]> git.ipfire.org Git - thirdparty/kernel/stable.git/commitdiff
thunderbolt: Fix use-after-free in tb_dp_dprx_work
authorDuoming Zhou <duoming@zju.edu.cn>
Tue, 23 Sep 2025 05:13:57 +0000 (13:13 +0800)
committerMika Westerberg <mika.westerberg@linux.intel.com>
Tue, 23 Sep 2025 15:16:38 +0000 (17:16 +0200)
The original code relies on cancel_delayed_work() in tb_dp_dprx_stop(),
which does not ensure that the delayed work item tunnel->dprx_work has
fully completed if it was already running. This leads to use-after-free
scenarios where tb_tunnel is deallocated by tb_tunnel_put(), while
tunnel->dprx_work remains active and attempts to dereference tb_tunnel
in tb_dp_dprx_work().

A typical race condition is illustrated below:

CPU 0                            | CPU 1
tb_dp_tunnel_active()            |
  tb_deactivate_and_free_tunnel()| tb_dp_dprx_start()
    tb_tunnel_deactivate()       |   queue_delayed_work()
      tb_dp_activate()           |
        tb_dp_dprx_stop()        | tb_dp_dprx_work() //delayed worker
          cancel_delayed_work()  |
    tb_tunnel_put(tunnel);       |
                                 |   tunnel = container_of(...); //UAF
                                 |   tunnel-> //UAF

Replacing cancel_delayed_work() with cancel_delayed_work_sync() is
not feasible as it would introduce a deadlock: both tb_dp_dprx_work()
and the cleanup path acquire tb->lock, and cancel_delayed_work_sync()
would wait indefinitely for the work item that cannot proceed.

Instead, implement proper reference counting:
- If cancel_delayed_work() returns true (work is pending), we release
  the reference in the stop function.
- If it returns false (work is executing or already completed), the
  reference is released in delayed work function itself.

This ensures the tb_tunnel remains valid during work item execution
while preventing memory leaks.

This bug was found by static analysis.

Fixes: d6d458d42e1e ("thunderbolt: Handle DisplayPort tunnel activation asynchronously")
Cc: stable@vger.kernel.org
Signed-off-by: Duoming Zhou <duoming@zju.edu.cn>
Signed-off-by: Mika Westerberg <mika.westerberg@linux.intel.com>
drivers/thunderbolt/tunnel.c

index 850d9b107abd5340af48215196e1e69f7c265e63..bfa0607b55744f465d5712389094491c46d6a06b 100644 (file)
@@ -1079,6 +1079,7 @@ static void tb_dp_dprx_work(struct work_struct *work)
 
        if (tunnel->callback)
                tunnel->callback(tunnel, tunnel->callback_data);
+       tb_tunnel_put(tunnel);
 }
 
 static int tb_dp_dprx_start(struct tb_tunnel *tunnel)
@@ -1106,8 +1107,8 @@ static void tb_dp_dprx_stop(struct tb_tunnel *tunnel)
        if (tunnel->dprx_started) {
                tunnel->dprx_started = false;
                tunnel->dprx_canceled = true;
-               cancel_delayed_work(&tunnel->dprx_work);
-               tb_tunnel_put(tunnel);
+               if (cancel_delayed_work(&tunnel->dprx_work))
+                       tb_tunnel_put(tunnel);
        }
 }