Received: by 2002:a25:1506:0:0:0:0:0 with SMTP id 6csp709025ybv; Thu, 13 Feb 2020 08:07:50 -0800 (PST) X-Google-Smtp-Source: APXvYqzfbkrRVuvjnZVtAqRHMYryjWjDbOZ8+kvVSgHDD19t8BSGffQQr6AqtwrGxdzYpG+AxFlS X-Received: by 2002:aca:cdd5:: with SMTP id d204mr3384402oig.134.1581610070248; Thu, 13 Feb 2020 08:07:50 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1581610070; cv=none; d=google.com; s=arc-20160816; b=M5QqhtxK86cbmEdhy15SjqG11W6yKG9kL22+uWReE4DY2Xwgu9zjPLzNIk+WnpQ7xF ElxLsUHCJ2rI+f8HfRi7lU+vIPSC7A5yGTREOQOtgbyRnjRPKz3DVUfy/yGRUAQ1f9YA 3dLFnuAJqb18OZ4L/oW+MvmfissDdH51ULkPnOyVlOn+sF6KKDV6UDgLWnktQzcKAjo1 egN+k/rB6zeDLcD6lS4FRV220WSD+iEjgVSuRpTECblZ2nwmSMPXxghut9r8c99mkVaG f8Wdyd5tMjUq9NYoURCM/853PMO/ld+G8OWoZvscAvgDXdxZ6B8yP1P4kV3KyJ1qeesi 8vag== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=wvOoCz/kWFMHmyN4TArlTfe9Y9r7a9D9Tmfof/PaPMw=; b=SvxiOAwks7s0T4p+SqvAeBMUIuvQMOEWGvq99q+S8utmxDTyJW7P0Sls2t9ALajSZD BY0b8IByudk4OsceNv4ebk5A4X02i+7vBShdrBomyUOCj4qdz3AGCBGGtF40C66gNrF3 5Je99c8Zpbm52kcL7lP6i4ZpFic8lOylfHKGMWgB6XelD3WFRLAE6eLC8MXGIy3/ItLt T1+2ds46szAS6eDy+S0YsGcVCT1ifGpAIA+v1VghGI97CLMdDTRZfHvXBpdXBtXnbXRy hmJGlwg5CdNFR96uTCYEI78zDyOtl2B5vHgpA7YmkxZCwas7BvddwSZYPiwmMrrqPWJV Bo6Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=J6EG1zBK; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e77si1373353ote.153.2020.02.13.08.07.33; Thu, 13 Feb 2020 08:07:50 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=J6EG1zBK; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730400AbgBMQGl (ORCPT + 99 others); Thu, 13 Feb 2020 11:06:41 -0500 Received: from mail.kernel.org ([198.145.29.99]:35014 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728416AbgBMPXe (ORCPT ); Thu, 13 Feb 2020 10:23:34 -0500 Received: from localhost (unknown [104.132.1.104]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id D074F246B3; Thu, 13 Feb 2020 15:23:33 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1581607413; bh=z9SGixNCT5LqAOs1AaIfPqnNP4XDDLBFKtI3cWOntoQ=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=J6EG1zBKzcLpPUrjKSwKDYKHIBGJZGwe+4k8C0WaiCVkZutyNFi7zjQTCqKc1ydqe oaoCJSfkzOTNp4sA7LSfXZr5MZ18HUVHqaJ6bO6xdXg728VtscTroVJBQ0itJpmqwL dNfL0fG4owh1rJPWda7TEbSeyVpa6cD5JK6clpXE= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Bryan ODonoghue , Felipe Balbi Subject: [PATCH 4.9 019/116] usb: gadget: f_ncm: Use atomic_t to track in-flight request Date: Thu, 13 Feb 2020 07:19:23 -0800 Message-Id: <20200213151850.320924673@linuxfoundation.org> X-Mailer: git-send-email 2.25.0 In-Reply-To: <20200213151842.259660170@linuxfoundation.org> References: <20200213151842.259660170@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Bryan O'Donoghue commit 5b24c28cfe136597dc3913e1c00b119307a20c7e upstream. Currently ncm->notify_req is used to flag when a request is in-flight. ncm->notify_req is set to NULL and when a request completes it is subsequently reset. This is fundamentally buggy in that the unbind logic of the NCM driver will unconditionally free ncm->notify_req leading to a NULL pointer dereference. Fixes: 40d133d7f542 ("usb: gadget: f_ncm: convert to new function interface with backward compatibility") Cc: stable Signed-off-by: Bryan O'Donoghue Signed-off-by: Felipe Balbi Signed-off-by: Greg Kroah-Hartman --- drivers/usb/gadget/function/f_ncm.c | 17 +++++++++++++---- 1 file changed, 13 insertions(+), 4 deletions(-) --- a/drivers/usb/gadget/function/f_ncm.c +++ b/drivers/usb/gadget/function/f_ncm.c @@ -57,6 +57,7 @@ struct f_ncm { struct usb_ep *notify; struct usb_request *notify_req; u8 notify_state; + atomic_t notify_count; bool is_open; const struct ndp_parser_opts *parser_opts; @@ -552,7 +553,7 @@ static void ncm_do_notify(struct f_ncm * int status; /* notification already in flight? */ - if (!req) + if (atomic_read(&ncm->notify_count)) return; event = req->buf; @@ -592,7 +593,8 @@ static void ncm_do_notify(struct f_ncm * event->bmRequestType = 0xA1; event->wIndex = cpu_to_le16(ncm->ctrl_id); - ncm->notify_req = NULL; + atomic_inc(&ncm->notify_count); + /* * In double buffering if there is a space in FIFO, * completion callback can be called right after the call, @@ -602,7 +604,7 @@ static void ncm_do_notify(struct f_ncm * status = usb_ep_queue(ncm->notify, req, GFP_ATOMIC); spin_lock(&ncm->lock); if (status < 0) { - ncm->notify_req = req; + atomic_dec(&ncm->notify_count); DBG(cdev, "notify --> %d\n", status); } } @@ -637,17 +639,19 @@ static void ncm_notify_complete(struct u case 0: VDBG(cdev, "Notification %02x sent\n", event->bNotificationType); + atomic_dec(&ncm->notify_count); break; case -ECONNRESET: case -ESHUTDOWN: + atomic_set(&ncm->notify_count, 0); ncm->notify_state = NCM_NOTIFY_NONE; break; default: DBG(cdev, "event %02x --> %d\n", event->bNotificationType, req->status); + atomic_dec(&ncm->notify_count); break; } - ncm->notify_req = req; ncm_do_notify(ncm); spin_unlock(&ncm->lock); } @@ -1639,6 +1643,11 @@ static void ncm_unbind(struct usb_config ncm_string_defs[0].id = 0; usb_free_all_descriptors(f); + if (atomic_read(&ncm->notify_count)) { + usb_ep_dequeue(ncm->notify, ncm->notify_req); + atomic_set(&ncm->notify_count, 0); + } + kfree(ncm->notify_req->buf); usb_ep_free_request(ncm->notify, ncm->notify_req); }