public inbox for linux-kernel@vger.kernel.org
 help / color / mirror / Atom feed
From: Sasha Levin <sashal@kernel.org>
To: linux-kernel@vger.kernel.org, stable@vger.kernel.org
Cc: Brooke Basile <brookebasile@gmail.com>,
	syzbot+89bd486af9427a9fc605@syzkaller.appspotmail.com,
	Kalle Valo <kvalo@codeaurora.org>,
	Sasha Levin <sashal@kernel.org>,
	linux-wireless@vger.kernel.org, netdev@vger.kernel.org
Subject: [PATCH AUTOSEL 4.9 26/41] ath9k: hif_usb: fix race condition between usb_get_urb() and usb_kill_anchored_urbs()
Date: Sun, 18 Oct 2020 15:26:20 -0400	[thread overview]
Message-ID: <20201018192635.4056198-26-sashal@kernel.org> (raw)
In-Reply-To: <20201018192635.4056198-1-sashal@kernel.org>

From: Brooke Basile <brookebasile@gmail.com>

[ Upstream commit 03fb92a432ea5abe5909bca1455b7e44a9380480 ]

Calls to usb_kill_anchored_urbs() after usb_kill_urb() on multiprocessor
systems create a race condition in which usb_kill_anchored_urbs() deallocates
the URB before the completer callback is called in usb_kill_urb(), resulting
in a use-after-free.
To fix this, add proper lock protection to usb_kill_urb() calls that can
possibly run concurrently with usb_kill_anchored_urbs().

Reported-by: syzbot+89bd486af9427a9fc605@syzkaller.appspotmail.com
Link: https://syzkaller.appspot.com/bug?id=cabffad18eb74197f84871802fd2c5117b61febf
Signed-off-by: Brooke Basile <brookebasile@gmail.com>
Signed-off-by: Kalle Valo <kvalo@codeaurora.org>
Link: https://lore.kernel.org/r/20200911071427.32354-1-brookebasile@gmail.com
Signed-off-by: Sasha Levin <sashal@kernel.org>
---
 drivers/net/wireless/ath/ath9k/hif_usb.c | 19 +++++++++++++++++++
 1 file changed, 19 insertions(+)

diff --git a/drivers/net/wireless/ath/ath9k/hif_usb.c b/drivers/net/wireless/ath/ath9k/hif_usb.c
index fb5b7ce3d2c3d..7c409cd43b709 100644
--- a/drivers/net/wireless/ath/ath9k/hif_usb.c
+++ b/drivers/net/wireless/ath/ath9k/hif_usb.c
@@ -447,10 +447,19 @@ static void hif_usb_stop(void *hif_handle)
 	spin_unlock_irqrestore(&hif_dev->tx.tx_lock, flags);
 
 	/* The pending URBs have to be canceled. */
+	spin_lock_irqsave(&hif_dev->tx.tx_lock, flags);
 	list_for_each_entry_safe(tx_buf, tx_buf_tmp,
 				 &hif_dev->tx.tx_pending, list) {
+		usb_get_urb(tx_buf->urb);
+		spin_unlock_irqrestore(&hif_dev->tx.tx_lock, flags);
 		usb_kill_urb(tx_buf->urb);
+		list_del(&tx_buf->list);
+		usb_free_urb(tx_buf->urb);
+		kfree(tx_buf->buf);
+		kfree(tx_buf);
+		spin_lock_irqsave(&hif_dev->tx.tx_lock, flags);
 	}
+	spin_unlock_irqrestore(&hif_dev->tx.tx_lock, flags);
 
 	usb_kill_anchored_urbs(&hif_dev->mgmt_submitted);
 }
@@ -760,27 +769,37 @@ static void ath9k_hif_usb_dealloc_tx_urbs(struct hif_device_usb *hif_dev)
 	struct tx_buf *tx_buf = NULL, *tx_buf_tmp = NULL;
 	unsigned long flags;
 
+	spin_lock_irqsave(&hif_dev->tx.tx_lock, flags);
 	list_for_each_entry_safe(tx_buf, tx_buf_tmp,
 				 &hif_dev->tx.tx_buf, list) {
+		usb_get_urb(tx_buf->urb);
+		spin_unlock_irqrestore(&hif_dev->tx.tx_lock, flags);
 		usb_kill_urb(tx_buf->urb);
 		list_del(&tx_buf->list);
 		usb_free_urb(tx_buf->urb);
 		kfree(tx_buf->buf);
 		kfree(tx_buf);
+		spin_lock_irqsave(&hif_dev->tx.tx_lock, flags);
 	}
+	spin_unlock_irqrestore(&hif_dev->tx.tx_lock, flags);
 
 	spin_lock_irqsave(&hif_dev->tx.tx_lock, flags);
 	hif_dev->tx.flags |= HIF_USB_TX_FLUSH;
 	spin_unlock_irqrestore(&hif_dev->tx.tx_lock, flags);
 
+	spin_lock_irqsave(&hif_dev->tx.tx_lock, flags);
 	list_for_each_entry_safe(tx_buf, tx_buf_tmp,
 				 &hif_dev->tx.tx_pending, list) {
+		usb_get_urb(tx_buf->urb);
+		spin_unlock_irqrestore(&hif_dev->tx.tx_lock, flags);
 		usb_kill_urb(tx_buf->urb);
 		list_del(&tx_buf->list);
 		usb_free_urb(tx_buf->urb);
 		kfree(tx_buf->buf);
 		kfree(tx_buf);
+		spin_lock_irqsave(&hif_dev->tx.tx_lock, flags);
 	}
+	spin_unlock_irqrestore(&hif_dev->tx.tx_lock, flags);
 
 	usb_kill_anchored_urbs(&hif_dev->mgmt_submitted);
 }
-- 
2.25.1


  parent reply	other threads:[~2020-10-18 19:32 UTC|newest]

Thread overview: 41+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2020-10-18 19:25 [PATCH AUTOSEL 4.9 01/41] crypto: ccp - fix error handling Sasha Levin
2020-10-18 19:25 ` [PATCH AUTOSEL 4.9 02/41] media: firewire: fix memory leak Sasha Levin
2020-10-18 19:25 ` [PATCH AUTOSEL 4.9 03/41] media: ati_remote: sanity check for both endpoints Sasha Levin
2020-10-18 19:25 ` [PATCH AUTOSEL 4.9 04/41] media: exynos4-is: Fix several reference count leaks due to pm_runtime_get_sync Sasha Levin
2020-10-18 19:25 ` [PATCH AUTOSEL 4.9 05/41] media: exynos4-is: Fix a reference count leak " Sasha Levin
2020-10-18 19:26 ` [PATCH AUTOSEL 4.9 06/41] media: exynos4-is: Fix a reference count leak Sasha Levin
2020-10-18 19:26 ` [PATCH AUTOSEL 4.9 07/41] media: vsp1: Fix runtime PM imbalance on error Sasha Levin
2020-10-18 19:26 ` [PATCH AUTOSEL 4.9 08/41] media: platform: s3c-camif: " Sasha Levin
2020-10-18 19:26 ` [PATCH AUTOSEL 4.9 09/41] media: platform: sti: hva: " Sasha Levin
2020-10-18 19:26 ` [PATCH AUTOSEL 4.9 10/41] media: bdisp: " Sasha Levin
2020-10-18 19:26 ` [PATCH AUTOSEL 4.9 11/41] media: media/pci: prevent memory leak in bttv_probe Sasha Levin
2020-10-18 19:26 ` [PATCH AUTOSEL 4.9 12/41] media: uvcvideo: Ensure all probed info is returned to v4l2 Sasha Levin
2020-10-18 19:26 ` [PATCH AUTOSEL 4.9 13/41] mmc: sdio: Check for CISTPL_VERS_1 buffer size Sasha Levin
2020-10-18 19:26 ` [PATCH AUTOSEL 4.9 14/41] media: saa7134: avoid a shift overflow Sasha Levin
2020-10-18 19:26 ` [PATCH AUTOSEL 4.9 15/41] fs: dlm: fix configfs memory leak Sasha Levin
2020-10-18 19:26 ` [PATCH AUTOSEL 4.9 16/41] ntfs: add check for mft record size in superblock Sasha Levin
2020-10-18 19:26 ` [PATCH AUTOSEL 4.9 17/41] PM: hibernate: remove the bogus call to get_gendisk() in software_resume() Sasha Levin
2020-10-18 19:26 ` [PATCH AUTOSEL 4.9 18/41] scsi: mvumi: Fix error return in mvumi_io_attach() Sasha Levin
2020-10-18 19:26 ` [PATCH AUTOSEL 4.9 19/41] scsi: target: core: Add CONTROL field for trace events Sasha Levin
2020-10-18 19:26 ` [PATCH AUTOSEL 4.9 20/41] mic: vop: copy data to kernel space then write to io memory Sasha Levin
2020-10-18 19:26 ` [PATCH AUTOSEL 4.9 21/41] misc: vop: add round_up(x,4) for vring_size to avoid kernel panic Sasha Levin
2020-10-18 19:26 ` [PATCH AUTOSEL 4.9 22/41] usb: gadget: function: printer: fix use-after-free in __lock_acquire Sasha Levin
2020-10-18 19:26 ` [PATCH AUTOSEL 4.9 23/41] udf: Limit sparing table size Sasha Levin
2020-10-18 19:26 ` [PATCH AUTOSEL 4.9 24/41] udf: Avoid accessing uninitialized data on failed inode read Sasha Levin
2020-10-18 19:26 ` [PATCH AUTOSEL 4.9 25/41] USB: cdc-acm: handle broken union descriptors Sasha Levin
2020-10-18 19:26 ` Sasha Levin [this message]
2020-10-18 19:26 ` [PATCH AUTOSEL 4.9 27/41] misc: rtsx: Fix memory leak in rtsx_pci_probe Sasha Levin
2020-10-18 19:26 ` [PATCH AUTOSEL 4.9 28/41] reiserfs: only call unlock_new_inode() if I_NEW Sasha Levin
2020-10-18 19:26 ` [PATCH AUTOSEL 4.9 29/41] xfs: make sure the rt allocator doesn't run off the end Sasha Levin
2020-10-18 19:26 ` [PATCH AUTOSEL 4.9 30/41] usb: ohci: Default to per-port over-current protection Sasha Levin
2020-10-18 19:26 ` [PATCH AUTOSEL 4.9 31/41] Bluetooth: Only mark socket zapped after unlocking Sasha Levin
2020-10-18 19:26 ` [PATCH AUTOSEL 4.9 32/41] scsi: ibmvfc: Fix error return in ibmvfc_probe() Sasha Levin
2020-10-18 19:26 ` [PATCH AUTOSEL 4.9 33/41] brcmsmac: fix memory leak in wlc_phy_attach_lcnphy Sasha Levin
2020-10-18 19:26 ` [PATCH AUTOSEL 4.9 34/41] rtl8xxxu: prevent potential memory leak Sasha Levin
2020-10-18 19:26 ` [PATCH AUTOSEL 4.9 35/41] Fix use after free in get_capset_info callback Sasha Levin
2020-10-18 19:26 ` [PATCH AUTOSEL 4.9 36/41] tty: ipwireless: fix error handling Sasha Levin
2020-10-18 19:26 ` [PATCH AUTOSEL 4.9 37/41] ipvs: Fix uninit-value in do_ip_vs_set_ctl() Sasha Levin
2020-10-18 19:26 ` [PATCH AUTOSEL 4.9 38/41] reiserfs: Fix memory leak in reiserfs_parse_options() Sasha Levin
2020-10-18 19:26 ` [PATCH AUTOSEL 4.9 39/41] brcm80211: fix possible memleak in brcmf_proto_msgbuf_attach Sasha Levin
2020-10-18 19:26 ` [PATCH AUTOSEL 4.9 40/41] usb: core: Solve race condition in anchor cleanup functions Sasha Levin
2020-10-18 19:26 ` [PATCH AUTOSEL 4.9 41/41] ath10k: check idx validity in __ath10k_htt_rx_ring_fill_n() Sasha Levin

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20201018192635.4056198-26-sashal@kernel.org \
    --to=sashal@kernel.org \
    --cc=brookebasile@gmail.com \
    --cc=kvalo@codeaurora.org \
    --cc=linux-kernel@vger.kernel.org \
    --cc=linux-wireless@vger.kernel.org \
    --cc=netdev@vger.kernel.org \
    --cc=stable@vger.kernel.org \
    --cc=syzbot+89bd486af9427a9fc605@syzkaller.appspotmail.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox