[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20170306231946.GA23953@obsidianresearch.com>
Date: Mon, 6 Mar 2017 16:19:46 -0700
From: Jason Gunthorpe <jgunthorpe@...idianresearch.com>
To: "Hon Ching(Vicky) Lo" <honclo@...ux.vnet.ibm.com>
Cc: tpmdd-devel@...ts.sourceforge.net,
Ashley Lai <ashley@...leylai.com>,
linux-kernel@...r.kernel.org, stable@...r.kernel.org,
Peter Huewe <PeterHuewe@....de>
Subject: Re: [tpmdd-devel] [PATCH] vTPM: Fix missing NULL check
On Mon, Mar 06, 2017 at 05:32:15PM -0500, Hon Ching(Vicky) Lo wrote:
> The current code passes the address of tpm_chip as the argument to
> dev_get_drvdata() without prior NULL check in
> tpm_ibmvtpm_get_desired_dma. This resulted an oops during kernel
> boot when vTPM is enabled in Power partition configured in active
> memory sharing mode.
>
> The vio_driver's get_desired_dma() is called before the probe(), which
> for vtpm is tpm_ibmvtpm_probe, and it's this latter function that
> initializes the driver and set data. Attempting to get data before
> the probe() caused the problem.
>
> This patch adds a NULL check to the tpm_ibmvtpm_get_desired_dma.
Does this also need a hunk in tpm_ibmvtpm_remove to null the drvdata
after removal, or does something in the driver code guarentee it is
null'd after remove?
We don't want to use-after-free chip on the next probe cycle.
> static unsigned long tpm_ibmvtpm_get_desired_dma(struct vio_dev *vdev)
> {
> struct tpm_chip *chip = dev_get_drvdata(&vdev->dev);
> - struct ibmvtpm_dev *ibmvtpm = dev_get_drvdata(&chip->dev);
> + struct ibmvtpm_dev *ibmvtpm = NULL;
> +
> + if (chip)
> + ibmvtpm = dev_get_drvdata(&chip->dev);
Maybe just do this, clearer that it is chip that can be null. We do
not want to see drivers testing their chip drvdata against null.
Also, how does locking work here? Does the vio core prevent
tpm_ibmvtpm_get_desired_dma and tpm_ibmvtpm_remove from running
concurrently?
diff --git a/drivers/char/tpm/tpm_ibmvtpm.c b/drivers/char/tpm/tpm_ibmvtpm.c
index 946025a7413b6b..ced6b9f0008dc2 100644
--- a/drivers/char/tpm/tpm_ibmvtpm.c
+++ b/drivers/char/tpm/tpm_ibmvtpm.c
@@ -294,6 +294,8 @@ static int tpm_ibmvtpm_remove(struct vio_dev *vdev)
kfree(ibmvtpm->rtce_buf);
}
+ /* For tpm_ibmvtpm_get_desired_dma */
+ dev_set_drvdata(&vdev->dev, NULL);
kfree(ibmvtpm);
return 0;
@@ -309,15 +311,16 @@ static int tpm_ibmvtpm_remove(struct vio_dev *vdev)
static unsigned long tpm_ibmvtpm_get_desired_dma(struct vio_dev *vdev)
{
struct tpm_chip *chip = dev_get_drvdata(&vdev->dev);
- struct ibmvtpm_dev *ibmvtpm = dev_get_drvdata(&chip->dev);
+ struct ibmvtpm_dev *ibmvtpm;
/* ibmvtpm initializes at probe time, so the data we are
* asking for may not be set yet. Estimate that 4K required
* for TCE-mapped buffer in addition to CRQ.
*/
- if (!ibmvtpm)
+ if (!chip)
return CRQ_RES_BUF_SIZE + PAGE_SIZE;
+ ibmvtpm = dev_get_drvdata(&chip->dev);
return CRQ_RES_BUF_SIZE + ibmvtpm->rtce_size;
}
Powered by blists - more mailing lists