lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <db2c9d2f-29b1-2bff-1261-7da6f5baaf4a@huawei.com>
Date:   Mon, 14 Dec 2020 15:24:41 +0800
From:   Qinglang Miao <miaoqinglang@...wei.com>
To:     Rob Herring <robh@...nel.org>
CC:     Bjorn Helgaas <bhelgaas@...gle.com>, <linux-pci@...r.kernel.org>,
        <linux-kernel@...r.kernel.org>
Subject: Re: [PATCH] PCI: fix use-after-free in pci_register_host_bridge



在 2020/12/11 23:46, Rob Herring 写道:
> On Fri, Nov 20, 2020 at 03:48:48PM +0800, Qinglang Miao wrote:
>> When put_device(&bridge->dev) being called, kfree(bridge) is inside
>> of release function, so the following device_del would cause a
>> use-after-free bug.
>>
>> Fixes: 37d6a0a6f470 ("PCI: Add pci_register_host_bridge() interface")
> 
> That commit did have some problems, but this patch doesn't apply to that
> commit. See commits 1b54ae8327a4 and 9885440b16b8.
> 
>> Reported-by: Hulk Robot <hulkci@...wei.com>
>> Signed-off-by: Qinglang Miao <miaoqinglang@...wei.com>
>> ---
>>   drivers/pci/probe.c | 2 +-
>>   1 file changed, 1 insertion(+), 1 deletion(-)
>>
>> diff --git a/drivers/pci/probe.c b/drivers/pci/probe.c
>> index 4289030b0..82292e87e 100644
>> --- a/drivers/pci/probe.c
>> +++ b/drivers/pci/probe.c
>> @@ -991,8 +991,8 @@ static int pci_register_host_bridge(struct pci_host_bridge *bridge)
>>   	return 0;
>>   
>>   unregister:
>> -	put_device(&bridge->dev);
>>   	device_del(&bridge->dev);
>> +	put_device(&bridge->dev);
> 
> I don't think this is right.
> 
> Let's look at pci_register_host_bridge() with only the relevant
> sections:
> 
> static int pci_register_host_bridge(struct pci_host_bridge *bridge)
> {
> 	...
> 
> 	err = device_add(&bridge->dev);
> 	if (err) {
> 		put_device(&bridge->dev);
> 		goto free;
> 	}
> 	bus->bridge = get_device(&bridge->dev);
> 
>          ...
> 	if (err)
> 		goto unregister;
> 	...
> 
> 	return 0;
> 
> unregister:
> 	put_device(&bridge->dev);
> 	device_del(&bridge->dev);
> 
> free:
> 	kfree(bus);
> 	return err;
> }
> 
> The documentation for device_add says this:
>   * Rule of thumb is: if device_add() succeeds, you should call
>   * device_del() when you want to get rid of it. If device_add() has
>   * *not* succeeded, use *only* put_device() to drop the reference
>   * count.
> 
> The put_device at the end is to balance the get_device after device_add.
> It will *only* decrement the use count. Then we call device_del as the
> documentation says.
> 
> Rob
> .
Hi, Rob

Your words make sence to me: the code is *logicly* correct here and 
won't raise a use-after-free bug. I do hold a misunderstanding of this 
one, sorry for that ~

But I still think this patch should be reconsidered:

The kdoc of device_unregister explicitly mentions the possibility that 
other refs might continue to exist after device_unregister was called, 
and *del_device* is first part of it.

By the way, 'del_device() called before put_device()' is everywhere in 
kernel code, like device_unregister(), pci_destroy_dev() or 
switchtec_pci_remove()

In fact, I can't find another place in kernel code looks like:
	put_device(x);
  	device_del(x);

So I guess put_device() ought to be the last time we touch the object 
(I don't find evidence strong enough in kdoc to prove this) and putting 
put_device after device_del is a more natural logic.

Qinglang
.

> 

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ