CWE
416
Advisory Published
CVE Published
Updated

CVE-2024-26939: drm/i915/vma: Fix UAF on destroy against retire race

First published: Wed May 01 2024(Updated: )

In the Linux kernel, the following vulnerability has been resolved: drm/i915/vma: Fix UAF on destroy against retire race Object debugging tools were sporadically reporting illegal attempts to free a still active i915 VMA object when parking a GT believed to be idle. [161.359441] ODEBUG: free active (active state 0) object: ffff88811643b958 object type: i915_active hint: __i915_vma_active+0x0/0x50 [i915] [161.360082] WARNING: CPU: 5 PID: 276 at lib/debugobjects.c:514 debug_print_object+0x80/0xb0 ... [161.360304] CPU: 5 PID: 276 Comm: kworker/5:2 Not tainted 6.5.0-rc1-CI_DRM_13375-g003f860e5577+ #1 [161.360314] Hardware name: Intel Corporation Rocket Lake Client Platform/RocketLake S UDIMM 6L RVP, BIOS RKLSFWI1.R00.3173.A03.2204210138 04/21/2022 [161.360322] Workqueue: i915-unordered __intel_wakeref_put_work [i915] [161.360592] RIP: 0010:debug_print_object+0x80/0xb0 ... [161.361347] debug_object_free+0xeb/0x110 [161.361362] i915_active_fini+0x14/0x130 [i915] [161.361866] release_references+0xfe/0x1f0 [i915] [161.362543] i915_vma_parked+0x1db/0x380 [i915] [161.363129] __gt_park+0x121/0x230 [i915] [161.363515] ____intel_wakeref_put_last+0x1f/0x70 [i915] That has been tracked down to be happening when another thread is deactivating the VMA inside __active_retire() helper, after the VMA's active counter has been already decremented to 0, but before deactivation of the VMA's object is reported to the object debugging tool. We could prevent from that race by serializing i915_active_fini() with __active_retire() via ref->tree_lock, but that wouldn't stop the VMA from being used, e.g. from __i915_vma_retire() called at the end of __active_retire(), after that VMA has been already freed by a concurrent i915_vma_destroy() on return from the i915_active_fini(). Then, we should rather fix the issue at the VMA level, not in i915_active. Since __i915_vma_parked() is called from __gt_park() on last put of the GT's wakeref, the issue could be addressed by holding the GT wakeref long enough for __active_retire() to complete before that wakeref is released and the GT parked. I believe the issue was introduced by commit d93939730347 ("drm/i915: Remove the vma refcount") which moved a call to i915_active_fini() from a dropped i915_vma_release(), called on last put of the removed VMA kref, to i915_vma_parked() processing path called on last put of a GT wakeref. However, its visibility to the object debugging tool was suppressed by a bug in i915_active that was fixed two weeks later with commit e92eb246feb9 ("drm/i915/active: Fix missing debug object activation"). A VMA associated with a request doesn't acquire a GT wakeref by itself. Instead, it depends on a wakeref held directly by the request's active intel_context for a GT associated with its VM, and indirectly on that intel_context's engine wakeref if the engine belongs to the same GT as the VMA's VM. Those wakerefs are released asynchronously to VMA deactivation. Fix the issue by getting a wakeref for the VMA's GT when activating it, and putting that wakeref only after the VMA is deactivated. However, exclude global GTT from that processing path, otherwise the GPU never goes idle. Since __i915_vma_retire() may be called from atomic contexts, use async variant of wakeref put. Also, to avoid circular locking dependency, take care of acquiring the wakeref before VM mutex when both are needed. v7: Add inline comments with justifications for: - using untracked variants of intel_gt_pm_get/put() (Nirmoy), - using async variant of _put(), - not getting the wakeref in case of a global GTT, - always getting the first wakeref outside vm->mutex. v6: Since __i915_vma_active/retire() callbacks are not serialized, storing a wakeref tracking handle inside struct i915_vma is not safe, and there is no other good place for that. Use untracked variants of intel_gt_pm_get/put_async(). v5: Replace "tile" with "GT" across commit description (Rodrigo), - ---truncated---

Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67

Affected SoftwareAffected VersionHow to fix
debian/linux
5.10.218-1
5.10.221-1
6.1.94-1
6.1.99-1
6.9.10-1
6.9.12-1
ubuntu/linux<6.8.0-35.35
6.8.0-35.35
ubuntu/linux<6.9~<6.8.3
6.9~
6.8.3
ubuntu/linux-aws<6.8.0-1009.9
6.8.0-1009.9
ubuntu/linux-aws<6.9~<6.8.3
6.9~
6.8.3
ubuntu/linux-aws-5.15<6.9~<6.8.3
6.9~
6.8.3
ubuntu/linux-aws-5.4<6.9~<6.8.3
6.9~
6.8.3
ubuntu/linux-aws-6.5<6.9~<6.8.3
6.9~
6.8.3
ubuntu/linux-aws-fips<6.9~<6.8.3
6.9~
6.8.3
ubuntu/linux-aws-hwe<6.9~<6.8.3
6.9~
6.8.3
ubuntu/linux-azure<6.8.0-1008.8
6.8.0-1008.8
ubuntu/linux-azure<6.9~<6.8.3
6.9~
6.8.3
ubuntu/linux-azure-4.15<6.9~<6.8.3
6.9~
6.8.3
ubuntu/linux-azure-5.15<6.9~<6.8.3
6.9~
6.8.3
ubuntu/linux-azure-5.4<6.9~<6.8.3
6.9~
6.8.3
ubuntu/linux-azure-6.5<6.9~<6.8.3
6.9~
6.8.3
ubuntu/linux-azure-fde<6.9~<6.8.3
6.9~
6.8.3
ubuntu/linux-azure-fde-5.15<6.9~<6.8.3
6.9~
6.8.3
ubuntu/linux-azure-fips<6.9~<6.8.3
6.9~
6.8.3
ubuntu/linux-bluefield<6.9~<6.8.3
6.9~
6.8.3
ubuntu/linux-fips<6.9~<6.8.3
6.9~
6.8.3
ubuntu/linux-gcp<6.8.0-1008.9
6.8.0-1008.9
ubuntu/linux-gcp<6.9~<6.8.3
6.9~
6.8.3
ubuntu/linux-gcp-4.15<6.9~<6.8.3
6.9~
6.8.3
ubuntu/linux-gcp-5.15<6.9~<6.8.3
6.9~
6.8.3
ubuntu/linux-gcp-5.4<6.9~<6.8.3
6.9~
6.8.3
ubuntu/linux-gcp-6.5<6.9~<6.8.3
6.9~
6.8.3
ubuntu/linux-gcp-fips<6.9~<6.8.3
6.9~
6.8.3
ubuntu/linux-gke<6.8.0-1004.7
6.8.0-1004.7
ubuntu/linux-gke<6.9~<6.8.3
6.9~
6.8.3
ubuntu/linux-gkeop<6.9~<6.8.3
6.9~
6.8.3
ubuntu/linux-gkeop-5.15<6.9~<6.8.3
6.9~
6.8.3
ubuntu/linux-hwe<6.9~<6.8.3
6.9~
6.8.3
ubuntu/linux-hwe-5.15<6.9~<6.8.3
6.9~
6.8.3
ubuntu/linux-hwe-5.4<6.9~<6.8.3
6.9~
6.8.3
ubuntu/linux-hwe-6.5<6.9~<6.8.3
6.9~
6.8.3
ubuntu/linux-ibm<6.8.0-1006.6
6.8.0-1006.6
ubuntu/linux-ibm<6.9~<6.8.3
6.9~
6.8.3
ubuntu/linux-ibm-5.15<6.9~<6.8.3
6.9~
6.8.3
ubuntu/linux-ibm-5.4<6.9~<6.8.3
6.9~
6.8.3
ubuntu/linux-intel<6.9~<6.8.3
6.9~
6.8.3
ubuntu/linux-intel-iotg<6.9~<6.8.3
6.9~
6.8.3
ubuntu/linux-intel-iotg-5.15<6.9~<6.8.3
6.9~
6.8.3
ubuntu/linux-iot<6.9~<6.8.3
6.9~
6.8.3
ubuntu/linux-kvm<6.9~<6.8.3
6.9~
6.8.3
ubuntu/linux-laptop<6.9~<6.8.3
6.9~
6.8.3
ubuntu/linux-lowlatency<6.8.0-35.35.1
6.8.0-35.35.1
ubuntu/linux-lowlatency<6.9~<6.8.3
6.9~
6.8.3
ubuntu/linux-lowlatency-hwe-5.15<6.9~<6.8.3
6.9~
6.8.3
ubuntu/linux-lowlatency-hwe-6.5<6.9~<6.8.3
6.9~
6.8.3
ubuntu/linux-lts-xenial<6.9~<6.8.3
6.9~
6.8.3
ubuntu/linux-nvidia<6.9~<6.8.3
6.9~
6.8.3
ubuntu/linux-nvidia-6.5<6.9~<6.8.3
6.9~
6.8.3
ubuntu/linux-nvidia-6.8<6.9~<6.8.3
6.9~
6.8.3
ubuntu/linux-nvidia-lowlatency<6.9~<6.8.3
6.9~
6.8.3
ubuntu/linux-oem-6.5<6.9~<6.8.3
6.9~
6.8.3
ubuntu/linux-oem-6.8<6.8.0-1006.6
6.8.0-1006.6
ubuntu/linux-oem-6.8<6.9~<6.8.3
6.9~
6.8.3
ubuntu/linux-oracle<6.8.0-1006.6
6.8.0-1006.6
ubuntu/linux-oracle<6.9~<6.8.3
6.9~
6.8.3
ubuntu/linux-oracle-5.15<6.9~<6.8.3
6.9~
6.8.3
ubuntu/linux-oracle-5.4<6.9~<6.8.3
6.9~
6.8.3
ubuntu/linux-oracle-6.5<6.9~<6.8.3
6.9~
6.8.3
ubuntu/linux-raspi<6.8.0-1005.5
6.8.0-1005.5
ubuntu/linux-raspi<6.9~<6.8.3
6.9~
6.8.3
ubuntu/linux-raspi-5.4<6.9~<6.8.3
6.9~
6.8.3
ubuntu/linux-riscv<6.8.0-35.35.1
6.8.0-35.35.1
ubuntu/linux-riscv<6.9~<6.8.3
6.9~
6.8.3
ubuntu/linux-riscv-5.15<6.9~<6.8.3
6.9~
6.8.3
ubuntu/linux-riscv-6.5<6.9~<6.8.3
6.9~
6.8.3
ubuntu/linux-starfive<6.9~<6.8.3
6.9~
6.8.3
ubuntu/linux-starfive-6.5<6.9~<6.8.3
6.9~
6.8.3
ubuntu/linux-xilinx-zynqmp<6.9~<6.8.3
6.9~
6.8.3

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Parent vulnerabilities

(Appears in the following advisories)

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203