* [PATCH RESEND] Bluetooth: vhci: Prevent use-after-free by removing debugfs files early
@ 2025-07-16 0:42 Ivan Pravdin
2025-07-16 1:34 ` [RESEND] " bluez.test.bot
2025-07-16 3:26 ` [PATCH RESEND] " Paul Menzel
0 siblings, 2 replies; 4+ messages in thread
From: Ivan Pravdin @ 2025-07-16 0:42 UTC (permalink / raw)
To: marcel, johan.hedberg, luiz.dentz, linux-bluetooth, linux-kernel
Cc: Ivan Pravdin
Move the creation of debugfs files into a dedicated function, and ensure
they are explicitly removed during vhci_release(), before associated
data structures are freed.
Previously, debugfs files such as "force_suspend", "force_wakeup", and
others were created under hdev->debugfs but not removed in
vhci_release(). Since vhci_release() frees the backing vhci_data
structure, any access to these files after release would result in
use-after-free errors.
Although hdev->debugfs is later freed in hci_release_dev(), user can
access files after vhci_data is freed but before hdev->debugfs is
released.
Signed-off-by: Ivan Pravdin <ipravdin.official@gmail.com>
Fixes: ab4e4380d4e1 ("Bluetooth: Add vhci devcoredump support")
---
Resending because previous patch got archived [1].
[1] https://patchwork.kernel.org/project/bluetooth/patch/20250614235317.304705-1-ipravdin.official@gmail.com/
drivers/bluetooth/hci_vhci.c | 57 ++++++++++++++++++++++++++----------
1 file changed, 41 insertions(+), 16 deletions(-)
diff --git a/drivers/bluetooth/hci_vhci.c b/drivers/bluetooth/hci_vhci.c
index f7d8c3c00655..2fef08254d78 100644
--- a/drivers/bluetooth/hci_vhci.c
+++ b/drivers/bluetooth/hci_vhci.c
@@ -380,6 +380,28 @@ static const struct file_operations force_devcoredump_fops = {
.write = force_devcd_write,
};
+static void vhci_debugfs_init(struct vhci_data *data)
+{
+ struct hci_dev *hdev = data->hdev;
+
+ debugfs_create_file("force_suspend", 0644, hdev->debugfs, data,
+ &force_suspend_fops);
+
+ debugfs_create_file("force_wakeup", 0644, hdev->debugfs, data,
+ &force_wakeup_fops);
+
+ if (IS_ENABLED(CONFIG_BT_MSFTEXT))
+ debugfs_create_file("msft_opcode", 0644, hdev->debugfs, data,
+ &msft_opcode_fops);
+
+ if (IS_ENABLED(CONFIG_BT_AOSPEXT))
+ debugfs_create_file("aosp_capable", 0644, hdev->debugfs, data,
+ &aosp_capable_fops);
+
+ debugfs_create_file("force_devcoredump", 0644, hdev->debugfs, data,
+ &force_devcoredump_fops);
+}
+
static int __vhci_create_device(struct vhci_data *data, __u8 opcode)
{
struct hci_dev *hdev;
@@ -434,22 +456,8 @@ static int __vhci_create_device(struct vhci_data *data, __u8 opcode)
return -EBUSY;
}
- debugfs_create_file("force_suspend", 0644, hdev->debugfs, data,
- &force_suspend_fops);
-
- debugfs_create_file("force_wakeup", 0644, hdev->debugfs, data,
- &force_wakeup_fops);
-
- if (IS_ENABLED(CONFIG_BT_MSFTEXT))
- debugfs_create_file("msft_opcode", 0644, hdev->debugfs, data,
- &msft_opcode_fops);
-
- if (IS_ENABLED(CONFIG_BT_AOSPEXT))
- debugfs_create_file("aosp_capable", 0644, hdev->debugfs, data,
- &aosp_capable_fops);
-
- debugfs_create_file("force_devcoredump", 0644, hdev->debugfs, data,
- &force_devcoredump_fops);
+ if (!IS_ERR_OR_NULL(hdev->debugfs))
+ vhci_debugfs_init(data);
hci_skb_pkt_type(skb) = HCI_VENDOR_PKT;
@@ -651,6 +659,21 @@ static int vhci_open(struct inode *inode, struct file *file)
return 0;
}
+static void vhci_debugfs_remove(struct hci_dev *hdev)
+{
+ debugfs_lookup_and_remove("force_suspend", hdev->debugfs);
+
+ debugfs_lookup_and_remove("force_wakeup", hdev->debugfs);
+
+ if (IS_ENABLED(CONFIG_BT_MSFTEXT))
+ debugfs_lookup_and_remove("msft_opcode", hdev->debugfs);
+
+ if (IS_ENABLED(CONFIG_BT_AOSPEXT))
+ debugfs_lookup_and_remove("aosp_capable", hdev->debugfs);
+
+ debugfs_lookup_and_remove("force_devcoredump", hdev->debugfs);
+}
+
static int vhci_release(struct inode *inode, struct file *file)
{
struct vhci_data *data = file->private_data;
@@ -662,6 +685,8 @@ static int vhci_release(struct inode *inode, struct file *file)
hdev = data->hdev;
if (hdev) {
+ if (!IS_ERR_OR_NULL(hdev->debugfs))
+ vhci_debugfs_remove(hdev);
hci_unregister_dev(hdev);
hci_free_dev(hdev);
}
--
2.45.2
^ permalink raw reply related [flat|nested] 4+ messages in thread
* RE: [RESEND] Bluetooth: vhci: Prevent use-after-free by removing debugfs files early
2025-07-16 0:42 [PATCH RESEND] Bluetooth: vhci: Prevent use-after-free by removing debugfs files early Ivan Pravdin
@ 2025-07-16 1:34 ` bluez.test.bot
2025-07-16 3:26 ` [PATCH RESEND] " Paul Menzel
1 sibling, 0 replies; 4+ messages in thread
From: bluez.test.bot @ 2025-07-16 1:34 UTC (permalink / raw)
To: linux-bluetooth, ipravdin.official
[-- Attachment #1: Type: text/plain, Size: 2456 bytes --]
This is automated email and please do not reply to this email!
Dear submitter,
Thank you for submitting the patches to the linux bluetooth mailing list.
This is a CI test results with your patch series:
PW Link:https://patchwork.kernel.org/project/bluetooth/list/?series=982756
---Test result---
Test Summary:
CheckPatch PENDING 0.40 seconds
GitLint PENDING 0.30 seconds
SubjectPrefix PASS 0.08 seconds
BuildKernel PASS 24.91 seconds
CheckAllWarning PASS 27.48 seconds
CheckSparse PASS 31.47 seconds
BuildKernel32 PASS 25.09 seconds
TestRunnerSetup PASS 485.88 seconds
TestRunner_l2cap-tester PASS 26.03 seconds
TestRunner_iso-tester PASS 38.66 seconds
TestRunner_bnep-tester PASS 6.12 seconds
TestRunner_mgmt-tester FAIL 134.57 seconds
TestRunner_rfcomm-tester PASS 9.58 seconds
TestRunner_sco-tester PASS 15.05 seconds
TestRunner_ioctl-tester PASS 10.53 seconds
TestRunner_mesh-tester FAIL 11.46 seconds
TestRunner_smp-tester PASS 8.80 seconds
TestRunner_userchan-tester PASS 6.52 seconds
IncrementalBuild PENDING 0.62 seconds
Details
##############################
Test: CheckPatch - PENDING
Desc: Run checkpatch.pl script
Output:
##############################
Test: GitLint - PENDING
Desc: Run gitlint
Output:
##############################
Test: TestRunner_mgmt-tester - FAIL
Desc: Run mgmt-tester with test-runner
Output:
Total: 490, Passed: 483 (98.6%), Failed: 3, Not Run: 4
Failed Test Cases
LL Privacy - Set Flags 1 (Add to RL) Failed 0.181 seconds
LL Privacy - Set Flags 3 (2 Devices to RL) Failed 0.184 seconds
LL Privacy - Set Device Flag 1 (Device Privacy) Failed 0.186 seconds
##############################
Test: TestRunner_mesh-tester - FAIL
Desc: Run mesh-tester with test-runner
Output:
Total: 10, Passed: 8 (80.0%), Failed: 2, Not Run: 0
Failed Test Cases
Mesh - Send cancel - 1 Timed out 1.962 seconds
Mesh - Send cancel - 2 Timed out 1.999 seconds
##############################
Test: IncrementalBuild - PENDING
Desc: Incremental build with the patches in the series
Output:
---
Regards,
Linux Bluetooth
^ permalink raw reply [flat|nested] 4+ messages in thread
* Re: [PATCH RESEND] Bluetooth: vhci: Prevent use-after-free by removing debugfs files early
2025-07-16 0:42 [PATCH RESEND] Bluetooth: vhci: Prevent use-after-free by removing debugfs files early Ivan Pravdin
2025-07-16 1:34 ` [RESEND] " bluez.test.bot
@ 2025-07-16 3:26 ` Paul Menzel
2025-07-16 3:29 ` Ivan Pravdin
1 sibling, 1 reply; 4+ messages in thread
From: Paul Menzel @ 2025-07-16 3:26 UTC (permalink / raw)
To: Ivan Pravdin
Cc: marcel, johan.hedberg, luiz.dentz, linux-bluetooth, linux-kernel
Dear Ivan,
Thank you for your patch.
Am 16.07.25 um 02:42 schrieb Ivan Pravdin:
> Move the creation of debugfs files into a dedicated function, and ensure
> they are explicitly removed during vhci_release(), before associated
> data structures are freed.
>
> Previously, debugfs files such as "force_suspend", "force_wakeup", and
> others were created under hdev->debugfs but not removed in
> vhci_release(). Since vhci_release() frees the backing vhci_data
> structure, any access to these files after release would result in
> use-after-free errors.
>
> Although hdev->debugfs is later freed in hci_release_dev(), user can
> access files after vhci_data is freed but before hdev->debugfs is
> released.
>
> Signed-off-by: Ivan Pravdin <ipravdin.official@gmail.com>
> Fixes: ab4e4380d4e1 ("Bluetooth: Add vhci devcoredump support")
Not important, but I’d put the Signed-off-by: tag last.
> ---
> Resending because previous patch got archived [1].
>
> [1] https://patchwork.kernel.org/project/bluetooth/patch/20250614235317.304705-1-ipravdin.official@gmail.com/
>
> drivers/bluetooth/hci_vhci.c | 57 ++++++++++++++++++++++++++----------
> 1 file changed, 41 insertions(+), 16 deletions(-)
>
> diff --git a/drivers/bluetooth/hci_vhci.c b/drivers/bluetooth/hci_vhci.c
> index f7d8c3c00655..2fef08254d78 100644
> --- a/drivers/bluetooth/hci_vhci.c
> +++ b/drivers/bluetooth/hci_vhci.c
> @@ -380,6 +380,28 @@ static const struct file_operations force_devcoredump_fops = {
> .write = force_devcd_write,
> };
>
> +static void vhci_debugfs_init(struct vhci_data *data)
> +{
> + struct hci_dev *hdev = data->hdev;
> +
> + debugfs_create_file("force_suspend", 0644, hdev->debugfs, data,
> + &force_suspend_fops);
> +
> + debugfs_create_file("force_wakeup", 0644, hdev->debugfs, data,
> + &force_wakeup_fops);
> +
> + if (IS_ENABLED(CONFIG_BT_MSFTEXT))
> + debugfs_create_file("msft_opcode", 0644, hdev->debugfs, data,
> + &msft_opcode_fops);
> +
> + if (IS_ENABLED(CONFIG_BT_AOSPEXT))
> + debugfs_create_file("aosp_capable", 0644, hdev->debugfs, data,
> + &aosp_capable_fops);
> +
> + debugfs_create_file("force_devcoredump", 0644, hdev->debugfs, data,
> + &force_devcoredump_fops);
> +}
> +
> static int __vhci_create_device(struct vhci_data *data, __u8 opcode)
> {
> struct hci_dev *hdev;
> @@ -434,22 +456,8 @@ static int __vhci_create_device(struct vhci_data *data, __u8 opcode)
> return -EBUSY;
> }
>
> - debugfs_create_file("force_suspend", 0644, hdev->debugfs, data,
> - &force_suspend_fops);
> -
> - debugfs_create_file("force_wakeup", 0644, hdev->debugfs, data,
> - &force_wakeup_fops);
> -
> - if (IS_ENABLED(CONFIG_BT_MSFTEXT))
> - debugfs_create_file("msft_opcode", 0644, hdev->debugfs, data,
> - &msft_opcode_fops);
> -
> - if (IS_ENABLED(CONFIG_BT_AOSPEXT))
> - debugfs_create_file("aosp_capable", 0644, hdev->debugfs, data,
> - &aosp_capable_fops);
> -
> - debugfs_create_file("force_devcoredump", 0644, hdev->debugfs, data,
> - &force_devcoredump_fops);
> + if (!IS_ERR_OR_NULL(hdev->debugfs))
> + vhci_debugfs_init(data);
>
> hci_skb_pkt_type(skb) = HCI_VENDOR_PKT;
>
> @@ -651,6 +659,21 @@ static int vhci_open(struct inode *inode, struct file *file)
> return 0;
> }
>
> +static void vhci_debugfs_remove(struct hci_dev *hdev)
> +{
> + debugfs_lookup_and_remove("force_suspend", hdev->debugfs);
> +
> + debugfs_lookup_and_remove("force_wakeup", hdev->debugfs);
> +
> + if (IS_ENABLED(CONFIG_BT_MSFTEXT))
> + debugfs_lookup_and_remove("msft_opcode", hdev->debugfs);
> +
> + if (IS_ENABLED(CONFIG_BT_AOSPEXT))
> + debugfs_lookup_and_remove("aosp_capable", hdev->debugfs);
> +
> + debugfs_lookup_and_remove("force_devcoredump", hdev->debugfs);
> +}
> +
> static int vhci_release(struct inode *inode, struct file *file)
> {
> struct vhci_data *data = file->private_data;
> @@ -662,6 +685,8 @@ static int vhci_release(struct inode *inode, struct file *file)
> hdev = data->hdev;
>
> if (hdev) {
> + if (!IS_ERR_OR_NULL(hdev->debugfs))
> + vhci_debugfs_remove(hdev);
> hci_unregister_dev(hdev);
> hci_free_dev(hdev);
> }
Reviewed-by: Paul Menzel <pmenzel@molgen.mpg.de>
Kind regards,
Paul
^ permalink raw reply [flat|nested] 4+ messages in thread
* Re: [PATCH RESEND] Bluetooth: vhci: Prevent use-after-free by removing debugfs files early
2025-07-16 3:26 ` [PATCH RESEND] " Paul Menzel
@ 2025-07-16 3:29 ` Ivan Pravdin
0 siblings, 0 replies; 4+ messages in thread
From: Ivan Pravdin @ 2025-07-16 3:29 UTC (permalink / raw)
To: Paul Menzel
Cc: marcel, johan.hedberg, luiz.dentz, linux-bluetooth, linux-kernel
On Wed, Jul 16, 2025 at 05:26:05AM GMT, Paul Menzel wrote:
> Dear Ivan,
>
>
> Thank you for your patch.
>
> Am 16.07.25 um 02:42 schrieb Ivan Pravdin:
> > Move the creation of debugfs files into a dedicated function, and ensure
> > they are explicitly removed during vhci_release(), before associated
> > data structures are freed.
> >
> > Previously, debugfs files such as "force_suspend", "force_wakeup", and
> > others were created under hdev->debugfs but not removed in
> > vhci_release(). Since vhci_release() frees the backing vhci_data
> > structure, any access to these files after release would result in
> > use-after-free errors.
> >
> > Although hdev->debugfs is later freed in hci_release_dev(), user can
> > access files after vhci_data is freed but before hdev->debugfs is
> > released.
> >
> > Signed-off-by: Ivan Pravdin <ipravdin.official@gmail.com>
> > Fixes: ab4e4380d4e1 ("Bluetooth: Add vhci devcoredump support")
>
> Not important, but I’d put the Signed-off-by: tag last.
Not sure how I missed that, sorry!
>
> > ---
> > Resending because previous patch got archived [1].
> >
> > [1] https://patchwork.kernel.org/project/bluetooth/patch/20250614235317.304705-1-ipravdin.official@gmail.com/
> >
> > drivers/bluetooth/hci_vhci.c | 57 ++++++++++++++++++++++++++----------
> > 1 file changed, 41 insertions(+), 16 deletions(-)
> >
> > diff --git a/drivers/bluetooth/hci_vhci.c b/drivers/bluetooth/hci_vhci.c
> > index f7d8c3c00655..2fef08254d78 100644
> > --- a/drivers/bluetooth/hci_vhci.c
> > +++ b/drivers/bluetooth/hci_vhci.c
> > @@ -380,6 +380,28 @@ static const struct file_operations force_devcoredump_fops = {
> > .write = force_devcd_write,
> > };
> > +static void vhci_debugfs_init(struct vhci_data *data)
> > +{
> > + struct hci_dev *hdev = data->hdev;
> > +
> > + debugfs_create_file("force_suspend", 0644, hdev->debugfs, data,
> > + &force_suspend_fops);
> > +
> > + debugfs_create_file("force_wakeup", 0644, hdev->debugfs, data,
> > + &force_wakeup_fops);
> > +
> > + if (IS_ENABLED(CONFIG_BT_MSFTEXT))
> > + debugfs_create_file("msft_opcode", 0644, hdev->debugfs, data,
> > + &msft_opcode_fops);
> > +
> > + if (IS_ENABLED(CONFIG_BT_AOSPEXT))
> > + debugfs_create_file("aosp_capable", 0644, hdev->debugfs, data,
> > + &aosp_capable_fops);
> > +
> > + debugfs_create_file("force_devcoredump", 0644, hdev->debugfs, data,
> > + &force_devcoredump_fops);
> > +}
> > +
> > static int __vhci_create_device(struct vhci_data *data, __u8 opcode)
> > {
> > struct hci_dev *hdev;
> > @@ -434,22 +456,8 @@ static int __vhci_create_device(struct vhci_data *data, __u8 opcode)
> > return -EBUSY;
> > }
> > - debugfs_create_file("force_suspend", 0644, hdev->debugfs, data,
> > - &force_suspend_fops);
> > -
> > - debugfs_create_file("force_wakeup", 0644, hdev->debugfs, data,
> > - &force_wakeup_fops);
> > -
> > - if (IS_ENABLED(CONFIG_BT_MSFTEXT))
> > - debugfs_create_file("msft_opcode", 0644, hdev->debugfs, data,
> > - &msft_opcode_fops);
> > -
> > - if (IS_ENABLED(CONFIG_BT_AOSPEXT))
> > - debugfs_create_file("aosp_capable", 0644, hdev->debugfs, data,
> > - &aosp_capable_fops);
> > -
> > - debugfs_create_file("force_devcoredump", 0644, hdev->debugfs, data,
> > - &force_devcoredump_fops);
> > + if (!IS_ERR_OR_NULL(hdev->debugfs))
> > + vhci_debugfs_init(data);
> > hci_skb_pkt_type(skb) = HCI_VENDOR_PKT;
> > @@ -651,6 +659,21 @@ static int vhci_open(struct inode *inode, struct file *file)
> > return 0;
> > }
> > +static void vhci_debugfs_remove(struct hci_dev *hdev)
> > +{
> > + debugfs_lookup_and_remove("force_suspend", hdev->debugfs);
> > +
> > + debugfs_lookup_and_remove("force_wakeup", hdev->debugfs);
> > +
> > + if (IS_ENABLED(CONFIG_BT_MSFTEXT))
> > + debugfs_lookup_and_remove("msft_opcode", hdev->debugfs);
> > +
> > + if (IS_ENABLED(CONFIG_BT_AOSPEXT))
> > + debugfs_lookup_and_remove("aosp_capable", hdev->debugfs);
> > +
> > + debugfs_lookup_and_remove("force_devcoredump", hdev->debugfs);
> > +}
> > +
> > static int vhci_release(struct inode *inode, struct file *file)
> > {
> > struct vhci_data *data = file->private_data;
> > @@ -662,6 +685,8 @@ static int vhci_release(struct inode *inode, struct file *file)
> > hdev = data->hdev;
> > if (hdev) {
> > + if (!IS_ERR_OR_NULL(hdev->debugfs))
> > + vhci_debugfs_remove(hdev);
> > hci_unregister_dev(hdev);
> > hci_free_dev(hdev);
> > }
>
> Reviewed-by: Paul Menzel <pmenzel@molgen.mpg.de>
Thanks.
>
>
> Kind regards,
>
> Paul
Ivan Pravdin
^ permalink raw reply [flat|nested] 4+ messages in thread
end of thread, other threads:[~2025-07-16 3:29 UTC | newest]
Thread overview: 4+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2025-07-16 0:42 [PATCH RESEND] Bluetooth: vhci: Prevent use-after-free by removing debugfs files early Ivan Pravdin
2025-07-16 1:34 ` [RESEND] " bluez.test.bot
2025-07-16 3:26 ` [PATCH RESEND] " Paul Menzel
2025-07-16 3:29 ` Ivan Pravdin
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox