Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp786649rwb; Wed, 9 Nov 2022 08:35:49 -0800 (PST) X-Google-Smtp-Source: AMsMyM7gIpG6U+D8yIBygS5mfFiFiqUQ4yNdtWgiUYWKFhZSexJbBxIKQ8ADJhJez6pSjzrOnuJR X-Received: by 2002:a17:906:9414:b0:7ad:bde1:3ccf with SMTP id q20-20020a170906941400b007adbde13ccfmr54181813ejx.543.1668011749384; Wed, 09 Nov 2022 08:35:49 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1668011749; cv=none; d=google.com; s=arc-20160816; b=FyPaR9gxOkiS3gXZQrDaJ/KbFecnnb+rdmA8C2cHARViR9RIlq0w3Qy8B/jedZvKTC 7CC+A8HieHehRgA56yUNq8/toU++xtgO9FbRsYnW1NTHZ5n2GKpHts4fjSqprn3DQaj5 EOIFRXtFsb2pPBGtO6cwotZ0s9qKKRRao046KNjiOz2huWqm5hcEhD1QuEOKQkE6Gp4v KIXDHOP2ajZ42V9r9jSgLTGeeZ2lga2guFeafEBzjTJILeQ75nLfCbxxPKzGM6IwxOoS 2zHg1ReD5Uo4z/v/ybg4P/5pMlzscLxlvBVUBNg0fcX5zvQp5qQssxoCSZw+RQxclE8P 7Ltg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date; bh=gFJBOha6yLO6J/vAdHIlwxOrDH06spIhX+S3qtydCbY=; b=m7EWJQ5dCLM4XEPGaWJ+Eh3DRGBLpzh79EdUgo59epN7KXldpBeLSnItX6c5IFcPJH Qukt4b/SGX7FYbRhlxMgGNLAehBj7P63jKby61RG5AQRSXb3vH1VHVz4owNxXsYlxKL0 kefnj/R/48vvt4sEZjDuHKwgAHVX0vdoSZwjUVsWbXc2YGafnaDcrtSasS0gbTLLIlhZ IOsXo8ztAqwi4+39phcDYaVVroWpMmPKe8aqG0a1tEs2spQaWdL24SCdtYKhMIszK3Oj TNtvuO204BIPAfR6OeKBxQsCydjmMrRA30RWh9slMLsfmYGbGKMdKbuSYG6/A7PriyQZ obFQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id wy8-20020a170906fe0800b0078334ccc570si14950187ejb.328.2022.11.09.08.35.25; Wed, 09 Nov 2022 08:35:49 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231773AbiKIPNo (ORCPT + 92 others); Wed, 9 Nov 2022 10:13:44 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:48222 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231841AbiKIPNk (ORCPT ); Wed, 9 Nov 2022 10:13:40 -0500 Received: from netrider.rowland.org (netrider.rowland.org [192.131.102.5]) by lindbergh.monkeyblade.net (Postfix) with SMTP id AC0A81115B for ; Wed, 9 Nov 2022 07:13:38 -0800 (PST) Received: (qmail 511709 invoked by uid 1000); 9 Nov 2022 10:13:37 -0500 Date: Wed, 9 Nov 2022 10:13:37 -0500 From: "stern@rowland.harvard.edu" To: jiantao zhang Cc: =?utf-8?B?6Jab5rab?= , "gregkh@linuxfoundation.org" , "jakobkoschel@gmail.com" , "geert+renesas@glider.be" , "colin.i.king@gmail.com" , "linux-usb@vger.kernel.org" , "linux-kernel@vger.kernel.org" , Caiyadong , xuhaiyang , suzhuangluan@hisilicon.com Subject: Re: [PATCH] USB: gadget: Fix use-after-free during usb config switch Message-ID: References: <20221109125315.2959-1-xuetao09@huawei.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: X-Spam-Status: No, score=-1.7 required=5.0 tests=BAYES_00, HEADER_FROM_DIFFERENT_DOMAINS,SPF_HELO_PASS,SPF_PASS autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Was this supposed to be an actual patch submission? It doesn't look like it, because each line of the email begins with "> ". On Wed, Nov 09, 2022 at 10:11:51PM +0800, jiantao zhang wrote: > > In the process of switching USB config from rndis to other config, > > if function gadget->ops->pullup() return an error,it will inevitably > > cause a system panic(use after free). > > > > Analysis as follows: > > ===================================================================== > > (1) write /config/usb_gadget/g1/UDC "none" (init.usb.configfs.rc:2) > > > > gether_disconnect+0x2c/0x1f8 (dev->port_usb = NULL) > > rndis_disable+0x4c/0x74 > > composite_disconnect+0x74/0xb0 > > configfs_composite_disconnect+0x60/0x7c > > usb_gadget_disconnect+0x70/0x124 > > usb_gadget_unregister_driver+0xc8/0x1d8 > > gadget_dev_desc_UDC_store+0xec/0x1e4 > > > > In general, pointer dev->port will be set to null. > > In function usb_gadget_disconnect(),gadget->udc->driver->disconnect() > > will not be called when gadget->ops->pullup() return an error, therefore, > > pointer dev->port will not be set to NULL. > > If pointer dev->port_usb is not null, it will cause an exception of using > > the freed memory in step3. Good point. ... > > Through above analysis, i think gadget->udc->driver->disconnect() need > > to be called even if gadget->udc->driver->disconnect() return an error. You mean "even if gadget->ops->pullup() returns an error". That seems reasonable. The only reason for the ->pullup callback to fail is if the hardware doesn't support it, but gadget drivers sometimes need to be unloaded regardless of the hardware's capabilities. > > This reverts commit 0a55187a1ec8c03d0619e7ce41d10fdc39cff036 But this is not reasonable. You should change the code so that it does what you want: Make it call driver->disconnect() even if ops->pullup() returns an error. Don't revert an entire commit just because of one side effect. > > I think this change is a code optimization, not a solution to specific > > problem. And i think this problem is caused by this change,revert it can > > solve this problem. That commit was not just a code optimization. It did fix a problem: Some UDCs would not call driver->disconnect() because they expected the core to make the call for them. > > Of course, my understanding may be inaccurate.There may be a better > > solution to this problem. If possible, please give some suggestions, > > thanks. Simply move the lines which grab the mutex and do the callback after the "if" statement, so that they will run regardless of what ops->pullup() returns. Alan Stern > > Fixes:<0a55187a1ec8c> (USB: gadget core: Issue ->disconnect() > > callback from usb_gadget_disconnect()) > > > > Signed-off-by: Jiantao Zhang > > Signed-off-by: TaoXue > > --- > > drivers/usb/gadget/udc/core.c | 20 +++++++++++--------- > > 1 file changed, 11 insertions(+), 9 deletions(-) > > > > diff --git a/drivers/usb/gadget/udc/core.c b/drivers/usb/gadget/udc/core.c > > index c63c0c2cf649..b502b2ac4824 100644 > > --- a/drivers/usb/gadget/udc/core.c > > +++ b/drivers/usb/gadget/udc/core.c > > @@ -707,9 +707,6 @@ EXPORT_SYMBOL_GPL(usb_gadget_connect); > > * as a disconnect (when a VBUS session is active). Not all systems > > * support software pullup controls. > > * > > - * Following a successful disconnect, invoke the ->disconnect() callback > > - * for the current gadget driver so that UDC drivers don't need to. > > - * > > * Returns zero on success, else negative errno. > > */ > > int usb_gadget_disconnect(struct usb_gadget *gadget) > > @@ -734,13 +731,8 @@ int usb_gadget_disconnect(struct usb_gadget *gadget) > > } > > ret = gadget->ops->pullup(gadget, 0); > > - if (!ret) { > > + if (!ret) > > gadget->connected = 0; > > - mutex_lock(&udc_lock); > > - if (gadget->udc->driver) > > - gadget->udc->driver->disconnect(gadget); > > - mutex_unlock(&udc_lock); > > - } > > out: > > trace_usb_gadget_disconnect(gadget, ret); > > @@ -1532,6 +1524,11 @@ static void gadget_unbind_driver(struct device *dev) > > kobject_uevent(&udc->dev.kobj, KOBJ_CHANGE); > > usb_gadget_disconnect(gadget); > > + > > + mutex_lock(&udc_lock); > > + udc->driver->disconnect(udc->gadget); > > + mutex_unlock(&udc_lock); > > + > > usb_gadget_disable_async_callbacks(udc); > > if (gadget->irq) > > synchronize_irq(gadget->irq); > > @@ -1626,6 +1623,11 @@ static ssize_t soft_connect_store(struct device *dev, > > usb_gadget_connect(udc->gadget); > > } else if (sysfs_streq(buf, "disconnect")) { > > usb_gadget_disconnect(udc->gadget); > > + > > + mutex_lock(&udc_lock); > > + udc->driver->disconnect(udc->gadget); > > + mutex_unlock(&udc_lock); > > + > > usb_gadget_udc_stop(udc); > > } else { > > dev_err(dev, "unsupported command '%s'\n", buf);