #A-3-1, but #B-4 comes after #A-4, it >>      will hit use-after-free issue when trying to access >>      'devcd->failing_dev->kobj.sd'. >> >>      #A-1-1: dev_coredumpm() >>        #A-1-2: wait_for_completion(&dump_state.dump_done) >>        #A-1-3: device_del() >>          #A-2: kobject_del() >>            #A-3-1: sysfs_remove_dir() --> set kobj->sd=NULL >>            #A-3-2: kernfs_put() >>              #A-4: kmem_cache_free() --> free kobj->sd >> >>      #B-1: devcd_dev_release() >>        #B-2-1: devcd->free(devcd->data) >>        #B-2-2: check devcd->failing_dev->kobj.sd >>        #B-2-3: sysfs_delete_link() >>          #B-3: kernfs_remove_by_name_ns() >>            #B-4: kernfs_find_ns() --> access devcd->failing_dev->kobj.sd >> >> To fix this issue, put operations on devcd->failing_dev before >> calling the free() callback in devcd_dev_release(). >> >> Signed-off-by: Yu Wang > > Awesome explanation. But it is still not solving the original race like device can go anytime., what if caller of dev_coredumpm() is not waiting and called device_del() right during this devcd_dev_release() where, this race can still happen. Although, dev_coredumpm() does keep reference to the device devcd->failing_dev = get_device(dev); Does it also need to keep reference to kernfs_get(devcd->failing_dev->kobj.sd) inside dev_coredumpm() itself and release reference kernfs_put(devcd->failing_dev->kobj.sd) after sysfs_delete_link() to avoid this issue completely. thoughts ? > > Reviewed-by: Mukesh Ojha Ignore this for now -Mukesh > > -Mukesh > >> --- >>   drivers/base/devcoredump.c | 5 ++--- >>   1 file changed, 2 insertions(+), 3 deletions(-) >> >> diff --git a/drivers/base/devcoredump.c b/drivers/base/devcoredump.c >> index 91536ee05f14..35c704ddfeae 100644 >> --- a/drivers/base/devcoredump.c >> +++ b/drivers/base/devcoredump.c >> @@ -83,9 +83,6 @@ static void devcd_dev_release(struct device *dev) >>   { >>       struct devcd_entry *devcd = dev_to_devcd(dev); >> -    devcd->free(devcd->data); >> -    module_put(devcd->owner); >> - >>       /* >>        * this seems racy, but I don't see a notifier or such on >>        * a struct device to know when it goes away? >> @@ -95,6 +92,8 @@ static void devcd_dev_release(struct device *dev) >>                     "devcoredump"); >>       put_device(devcd->failing_dev); >> +    devcd->free(devcd->data); >> +    module_put(devcd->owner); >>       kfree(devcd); >>   }