Re: [PATCH] drm/vmwgfx: Keep a gem reference to user bos in surfaces

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hello Murray,

thanks for looking into this!

> > > On Thu, 2023-09-28 at 00:13 -0400, Zack Rusin wrote:
> > > > From: Zack Rusin <zackr@xxxxxxxxxx>
> > > > 
> > > > Surfaces can be backed (i.e. stored in) memory objects (mob's) which
> > > > are created and managed by the userspace as GEM buffers. Surfaces
> > > > grab only a ttm reference which means that the gem object can
> > > > be deleted underneath us, especially in cases where prime buffer
> > > > export is used.
> > > > 
> > > > Make sure that all userspace surfaces which are backed by gem objects
> > > > hold a gem reference to make sure they're not deleted before vmw
> > > > surfaces are done with them, which fixes:
> > > > ------------[ cut here ]------------
> > > > refcount_t: underflow; use-after-free.
> > > > WARNING: CPU: 2 PID: 2632 at lib/refcount.c:28 refcount_warn_saturate+0xfb/0x150

[]

> > > > ---[ end trace 0000000000000000 ]---
> > > > 
> > > > A lot of the analyis on the bug was done by Murray McAllister and
> > > > Ian Forbes.
> > > > 
> > > > Reported-by: Murray McAllister <murray.mcallister@xxxxxxxxx>
> > > > Cc: Ian Forbes <iforbes@xxxxxxxxxx>
> > > > Signed-off-by: Zack Rusin <zackr@xxxxxxxxxx>
> > > > Fixes: a950b989ea29 ("drm/vmwgfx: Do not drop the reference to the handle too soon")
> > > > Cc: <stable@xxxxxxxxxxxxxxx> # v6.2+
> > > 
> > > Do you remember the particular reason this was marked 6.2+?
> > 
> > That's because that's the kernel release where the commit this one is
> > fixing first landed.
> > 
> > > We see this on Debian 6.1.67 (which at least has the mentioned
> > > "drm/vmwgfx: Do not drop the reference to the handle too soon"):
> > 
> > The original had to be backported there. I'll ask someone on my team
> > to check the branches the original was backported to see if this
> > change even applies on those and then we'll see what we can do. In the
> > meantime if you know anyone on the Debian kernel team suggesting this
> > as a cherry-pick might also be a good idea.
> > 
> > z
> 
> Hi Alexander,
> 
> I think the backport might already be on Debian's radar for your version:
> 
> https://security-tracker.debian.org/tracker/CVE-2023-5633

Sorry, my reference to Debian was irrelevant, the patch-to-be-fixed
is actually in the upstream kernel:

$ git log --grep "drm/vmwgfx: Do not drop the reference to the handle too soon" v6.1.67
commit 0a127ac972404600c99eb141c8d5b5348e53ee4f
Author: Zack Rusin <zackr@xxxxxxxxxx>
Date:   Sat Feb 11 00:05:14 2023 -0500

    drm/vmwgfx: Do not drop the reference to the handle too soon
    
    commit a950b989ea29ab3b38ea7f6e3d2540700a3c54e8 upstream.

So it was merely a hint for Stable Team to pick the Subject path into v6.1.x. 

-- 
Alexander Sverdlin
Siemens AG
www.siemens.com




[Index of Archives]     [Linux Kernel]     [Kernel Development Newbies]     [Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Yosemite Hiking]     [Linux Kernel]     [Linux SCSI]

  Powered by Linux