From nobody Wed Dec 17 17:47:27 2025 Received: from www262.sakura.ne.jp (www262.sakura.ne.jp [202.181.97.72]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 7613912E1D2 for ; Tue, 25 Jun 2024 04:54:07 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=202.181.97.72 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1719291250; cv=none; b=MXPqTS9nw3xroiEXrfM7Cfjn2bJdM+oIie98wauHabtSTDFbBPcT9arLBSoalWXz8R9DcXg2Qy3TIAOz3vvzpf0YFjaqLDAI+A0rZfiHJc2CQuVi/dzCSfcwbf4bSc5jZsD3APdUmlwaAfbnChcoCy3F1WH4xUS5Z3riWBWo2fM= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1719291250; c=relaxed/simple; bh=UAZafgTioIB4RZU9F8hI1c0llV96siVufhfJdveDgaQ=; h=Message-ID:Date:MIME-Version:Subject:From:To:References: In-Reply-To:Content-Type; b=S1BaVlQk+U3ZquDzAbQIQkB8lbuVb8KUEOCViwBs64YRqd74dFQ+Ou3qxmNuKKLdkd7hmZS2rTBXgqBj5UScxklmdJ3i1VJc98HfTArAGdZF/+ZOMXjdszxxLQ/gVrb4/mqYoJ1IqyTcrlZNoM8RSbIhVeYTkryvi4IicgpzvWU= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=I-love.SAKURA.ne.jp; spf=pass smtp.mailfrom=I-love.SAKURA.ne.jp; arc=none smtp.client-ip=202.181.97.72 Authentication-Results: smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=I-love.SAKURA.ne.jp Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=I-love.SAKURA.ne.jp Received: from fsav315.sakura.ne.jp (fsav315.sakura.ne.jp [153.120.85.146]) by www262.sakura.ne.jp (8.15.2/8.15.2) with ESMTP id 45P4s4Hi018260; Tue, 25 Jun 2024 13:54:04 +0900 (JST) (envelope-from penguin-kernel@I-love.SAKURA.ne.jp) Received: from www262.sakura.ne.jp (202.181.97.72) by fsav315.sakura.ne.jp (F-Secure/fsigk_smtp/550/fsav315.sakura.ne.jp); Tue, 25 Jun 2024 13:54:04 +0900 (JST) X-Virus-Status: clean(F-Secure/fsigk_smtp/550/fsav315.sakura.ne.jp) Received: from [192.168.1.6] (M106072142033.v4.enabler.ne.jp [106.72.142.33]) (authenticated bits=0) by www262.sakura.ne.jp (8.15.2/8.15.2) with ESMTPSA id 45P4s4bV018257 (version=TLSv1.2 cipher=AES256-GCM-SHA384 bits=256 verify=NO); Tue, 25 Jun 2024 13:54:04 +0900 (JST) (envelope-from penguin-kernel@I-love.SAKURA.ne.jp) Message-ID: Date: Tue, 25 Jun 2024 13:54:00 +0900 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Subject: [PATCH 1/2] profiling: initialize prof_cpu_mask from profile_online_cpu() From: Tetsuo Handa To: Linus Torvalds , LKML References: Content-Language: en-US In-Reply-To: Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" syzbot is reporting uninit-value at profile_hits(), for commit acd895795d35 ("profiling: fix broken profiling regression") by error initialized prof_cpu_mask too early. do_profile_hits() is called from profile_tick() from timer interrupt only if cpumask_test_cpu(smp_processor_id(), prof_cpu_mask) is true and prof_buffer is not NULL. But the syzbot's report says that profile_hits() was called while current thread is still doing vzalloc(buffer_bytes) where prof_buffer is NULL at this moment. This indicates two things. One is that cpumask_set_cpu(cpu, prof_cpu_mask) should have been called from profile_online_cpu() from cpuhp_setup_state() only after profile_init() completed. Fix this by explicitly calling cpumask_copy() from create_proc_profile() on only UP kernels. The other is that multiple threads concurrently tried to write to /sys/kernel/profiling interface, which caused that somebody else tried to re-initialize prof_buffer despite somebody has already initialized prof_buffer. Fix this by using serialization. Reported-by: syzbot+b1a83ab2a9eb9321fbdd@syzkaller.appspotmail.com Closes: https://syzkaller.appspot.com/bug?extid=3Db1a83ab2a9eb9321fbdd Fixes: acd895795d35 ("profiling: fix broken profiling regression") Tested-by: syzbot+b1a83ab2a9eb9321fbdd@syzkaller.appspotmail.com Signed-off-by: Tetsuo Handa --- kernel/ksysfs.c | 27 ++++++++++++++++++++++----- kernel/profile.c | 6 +++--- 2 files changed, 25 insertions(+), 8 deletions(-) diff --git a/kernel/ksysfs.c b/kernel/ksysfs.c index 07fb5987b42b..0be3dc86da54 100644 --- a/kernel/ksysfs.c +++ b/kernel/ksysfs.c @@ -91,10 +91,23 @@ static ssize_t profiling_store(struct kobject *kobj, struct kobj_attribute *attr, const char *buf, size_t count) { + static DEFINE_MUTEX(lock); int ret; =20 - if (prof_on) - return -EEXIST; + /* + * We need serialization, for profile_setup() initializes prof_on + * value. Also, use killable wait in case memory allocation from + * profile_init() triggered the OOM killer and chose current thread + * blocked here. + */ + if (mutex_lock_killable(&lock)) + return -EINTR; + + if (prof_on) { + count =3D -EEXIST; + goto out; + } + /* * This eventually calls into get_option() which * has a ton of callers and is not const. It is @@ -102,11 +115,15 @@ static ssize_t profiling_store(struct kobject *kobj, */ profile_setup((char *)buf); ret =3D profile_init(); - if (ret) - return ret; + if (ret) { + count =3D ret; + goto out; + } ret =3D create_proc_profile(); if (ret) - return ret; + count =3D ret; +out: + mutex_unlock(&lock); return count; } KERNEL_ATTR_RW(profiling); diff --git a/kernel/profile.c b/kernel/profile.c index 2b775cc5c28f..1a6c1cf98485 100644 --- a/kernel/profile.c +++ b/kernel/profile.c @@ -114,11 +114,9 @@ int __ref profile_init(void) =20 buffer_bytes =3D prof_len*sizeof(atomic_t); =20 - if (!alloc_cpumask_var(&prof_cpu_mask, GFP_KERNEL)) + if (!zalloc_cpumask_var(&prof_cpu_mask, GFP_KERNEL)) return -ENOMEM; =20 - cpumask_copy(prof_cpu_mask, cpu_possible_mask); - prof_buffer =3D kzalloc(buffer_bytes, GFP_KERNEL|__GFP_NOWARN); if (prof_buffer) return 0; @@ -438,6 +436,8 @@ int __ref create_proc_profile(void) goto err_state_prep; online_state =3D err; err =3D 0; +#else + cpumask_copy(prof_cpu_mask, cpu_possible_mask); #endif entry =3D proc_create("profile", S_IWUSR | S_IRUGO, NULL, &profile_proc_ops); --=20 2.43.0 From nobody Wed Dec 17 17:47:27 2025 Received: from www262.sakura.ne.jp (www262.sakura.ne.jp [202.181.97.72]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id E241B13C691 for ; Tue, 25 Jun 2024 04:54:37 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=202.181.97.72 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1719291281; cv=none; b=n/YUsSH6VUsUl1HM7jTSrpvykRDLgwCoMJRrnqfwSKq6Am/0aatrfea8Tmu8L8n7XQ/1JU4DCJdD09vNm1On7lQmFsnQxudLhfqXkOytWFeEvkrdRJB0keP32fFxQfDFpz+3iTlvXDrTaEaGQqBci9yRyq4bJdtPMIq+P6zIGE0= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1719291281; c=relaxed/simple; bh=69Kf6oY5WgzlT6bQVJHwUZOiCn1BEQqZcbulidNqmkY=; h=Message-ID:Date:MIME-Version:Subject:From:To:References: In-Reply-To:Content-Type; b=D+/vzsO2rGu2HfBDuICJLMZOIm6SCxuTd1LBOhZURH9qjiUhflDNnIIC6CxCgkZydbgKxHM3XwhD0QGtvi1TnKxhlroJVdF/cJHOR0hyb1Oe4JD2hL+E8X2IR36zgY9pNqd8UNptlx/1v92lzatoBRwTT5XX8Qs5qGBEIaK3+dM= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=I-love.SAKURA.ne.jp; spf=pass smtp.mailfrom=I-love.SAKURA.ne.jp; arc=none smtp.client-ip=202.181.97.72 Authentication-Results: smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=I-love.SAKURA.ne.jp Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=I-love.SAKURA.ne.jp Received: from fsav117.sakura.ne.jp (fsav117.sakura.ne.jp [27.133.134.244]) by www262.sakura.ne.jp (8.15.2/8.15.2) with ESMTP id 45P4sYHD018379; Tue, 25 Jun 2024 13:54:34 +0900 (JST) (envelope-from penguin-kernel@I-love.SAKURA.ne.jp) Received: from www262.sakura.ne.jp (202.181.97.72) by fsav117.sakura.ne.jp (F-Secure/fsigk_smtp/550/fsav117.sakura.ne.jp); Tue, 25 Jun 2024 13:54:34 +0900 (JST) X-Virus-Status: clean(F-Secure/fsigk_smtp/550/fsav117.sakura.ne.jp) Received: from [192.168.1.6] (M106072142033.v4.enabler.ne.jp [106.72.142.33]) (authenticated bits=0) by www262.sakura.ne.jp (8.15.2/8.15.2) with ESMTPSA id 45P4sYxM018371 (version=TLSv1.2 cipher=AES256-GCM-SHA384 bits=256 verify=NO); Tue, 25 Jun 2024 13:54:34 +0900 (JST) (envelope-from penguin-kernel@I-love.SAKURA.ne.jp) Message-ID: Date: Tue, 25 Jun 2024 13:54:31 +0900 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Subject: [PATCH 2/2] Input: MT - limit max slots From: Tetsuo Handa To: Linus Torvalds , LKML References: Content-Language: en-US In-Reply-To: Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" syzbot is reporting too large allocation at input_mt_init_slots(), for num_slots is supplied from userspace using ioctl(UI_DEV_CREATE). Since nobody knows possible max slots, this patch chose 1024. Reported-by: syzbot Closes: https://syzkaller.appspot.com/bug?extid=3D0122fa359a69694395d5 Suggested-by: Dmitry Torokhov Signed-off-by: Tetsuo Handa --- drivers/input/input-mt.c | 3 +++ 1 file changed, 3 insertions(+) diff --git a/drivers/input/input-mt.c b/drivers/input/input-mt.c index 14b53dac1253..6b04a674f832 100644 --- a/drivers/input/input-mt.c +++ b/drivers/input/input-mt.c @@ -46,6 +46,9 @@ int input_mt_init_slots(struct input_dev *dev, unsigned i= nt num_slots, return 0; if (mt) return mt->num_slots !=3D num_slots ? -EINVAL : 0; + /* Arbitrary limit for avoiding too large memory allocation. */ + if (num_slots > 1024) + return -EINVAL; =20 mt =3D kzalloc(struct_size(mt, slots, num_slots), GFP_KERNEL); if (!mt) --=20 2.43.0