From patchwork Thu Feb 18 03:20:54 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Jonathan Marek X-Patchwork-Id: 384974 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-13.9 required=3.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID, HEADER_FROM_DIFFERENT_DOMAINS, INCLUDES_CR_TRAILER, INCLUDES_PATCH, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,UNWANTED_LANGUAGE_BODY, URIBL_BLOCKED, USER_AGENT_GIT autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id B4182C4332B for ; Thu, 18 Feb 2021 03:23:01 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id 906AE64E58 for ; Thu, 18 Feb 2021 03:23:01 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230138AbhBRDW5 (ORCPT ); Wed, 17 Feb 2021 22:22:57 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:44798 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230121AbhBRDWz (ORCPT ); Wed, 17 Feb 2021 22:22:55 -0500 Received: from mail-qk1-x72c.google.com (mail-qk1-x72c.google.com [IPv6:2607:f8b0:4864:20::72c]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 6C4F1C061794 for ; Wed, 17 Feb 2021 19:21:57 -0800 (PST) Received: by mail-qk1-x72c.google.com with SMTP id t63so924720qkc.1 for ; Wed, 17 Feb 2021 19:21:57 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=marek-ca.20150623.gappssmtp.com; s=20150623; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=CbzAry+HXVVk5Jw3yl75zypO/Gw5eoDiCnFu+DpRBBk=; b=yF7SUFMop4IDVBG98n7+ZbBZHJheC/4KAcnWw/1ax2MwIwqSBdy7MP6qvpRcdh3uRt ZPFgnOgEr7a+fQAziXK0cxLsCBGPtulyeklqoz75kUCYt/tIcfIdmQ8dJ/+4uR1s28au +pJDJyqMi9XBpsm//9zVO+Fi3fBXjiyE7K/TCzR92js9LsPn5stQm4z0M4UVnmvlmQ49 //HJrasc+i2VF9uvs6lrkrBhJYIeG4bFyaKlqZ246vBPjIs1DeYgdFo47nlro6SHYomc VGdFuv9HLh61j8F8mWdAUucx4/ld/p6jPjsKerlTgPJgx3EkXgLVdIkx9BZ55ULtPgeZ GhNA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=CbzAry+HXVVk5Jw3yl75zypO/Gw5eoDiCnFu+DpRBBk=; b=myoY4oLhdJy3cx2uurx4kTcPuYiVYuGUiqfsXWkhQRJexUGAhA31OTIQ8N3UcE/Qgi sYPS3XU1cgkmVelHOT1BCUVKZWruyoJMbtB0Cpt4bp+vE08itMD2LY9pk7N0h7d09SHj 44WaOshjXyqYPNJ01gIMMqHnw+lWw6ksl7O27fI9Nk70zY3yZ4Je+fjixz892N8JLVee 4l/QQtWlHUPvF8Ov8nyyYeVrN+WfKQocvRM2j3P8KxK8/a6xRzzQ6WUcSCv3/D9h9mz/ 9gpetSjXMHMmcXBEAp2JEGeQNWWVEELoeelTnJq1XezDUkunUo18VnWsjUZeC2dJJ9+t 6q8Q== X-Gm-Message-State: AOAM531Fmbce7hMELl7WdUeM5G3JdPTpZ3d71QON93C2uFCr7v/Ed36R JM37DVtTeLHqFJsUZQLy+CPCf8zZiXX7Tv4A X-Google-Smtp-Source: ABdhPJxRK1DQ7tsuLb3QYOvAaidyikcDIbIYXr2LzwaZh7+HJwOPO7u59wly1cuPy9ZZohx1e6M++Q== X-Received: by 2002:a37:6ca:: with SMTP id 193mr2428821qkg.436.1613618516468; Wed, 17 Feb 2021 19:21:56 -0800 (PST) Received: from localhost.localdomain (modemcable068.184-131-66.mc.videotron.ca. [66.131.184.68]) by smtp.gmail.com with ESMTPSA id b24sm2578996qtt.44.2021.02.17.19.21.55 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 17 Feb 2021 19:21:56 -0800 (PST) From: Jonathan Marek To: linux-arm-msm@vger.kernel.org Cc: srinivas.kandagatla@linaro.org, Arnd Bergmann , Greg Kroah-Hartman , linux-kernel@vger.kernel.org (open list) Subject: [PATCH 2/3] fastrpc: move fl->maps list removal into fastrpc_free_map Date: Wed, 17 Feb 2021 22:20:54 -0500 Message-Id: <20210218032055.28247-3-jonathan@marek.ca> X-Mailer: git-send-email 2.26.1 In-Reply-To: <20210218032055.28247-1-jonathan@marek.ca> References: <20210218032055.28247-1-jonathan@marek.ca> MIME-Version: 1.0 Precedence: bulk List-ID: X-Mailing-List: linux-arm-msm@vger.kernel.org This fixes the incredibly broken behavior of fastrpc_context_free(), which calls fastrpc_map_put() but does not remove the map from the list when it is free'd, causing use-after-free errors. fl->lock needs to be held not just for list_del(), but also kref_put, to avoid a race condition with fastrpc_map_find() logic. Signed-off-by: Jonathan Marek --- drivers/misc/fastrpc.c | 27 +++++++++++++-------------- 1 file changed, 13 insertions(+), 14 deletions(-) diff --git a/drivers/misc/fastrpc.c b/drivers/misc/fastrpc.c index 4fabea0c1551..170352b43ab6 100644 --- a/drivers/misc/fastrpc.c +++ b/drivers/misc/fastrpc.c @@ -245,19 +245,21 @@ static void fastrpc_free_map(struct kref *ref) dma_buf_put(map->buf); } + list_del(&map->node); + kfree(map); } static void fastrpc_map_put(struct fastrpc_map *map) { - if (map) - kref_put(&map->refcount, fastrpc_free_map); + spin_lock(&map->fl->lock); + kref_put(&map->refcount, fastrpc_free_map); + spin_unlock(&map->fl->lock); } static void fastrpc_map_get(struct fastrpc_map *map) { - if (map) - kref_get(&map->refcount); + kref_get(&map->refcount); } static int fastrpc_map_find(struct fastrpc_user *fl, int fd, @@ -351,8 +353,10 @@ static void fastrpc_context_free(struct kref *ref) ctx = container_of(ref, struct fastrpc_invoke_ctx, refcount); cctx = ctx->cctx; - for (i = 0; i < ctx->nscalars; i++) - fastrpc_map_put(ctx->maps[i]); + for (i = 0; i < ctx->nscalars; i++) { + if (ctx->maps[i]) + fastrpc_map_put(ctx->maps[i]); + } if (ctx->buf) fastrpc_buf_free(ctx->buf); @@ -1103,12 +1107,8 @@ static int fastrpc_init_create_process(struct fastrpc_user *fl, fl->init_mem = NULL; fastrpc_buf_free(imem); err_alloc: - if (map) { - spin_lock(&fl->lock); - list_del(&map->node); - spin_unlock(&fl->lock); + if (map) fastrpc_map_put(map); - } err: kfree(args); @@ -1185,10 +1185,9 @@ static int fastrpc_device_release(struct inode *inode, struct file *file) fastrpc_context_put(ctx); } - list_for_each_entry_safe(map, m, &fl->maps, node) { - list_del(&map->node); + list_for_each_entry_safe(map, m, &fl->maps, node) fastrpc_map_put(map); - } + WARN_ON(!list_empty(&fl->maps)); list_for_each_entry_safe(buf, b, &fl->mmaps, node) { list_del(&buf->node);