All of lore.kernel.org
 help / color / mirror / Atom feed
From: Mathias Nyman <mathias.nyman@linux.intel.com>
To: Alan Stern <stern@rowland.harvard.edu>
Cc: linux-usb@vger.kernel.org, sudipm.mukherjee@gmail.com,
	stable@vger.kernel.org
Subject: Re: [PATCH] usb: Avoid use-after-free by flushing endpoints early in usb_set_interface()
Date: Mon, 3 Sep 2018 15:36:25 +0300	[thread overview]
Message-ID: <4cf27ab2-ecd4-2288-749f-77e35bec344e@linux.intel.com> (raw)
In-Reply-To: <Pine.LNX.4.44L0.1808311035380.4901-100000@netrider.rowland.org>

On 31.08.2018 17:39, Alan Stern wrote:
> On Fri, 31 Aug 2018, Mathias Nyman wrote:
> 
>> The steps taken by usb core to set a new interface is very different from
>> what is done on the xHC host side.
>>
>> xHC hardware will do everything in one go. One command is used to set up
>> new endpoints, free old endpoints, check bandwidth, and run the new
>> endpoints.
>>
>> All this is done by xHC when usb core asks the hcd to check for
>> available bandwidth. At this point usb core has not yet flushed the old
>> endpoints, which will cause use-after-free issues in xhci driver as
>> queued URBs are cancelled on a re-allocated endpoint.
>>
>> To resolve this add a call to usb_disable_interface() which will flush
>> the endpoints before calling usb_hcd_alloc_bandwidth()
>>
>> Additional checks in xhci driver will also be implemented to gracefully
>> handle stale URB cancel on freed and re-allocated endpoints
>>
>> Cc: <stable@vger.kernel.org>
>> Reported-by: Sudip Mukherjee <sudipm.mukherjee@gmail.com>
>> Signed-off-by: Mathias Nyman <mathias.nyman@linux.intel.com>
>> ---
>>   drivers/usb/core/message.c | 7 +++++++
>>   1 file changed, 7 insertions(+)
>>
>> diff --git a/drivers/usb/core/message.c b/drivers/usb/core/message.c
>> index 228672f..304bef2 100644
>> --- a/drivers/usb/core/message.c
>> +++ b/drivers/usb/core/message.c
>> @@ -1377,6 +1377,13 @@ int usb_set_interface(struct usb_device *dev, int interface, int alternate)
>>   		return -EINVAL;
>>   	}
>>   
>> +	/*
>> +	 * usb3 hosts configure the interface in usb_hcd_alloc_bandwidth,
>> +	 * including freeing dropped endpoint ring buffers.
>> +	 * Make sure the interface endpoints are flushed before that
>> +	 */
>> +	usb_disable_interface(dev, iface, false);
>> +
>>   	/* Make sure we have enough bandwidth for this alternate interface.
>>   	 * Remove the current alt setting and add the new alt setting.
>>   	 */
> 
> Please also update the kerneldoc for this function.  It should now
> specify that if the request fails, the original interface altsetting
> may be disabled.  Drivers cannot rely on any particular alternate
> setting being in effect after a failure.
> 
> Alan Stern
> 

Sure, thanks, will do

-Mathias

WARNING: multiple messages have this Message-ID (diff)
From: Mathias Nyman <mathias.nyman@linux.intel.com>
To: Alan Stern <stern@rowland.harvard.edu>
Cc: linux-usb@vger.kernel.org, sudipm.mukherjee@gmail.com,
	stable@vger.kernel.org
Subject: usb: Avoid use-after-free by flushing endpoints early in usb_set_interface()
Date: Mon, 3 Sep 2018 15:36:25 +0300	[thread overview]
Message-ID: <4cf27ab2-ecd4-2288-749f-77e35bec344e@linux.intel.com> (raw)

On 31.08.2018 17:39, Alan Stern wrote:
> On Fri, 31 Aug 2018, Mathias Nyman wrote:
> 
>> The steps taken by usb core to set a new interface is very different from
>> what is done on the xHC host side.
>>
>> xHC hardware will do everything in one go. One command is used to set up
>> new endpoints, free old endpoints, check bandwidth, and run the new
>> endpoints.
>>
>> All this is done by xHC when usb core asks the hcd to check for
>> available bandwidth. At this point usb core has not yet flushed the old
>> endpoints, which will cause use-after-free issues in xhci driver as
>> queued URBs are cancelled on a re-allocated endpoint.
>>
>> To resolve this add a call to usb_disable_interface() which will flush
>> the endpoints before calling usb_hcd_alloc_bandwidth()
>>
>> Additional checks in xhci driver will also be implemented to gracefully
>> handle stale URB cancel on freed and re-allocated endpoints
>>
>> Cc: <stable@vger.kernel.org>
>> Reported-by: Sudip Mukherjee <sudipm.mukherjee@gmail.com>
>> Signed-off-by: Mathias Nyman <mathias.nyman@linux.intel.com>
>> ---
>>   drivers/usb/core/message.c | 7 +++++++
>>   1 file changed, 7 insertions(+)
>>
>> diff --git a/drivers/usb/core/message.c b/drivers/usb/core/message.c
>> index 228672f..304bef2 100644
>> --- a/drivers/usb/core/message.c
>> +++ b/drivers/usb/core/message.c
>> @@ -1377,6 +1377,13 @@ int usb_set_interface(struct usb_device *dev, int interface, int alternate)
>>   		return -EINVAL;
>>   	}
>>   
>> +	/*
>> +	 * usb3 hosts configure the interface in usb_hcd_alloc_bandwidth,
>> +	 * including freeing dropped endpoint ring buffers.
>> +	 * Make sure the interface endpoints are flushed before that
>> +	 */
>> +	usb_disable_interface(dev, iface, false);
>> +
>>   	/* Make sure we have enough bandwidth for this alternate interface.
>>   	 * Remove the current alt setting and add the new alt setting.
>>   	 */
> 
> Please also update the kerneldoc for this function.  It should now
> specify that if the request fails, the original interface altsetting
> may be disabled.  Drivers cannot rely on any particular alternate
> setting being in effect after a failure.
> 
> Alan Stern
> 

Sure, thanks, will do

-Mathias

  reply	other threads:[~2018-09-03 16:54 UTC|newest]

Thread overview: 6+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2018-08-31 14:06 [PATCH] usb: Avoid use-after-free by flushing endpoints early in usb_set_interface() Mathias Nyman
2018-08-31 14:06 ` Mathias Nyman
2018-08-31 14:39 ` [PATCH] " Alan Stern
2018-08-31 14:39   ` Alan Stern
2018-09-03 12:36   ` Mathias Nyman [this message]
2018-09-03 12:36     ` Mathias Nyman

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=4cf27ab2-ecd4-2288-749f-77e35bec344e@linux.intel.com \
    --to=mathias.nyman@linux.intel.com \
    --cc=linux-usb@vger.kernel.org \
    --cc=stable@vger.kernel.org \
    --cc=stern@rowland.harvard.edu \
    --cc=sudipm.mukherjee@gmail.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.