2024-01-04 10:26:57

by Udipto Goswami

[permalink] [raw]
Subject: [PATCH] usb: core: Prevent null pointer dereference in update_port_device_state

Currently,the function update_port_device_state gets the usb_hub from
udev->parent by calling usb_hub_to_struct_hub.
However, in case the actconfig or the maxchild is 0, the usb_hub would
be NULL and upon further accessing to get port_dev would result in null
pointer dereference.

Fix this by introducing an if check after the usb_hub is populated.

Fixes: 83cb2604f641 ("usb: core: add sysfs entry for usb device state")
Signed-off-by: Udipto Goswami <[email protected]>
---
drivers/usb/core/hub.c | 8 +++++---
1 file changed, 5 insertions(+), 3 deletions(-)

diff --git a/drivers/usb/core/hub.c b/drivers/usb/core/hub.c
index ffd7c99e24a3..c33ff37159c2 100644
--- a/drivers/usb/core/hub.c
+++ b/drivers/usb/core/hub.c
@@ -2053,9 +2053,11 @@ static void update_port_device_state(struct usb_device *udev)

if (udev->parent) {
hub = usb_hub_to_struct_hub(udev->parent);
- port_dev = hub->ports[udev->portnum - 1];
- WRITE_ONCE(port_dev->state, udev->state);
- sysfs_notify_dirent(port_dev->state_kn);
+ if (hub) {
+ port_dev = hub->ports[udev->portnum - 1];
+ WRITE_ONCE(port_dev->state, udev->state);
+ sysfs_notify_dirent(port_dev->state_kn);
+ }
}
}

--
2.17.1



2024-01-04 10:44:18

by Greg KH

[permalink] [raw]
Subject: Re: [PATCH] usb: core: Prevent null pointer dereference in update_port_device_state

On Thu, Jan 04, 2024 at 03:56:16PM +0530, Udipto Goswami wrote:
> Currently,the function update_port_device_state gets the usb_hub from
> udev->parent by calling usb_hub_to_struct_hub.
> However, in case the actconfig or the maxchild is 0, the usb_hub would
> be NULL and upon further accessing to get port_dev would result in null
> pointer dereference.

Is this true for any real (or fake) hardware?

>
> Fix this by introducing an if check after the usb_hub is populated.
>
> Fixes: 83cb2604f641 ("usb: core: add sysfs entry for usb device state")
> Signed-off-by: Udipto Goswami <[email protected]>

Any specific reason you don't want this backported to the stable kernels
that include the commit you marked this as a fix for?

As my bot says:

- You have marked a patch with a "Fixes:" tag for a commit that is in an
older released kernel, yet you do not have a cc: stable line in the
signed-off-by area at all, which means that the patch will not be
applied to any older kernel releases. To properly fix this, please
follow the documented rules in the
Documentation/process/stable-kernel-rules.rst file for how to resolve
this.

thanks,

greg k-h

2024-01-04 13:08:19

by Udipto Goswami

[permalink] [raw]
Subject: Re: [PATCH] usb: core: Prevent null pointer dereference in update_port_device_state

Hi Greg,

On 1/4/2024 4:14 PM, Greg Kroah-Hartman wrote:
> On Thu, Jan 04, 2024 at 03:56:16PM +0530, Udipto Goswami wrote:
>> Currently,the function update_port_device_state gets the usb_hub from
>> udev->parent by calling usb_hub_to_struct_hub.
>> However, in case the actconfig or the maxchild is 0, the usb_hub would
>> be NULL and upon further accessing to get port_dev would result in null
>> pointer dereference.
>
> Is this true for any real (or fake) hardware?

We saw this in our QCOM hardwares where lvstest.c was calling
get_dev_desc_store:

usb_set_device_state+0x128/0x17c
create_lvs_device+0x60/0xf8 [lvstest]
get_dev_desc_store+0x94/0x18c [lvstest]
dev_attr_store+0x30/0x48

I think the part of the test procedure is to first unbind the hub driver
which calls hub_disconnect setting the maxchild = 0.

So if after this the dev_attr try to access, it throws the NULL pointer
de-reference.

>
>>
>> Fix this by introducing an if check after the usb_hub is populated.
>>
>> Fixes: 83cb2604f641 ("usb: core: add sysfs entry for usb device state")
>> Signed-off-by: Udipto Goswami <[email protected]>
>
> Any specific reason you don't want this backported to the stable kernels
> that include the commit you marked this as a fix for?
>
> As my bot says:
>
> - You have marked a patch with a "Fixes:" tag for a commit that is in an
> older released kernel, yet you do not have a cc: stable line in the
> signed-off-by area at all, which means that the patch will not be
> applied to any older kernel releases. To properly fix this, please
> follow the documented rules in the
> Documentation/process/stable-kernel-rules.rst file for how to resolve
> this.
Got it, I'll take care of it in next version.

Thanks,
-Udipto

2024-01-04 13:14:11

by Greg KH

[permalink] [raw]
Subject: Re: [PATCH] usb: core: Prevent null pointer dereference in update_port_device_state

On Thu, Jan 04, 2024 at 06:35:38PM +0530, Udipto Goswami wrote:
> Hi Greg,
>
> On 1/4/2024 4:14 PM, Greg Kroah-Hartman wrote:
> > On Thu, Jan 04, 2024 at 03:56:16PM +0530, Udipto Goswami wrote:
> > > Currently,the function update_port_device_state gets the usb_hub from
> > > udev->parent by calling usb_hub_to_struct_hub.
> > > However, in case the actconfig or the maxchild is 0, the usb_hub would
> > > be NULL and upon further accessing to get port_dev would result in null
> > > pointer dereference.
> >
> > Is this true for any real (or fake) hardware?
>
> We saw this in our QCOM hardwares where lvstest.c was calling
> get_dev_desc_store:
>
> usb_set_device_state+0x128/0x17c
> create_lvs_device+0x60/0xf8 [lvstest]
> get_dev_desc_store+0x94/0x18c [lvstest]
> dev_attr_store+0x30/0x48
>
> I think the part of the test procedure is to first unbind the hub driver
> which calls hub_disconnect setting the maxchild = 0.

Are you sure lvstest is correct here?

thanks,

greg k-h

2024-01-04 15:07:04

by Alan Stern

[permalink] [raw]
Subject: Re: [PATCH] usb: core: Prevent null pointer dereference in update_port_device_state

On Thu, Jan 04, 2024 at 02:13:51PM +0100, Greg Kroah-Hartman wrote:
> On Thu, Jan 04, 2024 at 06:35:38PM +0530, Udipto Goswami wrote:
> > Hi Greg,
> >
> > On 1/4/2024 4:14 PM, Greg Kroah-Hartman wrote:
> > > On Thu, Jan 04, 2024 at 03:56:16PM +0530, Udipto Goswami wrote:
> > > > Currently,the function update_port_device_state gets the usb_hub from
> > > > udev->parent by calling usb_hub_to_struct_hub.
> > > > However, in case the actconfig or the maxchild is 0, the usb_hub would
> > > > be NULL and upon further accessing to get port_dev would result in null
> > > > pointer dereference.
> > >
> > > Is this true for any real (or fake) hardware?
> >
> > We saw this in our QCOM hardwares where lvstest.c was calling
> > get_dev_desc_store:
> >
> > usb_set_device_state+0x128/0x17c
> > create_lvs_device+0x60/0xf8 [lvstest]
> > get_dev_desc_store+0x94/0x18c [lvstest]
> > dev_attr_store+0x30/0x48
> >
> > I think the part of the test procedure is to first unbind the hub driver
> > which calls hub_disconnect setting the maxchild = 0.
>
> Are you sure lvstest is correct here?

This is what happens when people work behind the hub driver's back. :-(

If you can't find another way to fix the problem, you should at least
change the patch to include a comment before the "if (hub)" test,
explaining why it is necessary. Otherwise somebody in the future will
remove the test, because under normal circumstances hub would never be
NULL here.

Alan Stern

2024-01-08 04:51:17

by Udipto Goswami

[permalink] [raw]
Subject: Re: [PATCH] usb: core: Prevent null pointer dereference in update_port_device_state

Hi Greg, Alan,

On 1/4/2024 8:26 PM, Alan Stern wrote:
> On Thu, Jan 04, 2024 at 02:13:51PM +0100, Greg Kroah-Hartman wrote:
>> On Thu, Jan 04, 2024 at 06:35:38PM +0530, Udipto Goswami wrote:
>>> Hi Greg,
>>>
>>> On 1/4/2024 4:14 PM, Greg Kroah-Hartman wrote:
>>>> On Thu, Jan 04, 2024 at 03:56:16PM +0530, Udipto Goswami wrote:
>>>>> Currently,the function update_port_device_state gets the usb_hub from
>>>>> udev->parent by calling usb_hub_to_struct_hub.
>>>>> However, in case the actconfig or the maxchild is 0, the usb_hub would
>>>>> be NULL and upon further accessing to get port_dev would result in null
>>>>> pointer dereference.
>>>>
>>>> Is this true for any real (or fake) hardware?
>>>
>>> We saw this in our QCOM hardwares where lvstest.c was calling
>>> get_dev_desc_store:
>>>
>>> usb_set_device_state+0x128/0x17c
>>> create_lvs_device+0x60/0xf8 [lvstest]
>>> get_dev_desc_store+0x94/0x18c [lvstest]
>>> dev_attr_store+0x30/0x48
>>>
>>> I think the part of the test procedure is to first unbind the hub driver
>>> which calls hub_disconnect setting the maxchild = 0.
>>
>> Are you sure lvstest is correct here?
By the commit description of lvstest driver this seems to be the procedure:

https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/drivers/usb/misc/lvstest.c?h=v6.6.9&id=ce21bfe603b3401c258c415456c915634998e133

As you can see it mentions unbind is necessary before further steps
carried out. Also, since the test was passing before
update_port_device_state was introduced, wasn't doubting this.

Either way, usb_hub_to_struct_hub() can potentially return NULL not only
for maxchild == 0, but other cases like actconfig == NULL or hdev ==
NULL as well, so it isn't wise to access the hub in subsequent line.

>
> This is what happens when people work behind the hub driver's back. :-(
>
> If you can't find another way to fix the problem, you should at least
> change the patch to include a comment before the "if (hub)" test,
> explaining why it is necessary. Otherwise somebody in the future will
> remove the test, because under normal circumstances hub would never be
> NULL here.
Thanks for the review Alan. Sure I'll put a comment here stating the
necessity of the check for clarity in the next version.

I agree under normal conditions this won't fail for example even in this
case we unbinded 2-1. Since 1-1 wasn't unbinded that therefore usb1 has
a maxchild still present.

Thanks,
-Udipto