Received: by 2002:a05:6358:5282:b0:b5:90e7:25cb with SMTP id g2csp3409635rwa; Tue, 23 Aug 2022 04:25:30 -0700 (PDT) X-Google-Smtp-Source: AA6agR4c7cbtgFBIp30ldsmkXojNvJgv601808nDitJMjcXcBClhomefeglYtYfHjiyq6NtFcGi2 X-Received: by 2002:a17:907:6890:b0:73d:a58c:4f0b with SMTP id qy16-20020a170907689000b0073da58c4f0bmr958549ejc.247.1661253930439; Tue, 23 Aug 2022 04:25:30 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1661253930; cv=none; d=google.com; s=arc-20160816; b=Q7p1fRCVJstfB5N9NbIatpaTelLB+e2qmgQ+rSoW35byjAWDhkCyhBTUSsfuhiOxZN mKngEQCHxEWT1mHjqE308Pu4hzUqqVtaPyRW8bE0hJdYuRQXxGpLJrP+W22AHlsmcidV YkJm1Jh1wLWJ7XapcU+A3PrqhiYD37U32YHJr4AzpWuUBKu3tqAeS37UpE84hziAL0hl DJsTS98rmHlEfI9Lhzm8Ib4KsjVS0bVcy+oyWKXtTtgAmawZ4vvwVs36Tjwqz5mp1r95 S5t0Uiri5H4WHgksDswwHPSYfXN6+RrwTkvdGjkJ6uYWg3+mtmfwRjhKkvonGBrFcsu5 xrHA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=zP11dEMGKXhrS/Lb0fNLRufP1NpgmFOWNjpv9Larc6w=; b=RMPkeh5OphUX4sUGe+uZHUTQAB9toKWmDwQ6DAkm2JKbZRKG5aK/kf86fKzLKNK404 /IcFRGrcdTXboAPH2wowW0jxracL98/SLnfq+b7FCvw4LfsWY0nacdLIsrPvbYCC2YXy aE2r7yRMmXZCkJZ0g1keJQMmvtOO/Fc81lGf/nW/DtgsCBOFwsPdq/nUNqT9cntCLgT3 FyZ9yawcqYBSzAtCVWHu6AkA14v3xlBdmZ4LzZZXrL+cgJJn2Ncipn+V8Ls3DEWfPBQw hHOaRi7R0aCGvKKrflB7x9SBYMpxJrza+/Ph3n3mMh1WvFjr/G3InywK6y4hcsGc30Tx KVFg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=p4vvQQyy; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id qb34-20020a1709077ea200b0073d80c9dc85si4658493ejc.459.2022.08.23.04.25.04; Tue, 23 Aug 2022 04:25:30 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=p4vvQQyy; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1355296AbiHWKbj (ORCPT + 99 others); Tue, 23 Aug 2022 06:31:39 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:53682 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1353647AbiHWKP0 (ORCPT ); Tue, 23 Aug 2022 06:15:26 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id ECD477F25D; Tue, 23 Aug 2022 02:00:49 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 4CE2D61524; Tue, 23 Aug 2022 09:00:49 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 51F52C433D6; Tue, 23 Aug 2022 09:00:48 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1661245248; bh=ZMWWUWrKYO4I9/D/3v00Nua0PxJnuVwOFR2J1Y+myQM=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=p4vvQQyytxu4RoX2ZyCnbug9iroS/ttZZuWRXVYuxu+cn34RCRv2vqoRKtyifVP6d ROdQ6k1tWIIWCTVzIPWrpkOM4FHnLQZoyD/KBIlrWlnV4Wyg9VRcz4WB4PvekZ3rVk zTyTHneufhKLod1WIeBzhoqqi2LE5Wl9Yg93VytI= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Jann Horn , Oleksij Rempel , Lukas Wunner , Oliver Neukum , Jakub Kicinski Subject: [PATCH 4.19 019/287] usbnet: Fix linkwatch use-after-free on disconnect Date: Tue, 23 Aug 2022 10:23:08 +0200 Message-Id: <20220823080100.929893511@linuxfoundation.org> X-Mailer: git-send-email 2.37.2 In-Reply-To: <20220823080100.268827165@linuxfoundation.org> References: <20220823080100.268827165@linuxfoundation.org> User-Agent: quilt/0.67 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-7.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Lukas Wunner commit a69e617e533edddf3fa3123149900f36e0a6dc74 upstream. usbnet uses the work usbnet_deferred_kevent() to perform tasks which may sleep. On disconnect, completion of the work was originally awaited in ->ndo_stop(). But in 2003, that was moved to ->disconnect() by historic commit "[PATCH] USB: usbnet, prevent exotic rtnl deadlock": https://git.kernel.org/tglx/history/c/0f138bbfd83c The change was made because back then, the kernel's workqueue implementation did not allow waiting for a single work. One had to wait for completion of *all* work by calling flush_scheduled_work(), and that could deadlock when waiting for usbnet_deferred_kevent() with rtnl_mutex held in ->ndo_stop(). The commit solved one problem but created another: It causes a use-after-free in USB Ethernet drivers aqc111.c, asix_devices.c, ax88179_178a.c, ch9200.c and smsc75xx.c: * If the drivers receive a link change interrupt immediately before disconnect, they raise EVENT_LINK_RESET in their (non-sleepable) ->status() callback and schedule usbnet_deferred_kevent(). * usbnet_deferred_kevent() invokes the driver's ->link_reset() callback, which calls netif_carrier_{on,off}(). * That in turn schedules the work linkwatch_event(). Because usbnet_deferred_kevent() is awaited after unregister_netdev(), netif_carrier_{on,off}() may operate on an unregistered netdev and linkwatch_event() may run after free_netdev(), causing a use-after-free. In 2010, usbnet was changed to only wait for a single instance of usbnet_deferred_kevent() instead of *all* work by commit 23f333a2bfaf ("drivers/net: don't use flush_scheduled_work()"). Unfortunately the commit neglected to move the wait back to ->ndo_stop(). Rectify that omission at long last. Reported-by: Jann Horn Link: https://lore.kernel.org/netdev/CAG48ez0MHBbENX5gCdHAUXZ7h7s20LnepBF-pa5M=7Bi-jZrEA@mail.gmail.com/ Reported-by: Oleksij Rempel Link: https://lore.kernel.org/netdev/20220315113841.GA22337@pengutronix.de/ Signed-off-by: Lukas Wunner Cc: stable@vger.kernel.org Acked-by: Oliver Neukum Link: https://lore.kernel.org/r/d1c87ebe9fc502bffcd1576e238d685ad08321e4.1655987888.git.lukas@wunner.de Signed-off-by: Jakub Kicinski Signed-off-by: Greg Kroah-Hartman --- drivers/net/usb/usbnet.c | 8 ++------ 1 file changed, 2 insertions(+), 6 deletions(-) --- a/drivers/net/usb/usbnet.c +++ b/drivers/net/usb/usbnet.c @@ -845,13 +845,11 @@ int usbnet_stop (struct net_device *net) mpn = !test_and_clear_bit(EVENT_NO_RUNTIME_PM, &dev->flags); - /* deferred work (task, timer, softirq) must also stop. - * can't flush_scheduled_work() until we drop rtnl (later), - * else workers could deadlock; so make workers a NOP. - */ + /* deferred work (timer, softirq, task) must also stop */ dev->flags = 0; del_timer_sync (&dev->delay); tasklet_kill (&dev->bh); + cancel_work_sync(&dev->kevent); if (!pm) usb_autopm_put_interface(dev->intf); @@ -1614,8 +1612,6 @@ void usbnet_disconnect (struct usb_inter net = dev->net; unregister_netdev (net); - cancel_work_sync(&dev->kevent); - usb_scuttle_anchored_urbs(&dev->deferred); if (dev->driver_info->unbind)