lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <2024122413-jersey-dimmer-b01a@gregkh>
Date: Tue, 24 Dec 2024 08:38:37 +0100
From: Greg KH <gregkh@...uxfoundation.org>
To: Akash M/Akash M <akash.m5@...sung.com>
Cc: paul@...pouillou.net, Chris.Wulff@...mp.com, tudor.ambarus@...aro.org,
	m.grzeschik@...gutronix.de, viro@...iv.linux.org.uk,
	quic_jjohnson@...cinc.com, linux-usb@...r.kernel.org,
	linux-kernel@...r.kernel.org, jh0801.jung@...sung.com,
	dh10.jung@...sung.com, naushad@...sung.com, rc93.raju@...sung.com,
	taehyun.cho@...sung.com, hongpooh.kim@...sung.com,
	eomji.oh@...sung.com, shijie.cai@...sung.com,
	alim.akhtar@...sung.com, selvarasu.g@...sung.com,
	stable@...r.kernel.org
Subject: Re: [PATCH] usb: gadget: f_fs: Remove WARN_ON in functionfs_bind

On Tue, Dec 24, 2024 at 12:12:49PM +0530, Akash M/Akash M wrote:
> 
> On 12/19/2024 6:22 PM, Akash M wrote:
> > This commit addresses an issue related to below kernel panic where
> > panic_on_warn is enabled. It is caused by the unnecessary use of WARN_ON
> > in functionsfs_bind, which easily leads to the following scenarios.
> >
> > 1.adb_write in adbd               2. UDC write via configfs
> >    =================	             =====================
> >
> > ->usb_ffs_open_thread()           ->UDC write
> >   ->open_functionfs()               ->configfs_write_iter()
> >    ->adb_open()                      ->gadget_dev_desc_UDC_store()
> >     ->adb_write()                     ->usb_gadget_register_driver_owner
> >                                        ->driver_register()
> > ->StartMonitor()                       ->bus_add_driver()
> >   ->adb_read()                           ->gadget_bind_driver()
> > <times-out without BIND event>           ->configfs_composite_bind()
> >                                            ->usb_add_function()
> > ->open_functionfs()                        ->ffs_func_bind()
> >   ->adb_open()                               ->functionfs_bind()
> >                                         <ffs->state !=FFS_ACTIVE>
> >
> > The adb_open, adb_read, and adb_write operations are invoked from the
> > daemon, but trying to bind the function is a process that is invoked by
> > UDC write through configfs, which opens up the possibility of a race
> > condition between the two paths. In this race scenario, the kernel panic
> > occurs due to the WARN_ON from functionfs_bind when panic_on_warn is
> > enabled. This commit fixes the kernel panic by removing the unnecessary
> > WARN_ON.
> >
> > Kernel panic - not syncing: kernel: panic_on_warn set ...
> > [   14.542395] Call trace:
> > [   14.542464]  ffs_func_bind+0x1c8/0x14a8
> > [   14.542468]  usb_add_function+0xcc/0x1f0
> > [   14.542473]  configfs_composite_bind+0x468/0x588
> > [   14.542478]  gadget_bind_driver+0x108/0x27c
> > [   14.542483]  really_probe+0x190/0x374
> > [   14.542488]  __driver_probe_device+0xa0/0x12c
> > [   14.542492]  driver_probe_device+0x3c/0x220
> > [   14.542498]  __driver_attach+0x11c/0x1fc
> > [   14.542502]  bus_for_each_dev+0x104/0x160
> > [   14.542506]  driver_attach+0x24/0x34
> > [   14.542510]  bus_add_driver+0x154/0x270
> > [   14.542514]  driver_register+0x68/0x104
> > [   14.542518]  usb_gadget_register_driver_owner+0x48/0xf4
> > [   14.542523]  gadget_dev_desc_UDC_store+0xf8/0x144
> > [   14.542526]  configfs_write_iter+0xf0/0x138
> >
> > Fixes: ddf8abd25994 ("USB: f_fs: the FunctionFS driver")
> > Cc: stable@...r.kernel.org
> > Signed-off-by: Akash M <akash.m5@...sung.com>
> >
> > diff --git a/drivers/usb/gadget/function/f_fs.c b/drivers/usb/gadget/function/f_fs.c
> > index 2920f8000bbd..92c883440e02 100644
> > --- a/drivers/usb/gadget/function/f_fs.c
> > +++ b/drivers/usb/gadget/function/f_fs.c
> > @@ -2285,7 +2285,7 @@ static int functionfs_bind(struct ffs_data *ffs, struct usb_composite_dev *cdev)
> >   	struct usb_gadget_strings **lang;
> >   	int first_id;
> >   
> > -	if (WARN_ON(ffs->state != FFS_ACTIVE
> > +	if ((ffs->state != FFS_ACTIVE
> >   		 || test_and_set_bit(FFS_FL_BOUND, &ffs->flags)))
> >   		return -EBADFD;
> >   
> Hi Greg,
> 
> I realized there's a minor nitpick with the patch I submitted - 
> specifically a pair of extra brackets not removed.
> 
> Do you want me to proceed with sending a v2 to address this, or is this 
> something you can take care while applying this patch?

It's already in my tree, as you should have gotten an email about that.

Just send a cleanup patch for later, it's not a big deal.

thanks,

greg k-h

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ