public inbox for stable@vger.kernel.org
 help / color / mirror / Atom feed
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: Pascal Ernster <git@hardfalcon.net>
Cc: Sasha Levin <sashal@kernel.org>, stable@vger.kernel.org
Subject: Re: Patch "xhci: fix possible null pointer deref during xhci urb enqueue" has been added to the 6.7-stab
Date: Mon, 26 Feb 2024 07:01:52 +0100	[thread overview]
Message-ID: <2024022614-omen-bauble-ea55@gregkh> (raw)
In-Reply-To: <977d5a90-4c4e-446c-aeb7-fb31f7281f17@hardfalcon.net>

On Sun, Feb 25, 2024 at 06:31:04PM +0100, Pascal Ernster wrote:
> [2024-02-23 18:45] Sasha Levin:
> > This is a note to let you know that I've just added the patch titled
> > 
> >      xhci: fix possible null pointer deref during xhci urb enqueue
> > 
> > to the 6.7-stable tree which can be found at:
> >      http://www.kernel.org/git/?p=linux/kernel/git/stable/stable-queue.git;a=summary
> > 
> > The filename of the patch is:
> >       xhci-fix-possible-null-pointer-deref-during-xhci-urb.patch
> > and it can be found in the queue-6.7 subdirectory.
> > 
> > If you, or anyone else, feels it should not be added to the stable tree,
> > please let <stable@vger.kernel.org> know about it.
> > 
> > 
> > 
> > commit fb9100c2c6b7b172650ba25283cc4cf9af1d082c
> > Author: Mathias Nyman <mathias.nyman@linux.intel.com>
> > Date:   Fri Dec 1 17:06:47 2023 +0200
> > 
> >      xhci: fix possible null pointer deref during xhci urb enqueue
> >      [ Upstream commit e2e2aacf042f52854c92775b7800ba668e0bdfe4 ]
> >      There is a short gap between urb being submitted and actually added to the
> >      endpoint queue (linked). If the device is disconnected during this time
> >      then usb core is not yet aware of the pending urb, and device may be freed
> >      just before xhci_urq_enqueue() continues, dereferencing the freed device.
> >      Freeing the device is protected by the xhci spinlock, so make sure we take
> >      and keep the lock while checking that device exists, dereference it, and
> >      add the urb to the queue.
> >      Remove the unnecessary URB check, usb core checks it before calling
> >      xhci_urb_enqueue()
> >      Suggested-by: Kuen-Han Tsai <khtsai@google.com>
> >      Signed-off-by: Mathias Nyman <mathias.nyman@linux.intel.com>
> >      Link: https://lore.kernel.org/r/20231201150647.1307406-20-mathias.nyman@linux.intel.com
> >      Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
> >      Signed-off-by: Sasha Levin <sashal@kernel.org>
> > 
> > diff --git a/drivers/usb/host/xhci.c b/drivers/usb/host/xhci.c
> > index 884b0898d9c95..ddb686301af5d 100644
> > --- a/drivers/usb/host/xhci.c
> > +++ b/drivers/usb/host/xhci.c
> > @@ -1522,24 +1522,7 @@ static int xhci_urb_enqueue(struct usb_hcd *hcd, struct urb *urb, gfp_t mem_flag
> >   	struct urb_priv	*urb_priv;
> >   	int num_tds;
> > -	if (!urb)
> > -		return -EINVAL;
> > -	ret = xhci_check_args(hcd, urb->dev, urb->ep,
> > -					true, true, __func__);
> > -	if (ret <= 0)
> > -		return ret ? ret : -EINVAL;
> > -
> > -	slot_id = urb->dev->slot_id;
> >   	ep_index = xhci_get_endpoint_index(&urb->ep->desc);
> > -	ep_state = &xhci->devs[slot_id]->eps[ep_index].ep_state;
> > -
> > -	if (!HCD_HW_ACCESSIBLE(hcd))
> > -		return -ESHUTDOWN;
> > -
> > -	if (xhci->devs[slot_id]->flags & VDEV_PORT_ERROR) {
> > -		xhci_dbg(xhci, "Can't queue urb, port error, link inactive\n");
> > -		return -ENODEV;
> > -	}
> >   	if (usb_endpoint_xfer_isoc(&urb->ep->desc))
> >   		num_tds = urb->number_of_packets;
> > @@ -1578,12 +1561,35 @@ static int xhci_urb_enqueue(struct usb_hcd *hcd, struct urb *urb, gfp_t mem_flag
> >   	spin_lock_irqsave(&xhci->lock, flags);
> > +	ret = xhci_check_args(hcd, urb->dev, urb->ep,
> > +			      true, true, __func__);
> > +	if (ret <= 0) {
> > +		ret = ret ? ret : -EINVAL;
> > +		goto free_priv;
> > +	}
> > +
> > +	slot_id = urb->dev->slot_id;
> > +
> > +	if (!HCD_HW_ACCESSIBLE(hcd)) {
> > +		ret = -ESHUTDOWN;
> > +		goto free_priv;
> > +	}
> > +
> > +	if (xhci->devs[slot_id]->flags & VDEV_PORT_ERROR) {
> > +		xhci_dbg(xhci, "Can't queue urb, port error, link inactive\n");
> > +		ret = -ENODEV;
> > +		goto free_priv;
> > +	}
> > +
> >   	if (xhci->xhc_state & XHCI_STATE_DYING) {
> >   		xhci_dbg(xhci, "Ep 0x%x: URB %p submitted for non-responsive xHCI host.\n",
> >   			 urb->ep->desc.bEndpointAddress, urb);
> >   		ret = -ESHUTDOWN;
> >   		goto free_priv;
> >   	}
> > +
> > +	ep_state = &xhci->devs[slot_id]->eps[ep_index].ep_state;
> > +
> >   	if (*ep_state & (EP_GETTING_STREAMS | EP_GETTING_NO_STREAMS)) {
> >   		xhci_warn(xhci, "WARN: Can't enqueue URB, ep in streams transition state %x\n",
> >   			  *ep_state);
> 
> 
> Hi, this patch is causing my laptop (Dell Precision 7530) to crash during
> early boot with a kernel 6.7.6 with all the patches from your current
> stable-queue applied on top (https://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git/tree/queue-6.7?id=8294c8ea0d96dc8271e87053f7b6731ee5b986ca).
> 
> Booting with "module_blacklist=xhci_pci,xhci_pci_renesas" stops the crashes.
> This patch was already thrown out a few weeks ago because it was causing
> problems:
> 
> https://lore.kernel.org/stable/2024020331-confetti-ducking-8afb@gregkh/

Yeah, thanks, this one needs to be dropped as it depended on previous
patches to work properly, I'll go drop them now, thanks!

greg k-h

      reply	other threads:[~2024-02-26  6:01 UTC|newest]

Thread overview: 2+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
     [not found] <20240223174501.3260504-1-sashal () kernel ! org>
2024-02-25 17:31 ` Patch "xhci: fix possible null pointer deref during xhci urb enqueue" has been added to the 6.7-stab Pascal Ernster
2024-02-26  6:01   ` Greg Kroah-Hartman [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=2024022614-omen-bauble-ea55@gregkh \
    --to=gregkh@linuxfoundation.org \
    --cc=git@hardfalcon.net \
    --cc=sashal@kernel.org \
    --cc=stable@vger.kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox