Received: by 2002:a05:6a10:af89:0:0:0:0 with SMTP id iu9csp3670617pxb; Mon, 24 Jan 2022 14:59:22 -0800 (PST) X-Google-Smtp-Source: ABdhPJw/OM+rxxNIp+O++ftkFQ1fdPove/FoNkGdS4/smayiLxLOzNZ5orvbsdww7teQwOsyUCu7 X-Received: by 2002:a17:903:230f:b0:14b:5198:9ca9 with SMTP id d15-20020a170903230f00b0014b51989ca9mr6264476plh.0.1643065162032; Mon, 24 Jan 2022 14:59:22 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1643065162; cv=none; d=google.com; s=arc-20160816; b=glHiCNJMDupOXlTSxD9dAScuEFeC4FjXfUheJmdWk+jIj800oxtIHAtycbGTCurJcS 0gp8XmnyWkkC+5/kyGWlQcTQ9G8/Lvs9sFrMvEj3vtf3s/kev4OKGKnJXPxPTsoSayko j6K4N4vms0YpjBwXrW2aHZG0dgg8+sCk9wmD08TUMvtZAqTAp1t4o5ZZ6TN5GA1q0Bxz +nWTc3kuqzC6AIA5D5MrMPHzokqc2KR4y7xtrYkS/DrPGP42UIuHidMrU0mPxKGAAuAQ gT0A02fQeF7VPlJtEWZnMMCdeFuWPA8ZJ3JtngYwo+StDk5V/kc9XFe3MKde9hI4YFR0 9A7A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=NXnTriFbCi2YTcTLpeEv9E7yki1/NPMNEywt6O4ShhA=; b=c3HVDeXgy8Jrg09h9S1fgPPh+/LL1Runzy76h1DqfsKVGy2PECqdLk8jAKqINae8NT B0lCUsbVF4QdSwINZ52cOCsZOX2jnS107VttKnLRAVwcw21BggTT6C5NXivZwYbUGVwU amsXLOKzhcYTYq5wHujAcr8eAq8rxxMQmcfxxZl2xohK5ZABDhmcO7hhMWVG/vrv0dLW HuRdSOx7Uohe98nQrvm3soX/wwmy6SmfStTbC5VBVnAmnVFwR3Stemze7tZvMmCl8ywj GE70Lwu2MFEOix5e05odGgabOD1Llc3L1bAqow/lG8qFuPfPpT5MYjky4opTloc5xADj YOMw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=SID9gG1Z; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id v2si4087436plg.179.2022.01.24.14.59.09; Mon, 24 Jan 2022 14:59:22 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=SID9gG1Z; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1355026AbiAXW4r (ORCPT + 99 others); Mon, 24 Jan 2022 17:56:47 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:58600 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1457807AbiAXVzG (ORCPT ); Mon, 24 Jan 2022 16:55:06 -0500 Received: from ams.source.kernel.org (ams.source.kernel.org [IPv6:2604:1380:4601:e00::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 8C9D1C07E2A2; Mon, 24 Jan 2022 12:36:25 -0800 (PST) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id 49FBEB81218; Mon, 24 Jan 2022 20:36:24 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 5398BC340E5; Mon, 24 Jan 2022 20:36:22 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1643056583; bh=mMVMuisXCIt+zCi8F5XYc+fsmSAixmNaldXMRbfRe4I=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=SID9gG1ZDoqa/AEt+26SAJ2NAqNuZDSk6Su3LMRrym0h8oMas+Z+3CMtz6ZiFQCsV tQzvvly/LeFJ7RMukg+WTF3K7/eQ7sODrAAQtNqpYZWCCxQ80SvG3ZDAvJEnXEMLJ2 hgbnv0bBWc84BcKYtIolHowzL2SDT+aPwMw+Mywk= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Brendan Dolan-Gavitt , Zekun Shen , Kalle Valo , Sasha Levin Subject: [PATCH 5.15 505/846] mwifiex: Fix skb_over_panic in mwifiex_usb_recv() Date: Mon, 24 Jan 2022 19:40:22 +0100 Message-Id: <20220124184118.453270302@linuxfoundation.org> X-Mailer: git-send-email 2.34.1 In-Reply-To: <20220124184100.867127425@linuxfoundation.org> References: <20220124184100.867127425@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Zekun Shen [ Upstream commit 04d80663f67ccef893061b49ec8a42ff7045ae84 ] Currently, with an unknown recv_type, mwifiex_usb_recv just return -1 without restoring the skb. Next time mwifiex_usb_rx_complete is invoked with the same skb, calling skb_put causes skb_over_panic. The bug is triggerable with a compromised/malfunctioning usb device. After applying the patch, skb_over_panic no longer shows up with the same input. Attached is the panic report from fuzzing. skbuff: skb_over_panic: text:000000003bf1b5fa len:2048 put:4 head:00000000dd6a115b data:000000000a9445d8 tail:0x844 end:0x840 dev: kernel BUG at net/core/skbuff.c:109! invalid opcode: 0000 [#1] SMP KASAN NOPTI CPU: 0 PID: 198 Comm: in:imklog Not tainted 5.6.0 #60 RIP: 0010:skb_panic+0x15f/0x161 Call Trace: ? mwifiex_usb_rx_complete+0x26b/0xfcd [mwifiex_usb] skb_put.cold+0x24/0x24 mwifiex_usb_rx_complete+0x26b/0xfcd [mwifiex_usb] __usb_hcd_giveback_urb+0x1e4/0x380 usb_giveback_urb_bh+0x241/0x4f0 ? __hrtimer_run_queues+0x316/0x740 ? __usb_hcd_giveback_urb+0x380/0x380 tasklet_action_common.isra.0+0x135/0x330 __do_softirq+0x18c/0x634 irq_exit+0x114/0x140 smp_apic_timer_interrupt+0xde/0x380 apic_timer_interrupt+0xf/0x20 Reported-by: Brendan Dolan-Gavitt Signed-off-by: Zekun Shen Signed-off-by: Kalle Valo Link: https://lore.kernel.org/r/YX4CqjfRcTa6bVL+@Zekuns-MBP-16.fios-router.home Signed-off-by: Sasha Levin --- drivers/net/wireless/marvell/mwifiex/usb.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/drivers/net/wireless/marvell/mwifiex/usb.c b/drivers/net/wireless/marvell/mwifiex/usb.c index 9736aa0ab7fd4..8f01fcbe93961 100644 --- a/drivers/net/wireless/marvell/mwifiex/usb.c +++ b/drivers/net/wireless/marvell/mwifiex/usb.c @@ -130,7 +130,8 @@ static int mwifiex_usb_recv(struct mwifiex_adapter *adapter, default: mwifiex_dbg(adapter, ERROR, "unknown recv_type %#x\n", recv_type); - return -1; + ret = -1; + goto exit_restore_skb; } break; case MWIFIEX_USB_EP_DATA: -- 2.34.1