Received: by 2002:a05:6a10:a841:0:0:0:0 with SMTP id d1csp3407088pxy; Mon, 26 Apr 2021 00:36:56 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxuz80xajdZI2TslS3g5UKYnZna5NlyOaQ6btLkCFJEm1X+cM3fZ4B0Kvik50g2/qEK7uzg X-Received: by 2002:a17:90b:3b4a:: with SMTP id ot10mr20780178pjb.48.1619422616077; Mon, 26 Apr 2021 00:36:56 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1619422616; cv=none; d=google.com; s=arc-20160816; b=Q7t90GvhECPEnqW5aLnez6Wrwm38sp4vyvnIx5D/mO4hQpIcOk1W7+shc6+U5q+NwY ACqCLvB8RohYlFi8SijXxRZs0YS2hHaNfIwFQN3QotoQYlqlTjO80S3VyQQU4zOzJWc4 O1tGFV8j06Clf+UYH89OvEj51O2JKbpn6RMJruNVfKWmPj34zricLoaCKNwWW6afzOVT PDuutrgE2VZmrIKlg3oo52HCF495+HwTpAKRVwDoIeSASmFKPFlkAXttd028mRc4Nb6J MgG1Na2bCP3usmkIfaPHEKe9hewoVoAqI45vfrFGGpQN/tRH6n8uEkx5bd/PR4dQvidX qR2A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=FGL3kvgujhUSJ0M/BAgos07QCBNLgljs8BssCaU6q34=; b=B76YTVpGc0ekvZAlHQEiUMInp8KINZ0SoYOQhBCVvxm6h+3Q36T3Ts3NeObcrTLXi/ 9YBDe1B3MRPro7nG3AtmP/UA+rQlX9AZf1Ws4yYba0mbDs8FuUz30XVz+bv2dCOeZLRs 6L5Gp80UjyIVl6YUx8lN3KsHKdO6ItHx7JBp09S7w/BGK2EYJEvwcQZzJQc/dsLT0Vrw fwIWt1sU4lyqcZfRMLdgxM/jJJFk+VgIdsJ07+ggtZAoOUzK8Q7bTk7vhJ+ve5Qnzop6 K/0+Gp0c7h/PoF2X8053LQwxrCoibcuwajwRnRDqrZKNEodVhh2dA4IYnOyNceujRjsH tBzA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=EGghVTWK; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id t66si16931683pgb.204.2021.04.26.00.36.42; Mon, 26 Apr 2021 00:36:56 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=EGghVTWK; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232475AbhDZHex (ORCPT + 99 others); Mon, 26 Apr 2021 03:34:53 -0400 Received: from mail.kernel.org ([198.145.29.99]:46160 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232698AbhDZHdp (ORCPT ); Mon, 26 Apr 2021 03:33:45 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 451F4611BF; Mon, 26 Apr 2021 07:33:04 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1619422384; bh=/FET0OnZKddjKdcR2rjpSLKM0BcsX2Qq39WiusLCRwk=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=EGghVTWKwTRU3NPS2pa7jQpBgBQjdRwPfTVSiyD6KLFFoCIVlWWeyEl94hrMK5gpq XRdzZloWbXb7hD5SfRHR5pu0t5w3bcyHp2ForxftLNV23nhmeUp9MHPVDX/y2+0Pfu 5yZQesk5VHLbsnjd405uUNLvdf1bwX62cFE0/ZzI= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, syzbot+c49fe6089f295a05e6f8@syzkaller.appspotmail.com, Anirudh Rayabharam , "David S. Miller" , Sudip Mukherjee Subject: [PATCH 4.9 28/37] net: hso: fix null-ptr-deref during tty device unregistration Date: Mon, 26 Apr 2021 09:29:29 +0200 Message-Id: <20210426072818.206452574@linuxfoundation.org> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20210426072817.245304364@linuxfoundation.org> References: <20210426072817.245304364@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Anirudh Rayabharam commit 8a12f8836145ffe37e9c8733dce18c22fb668b66 upstream Multiple ttys try to claim the same the minor number causing a double unregistration of the same device. The first unregistration succeeds but the next one results in a null-ptr-deref. The get_free_serial_index() function returns an available minor number but doesn't assign it immediately. The assignment is done by the caller later. But before this assignment, calls to get_free_serial_index() would return the same minor number. Fix this by modifying get_free_serial_index to assign the minor number immediately after one is found to be and rename it to obtain_minor() to better reflect what it does. Similary, rename set_serial_by_index() to release_minor() and modify it to free up the minor number of the given hso_serial. Every obtain_minor() should have corresponding release_minor() call. Fixes: 72dc1c096c705 ("HSO: add option hso driver") Reported-by: syzbot+c49fe6089f295a05e6f8@syzkaller.appspotmail.com Tested-by: syzbot+c49fe6089f295a05e6f8@syzkaller.appspotmail.com Reviewed-by: Greg Kroah-Hartman Signed-off-by: Anirudh Rayabharam Signed-off-by: David S. Miller [sudip: adjust context] Signed-off-by: Sudip Mukherjee Signed-off-by: Greg Kroah-Hartman --- drivers/net/usb/hso.c | 33 ++++++++++++--------------------- 1 file changed, 12 insertions(+), 21 deletions(-) --- a/drivers/net/usb/hso.c +++ b/drivers/net/usb/hso.c @@ -626,7 +626,7 @@ static struct hso_serial *get_serial_by_ return serial; } -static int get_free_serial_index(void) +static int obtain_minor(struct hso_serial *serial) { int index; unsigned long flags; @@ -634,8 +634,10 @@ static int get_free_serial_index(void) spin_lock_irqsave(&serial_table_lock, flags); for (index = 0; index < HSO_SERIAL_TTY_MINORS; index++) { if (serial_table[index] == NULL) { + serial_table[index] = serial->parent; + serial->minor = index; spin_unlock_irqrestore(&serial_table_lock, flags); - return index; + return 0; } } spin_unlock_irqrestore(&serial_table_lock, flags); @@ -644,15 +646,12 @@ static int get_free_serial_index(void) return -1; } -static void set_serial_by_index(unsigned index, struct hso_serial *serial) +static void release_minor(struct hso_serial *serial) { unsigned long flags; spin_lock_irqsave(&serial_table_lock, flags); - if (serial) - serial_table[index] = serial->parent; - else - serial_table[index] = NULL; + serial_table[serial->minor] = NULL; spin_unlock_irqrestore(&serial_table_lock, flags); } @@ -2243,6 +2242,7 @@ static int hso_stop_serial_device(struct static void hso_serial_tty_unregister(struct hso_serial *serial) { tty_unregister_device(tty_drv, serial->minor); + release_minor(serial); } static void hso_serial_common_free(struct hso_serial *serial) @@ -2267,25 +2267,23 @@ static int hso_serial_common_create(stru int rx_size, int tx_size) { struct device *dev; - int minor; int i; tty_port_init(&serial->port); - minor = get_free_serial_index(); - if (minor < 0) + if (obtain_minor(serial)) goto exit2; /* register our minor number */ serial->parent->dev = tty_port_register_device_attr(&serial->port, - tty_drv, minor, &serial->parent->interface->dev, + tty_drv, serial->minor, &serial->parent->interface->dev, serial->parent, hso_serial_dev_groups); - if (IS_ERR(serial->parent->dev)) + if (IS_ERR(serial->parent->dev)) { + release_minor(serial); goto exit2; + } dev = serial->parent->dev; - /* fill in specific data for later use */ - serial->minor = minor; serial->magic = HSO_SERIAL_MAGIC; spin_lock_init(&serial->serial_lock); serial->num_rx_urbs = num_urbs; @@ -2678,9 +2676,6 @@ static struct hso_device *hso_create_bul serial->write_data = hso_std_serial_write_data; - /* and record this serial */ - set_serial_by_index(serial->minor, serial); - /* setup the proc dirs and files if needed */ hso_log_port(hso_dev); @@ -2737,9 +2732,6 @@ struct hso_device *hso_create_mux_serial serial->shared_int->ref_count++; mutex_unlock(&serial->shared_int->shared_int_lock); - /* and record this serial */ - set_serial_by_index(serial->minor, serial); - /* setup the proc dirs and files if needed */ hso_log_port(hso_dev); @@ -3124,7 +3116,6 @@ static void hso_free_interface(struct us cancel_work_sync(&serial_table[i]->async_get_intf); hso_serial_tty_unregister(serial); kref_put(&serial_table[i]->ref, hso_serial_ref_free); - set_serial_by_index(i, NULL); } }