2019-05-20 09:19:02 +02:00
|
|
|
// SPDX-License-Identifier: GPL-2.0-or-later
|
2010-03-10 15:23:47 -08:00
|
|
|
/*
|
|
|
|
* pps-ldisc.c -- PPS line discipline
|
|
|
|
*
|
|
|
|
* Copyright (C) 2008 Rodolfo Giometti <giometti@linux.it>
|
|
|
|
*/
|
|
|
|
|
2011-01-12 17:00:52 -08:00
|
|
|
#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
|
|
|
|
|
2010-03-10 15:23:47 -08:00
|
|
|
#include <linux/module.h>
|
|
|
|
#include <linux/serial_core.h>
|
|
|
|
#include <linux/tty.h>
|
|
|
|
#include <linux/pps_kernel.h>
|
2013-02-10 04:43:41 -05:00
|
|
|
#include <linux/bug.h>
|
2010-03-10 15:23:47 -08:00
|
|
|
|
2023-01-17 11:03:54 +02:00
|
|
|
static void pps_tty_dcd_change(struct tty_struct *tty, bool active)
|
2010-03-10 15:23:47 -08:00
|
|
|
{
|
2013-02-12 02:00:43 -05:00
|
|
|
struct pps_device *pps;
|
|
|
|
struct pps_event_time ts;
|
|
|
|
|
|
|
|
pps_get_ts(&ts);
|
2010-03-10 15:23:47 -08:00
|
|
|
|
2013-02-12 02:00:43 -05:00
|
|
|
pps = pps_lookup_dev(tty);
|
2013-02-10 04:43:41 -05:00
|
|
|
/*
|
|
|
|
* This should never fail, but the ldisc locking is very
|
|
|
|
* convoluted, so don't crash just in case.
|
|
|
|
*/
|
|
|
|
if (WARN_ON_ONCE(pps == NULL))
|
|
|
|
return;
|
2011-01-12 17:00:51 -08:00
|
|
|
|
2010-03-10 15:23:47 -08:00
|
|
|
/* Now do the PPS event report */
|
2023-01-17 11:03:54 +02:00
|
|
|
pps_event(pps, &ts, active ? PPS_CAPTUREASSERT :
|
2011-01-12 17:00:51 -08:00
|
|
|
PPS_CAPTURECLEAR, NULL);
|
2010-03-10 15:23:47 -08:00
|
|
|
|
pps: Fix a use-after-free
On a board running ntpd and gpsd, I'm seeing a consistent use-after-free
in sys_exit() from gpsd when rebooting:
pps pps1: removed
------------[ cut here ]------------
kobject: '(null)' (00000000db4bec24): is not initialized, yet kobject_put() is being called.
WARNING: CPU: 2 PID: 440 at lib/kobject.c:734 kobject_put+0x120/0x150
CPU: 2 UID: 299 PID: 440 Comm: gpsd Not tainted 6.11.0-rc6-00308-gb31c44928842 #1
Hardware name: Raspberry Pi 4 Model B Rev 1.1 (DT)
pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : kobject_put+0x120/0x150
lr : kobject_put+0x120/0x150
sp : ffffffc0803d3ae0
x29: ffffffc0803d3ae0 x28: ffffff8042dc9738 x27: 0000000000000001
x26: 0000000000000000 x25: ffffff8042dc9040 x24: ffffff8042dc9440
x23: ffffff80402a4620 x22: ffffff8042ef4bd0 x21: ffffff80405cb600
x20: 000000000008001b x19: ffffff8040b3b6e0 x18: 0000000000000000
x17: 0000000000000000 x16: 0000000000000000 x15: 696e6920746f6e20
x14: 7369203a29343263 x13: 205d303434542020 x12: 0000000000000000
x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000
x8 : 0000000000000000 x7 : 0000000000000000 x6 : 0000000000000000
x5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000000
x2 : 0000000000000000 x1 : 0000000000000000 x0 : 0000000000000000
Call trace:
kobject_put+0x120/0x150
cdev_put+0x20/0x3c
__fput+0x2c4/0x2d8
____fput+0x1c/0x38
task_work_run+0x70/0xfc
do_exit+0x2a0/0x924
do_group_exit+0x34/0x90
get_signal+0x7fc/0x8c0
do_signal+0x128/0x13b4
do_notify_resume+0xdc/0x160
el0_svc+0xd4/0xf8
el0t_64_sync_handler+0x140/0x14c
el0t_64_sync+0x190/0x194
---[ end trace 0000000000000000 ]---
...followed by more symptoms of corruption, with similar stacks:
refcount_t: underflow; use-after-free.
kernel BUG at lib/list_debug.c:62!
Kernel panic - not syncing: Oops - BUG: Fatal exception
This happens because pps_device_destruct() frees the pps_device with the
embedded cdev immediately after calling cdev_del(), but, as the comment
above cdev_del() notes, fops for previously opened cdevs are still
callable even after cdev_del() returns. I think this bug has always
been there: I can't explain why it suddenly started happening every time
I reboot this particular board.
In commit d953e0e837e6 ("pps: Fix a use-after free bug when
unregistering a source."), George Spelvin suggested removing the
embedded cdev. That seems like the simplest way to fix this, so I've
implemented his suggestion, using __register_chrdev() with pps_idr
becoming the source of truth for which minor corresponds to which
device.
But now that pps_idr defines userspace visibility instead of cdev_add(),
we need to be sure the pps->dev refcount can't reach zero while
userspace can still find it again. So, the idr_remove() call moves to
pps_unregister_cdev(), and pps_idr now holds a reference to pps->dev.
pps_core: source serial1 got cdev (251:1)
<...>
pps pps1: removed
pps_core: unregistering pps1
pps_core: deallocating pps1
Fixes: d953e0e837e6 ("pps: Fix a use-after free bug when unregistering a source.")
Cc: stable@vger.kernel.org
Signed-off-by: Calvin Owens <calvin@wbinvd.org>
Reviewed-by: Michal Schmidt <mschmidt@redhat.com>
Link: https://lore.kernel.org/r/a17975fd5ae99385791929e563f72564edbcf28f.1731383727.git.calvin@wbinvd.org
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2024-11-11 20:13:29 -08:00
|
|
|
dev_dbg(&pps->dev, "PPS %s at %lu\n",
|
2023-01-17 11:03:54 +02:00
|
|
|
active ? "assert" : "clear", jiffies);
|
2010-03-10 15:23:47 -08:00
|
|
|
}
|
|
|
|
|
|
|
|
static int (*alias_n_tty_open)(struct tty_struct *tty);
|
|
|
|
|
|
|
|
static int pps_tty_open(struct tty_struct *tty)
|
|
|
|
{
|
|
|
|
struct pps_source_info info;
|
|
|
|
struct tty_driver *drv = tty->driver;
|
|
|
|
int index = tty->index + drv->name_base;
|
2011-01-12 17:00:51 -08:00
|
|
|
struct pps_device *pps;
|
2010-03-10 15:23:47 -08:00
|
|
|
int ret;
|
|
|
|
|
|
|
|
info.owner = THIS_MODULE;
|
|
|
|
info.dev = NULL;
|
|
|
|
snprintf(info.name, PPS_MAX_NAME_LEN, "%s%d", drv->driver_name, index);
|
|
|
|
snprintf(info.path, PPS_MAX_NAME_LEN, "/dev/%s%d", drv->name, index);
|
|
|
|
info.mode = PPS_CAPTUREBOTH | \
|
|
|
|
PPS_OFFSETASSERT | PPS_OFFSETCLEAR | \
|
|
|
|
PPS_CANWAIT | PPS_TSFMT_TSPEC;
|
|
|
|
|
2011-01-12 17:00:51 -08:00
|
|
|
pps = pps_register_source(&info, PPS_CAPTUREBOTH | \
|
2010-03-10 15:23:47 -08:00
|
|
|
PPS_OFFSETASSERT | PPS_OFFSETCLEAR);
|
2018-11-26 18:24:22 +08:00
|
|
|
if (IS_ERR(pps)) {
|
2010-03-10 15:23:47 -08:00
|
|
|
pr_err("cannot register PPS source \"%s\"\n", info.path);
|
2018-11-26 18:24:22 +08:00
|
|
|
return PTR_ERR(pps);
|
2010-03-10 15:23:47 -08:00
|
|
|
}
|
2013-02-10 04:41:56 -05:00
|
|
|
pps->lookup_cookie = tty;
|
2010-03-10 15:23:47 -08:00
|
|
|
|
2013-02-10 04:41:56 -05:00
|
|
|
/* Now open the base class N_TTY ldisc */
|
2010-03-10 15:23:47 -08:00
|
|
|
ret = alias_n_tty_open(tty);
|
2011-01-12 17:00:51 -08:00
|
|
|
if (ret < 0) {
|
|
|
|
pr_err("cannot open tty ldisc \"%s\"\n", info.path);
|
|
|
|
goto err_unregister;
|
|
|
|
}
|
2010-03-10 15:23:47 -08:00
|
|
|
|
pps: Fix a use-after-free
On a board running ntpd and gpsd, I'm seeing a consistent use-after-free
in sys_exit() from gpsd when rebooting:
pps pps1: removed
------------[ cut here ]------------
kobject: '(null)' (00000000db4bec24): is not initialized, yet kobject_put() is being called.
WARNING: CPU: 2 PID: 440 at lib/kobject.c:734 kobject_put+0x120/0x150
CPU: 2 UID: 299 PID: 440 Comm: gpsd Not tainted 6.11.0-rc6-00308-gb31c44928842 #1
Hardware name: Raspberry Pi 4 Model B Rev 1.1 (DT)
pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : kobject_put+0x120/0x150
lr : kobject_put+0x120/0x150
sp : ffffffc0803d3ae0
x29: ffffffc0803d3ae0 x28: ffffff8042dc9738 x27: 0000000000000001
x26: 0000000000000000 x25: ffffff8042dc9040 x24: ffffff8042dc9440
x23: ffffff80402a4620 x22: ffffff8042ef4bd0 x21: ffffff80405cb600
x20: 000000000008001b x19: ffffff8040b3b6e0 x18: 0000000000000000
x17: 0000000000000000 x16: 0000000000000000 x15: 696e6920746f6e20
x14: 7369203a29343263 x13: 205d303434542020 x12: 0000000000000000
x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000
x8 : 0000000000000000 x7 : 0000000000000000 x6 : 0000000000000000
x5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000000
x2 : 0000000000000000 x1 : 0000000000000000 x0 : 0000000000000000
Call trace:
kobject_put+0x120/0x150
cdev_put+0x20/0x3c
__fput+0x2c4/0x2d8
____fput+0x1c/0x38
task_work_run+0x70/0xfc
do_exit+0x2a0/0x924
do_group_exit+0x34/0x90
get_signal+0x7fc/0x8c0
do_signal+0x128/0x13b4
do_notify_resume+0xdc/0x160
el0_svc+0xd4/0xf8
el0t_64_sync_handler+0x140/0x14c
el0t_64_sync+0x190/0x194
---[ end trace 0000000000000000 ]---
...followed by more symptoms of corruption, with similar stacks:
refcount_t: underflow; use-after-free.
kernel BUG at lib/list_debug.c:62!
Kernel panic - not syncing: Oops - BUG: Fatal exception
This happens because pps_device_destruct() frees the pps_device with the
embedded cdev immediately after calling cdev_del(), but, as the comment
above cdev_del() notes, fops for previously opened cdevs are still
callable even after cdev_del() returns. I think this bug has always
been there: I can't explain why it suddenly started happening every time
I reboot this particular board.
In commit d953e0e837e6 ("pps: Fix a use-after free bug when
unregistering a source."), George Spelvin suggested removing the
embedded cdev. That seems like the simplest way to fix this, so I've
implemented his suggestion, using __register_chrdev() with pps_idr
becoming the source of truth for which minor corresponds to which
device.
But now that pps_idr defines userspace visibility instead of cdev_add(),
we need to be sure the pps->dev refcount can't reach zero while
userspace can still find it again. So, the idr_remove() call moves to
pps_unregister_cdev(), and pps_idr now holds a reference to pps->dev.
pps_core: source serial1 got cdev (251:1)
<...>
pps pps1: removed
pps_core: unregistering pps1
pps_core: deallocating pps1
Fixes: d953e0e837e6 ("pps: Fix a use-after free bug when unregistering a source.")
Cc: stable@vger.kernel.org
Signed-off-by: Calvin Owens <calvin@wbinvd.org>
Reviewed-by: Michal Schmidt <mschmidt@redhat.com>
Link: https://lore.kernel.org/r/a17975fd5ae99385791929e563f72564edbcf28f.1731383727.git.calvin@wbinvd.org
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2024-11-11 20:13:29 -08:00
|
|
|
dev_dbg(&pps->dev, "source \"%s\" added\n", info.path);
|
2010-03-10 15:23:47 -08:00
|
|
|
|
|
|
|
return 0;
|
2011-01-12 17:00:51 -08:00
|
|
|
|
|
|
|
err_unregister:
|
|
|
|
pps_unregister_source(pps);
|
|
|
|
return ret;
|
2010-03-10 15:23:47 -08:00
|
|
|
}
|
|
|
|
|
|
|
|
static void (*alias_n_tty_close)(struct tty_struct *tty);
|
|
|
|
|
|
|
|
static void pps_tty_close(struct tty_struct *tty)
|
|
|
|
{
|
2013-02-10 04:41:56 -05:00
|
|
|
struct pps_device *pps = pps_lookup_dev(tty);
|
2010-03-10 15:23:47 -08:00
|
|
|
|
|
|
|
alias_n_tty_close(tty);
|
|
|
|
|
2013-02-10 04:43:41 -05:00
|
|
|
if (WARN_ON(!pps))
|
|
|
|
return;
|
|
|
|
|
pps: Fix a use-after-free
On a board running ntpd and gpsd, I'm seeing a consistent use-after-free
in sys_exit() from gpsd when rebooting:
pps pps1: removed
------------[ cut here ]------------
kobject: '(null)' (00000000db4bec24): is not initialized, yet kobject_put() is being called.
WARNING: CPU: 2 PID: 440 at lib/kobject.c:734 kobject_put+0x120/0x150
CPU: 2 UID: 299 PID: 440 Comm: gpsd Not tainted 6.11.0-rc6-00308-gb31c44928842 #1
Hardware name: Raspberry Pi 4 Model B Rev 1.1 (DT)
pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : kobject_put+0x120/0x150
lr : kobject_put+0x120/0x150
sp : ffffffc0803d3ae0
x29: ffffffc0803d3ae0 x28: ffffff8042dc9738 x27: 0000000000000001
x26: 0000000000000000 x25: ffffff8042dc9040 x24: ffffff8042dc9440
x23: ffffff80402a4620 x22: ffffff8042ef4bd0 x21: ffffff80405cb600
x20: 000000000008001b x19: ffffff8040b3b6e0 x18: 0000000000000000
x17: 0000000000000000 x16: 0000000000000000 x15: 696e6920746f6e20
x14: 7369203a29343263 x13: 205d303434542020 x12: 0000000000000000
x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000
x8 : 0000000000000000 x7 : 0000000000000000 x6 : 0000000000000000
x5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000000
x2 : 0000000000000000 x1 : 0000000000000000 x0 : 0000000000000000
Call trace:
kobject_put+0x120/0x150
cdev_put+0x20/0x3c
__fput+0x2c4/0x2d8
____fput+0x1c/0x38
task_work_run+0x70/0xfc
do_exit+0x2a0/0x924
do_group_exit+0x34/0x90
get_signal+0x7fc/0x8c0
do_signal+0x128/0x13b4
do_notify_resume+0xdc/0x160
el0_svc+0xd4/0xf8
el0t_64_sync_handler+0x140/0x14c
el0t_64_sync+0x190/0x194
---[ end trace 0000000000000000 ]---
...followed by more symptoms of corruption, with similar stacks:
refcount_t: underflow; use-after-free.
kernel BUG at lib/list_debug.c:62!
Kernel panic - not syncing: Oops - BUG: Fatal exception
This happens because pps_device_destruct() frees the pps_device with the
embedded cdev immediately after calling cdev_del(), but, as the comment
above cdev_del() notes, fops for previously opened cdevs are still
callable even after cdev_del() returns. I think this bug has always
been there: I can't explain why it suddenly started happening every time
I reboot this particular board.
In commit d953e0e837e6 ("pps: Fix a use-after free bug when
unregistering a source."), George Spelvin suggested removing the
embedded cdev. That seems like the simplest way to fix this, so I've
implemented his suggestion, using __register_chrdev() with pps_idr
becoming the source of truth for which minor corresponds to which
device.
But now that pps_idr defines userspace visibility instead of cdev_add(),
we need to be sure the pps->dev refcount can't reach zero while
userspace can still find it again. So, the idr_remove() call moves to
pps_unregister_cdev(), and pps_idr now holds a reference to pps->dev.
pps_core: source serial1 got cdev (251:1)
<...>
pps pps1: removed
pps_core: unregistering pps1
pps_core: deallocating pps1
Fixes: d953e0e837e6 ("pps: Fix a use-after free bug when unregistering a source.")
Cc: stable@vger.kernel.org
Signed-off-by: Calvin Owens <calvin@wbinvd.org>
Reviewed-by: Michal Schmidt <mschmidt@redhat.com>
Link: https://lore.kernel.org/r/a17975fd5ae99385791929e563f72564edbcf28f.1731383727.git.calvin@wbinvd.org
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2024-11-11 20:13:29 -08:00
|
|
|
dev_info(&pps->dev, "removed\n");
|
2011-01-12 17:00:51 -08:00
|
|
|
pps_unregister_source(pps);
|
2010-03-10 15:23:47 -08:00
|
|
|
}
|
|
|
|
|
|
|
|
static struct tty_ldisc_ops pps_ldisc_ops;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Module stuff
|
|
|
|
*/
|
|
|
|
|
|
|
|
static int __init pps_tty_init(void)
|
|
|
|
{
|
|
|
|
int err;
|
|
|
|
|
|
|
|
/* Inherit the N_TTY's ops */
|
|
|
|
n_tty_inherit_ops(&pps_ldisc_ops);
|
|
|
|
|
|
|
|
/* Save N_TTY's open()/close() methods */
|
|
|
|
alias_n_tty_open = pps_ldisc_ops.open;
|
|
|
|
alias_n_tty_close = pps_ldisc_ops.close;
|
|
|
|
|
|
|
|
/* Init PPS_TTY data */
|
|
|
|
pps_ldisc_ops.owner = THIS_MODULE;
|
2021-05-05 11:19:07 +02:00
|
|
|
pps_ldisc_ops.num = N_PPS;
|
2010-03-10 15:23:47 -08:00
|
|
|
pps_ldisc_ops.name = "pps_tty";
|
|
|
|
pps_ldisc_ops.dcd_change = pps_tty_dcd_change;
|
|
|
|
pps_ldisc_ops.open = pps_tty_open;
|
|
|
|
pps_ldisc_ops.close = pps_tty_close;
|
|
|
|
|
2021-05-05 11:19:07 +02:00
|
|
|
err = tty_register_ldisc(&pps_ldisc_ops);
|
2010-03-10 15:23:47 -08:00
|
|
|
if (err)
|
|
|
|
pr_err("can't register PPS line discipline\n");
|
|
|
|
else
|
|
|
|
pr_info("PPS line discipline registered\n");
|
|
|
|
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void __exit pps_tty_cleanup(void)
|
|
|
|
{
|
2021-05-05 11:19:11 +02:00
|
|
|
tty_unregister_ldisc(&pps_ldisc_ops);
|
2010-03-10 15:23:47 -08:00
|
|
|
}
|
|
|
|
|
|
|
|
module_init(pps_tty_init);
|
|
|
|
module_exit(pps_tty_cleanup);
|
|
|
|
|
|
|
|
MODULE_ALIAS_LDISC(N_PPS);
|
|
|
|
MODULE_AUTHOR("Rodolfo Giometti <giometti@linux.it>");
|
|
|
|
MODULE_DESCRIPTION("PPS TTY device driver");
|
|
|
|
MODULE_LICENSE("GPL");
|