Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp610784pxj; Thu, 20 May 2021 17:48:59 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyQylr+XM9qJz+orepmeZ4HL6zPccCb2WB79iI9rFG6QiLb+uUEhDrfWvP/Kg1rKX95bPsQ X-Received: by 2002:a5e:974d:: with SMTP id h13mr8059667ioq.150.1621558138814; Thu, 20 May 2021 17:48:58 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1621558138; cv=none; d=google.com; s=arc-20160816; b=QxarETPBsE4SwLvG9CKNLvTne0f7thVnST8w+UmkpU/GiU+ClXb+bOoTo6oMJewJL/ YjNG60+k2mpwa1PNYgJtIRH0wYKAVdMe7Eqqtd0hPXzUBdwb0Q3mvJjOFCaAU3jOwGr2 +dKCd/zw9++44HG9Rs03+CNRYn13+jBJGb/8wxGFqiLgczrz2+WVQfvco+5cpKghGOzR Byk8ju6rVj8qdjuGtblodAcs62zdhLT2ruLisuByBYffxagfRAiCxQhrv10uQMbsGFpo XDaGv1RAz4PP4S1DL0PGceiSznjMwpXJnb4xhxf5ptiO9iIWxF/99RMM1Gn2K3w2E2gX rejw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=Js/iBG9Y53q7hZI/B81yidjBaek6PjHHcDDGRm74QRo=; b=W4LLu58QaJEWe3i0143wkpfEiNdasPftwDcxS4vQpeO2N7H60HKPZCkDC0YpQLV3AV jPE35sS56E9v4G1NNDL2VTlsM2V1zyfv/aO8Ay2YgTTd84wRWvex4shUeUsrRNxMlub9 746IchkiwDRrkkwQ2K+f2xZBSSwN60krcqn/hQDHQBmvDIhcfNzbluGAwbWjoRJJ0n0J cbMxKmz4NGp8wRGA+nUc8r+A4ckk2lt+OtFlQqvWPDG94rz7zMqDT0B0aKvQyJaw5uCI 1Ww0TSjgKcvz14xLG5PsA8HLNMYeMYqnsFWHyj07bY5NKxctJxXOhDaEYq5uI1zLLnDk DwFQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=lDmazcvg; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id x9si3869172ilo.119.2021.05.20.17.48.45; Thu, 20 May 2021 17:48:58 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=lDmazcvg; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S241321AbhETLcK (ORCPT + 99 others); Thu, 20 May 2021 07:32:10 -0400 Received: from mail.kernel.org ([198.145.29.99]:55582 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S239703AbhETLLW (ORCPT ); Thu, 20 May 2021 07:11:22 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 4DE6B61D45; Thu, 20 May 2021 10:07:29 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1621505249; bh=6s3pF3zsOt5oF/zaRc4dev6Ar8VPay3TSaKed6ftF8I=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=lDmazcvgn/mYqqusQ7+VBRZ9Z++1b+8CwaQNV83KNwn7+thRpqx/H59rp/E45Gjqx N+rtAP3GoEjPCxw8MLbYEV2t3UFUMSrKogzm/hOMEmDV+AiPzgv3uT8hsAwVD9mKup QlmsZdOrlhsRg4groqgO4mkgAaTU8fWoU+0RYM0E= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, syzbot+eb4674092e6cc8d9e0bd@syzkaller.appspotmail.com, Alan Stern , Anirudh Rayabharam Subject: [PATCH 4.4 050/190] usb: gadget: dummy_hcd: fix gpf in gadget_setup Date: Thu, 20 May 2021 11:21:54 +0200 Message-Id: <20210520092103.828139851@linuxfoundation.org> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20210520092102.149300807@linuxfoundation.org> References: <20210520092102.149300807@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Anirudh Rayabharam commit 4a5d797a9f9c4f18585544237216d7812686a71f upstream. Fix a general protection fault reported by syzbot due to a race between gadget_setup() and gadget_unbind() in raw_gadget. The gadget core is supposed to guarantee that there won't be any more callbacks to the gadget driver once the driver's unbind routine is called. That guarantee is enforced in usb_gadget_remove_driver as follows: usb_gadget_disconnect(udc->gadget); if (udc->gadget->irq) synchronize_irq(udc->gadget->irq); udc->driver->unbind(udc->gadget); usb_gadget_udc_stop(udc); usb_gadget_disconnect turns off the pullup resistor, telling the host that the gadget is no longer connected and preventing the transmission of any more USB packets. Any packets that have already been received are sure to processed by the UDC driver's interrupt handler by the time synchronize_irq returns. But this doesn't work with dummy_hcd, because dummy_hcd doesn't use interrupts; it uses a timer instead. It does have code to emulate the effect of synchronize_irq, but that code doesn't get invoked at the right time -- it currently runs in usb_gadget_udc_stop, after the unbind callback instead of before. Indeed, there's no way for usb_gadget_remove_driver to invoke this code before the unbind callback. To fix this, move the synchronize_irq() emulation code to dummy_pullup so that it runs before unbind. Also, add a comment explaining why it is necessary to have it there. Reported-by: syzbot+eb4674092e6cc8d9e0bd@syzkaller.appspotmail.com Suggested-by: Alan Stern Acked-by: Alan Stern Signed-off-by: Anirudh Rayabharam Link: https://lore.kernel.org/r/20210419033713.3021-1-mail@anirudhrb.com Cc: stable Signed-off-by: Greg Kroah-Hartman --- drivers/usb/gadget/udc/dummy_hcd.c | 23 +++++++++++++++-------- 1 file changed, 15 insertions(+), 8 deletions(-) --- a/drivers/usb/gadget/udc/dummy_hcd.c +++ b/drivers/usb/gadget/udc/dummy_hcd.c @@ -920,6 +920,21 @@ static int dummy_pullup(struct usb_gadge spin_lock_irqsave(&dum->lock, flags); dum->pullup = (value != 0); set_link_state(dum_hcd); + if (value == 0) { + /* + * Emulate synchronize_irq(): wait for callbacks to finish. + * This seems to be the best place to emulate the call to + * synchronize_irq() that's in usb_gadget_remove_driver(). + * Doing it in dummy_udc_stop() would be too late since it + * is called after the unbind callback and unbind shouldn't + * be invoked until all the other callbacks are finished. + */ + while (dum->callback_usage > 0) { + spin_unlock_irqrestore(&dum->lock, flags); + usleep_range(1000, 2000); + spin_lock_irqsave(&dum->lock, flags); + } + } spin_unlock_irqrestore(&dum->lock, flags); usb_hcd_poll_rh_status(dummy_hcd_to_hcd(dum_hcd)); @@ -1000,14 +1015,6 @@ static int dummy_udc_stop(struct usb_gad spin_lock_irq(&dum->lock); dum->ints_enabled = 0; stop_activity(dum); - - /* emulate synchronize_irq(): wait for callbacks to finish */ - while (dum->callback_usage > 0) { - spin_unlock_irq(&dum->lock); - usleep_range(1000, 2000); - spin_lock_irq(&dum->lock); - } - dum->driver = NULL; spin_unlock_irq(&dum->lock);