Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp2555424pxj; Mon, 10 May 2021 05:50:59 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwjq3ZtLUBsG3Th7bhX2bR0wuWV0/fEv6mfojDWiSzSUAr1Q5efrZNItiei2FRodiQhGIS1 X-Received: by 2002:a92:d4c9:: with SMTP id o9mr8165504ilm.62.1620651058840; Mon, 10 May 2021 05:50:58 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1620651058; cv=none; d=google.com; s=arc-20160816; b=IpcQoI/W9VyQq+FXkR8sSXoDhxYDIAOESuHjtVkSZpGu1/7/lPWLKcw01SOUY1Auoj JCp8VwGx3TFWENT0aZdLxPR0+BCL8+Mk4EZMo0MCkrWtYdu6OzLHJubdRSr9DqBuYa/I hlLEDvwao03Gv3yAPnnDdrASAOLHTcEtv9/UGYsQ5M4oj7BkZOKR8oriNQGQ0ueusBOM 7rncqCWI2afIqZaOHDVu9fc2vnVhyfW8Ik39fhtXCt7usNFvGVhFkalOGW3OxVzEJVJs 8PRQecETyMyHaKFbRNheKaOGU/3+MOidZ86hhCzhCjV2InoY4aoip5vqB9HBF81I9t0g ObGA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=3jeP/T88CJAhLJb8izHr77emxtQ6pJNd6U2H6c9hBSs=; b=KweT6bJGDnaYZpAXbnxXIRhiEwN4M3lNzlVG1Y4GHUgmR4PVU2dir/t1HwtMB8Yw1e WRffcsM0qBATEThYvkiWUTy5wJ3sYSCqOmaU0whN1TP/y3mTpUPxysODB4OGSKQvVSv/ DBBbeG9Giqmvee3gyo0Gb7qP+uvKC+H+nU92z9sdap/XF715H51IeOnLH4WH80V5SXyQ ooBGpQaxKAgc2gN1OeRF9BHLnxydeTarUY6pbQfuVqznCAGO0e3vuBbfGXPQkB6gFwBj ZhWKYdtIGwzPnR46h+h1G8R87UnMkXKcLLN4r1zpWZe6GBtprwWp65CuwnOaM7Mgou+V uORg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=ae6z61N5; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id y3si17497076jai.94.2021.05.10.05.50.46; Mon, 10 May 2021 05:50:58 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=ae6z61N5; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S239764AbhEJMmU (ORCPT + 99 others); Mon, 10 May 2021 08:42:20 -0400 Received: from mail.kernel.org ([198.145.29.99]:34976 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S238038AbhEJLQu (ORCPT ); Mon, 10 May 2021 07:16:50 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id EB21161480; Mon, 10 May 2021 11:12:06 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1620645127; bh=QWmGX5c9qnPYxPio/sCv/iTUFCnIt42AyHnKqsnFfv4=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=ae6z61N5Rb0pme5wIDguHLmHGZYko7L8Am81PMa/cLPPvIYZD6u4xEA3MPuZzerII piEL84si+cUrqI8uQTlHAxOKYSosyuIDxjk/juD94X9yf8EXOAUmJsbfB0We2dj29v LoNpprEx/LLKOnlXU/EZ1wZE50NxzPe2yG7EdNE8= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, syzbot+eb4674092e6cc8d9e0bd@syzkaller.appspotmail.com, Alan Stern , Anirudh Rayabharam Subject: [PATCH 5.12 363/384] usb: gadget: dummy_hcd: fix gpf in gadget_setup Date: Mon, 10 May 2021 12:22:32 +0200 Message-Id: <20210510102026.733994773@linuxfoundation.org> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20210510102014.849075526@linuxfoundation.org> References: <20210510102014.849075526@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Anirudh Rayabharam commit 4a5d797a9f9c4f18585544237216d7812686a71f upstream. Fix a general protection fault reported by syzbot due to a race between gadget_setup() and gadget_unbind() in raw_gadget. The gadget core is supposed to guarantee that there won't be any more callbacks to the gadget driver once the driver's unbind routine is called. That guarantee is enforced in usb_gadget_remove_driver as follows: usb_gadget_disconnect(udc->gadget); if (udc->gadget->irq) synchronize_irq(udc->gadget->irq); udc->driver->unbind(udc->gadget); usb_gadget_udc_stop(udc); usb_gadget_disconnect turns off the pullup resistor, telling the host that the gadget is no longer connected and preventing the transmission of any more USB packets. Any packets that have already been received are sure to processed by the UDC driver's interrupt handler by the time synchronize_irq returns. But this doesn't work with dummy_hcd, because dummy_hcd doesn't use interrupts; it uses a timer instead. It does have code to emulate the effect of synchronize_irq, but that code doesn't get invoked at the right time -- it currently runs in usb_gadget_udc_stop, after the unbind callback instead of before. Indeed, there's no way for usb_gadget_remove_driver to invoke this code before the unbind callback. To fix this, move the synchronize_irq() emulation code to dummy_pullup so that it runs before unbind. Also, add a comment explaining why it is necessary to have it there. Reported-by: syzbot+eb4674092e6cc8d9e0bd@syzkaller.appspotmail.com Suggested-by: Alan Stern Acked-by: Alan Stern Signed-off-by: Anirudh Rayabharam Link: https://lore.kernel.org/r/20210419033713.3021-1-mail@anirudhrb.com Cc: stable Signed-off-by: Greg Kroah-Hartman --- drivers/usb/gadget/udc/dummy_hcd.c | 23 +++++++++++++++-------- 1 file changed, 15 insertions(+), 8 deletions(-) --- a/drivers/usb/gadget/udc/dummy_hcd.c +++ b/drivers/usb/gadget/udc/dummy_hcd.c @@ -903,6 +903,21 @@ static int dummy_pullup(struct usb_gadge spin_lock_irqsave(&dum->lock, flags); dum->pullup = (value != 0); set_link_state(dum_hcd); + if (value == 0) { + /* + * Emulate synchronize_irq(): wait for callbacks to finish. + * This seems to be the best place to emulate the call to + * synchronize_irq() that's in usb_gadget_remove_driver(). + * Doing it in dummy_udc_stop() would be too late since it + * is called after the unbind callback and unbind shouldn't + * be invoked until all the other callbacks are finished. + */ + while (dum->callback_usage > 0) { + spin_unlock_irqrestore(&dum->lock, flags); + usleep_range(1000, 2000); + spin_lock_irqsave(&dum->lock, flags); + } + } spin_unlock_irqrestore(&dum->lock, flags); usb_hcd_poll_rh_status(dummy_hcd_to_hcd(dum_hcd)); @@ -1004,14 +1019,6 @@ static int dummy_udc_stop(struct usb_gad spin_lock_irq(&dum->lock); dum->ints_enabled = 0; stop_activity(dum); - - /* emulate synchronize_irq(): wait for callbacks to finish */ - while (dum->callback_usage > 0) { - spin_unlock_irq(&dum->lock); - usleep_range(1000, 2000); - spin_lock_irq(&dum->lock); - } - dum->driver = NULL; spin_unlock_irq(&dum->lock);