Received: by 2002:a25:31c3:0:0:0:0:0 with SMTP id x186csp6538088ybx; Mon, 11 Nov 2019 10:35:35 -0800 (PST) X-Google-Smtp-Source: APXvYqwwjWCP5J+6UH7hL+uwdMvvM+chan87Vw1KQcJJ3j6X8jyFsaHKhjt2m1Mm52eAXI6klOFa X-Received: by 2002:aa7:db82:: with SMTP id u2mr27606338edt.256.1573497334956; Mon, 11 Nov 2019 10:35:34 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1573497334; cv=none; d=google.com; s=arc-20160816; b=zqJx1m3MLGaMvB/FfX1kO8q3/b+4bFp2rvDlAZv589/rcsTrrg2nL32WdtsMZugexd T/6GrMb3ipx+RYGVUTs+IhE30Is6IiHX0dToA45BuaQ4MOtQer3WQeB0dYeL8IDe8kSt xnjnPtZEfRVnUFx4Q/kzrHV62H0bi+4KkUTzJWPOgeKmREfoAvURnURdtDBi6Sh+wJpt 60tllID1TbFrg3AOAT8M1TGM+vHDbwyMNfwMTWPcEWUu3AruLb5fNNSykxx6vx/NmrHK DTHunFZhc+vZTHD1+dhtlmPcH8Mz/05x6XC6BksKqewz6Rx4Q93JNlwoG/+VvJoJIEud Gn/g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=0rjdDw8hohP379Epk8vs7J3kqwXJUZA5ZOnEMN5ddI8=; b=Z8Hl3gf/+HWYbJieGR2Wzhk1gfXI7BJTsidsPAkVChQcNUeXHBYSU6cvA2eUu8yga+ mZ9SRNPgpgQMbwrerefyQaPym0FWlpEgF24wWrD2mhKVfDxT/zAjSr4GBWY6EwbAplgy 19kvzpLCcAthqv/dUnAaSIfZqtcNsN0RK/fT0N5kD20x/K1PRTXF6GT+dcRx0L8gc6Pq Ld3PPTVRgrq+jrT/N3G5KVwMIsu5aPdWhxFnuTg18tzrztuTnWD8quDlTNKPOM2qWDFy s3GVQ1pKX2okONa7NlcwQ9KOL9Z8MbK25HlV6mkdYNwYUDYdTKa5+k3/CdVRea2397LG yxqQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=ZuOaGUDv; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id r20si10420141edm.17.2019.11.11.10.35.11; Mon, 11 Nov 2019 10:35:34 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=ZuOaGUDv; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728129AbfKKSdT (ORCPT + 99 others); Mon, 11 Nov 2019 13:33:19 -0500 Received: from mail.kernel.org ([198.145.29.99]:50630 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728122AbfKKSdR (ORCPT ); Mon, 11 Nov 2019 13:33:17 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id B736521655; Mon, 11 Nov 2019 18:33:15 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1573497196; bh=ffjaODsYTvbGyDYsiW9Bkd7LaAZfNiZXUzp88mmNdBc=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=ZuOaGUDvDAD0hJEnvrpC6M5U1qL1gEoedQzQk5KKUxZIzhfKk1fi27TZDmgs4B5lN XM5GO1+/ytYgOEPxtinCGCAfZEPFMgftoXy/yccaARu/yevCwFqfZjQ+V+m4QCADmb +XNfLlQEgleWWTipw/kRoOJiassVUEs4YwAmMA/g= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Nobuo Iwata Subject: [PATCH 4.9 35/65] usbip: fix possibility of dereference by NULLL pointer in vhci_hcd.c Date: Mon, 11 Nov 2019 19:28:35 +0100 Message-Id: <20191111181346.989434977@linuxfoundation.org> X-Mailer: git-send-email 2.24.0 In-Reply-To: <20191111181331.917659011@linuxfoundation.org> References: <20191111181331.917659011@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Nobuo Iwata commit d79cda045e3bacb7e754a5324cd3d4ce80708eb1 upstream. This patch fixes possibility of dereference by NULLL pointer in "[PATCH v5 1/3] usbip: vhci extension: modifications to vhci driver" which has been merged to 4.9-rc1. It occurs when a URB with pointer to invalid USB/IP device is enqueued in race condition against detach operation. A pointer was passed to vdev_to_vhci() before NULL check. In vdev_to_vhci(), there's a dereference by the pointer. This patch moves vdev_to_vhci() after NULL check of the pointer. Signed-off-by: Nobuo Iwata Signed-off-by: Greg Kroah-Hartman --- drivers/usb/usbip/vhci_hcd.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) --- a/drivers/usb/usbip/vhci_hcd.c +++ b/drivers/usb/usbip/vhci_hcd.c @@ -465,13 +465,14 @@ static void vhci_tx_urb(struct urb *urb) { struct vhci_device *vdev = get_vdev(urb->dev); struct vhci_priv *priv; - struct vhci_hcd *vhci = vdev_to_vhci(vdev); + struct vhci_hcd *vhci; unsigned long flags; if (!vdev) { pr_err("could not get virtual device"); return; } + vhci = vdev_to_vhci(vdev); priv = kzalloc(sizeof(struct vhci_priv), GFP_ATOMIC); if (!priv) {