Received: by 2002:a05:6a10:a841:0:0:0:0 with SMTP id d1csp3405167pxy; Mon, 26 Apr 2021 00:33:07 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxqZIWiXpR3LrdqvnGNEy1KyXjoDXG6lrg4U8VZ8HoUWXRUVXg+HVTeueVkd/aHUv97PibK X-Received: by 2002:a63:5322:: with SMTP id h34mr16014873pgb.182.1619422387549; Mon, 26 Apr 2021 00:33:07 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1619422387; cv=none; d=google.com; s=arc-20160816; b=hnKrJpEq/Yc9gIeQl5x5RgFOYPRWp7om0p63cYDW/S111BDIDawV/x7TAjxjfvX9TY 5zBc8Tzugy/Pajtx1gLjVnaWMTiu3tQA+2kp11B1/IK5gRDA+qw1bFGnT7tAKs0DOCfi F2EZPO8yyaJfm2r4GNpKoAVvJ+6IPPohdvdUkfmM+z4DNk+72sgnUbyD/WVqLFG8V92S E8iNtvk6f8NTJGKoDp3nmYL4NxSPnRBM+X/rGeNpKGmP+6PirnaXVhA7G/tM7ZChzT9O GWf/ZTbldExmm1nXmM2wA2niXY+4m5iRp/SrF98dQLQe7Cdy14TrU1WBxsI1onh2mHZo nXiw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=IAEoMPoJ//4vSnB8IjbFGX198dUElD8l6I1M/DuDVlU=; b=r9ebIqUW9c8rQJm0qkh9EZTbWuHiZykV31HBjWI+4e5b2wdpmILmomm0tnGOlSRYht T2BQsUExA81QhlCNt0w8+aj8EnkGQQBul38/l52gIqxAIdpZ+alTpJWdotGr7wWf4mHF sLdZsY+cvZ0QATdBXTwp1nal9L7fWQ4bN1eFHlJ7tnAr8e68DMdUoGHA3Y8v7lw3m7/8 vNiwn2ytbNDBkr88MXYJbQDvxLGH6uDdOI6D5ngvkFzERlZI7SfHyoRRRS65RBOSeL2n LK1gep3OMlfLgCADwYm0TSPIv7rApnrsEEbQuWra3WJeXvkm+4GFiMz6Wo7n7VOC/e5d RwqA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=rEzwtW6O; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id h25si403848pgv.365.2021.04.26.00.32.55; Mon, 26 Apr 2021 00:33:07 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=rEzwtW6O; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232158AbhDZHci (ORCPT + 99 others); Mon, 26 Apr 2021 03:32:38 -0400 Received: from mail.kernel.org ([198.145.29.99]:43644 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232416AbhDZHca (ORCPT ); Mon, 26 Apr 2021 03:32:30 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 26B5A611C9; Mon, 26 Apr 2021 07:31:49 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1619422309; bh=ePKgHYrMCvetSA5ZIScOwo9vPcIwkmkQGfZFuVIbcTs=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=rEzwtW6Ot0FrSp3+Z5VjITaBRdlSYL5vFToZlUvmbTG/Qh6lFY0ARc0RQ2WfDQzPl cwCD/m3YRQIEA+SuGZwqJSE4WFxy1CGLo/LVOKAvLaA7MmjVLApu8rN68HOEY7EK/V WnBhGLFl0KFwLE0wcf+U697qmTkCAM0nZkb2amKI= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, syzbot+c49fe6089f295a05e6f8@syzkaller.appspotmail.com, Anirudh Rayabharam , "David S. Miller" , Sudip Mukherjee Subject: [PATCH 4.4 22/32] net: hso: fix null-ptr-deref during tty device unregistration Date: Mon, 26 Apr 2021 09:29:20 +0200 Message-Id: <20210426072817.327441466@linuxfoundation.org> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20210426072816.574319312@linuxfoundation.org> References: <20210426072816.574319312@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Anirudh Rayabharam commit 8a12f8836145ffe37e9c8733dce18c22fb668b66 upstream Multiple ttys try to claim the same the minor number causing a double unregistration of the same device. The first unregistration succeeds but the next one results in a null-ptr-deref. The get_free_serial_index() function returns an available minor number but doesn't assign it immediately. The assignment is done by the caller later. But before this assignment, calls to get_free_serial_index() would return the same minor number. Fix this by modifying get_free_serial_index to assign the minor number immediately after one is found to be and rename it to obtain_minor() to better reflect what it does. Similary, rename set_serial_by_index() to release_minor() and modify it to free up the minor number of the given hso_serial. Every obtain_minor() should have corresponding release_minor() call. Fixes: 72dc1c096c705 ("HSO: add option hso driver") Reported-by: syzbot+c49fe6089f295a05e6f8@syzkaller.appspotmail.com Tested-by: syzbot+c49fe6089f295a05e6f8@syzkaller.appspotmail.com Reviewed-by: Greg Kroah-Hartman Signed-off-by: Anirudh Rayabharam Signed-off-by: David S. Miller [sudip: adjust context] Signed-off-by: Sudip Mukherjee Signed-off-by: Greg Kroah-Hartman --- drivers/net/usb/hso.c | 33 ++++++++++++--------------------- 1 file changed, 12 insertions(+), 21 deletions(-) --- a/drivers/net/usb/hso.c +++ b/drivers/net/usb/hso.c @@ -635,7 +635,7 @@ static struct hso_serial *get_serial_by_ return serial; } -static int get_free_serial_index(void) +static int obtain_minor(struct hso_serial *serial) { int index; unsigned long flags; @@ -643,8 +643,10 @@ static int get_free_serial_index(void) spin_lock_irqsave(&serial_table_lock, flags); for (index = 0; index < HSO_SERIAL_TTY_MINORS; index++) { if (serial_table[index] == NULL) { + serial_table[index] = serial->parent; + serial->minor = index; spin_unlock_irqrestore(&serial_table_lock, flags); - return index; + return 0; } } spin_unlock_irqrestore(&serial_table_lock, flags); @@ -653,15 +655,12 @@ static int get_free_serial_index(void) return -1; } -static void set_serial_by_index(unsigned index, struct hso_serial *serial) +static void release_minor(struct hso_serial *serial) { unsigned long flags; spin_lock_irqsave(&serial_table_lock, flags); - if (serial) - serial_table[index] = serial->parent; - else - serial_table[index] = NULL; + serial_table[serial->minor] = NULL; spin_unlock_irqrestore(&serial_table_lock, flags); } @@ -2249,6 +2248,7 @@ static int hso_stop_serial_device(struct static void hso_serial_tty_unregister(struct hso_serial *serial) { tty_unregister_device(tty_drv, serial->minor); + release_minor(serial); } static void hso_serial_common_free(struct hso_serial *serial) @@ -2273,25 +2273,23 @@ static int hso_serial_common_create(stru int rx_size, int tx_size) { struct device *dev; - int minor; int i; tty_port_init(&serial->port); - minor = get_free_serial_index(); - if (minor < 0) + if (obtain_minor(serial)) goto exit2; /* register our minor number */ serial->parent->dev = tty_port_register_device_attr(&serial->port, - tty_drv, minor, &serial->parent->interface->dev, + tty_drv, serial->minor, &serial->parent->interface->dev, serial->parent, hso_serial_dev_groups); - if (IS_ERR(serial->parent->dev)) + if (IS_ERR(serial->parent->dev)) { + release_minor(serial); goto exit2; + } dev = serial->parent->dev; - /* fill in specific data for later use */ - serial->minor = minor; serial->magic = HSO_SERIAL_MAGIC; spin_lock_init(&serial->serial_lock); serial->num_rx_urbs = num_urbs; @@ -2692,9 +2690,6 @@ static struct hso_device *hso_create_bul serial->write_data = hso_std_serial_write_data; - /* and record this serial */ - set_serial_by_index(serial->minor, serial); - /* setup the proc dirs and files if needed */ hso_log_port(hso_dev); @@ -2751,9 +2746,6 @@ struct hso_device *hso_create_mux_serial serial->shared_int->ref_count++; mutex_unlock(&serial->shared_int->shared_int_lock); - /* and record this serial */ - set_serial_by_index(serial->minor, serial); - /* setup the proc dirs and files if needed */ hso_log_port(hso_dev); @@ -3140,7 +3132,6 @@ static void hso_free_interface(struct us cancel_work_sync(&serial_table[i]->async_get_intf); hso_serial_tty_unregister(serial); kref_put(&serial_table[i]->ref, hso_serial_ref_free); - set_serial_by_index(i, NULL); } }