From: <Tudor.Ambarus@microchip.com>
To: <u.kleine-koenig@pengutronix.de>
Cc: alexandre.belloni@bootlin.com, ard.biesheuvel@linaro.org,
linux-crypto@vger.kernel.org, kernel@pengutronix.de,
Claudiu.Beznea@microchip.com,
linux-arm-kernel@lists.infradead.org, linux-i2c@vger.kernel.org
Subject: Re: Bug in atmel-ecc driver
Date: Wed, 18 May 2022 10:07:32 +0000 [thread overview]
Message-ID: <7ffd4d35-938a-3e82-b39b-92e76819fa92@microchip.com> (raw)
In-Reply-To: <20220517143319.oi7cpgqumv2gn2l6@pengutronix.de>
On 5/17/22 17:33, Uwe Kleine-König wrote:
>
> Hi,
Hi,
>
> On Tue, May 17, 2022 at 01:11:22PM +0000, Tudor.Ambarus@microchip.com wrote:
>> On 5/17/22 13:24, Uwe Kleine-König wrote:
>>> On Fri, May 13, 2022 at 03:59:54PM +0200, Uwe Kleine-König wrote:
>>>> TL;DR: when a device bound to the drivers/crypto/atmel-ecc.c driver is
>>>> unbound while tfm_count isn't zero, this probably results in a
>>>> use-after-free.
>>>>
>>>> The .remove function has:
>>>>
>>>> if (atomic_read(&i2c_priv->tfm_count)) {
>>>> dev_err(&client->dev, "Device is busy\n");
>>>> return -EBUSY;
>>>> }
>>>>
>>>> before actually calling the cleanup stuff. If this branch is hit the
>>>> result is likely:
>>>>
>>>> - "Device is busy" from drivers/crypto/atmel-ecc.c
>>>> - "remove failed (EBUSY), will be ignored" from the i2c core
>>>> - the devm cleanup callbacks are called, including the one kfreeing
>>>> *i2c_priv
>>>> - at a later time atmel_ecc_i2c_client_free() is called which does
>>>> atomic_dec(&i2c_priv->tfm_count);
>>>> - *boom*
>>>>
>>>> I think to fix that you need to call get_device for the i2c device
>>>> before increasing tfm_count (and a matching put_device when decreasing
>>>> it). Having said that the architecture of this driver looks strange to
>>>> me, so there might be nicer fixes (probably with more effort).
>>> I tried to understand the architecture a bit, what I found is
>>> irritating. So the atmel-ecc driver provides a static struct kpp_alg
>>> atmel_ecdh_nist_p256 which embeds a struct crypto_alg (.base). During
>>> .probe() it calls crypto_register_kpp on that global kpp_alg. That is,
>>> if there are two or more devices bound to this driver, the same kpp_alg
>>> structure is registered repeatedly. This involves (among others)
>>>
>>> - refcount_set(&atmel_ecdh_nist_p256.base.cra_refcount)
>>> in crypto_check_alg()
>>> - INIT_LIST_HEAD(&atmel_ecdh_nist_p256.base.cra_users)
>>> in __crypto_register_alg()
>>>
>>> and then a check about registering the same alg twice which makes the
>>> call crypto_register_alg() return -EEXIST. So if a second device is
>>> bound, it probably corrupts the first device and then fails to probe.
>>>
>>> So there can always be (at most) only one bound device which somehow
>>> makes the whole logic in atmel_ecdh_init_tfm ->
>>> atmel_ecc_i2c_client_alloc to select the least used(?) i2c client among
>>> all the bound devices ridiculous.
>> It's been a while since I last worked with ateccx08, but as far as I remember
>> it contains 3 crypto IPs (ecdh, ecdsa, sha) that communicate over the same
>> i2c address. So if someone adds support for all algs and plug in multiple
>> ateccx08 devices, then the distribution of tfms across the i2c clients may work.
> It would require to register the crypto backends independent of the
> .probe() routine though.
>
>> Anyway, if you feel that the complexity is superfluous as the code is now, we
>> can get rid of the i2c_client_alloc logic and add it later on when/if needed.
> If it's you who acts, do whatever pleases you. If it's me I'd go for a
> quick and simple solution to get back to what I originally want to do
> with this driver.
>
> So I'd go for something like
>
> diff --git a/drivers/crypto/atmel-ecc.c b/drivers/crypto/atmel-ecc.c
> index 333fbefbbccb..e7f3f4793c55 100644
> --- a/drivers/crypto/atmel-ecc.c
> +++ b/drivers/crypto/atmel-ecc.c
> @@ -349,8 +349,13 @@ static int atmel_ecc_remove(struct i2c_client *client)
>
> /* Return EBUSY if i2c client already allocated. */
> if (atomic_read(&i2c_priv->tfm_count)) {
> - dev_err(&client->dev, "Device is busy\n");
> - return -EBUSY;
> + /*
> + * After we return here, the memory backing the device is freed.
> + * If there is still some action pending, it probably involves
> + * accessing free'd memory.
would be good to explain why i2c core will ignore -EBUSY.
I can't allocate time for this right now, so if you're in a hurry, it's fine
by me.
> + */
> + dev_emerg(&client->dev, "Hell is about to break loose, expect memory corruption.\n");
> + return 0;
> }
>
> crypto_unregister_kpp(&atmel_ecdh_nist_p256);
>
> because I'm not in yacc-shaving mood.
>
> Best regards
> Uwe
_______________________________________________
linux-arm-kernel mailing list
linux-arm-kernel@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/linux-arm-kernel
next prev parent reply other threads:[~2022-05-18 10:09 UTC|newest]
Thread overview: 12+ messages / expand[flat|nested] mbox.gz Atom feed top
2022-05-13 13:59 Bug in atmel-ecc driver Uwe Kleine-König
2022-05-17 10:24 ` Uwe Kleine-König
2022-05-17 13:11 ` Tudor.Ambarus
2022-05-17 14:33 ` Uwe Kleine-König
2022-05-18 10:07 ` Tudor.Ambarus [this message]
2022-05-18 21:36 ` Uwe Kleine-König
2022-05-20 17:21 ` [PATCH] crypto: atmel-ecc - Remove duplicated error reporting in .remove() Uwe Kleine-König
2022-06-07 6:48 ` Uwe Kleine-König
2022-06-08 4:33 ` Tudor.Ambarus
2022-06-08 7:04 ` Uwe Kleine-König
2022-06-08 8:35 ` Tudor.Ambarus
2022-06-10 9:14 ` Herbert Xu
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=7ffd4d35-938a-3e82-b39b-92e76819fa92@microchip.com \
--to=tudor.ambarus@microchip.com \
--cc=Claudiu.Beznea@microchip.com \
--cc=alexandre.belloni@bootlin.com \
--cc=ard.biesheuvel@linaro.org \
--cc=kernel@pengutronix.de \
--cc=linux-arm-kernel@lists.infradead.org \
--cc=linux-crypto@vger.kernel.org \
--cc=linux-i2c@vger.kernel.org \
--cc=u.kleine-koenig@pengutronix.de \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).