Message ID | 20230524-opp-lazy-uaf-v1-1-f5f95cb4b6de@kernkonzept.com |
---|---|
State | New |
Headers |
Return-Path: <linux-kernel-owner@vger.kernel.org> Delivered-To: ouuuleilei@gmail.com Received: by 2002:a59:994d:0:b0:3d9:f83d:47d9 with SMTP id k13csp103621vqr; Wed, 24 May 2023 11:33:00 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ5kquj4Ppu0QQvVnt91SNMOklgoR6fUeZ97Azx3s/JyeR3eH76uvVgvTUI4Uy61zdaF9mX7 X-Received: by 2002:a17:902:b48f:b0:1ae:762a:b660 with SMTP id y15-20020a170902b48f00b001ae762ab660mr16212895plr.39.1684953179886; Wed, 24 May 2023 11:32:59 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1684953179; cv=none; d=google.com; s=arc-20160816; b=lG14yac+AaTy6V6mkc6PzrNRcm8z6sOZU1E4Yfy6K23Ek9SPJQYJNtQMUYmNeivID/ dJwH2KMmBG1b9GJcgXW5Zt4kp+gNThSam1YSOr332IrA45hPgCJkfL09l1k9drTv03ln 2snqa/aUQkA2eGAxirofBt9Hy0ODJjLD32pR+ut5erG/iW2ElsIHGSIbCG6UGPa7/c0q 3//v/xQYgPqH0/T/qkTAFiDCOAOnuhX7qHiWwENHuCSTzwD+NRdCIjFXZmOqMNKp1coE iyS9KKFa5/pt1eC6fzcLZb2JNqW3TzYh6HQ9Pa2xeXiqScitVRWAoOSrXFuiVlevdvzz hfow== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:message-id:content-transfer-encoding :mime-version:subject:date:from:dkim-signature; bh=SPrqV6ntExTuKWUGea554T7MrMdxYL653Yvti6t/SiQ=; b=wH9ujnW0wvirm2DVIxV2ALBG5akP2wq+MQnfh2WVzfa73IJE29lPoolA0eIHgy8Oau A6RRO2sYzNEGyu2epZ/BmuLiGeH9cQztJL6c1LY0jebmxxkOhVQuv1dsoDOa1yaW5pTy sJb1Ne+u0cBhwk+eBNAicoWfKZQWw783BB1h86WS+1HIyNJkngPdTeigdts8C7eFV16n l2KvDATpnM8gPaYqH/vdg1+0zOdRPOtEb8pcaL/sq+0eXn6JO3w6Ny26oJ5EgDoI7ijR 7QtSb0B/JpqC1pKohNLEA5LYqQ8p34VJHF3auD97xIns38yYBX3PaT1g/0k6t/ObNuZz 740g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernkonzept.com header.s=mx1 header.b=QxbJe9w+; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernkonzept.com Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id ix1-20020a170902f80100b001ac6d52d936si1073557plb.87.2023.05.24.11.32.44; Wed, 24 May 2023 11:32:59 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernkonzept.com header.s=mx1 header.b=QxbJe9w+; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernkonzept.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229456AbjEXSZK (ORCPT <rfc822;jian.xie.xdx@gmail.com> + 99 others); Wed, 24 May 2023 14:25:10 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:54614 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S237775AbjEXSZH (ORCPT <rfc822;linux-kernel@vger.kernel.org>); Wed, 24 May 2023 14:25:07 -0400 X-Greylist: delayed 1712 seconds by postgrey-1.37 at lindbergh.monkeyblade.net; Wed, 24 May 2023 11:25:02 PDT Received: from mx.kernkonzept.com (serv1.kernkonzept.com [IPv6:2a01:4f8:1c1c:b490::2]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 6578613E; Wed, 24 May 2023 11:25:02 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=kernkonzept.com; s=mx1; h=Cc:To:Message-Id:Content-Transfer-Encoding: Content-Type:MIME-Version:Subject:Date:From:References:In-Reply-To:Sender: Reply-To:Content-ID:Content-Description; bh=SPrqV6ntExTuKWUGea554T7MrMdxYL653Yvti6t/SiQ=; b=QxbJe9w+BZfDdaA+dQgy0917EL /AGNlLaD6S2fxjGnGhkr9zUNSsXN67n/7C1/hCqU7sQwp31g1SSiBKuRluPdKJdT5kVWn0TCBq/Nf coK8ehnJxJgzCvV0lSlzRBLsWcdRERV9AZiJAXE1F+EdmjsOg4BkjMEBtl59SdPZYKBslHubkmx4H FlVhfuAhpsYhGdeF4XAkcSYaz+KxChhAcyJJN7YtpfKbgPwM6yRE+nu0Y8412hCotoJqi3/QR6I1l +yqQEX13g05r68Ga3dmwVH8phbTvG2ikw+W3oYqlAaPik1WnlgJXKWIcOTZwAZjlv/aqlCbdsnbpr dHpziR2Q==; Received: from [10.22.3.24] (helo=serv1.dd1.int.kernkonzept.com) by mx.kernkonzept.com with esmtpsa (TLS1.3:ECDHE_X25519__RSA_PSS_RSAE_SHA256__AES_256_GCM:256) (Exim 4.94.2) id 1q1sio-002A2x-Ty; Wed, 24 May 2023 19:56:26 +0200 From: Stephan Gerhold <stephan.gerhold@kernkonzept.com> Date: Wed, 24 May 2023 19:56:21 +0200 Subject: [PATCH] opp: Fix use-after-free in lazy_opp_tables after probe deferral MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit Message-Id: <20230524-opp-lazy-uaf-v1-1-f5f95cb4b6de@kernkonzept.com> X-B4-Tracking: v=1; b=H4sIAMVPbmQC/x2N0QqDMAwAf0XybCCrOsRfGT6kXZyBUkuLsk389 4U93sFxJ1QpKhWm5oQih1bdksGtbSCsnF6C+jQGR66jwfW45YyRvx/cecE7MVHvu3GQAJZ4roK +cAqrRWmP0WQusuj7/3jM1/UDqZFnUnMAAAA= To: Viresh Kumar <vireshk@kernel.org> Cc: Nishanth Menon <nm@ti.com>, Stephen Boyd <sboyd@kernel.org>, linux-pm@vger.kernel.org, linux-kernel@vger.kernel.org, stable@vger.kernel.org, Stephan Gerhold <stephan.gerhold@kernkonzept.com> X-Mailer: b4 0.12.2 X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,SPF_HELO_NONE,SPF_PASS, T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: <linux-kernel.vger.kernel.org> X-Mailing-List: linux-kernel@vger.kernel.org X-getmail-retrieved-from-mailbox: =?utf-8?q?INBOX?= X-GMAIL-THRID: =?utf-8?q?1766801465674676960?= X-GMAIL-MSGID: =?utf-8?q?1766801465674676960?= |
Series |
opp: Fix use-after-free in lazy_opp_tables after probe deferral
|
|
Commit Message
Stephan Gerhold
May 24, 2023, 5:56 p.m. UTC
When dev_pm_opp_of_find_icc_paths() in _allocate_opp_table() returns
-EPROBE_DEFER, the opp_table is freed again, to wait until all the
interconnect paths are available.
However, if the OPP table is using required-opps then it may already
have been added to the global lazy_opp_tables list. The error path
does not remove the opp_table from the list again.
This can cause crashes later when the provider of the required-opps
is added, since we will iterate over OPP tables that have already been
freed. E.g.:
Unable to handle kernel NULL pointer dereference when read
CPU: 0 PID: 7 Comm: kworker/0:0 Not tainted 6.4.0-rc3
PC is at _of_add_opp_table_v2 (include/linux/of.h:949
drivers/opp/of.c:98 drivers/opp/of.c:344 drivers/opp/of.c:404
drivers/opp/of.c:1032) -> lazy_link_required_opp_table()
Fix this by removing the opp_table from the list before freeing it.
Cc: stable@vger.kernel.org
Fixes: 7eba0c7641b0 ("opp: Allow lazy-linking of required-opps")
Signed-off-by: Stephan Gerhold <stephan.gerhold@kernkonzept.com>
---
This fixes the crash I ran into after adding an OPP table with
both "required-opps" and interconnect paths (opp-peak-kBps).
By the way, the "lazy_opp_tables" does not seem to be protected by any
locks(?) so I could imagine that theoretically there could be a race
condition while adding/removing OPP tables there. This is unrelated
to the crash I saw, though.
---
drivers/opp/core.c | 1 +
1 file changed, 1 insertion(+)
---
base-commit: 9e28f7a74581204807f20ae46568939038e327aa
change-id: 20230524-opp-lazy-uaf-60a004b385ec
Best regards,
Comments
On 24-05-23, 19:56, Stephan Gerhold wrote: > When dev_pm_opp_of_find_icc_paths() in _allocate_opp_table() returns > -EPROBE_DEFER, the opp_table is freed again, to wait until all the > interconnect paths are available. > > However, if the OPP table is using required-opps then it may already > have been added to the global lazy_opp_tables list. The error path > does not remove the opp_table from the list again. > > This can cause crashes later when the provider of the required-opps > is added, since we will iterate over OPP tables that have already been > freed. E.g.: > > Unable to handle kernel NULL pointer dereference when read > CPU: 0 PID: 7 Comm: kworker/0:0 Not tainted 6.4.0-rc3 > PC is at _of_add_opp_table_v2 (include/linux/of.h:949 > drivers/opp/of.c:98 drivers/opp/of.c:344 drivers/opp/of.c:404 > drivers/opp/of.c:1032) -> lazy_link_required_opp_table() > > Fix this by removing the opp_table from the list before freeing it. I think you need this instead: diff --git a/drivers/opp/core.c b/drivers/opp/core.c index 954c94865cf5..b5973fefdfd8 100644 --- a/drivers/opp/core.c +++ b/drivers/opp/core.c @@ -1358,7 +1358,10 @@ static struct opp_table *_allocate_opp_table(struct device *dev, int index) return opp_table; remove_opp_dev: + _of_clear_opp_table(opp_table); _remove_opp_dev(opp_dev, opp_table); + mutex_destroy(&opp_table->genpd_virt_dev_lock); + mutex_destroy(&opp_table->lock); err: kfree(opp_table); return ERR_PTR(ret); > Cc: stable@vger.kernel.org > Fixes: 7eba0c7641b0 ("opp: Allow lazy-linking of required-opps") > Signed-off-by: Stephan Gerhold <stephan.gerhold@kernkonzept.com> > --- > This fixes the crash I ran into after adding an OPP table with > both "required-opps" and interconnect paths (opp-peak-kBps). > > By the way, the "lazy_opp_tables" does not seem to be protected by any > locks(?) It is always accessed with opp_table_lock held I believe.
On Mon, May 29, 2023 at 11:01:48AM +0530, Viresh Kumar wrote: > On 24-05-23, 19:56, Stephan Gerhold wrote: > > When dev_pm_opp_of_find_icc_paths() in _allocate_opp_table() returns > > -EPROBE_DEFER, the opp_table is freed again, to wait until all the > > interconnect paths are available. > > > > However, if the OPP table is using required-opps then it may already > > have been added to the global lazy_opp_tables list. The error path > > does not remove the opp_table from the list again. > > > > This can cause crashes later when the provider of the required-opps > > is added, since we will iterate over OPP tables that have already been > > freed. E.g.: > > > > Unable to handle kernel NULL pointer dereference when read > > CPU: 0 PID: 7 Comm: kworker/0:0 Not tainted 6.4.0-rc3 > > PC is at _of_add_opp_table_v2 (include/linux/of.h:949 > > drivers/opp/of.c:98 drivers/opp/of.c:344 drivers/opp/of.c:404 > > drivers/opp/of.c:1032) -> lazy_link_required_opp_table() > > > > Fix this by removing the opp_table from the list before freeing it. > > I think you need this instead: > > diff --git a/drivers/opp/core.c b/drivers/opp/core.c > index 954c94865cf5..b5973fefdfd8 100644 > --- a/drivers/opp/core.c > +++ b/drivers/opp/core.c > @@ -1358,7 +1358,10 @@ static struct opp_table *_allocate_opp_table(struct device *dev, int index) > return opp_table; > > remove_opp_dev: > + _of_clear_opp_table(opp_table); > _remove_opp_dev(opp_dev, opp_table); > + mutex_destroy(&opp_table->genpd_virt_dev_lock); > + mutex_destroy(&opp_table->lock); > err: > kfree(opp_table); > return ERR_PTR(ret); > Thanks, this seems to fix the crash as well. Are you going to handle it or should I send a v2 with this diff? > > Cc: stable@vger.kernel.org > > Fixes: 7eba0c7641b0 ("opp: Allow lazy-linking of required-opps") > > Signed-off-by: Stephan Gerhold <stephan.gerhold@kernkonzept.com> > > --- > > This fixes the crash I ran into after adding an OPP table with > > both "required-opps" and interconnect paths (opp-peak-kBps). > > > > By the way, the "lazy_opp_tables" does not seem to be protected by any > > locks(?) > > It is always accessed with opp_table_lock held I believe. > During _allocate_opp_table() it's accessed without the opp_table_lock, because of /* Drop the lock to reduce the size of critical section */ mutex_unlock(&opp_table_lock); if (opp_table) { /* ... */ mutex_lock(&opp_table_lock); } else { opp_table = _allocate_opp_table(dev, index); mutex_lock(&opp_table_lock); /* ... */ } This doesn't seem to cause any problems in my case though so it's unrelated to the crash I observed. Thanks, Stephan
On 30-05-23, 10:31, Stephan Gerhold wrote: > Thanks, this seems to fix the crash as well. Are you going to handle it > or should I send a v2 with this diff? Please send a V2 :) > During _allocate_opp_table() it's accessed without the opp_table_lock, > because of > > /* Drop the lock to reduce the size of critical section */ > mutex_unlock(&opp_table_lock); > > if (opp_table) { > /* ... */ > mutex_lock(&opp_table_lock); > } else { > opp_table = _allocate_opp_table(dev, index); > > mutex_lock(&opp_table_lock); > /* ... */ > } > > This doesn't seem to cause any problems in my case though so it's > unrelated to the crash I observed. Hmm, right. Maybe we need a lock for that list, want to take that up ?
On Tue, May 30, 2023 at 02:43:30PM +0530, Viresh Kumar wrote: > On 30-05-23, 10:31, Stephan Gerhold wrote: > > Thanks, this seems to fix the crash as well. Are you going to handle it > > or should I send a v2 with this diff? > > Please send a V2 :) > Done! > > During _allocate_opp_table() it's accessed without the opp_table_lock, > > because of > > > > /* Drop the lock to reduce the size of critical section */ > > mutex_unlock(&opp_table_lock); > > > > if (opp_table) { > > /* ... */ > > mutex_lock(&opp_table_lock); > > } else { > > opp_table = _allocate_opp_table(dev, index); > > > > mutex_lock(&opp_table_lock); > > /* ... */ > > } > > > > This doesn't seem to cause any problems in my case though so it's > > unrelated to the crash I observed. > > Hmm, right. Maybe we need a lock for that list, want to take that up ? > Yeah, a lock would probably be good to be safe. I would appreciate if you or someone else could create a patch for this though, since I'm not too familiar with the overall OPP implementation. I would be happy to test that it works properly for my apparently quite special use case (I have several OPP tables with interconnects and required-opps). Thanks! Stephan
diff --git a/drivers/opp/core.c b/drivers/opp/core.c index 85cbc8de407c..6a3a320be7df 100644 --- a/drivers/opp/core.c +++ b/drivers/opp/core.c @@ -1358,6 +1358,7 @@ static struct opp_table *_allocate_opp_table(struct device *dev, int index) return opp_table; remove_opp_dev: + list_del(&opp_table->lazy); _remove_opp_dev(opp_dev, opp_table); err: kfree(opp_table);