[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <f3cd46fb-2bb1-0422-b2be-3f7625ec9c4e@codeaurora.org>
Date: Fri, 19 Apr 2019 14:13:48 +0530
From: Mukesh Ojha <mojha@...eaurora.org>
To: "dmitry.torokhov@...il.com" <dmitry.torokhov@...il.com>
Cc: linux-input@...r.kernel.org, linux-kernel@...r.kernel.org,
Gaurav Kohli <gkohli@...eaurora.org>,
Peter Hutterer <peter.hutterer@...-t.net>,
Martin Kepplinger <martink@...teo.de>,
"Paul E. McKenney" <paulmck@...ux.ibm.com>
Subject: Re: [PATCH v2] Input: uinput: Avoid Object-Already-Free with a global
lock
On 4/19/2019 12:41 PM, dmitry.torokhov@...il.com wrote:
> Hi Mukesh,
>
> On Fri, Apr 19, 2019 at 12:17:44PM +0530, Mukesh Ojha wrote:
>> For some reason my last mail did not get delivered, sending it again.
>>
>>
>> On 4/18/2019 11:55 AM, Mukesh Ojha wrote:
>>>
>>> On 4/18/2019 7:13 AM, dmitry.torokhov@...il.com wrote:
>>>> Hi Mukesh,
>>>>
>>>> On Mon, Apr 15, 2019 at 03:35:51PM +0530, Mukesh Ojha wrote:
>>>>> Hi Dmitry,
>>>>>
>>>>> Can you please have a look at this patch ? as this seems to reproducing
>>>>> quite frequently
>>>>>
>>>>> Thanks,
>>>>> Mukesh
>>>>>
>>>>> On 4/10/2019 1:29 PM, Mukesh Ojha wrote:
>>>>>> uinput_destroy_device() gets called from two places. In one place,
>>>>>> uinput_ioctl_handler() where it is protected under a lock
>>>>>> udev->mutex but there is no protection on udev device from freeing
>>>>>> inside uinput_release().
>>>> uinput_release() should be called when last file handle to the uinput
>>>> instance is being dropped, so there should be no other users and thus we
>>>> can't be racing with anyone.
>>> Lets say an example where i am creating input device quite frequently
>>>
>>> [ 97.836603] input: syz0 as /devices/virtual/input/input262
>>> [ 97.845589] input: syz0 as /devices/virtual/input/input261
>>> [ 97.849415] input: syz0 as /devices/virtual/input/input263
>>> [ 97.856479] input: syz0 as /devices/virtual/input/input264
>>> [ 97.936128] input: syz0 as /devices/virtual/input/input265
>>>
>>> e.g input265
>>>
>>> while input265 gets created [1] and handlers are getting registered on
>>> that device*fput* gets called on
>>> that device as user space got to know that input265 is created and its
>>> reference is still 1(rare but possible).
> Are you saying that there are 2 threads sharing the same file
> descriptor, one issuing the registration ioctl while the other closing
> the same fd?
Dmitry,
I don't have a the exact look inside the app here, but this looks like
the same as it is able to do
fput on the uinput device.
FYI
Syskaller app is running in userspace (which is for syscall fuzzing) on
kernel which is enabled
with various config fault injection, FAULT_INJECTION,FAIL_SLAB,
FAIL_PAGEALLOC, KASAN etc.
Thanks,
Mukesh
>
> Thanks.
>
Powered by blists - more mailing lists