Received: by 2002:a05:6358:4e97:b0:b3:742d:4702 with SMTP id ce23csp2810284rwb; Mon, 15 Aug 2022 11:48:10 -0700 (PDT) X-Google-Smtp-Source: AA6agR5XTn48l5LvhT/YaYnrulLtB9UxL6kzV+8aRX8Xy8JwXFvEiei4PnWHenVo98PItiwek9Nl X-Received: by 2002:a17:907:7f1a:b0:731:248c:258c with SMTP id qf26-20020a1709077f1a00b00731248c258cmr11274605ejc.191.1660589290482; Mon, 15 Aug 2022 11:48:10 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1660589290; cv=none; d=google.com; s=arc-20160816; b=e0Pj7FHa72FpbXNXlSHrABZK64VmxelHLx6hyubgXrJiKyZbddfeKsNQgc4jBJeokH +SlA7BHu0adzIJNagfGgkfAIP9ocq4Elg9yFVT1k0cugQwtngEhWZHAKMmXBNF6oLEMN xyUwx30Q/shftEpmA508PC716msv1+pwEPQyXeNpIcMQuXTZFp3vZ1Jg4Me15TvWAo/2 4QhMFzhKKDNjb0tx4hUDlEGz8mcgDhLBi447s+qQQ67cGCtytzqyPkHds0qZfUGnDlv9 YBVuqynl+6qctDuK0+iDuwXxOkhFq+GEf9m+Rd381JwxkjFG7B5tqcWnFUl/jJdLrVca u+ww== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=ZjdenDWS3Rxz+vkMp/u762f6X3phjr58RHJKfzwDKJA=; b=SVyvbuwNbJIucYOosXUyRmwoYQ2yC6plDOedFZm0/fGLORsv53WKlUGWG6yKdYQ7Qt PSvpAMPlA7P2rpDZ5G31xWU55MPsNJ9CVc3k1yXzQjrnTY5VJHAYFzbYEYmzcp3gLuwK HWoxS5y6uJl4+F5utHLGZLSpJkZU5x5SeBrfnBth5gqS8D/k3IbgVwbTLA72VJ5FsSf7 KVol7c9NPGOuIl0+dAZD/YF9dm6a5ZEBt0ghcTRXcMFdomdza3097as16QjCglvR3vL6 HVTMeBOSV+hrun4qBGk5dtkPVG61ciZT7niJ6O2M5XMo5rQxtF9hk6da3BHbp5VwNUQo JFSA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=QrEUD9Nn; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id m4-20020a056402430400b0043aa8412576si9252271edc.227.2022.08.15.11.47.45; Mon, 15 Aug 2022 11:48:10 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=QrEUD9Nn; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S241653AbiHOS1i (ORCPT + 99 others); Mon, 15 Aug 2022 14:27:38 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:55330 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232750AbiHOSZN (ORCPT ); Mon, 15 Aug 2022 14:25:13 -0400 Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id F31CA17074; Mon, 15 Aug 2022 11:18:37 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id 6FA5FB81071; Mon, 15 Aug 2022 18:18:16 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id A701DC433C1; Mon, 15 Aug 2022 18:18:14 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1660587495; bh=WKhP9fvoBVbhKnnC/6M6Uk1riJbubN2caMGm8tF5IXM=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=QrEUD9NnhVGgkGHETC1s8wBGCPJBGEjInSl//wsBsdYeNTOpJRLPdqU/KW9/nNAxk OASP8tTZromsw3XUdZoeWYhy/iQFx55lIaxK7Wk2e4MlevL5fG2YOLQfojj8kN6zIC bZ9oL39nEZi9HtGcWQGfWNgLUcGHxw+2ORdKKFMI= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Alan Stern , syzbot+b0de012ceb1e2a97891b@syzkaller.appspotmail.com Subject: [PATCH 5.15 103/779] USB: gadget: Fix use-after-free Read in usb_udc_uevent() Date: Mon, 15 Aug 2022 19:55:47 +0200 Message-Id: <20220815180341.711918032@linuxfoundation.org> X-Mailer: git-send-email 2.37.2 In-Reply-To: <20220815180337.130757997@linuxfoundation.org> References: <20220815180337.130757997@linuxfoundation.org> User-Agent: quilt/0.67 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-7.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Alan Stern commit 2191c00855b03aa59c20e698be713d952d51fc18 upstream. The syzbot fuzzer found a race between uevent callbacks and gadget driver unregistration that can cause a use-after-free bug: --------------------------------------------------------------- BUG: KASAN: use-after-free in usb_udc_uevent+0x11f/0x130 drivers/usb/gadget/udc/core.c:1732 Read of size 8 at addr ffff888078ce2050 by task udevd/2968 CPU: 1 PID: 2968 Comm: udevd Not tainted 5.19.0-rc4-next-20220628-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106 print_address_description mm/kasan/report.c:317 [inline] print_report.cold+0x2ba/0x719 mm/kasan/report.c:433 kasan_report+0xbe/0x1f0 mm/kasan/report.c:495 usb_udc_uevent+0x11f/0x130 drivers/usb/gadget/udc/core.c:1732 dev_uevent+0x290/0x770 drivers/base/core.c:2424 --------------------------------------------------------------- The bug occurs because usb_udc_uevent() dereferences udc->driver but does so without acquiring the udc_lock mutex, which protects this field. If the gadget driver is unbound from the udc concurrently with uevent processing, the driver structure may be accessed after it has been deallocated. To prevent the race, we make sure that the routine holds the mutex around the racing accesses. Link: CC: stable@vger.kernel.org # fc274c1e9973 Reported-and-tested-by: syzbot+b0de012ceb1e2a97891b@syzkaller.appspotmail.com Signed-off-by: Alan Stern Link: https://lore.kernel.org/r/YtlrnhHyrHsSky9m@rowland.harvard.edu Signed-off-by: Greg Kroah-Hartman --- drivers/usb/gadget/udc/core.c | 11 ++++++----- 1 file changed, 6 insertions(+), 5 deletions(-) --- a/drivers/usb/gadget/udc/core.c +++ b/drivers/usb/gadget/udc/core.c @@ -1739,13 +1739,14 @@ static int usb_udc_uevent(struct device return ret; } - if (udc->driver) { + mutex_lock(&udc_lock); + if (udc->driver) ret = add_uevent_var(env, "USB_UDC_DRIVER=%s", udc->driver->function); - if (ret) { - dev_err(dev, "failed to add uevent USB_UDC_DRIVER\n"); - return ret; - } + mutex_unlock(&udc_lock); + if (ret) { + dev_err(dev, "failed to add uevent USB_UDC_DRIVER\n"); + return ret; } return 0;