Commit graph

7321 commits

Author SHA1 Message Date
Hans de Goede
1d7129cc2e HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect
commit dac501397b9d81e4782232c39f94f4307b137452 upstream.

hidpp_connect_event() has *four* time-of-check vs time-of-use (TOCTOU)
races when it races with itself.

hidpp_connect_event() primarily runs from a workqueue but it also runs
on probe() and if a "device-connected" packet is received by the hw
when the thread running hidpp_connect_event() from probe() is waiting on
the hw, then a second thread running hidpp_connect_event() will be
started from the workqueue.

This opens the following races (note the below code is simplified):

1. Retrieving + printing the protocol (harmless race):

	if (!hidpp->protocol_major) {
		hidpp_root_get_protocol_version()
		hidpp->protocol_major = response.rap.params[0];
	}

We can actually see this race hit in the dmesg in the abrt output
attached to rhbz#2227968:

[ 3064.624215] logitech-hidpp-device 0003:046D:4071.0049: HID++ 4.5 device connected.
[ 3064.658184] logitech-hidpp-device 0003:046D:4071.0049: HID++ 4.5 device connected.

Testing with extra logging added has shown that after this the 2 threads
take turn grabbing the hw access mutex (send_mutex) so they ping-pong
through all the other TOCTOU cases managing to hit all of them:

2. Updating the name to the HIDPP name (harmless race):

	if (hidpp->name == hdev->name) {
		...
		hidpp->name = new_name;
	}

3. Initializing the power_supply class for the battery (problematic!):

hidpp_initialize_battery()
{
        if (hidpp->battery.ps)
                return 0;

	probe_battery(); /* Blocks, threads take turns executing this */

	hidpp->battery.desc.properties =
		devm_kmemdup(dev, hidpp_battery_props, cnt, GFP_KERNEL);

	hidpp->battery.ps =
		devm_power_supply_register(&hidpp->hid_dev->dev,
					   &hidpp->battery.desc, cfg);
}

4. Creating delayed input_device (potentially problematic):

	if (hidpp->delayed_input)
		return;

	hidpp->delayed_input = hidpp_allocate_input(hdev);

The really big problem here is 3. Hitting the race leads to the following
sequence:

	hidpp->battery.desc.properties =
		devm_kmemdup(dev, hidpp_battery_props, cnt, GFP_KERNEL);

	hidpp->battery.ps =
		devm_power_supply_register(&hidpp->hid_dev->dev,
					   &hidpp->battery.desc, cfg);

	...

	hidpp->battery.desc.properties =
		devm_kmemdup(dev, hidpp_battery_props, cnt, GFP_KERNEL);

	hidpp->battery.ps =
		devm_power_supply_register(&hidpp->hid_dev->dev,
					   &hidpp->battery.desc, cfg);

So now we have registered 2 power supplies for the same battery,
which looks a bit weird from userspace's pov but this is not even
the really big problem.

Notice how:

1. This is all devm-maganaged
2. The hidpp->battery.desc struct is shared between the 2 power supplies
3. hidpp->battery.desc.properties points to the result from the second
   devm_kmemdup()

This causes a use after free scenario on USB disconnect of the receiver:
1. The last registered power supply class device gets unregistered
2. The memory from the last devm_kmemdup() call gets freed,
   hidpp->battery.desc.properties now points to freed memory
3. The first registered power supply class device gets unregistered,
   this involves sending a remove uevent to userspace which invokes
   power_supply_uevent() to fill the uevent data
4. power_supply_uevent() uses hidpp->battery.desc.properties which
   now points to freed memory leading to backtraces like this one:

Sep 22 20:01:35 eric kernel: BUG: unable to handle page fault for address: ffffb2140e017f08
...
Sep 22 20:01:35 eric kernel: Workqueue: usb_hub_wq hub_event
Sep 22 20:01:35 eric kernel: RIP: 0010:power_supply_uevent+0xee/0x1d0
...
Sep 22 20:01:35 eric kernel:  ? asm_exc_page_fault+0x26/0x30
Sep 22 20:01:35 eric kernel:  ? power_supply_uevent+0xee/0x1d0
Sep 22 20:01:35 eric kernel:  ? power_supply_uevent+0x10d/0x1d0
Sep 22 20:01:35 eric kernel:  dev_uevent+0x10f/0x2d0
Sep 22 20:01:35 eric kernel:  kobject_uevent_env+0x291/0x680
Sep 22 20:01:35 eric kernel:  power_supply_unregister+0x8e/0xa0
Sep 22 20:01:35 eric kernel:  release_nodes+0x3d/0xb0
Sep 22 20:01:35 eric kernel:  devres_release_group+0xfc/0x130
Sep 22 20:01:35 eric kernel:  hid_device_remove+0x56/0xa0
Sep 22 20:01:35 eric kernel:  device_release_driver_internal+0x19f/0x200
Sep 22 20:01:35 eric kernel:  bus_remove_device+0xc6/0x130
Sep 22 20:01:35 eric kernel:  device_del+0x15c/0x3f0
Sep 22 20:01:35 eric kernel:  ? __queue_work+0x1df/0x440
Sep 22 20:01:35 eric kernel:  hid_destroy_device+0x4b/0x60
Sep 22 20:01:35 eric kernel:  logi_dj_remove+0x9a/0x100 [hid_logitech_dj 5c91534a0ead2b65e04dd799a0437e3b99b21bc4]
Sep 22 20:01:35 eric kernel:  hid_device_remove+0x44/0xa0
Sep 22 20:01:35 eric kernel:  device_release_driver_internal+0x19f/0x200
Sep 22 20:01:35 eric kernel:  bus_remove_device+0xc6/0x130
Sep 22 20:01:35 eric kernel:  device_del+0x15c/0x3f0
Sep 22 20:01:35 eric kernel:  ? __queue_work+0x1df/0x440
Sep 22 20:01:35 eric kernel:  hid_destroy_device+0x4b/0x60
Sep 22 20:01:35 eric kernel:  usbhid_disconnect+0x47/0x60 [usbhid 727dcc1c0b94e6b4418727a468398ac3bca492f3]
Sep 22 20:01:35 eric kernel:  usb_unbind_interface+0x90/0x270
Sep 22 20:01:35 eric kernel:  device_release_driver_internal+0x19f/0x200
Sep 22 20:01:35 eric kernel:  bus_remove_device+0xc6/0x130
Sep 22 20:01:35 eric kernel:  device_del+0x15c/0x3f0
Sep 22 20:01:35 eric kernel:  ? kobject_put+0xa0/0x1d0
Sep 22 20:01:35 eric kernel:  usb_disable_device+0xcd/0x1e0
Sep 22 20:01:35 eric kernel:  usb_disconnect+0xde/0x2c0
Sep 22 20:01:35 eric kernel:  usb_disconnect+0xc3/0x2c0
Sep 22 20:01:35 eric kernel:  hub_event+0xe80/0x1c10

There have been quite a few bug reports (see Link tags) about this crash.

Fix all the TOCTOU issues, including the really bad power-supply related
system crash on USB disconnect, by making probe() use the workqueue for
running hidpp_connect_event() too, so that it can never run more then once.

Link: https://bugzilla.redhat.com/show_bug.cgi?id=2227221
Link: https://bugzilla.redhat.com/show_bug.cgi?id=2227968
Link: https://bugzilla.redhat.com/show_bug.cgi?id=2227968
Link: https://bugzilla.redhat.com/show_bug.cgi?id=2242189
Link: https://bugzilla.kernel.org/show_bug.cgi?id=217412#c58
Cc: stable@vger.kernel.org
Signed-off-by: Hans de Goede <hdegoede@redhat.com>
Link: https://lore.kernel.org/r/20231005182638.3776-1-hdegoede@redhat.com
Signed-off-by: Benjamin Tissoires <bentiss@kernel.org>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2024-11-08 11:25:43 +01:00
Jing Zhang
cd8ffff4c8 perf/arm-cmn: Fix the unhandled overflow status of counter 4 to 7
[ Upstream commit 7f949f6f54ff593123ab95b6247bfa4542a65580 ]

The register por_dt_pmovsr Bits[7:0] indicates overflow from counters 7
to 0. But in arm_cmn_handle_irq(), only handled the overflow status of
Bits[3:0] which results in unhandled overflow status of counters 4 to 7.

So let the overflow status of DTC counters 4 to 7 to be handled.

Fixes: 0ba64770a2f2 ("perf: Add Arm CMN-600 PMU driver")
Signed-off-by: Jing Zhang <renyu.zj@linux.alibaba.com>
Reviewed-by: Robin Murphy <robin.murphy@arm.com>
Link: https://lore.kernel.org/r/1695612152-123633-1-git-send-email-renyu.zj@linux.alibaba.com
Signed-off-by: Will Deacon <will@kernel.org>
Signed-off-by: Sasha Levin <sashal@kernel.org>
2024-11-08 11:24:52 +01:00
Artem Chernyshev
f791bd61fd RDMA/cxgb4: Check skb value for failure to allocate
[ Upstream commit 8fb8a82086f5bda6893ea6557c5a458e4549c6d7 ]

get_skb() can fail to allocate skb, so check it.

Found by Linux Verification Center (linuxtesting.org) with SVACE.

Fixes: 5be78ee924ae ("RDMA/cxgb4: Fix LE hash collision bug for active open connection")
Signed-off-by: Artem Chernyshev <artem.chernyshev@red-soft.ru>
Link: https://lore.kernel.org/r/20230905124048.284165-1-artem.chernyshev@red-soft.ru
Signed-off-by: Leon Romanovsky <leon@kernel.org>
Signed-off-by: Sasha Levin <sashal@kernel.org>
2024-11-08 11:24:52 +01:00
Bart Van Assche
0cd3af7f25 RDMA/srp: Do not call scsi_done() from srp_abort()
[ Upstream commit e193b7955dfad68035b983a0011f4ef3590c85eb ]

After scmd_eh_abort_handler() has called the SCSI LLD eh_abort_handler
callback, it performs one of the following actions:
* Call scsi_queue_insert().
* Call scsi_finish_command().
* Call scsi_eh_scmd_add().
Hence, SCSI abort handlers must not call scsi_done(). Otherwise all
the above actions would trigger a use-after-free. Hence remove the
scsi_done() call from srp_abort(). Keep the srp_free_req() call
before returning SUCCESS because we may not see the command again if
SUCCESS is returned.

Cc: Bob Pearson <rpearsonhpe@gmail.com>
Cc: Shinichiro Kawasaki <shinichiro.kawasaki@wdc.com>
Fixes: d8536670916a ("IB/srp: Avoid having aborted requests hang")
Signed-off-by: Bart Van Assche <bvanassche@acm.org>
Link: https://lore.kernel.org/r/20230823205727.505681-1-bvanassche@acm.org
Signed-off-by: Leon Romanovsky <leon@kernel.org>
Signed-off-by: Sasha Levin <sashal@kernel.org>
2024-11-08 11:24:52 +01:00
Bart Van Assche
3fa7e77f60 RDMA/srp: Make struct scsi_cmnd and struct srp_request adjacent
[ Upstream commit ad215aaea4f9d637f441566cdbbc610e9849e1fa ]

Define .init_cmd_priv and .exit_cmd_priv callback functions in struct
scsi_host_template. Set .cmd_size such that the SCSI core allocates
per-command private data. Use scsi_cmd_priv() to access that private
data. Remove the req_ring pointer from struct srp_rdma_ch since it is no
longer necessary. Convert srp_alloc_req_data() and srp_free_req_data()
into functions that initialize one instance of the SRP-private command
data. This is a micro-optimization since this patch removes several
pointer dereferences from the hot path.

Note: due to commit e73a5e8e8003 ("scsi: core: Only return started
requests from scsi_host_find_tag()"), it is no longer necessary to protect
the completion path against duplicate responses.

Link: https://lore.kernel.org/r/20210524041211.9480-6-bvanassche@acm.org
Signed-off-by: Bart Van Assche <bvanassche@acm.org>
Signed-off-by: Jason Gunthorpe <jgg@nvidia.com>
Stable-dep-of: e193b7955dfa ("RDMA/srp: Do not call scsi_done() from srp_abort()")
Signed-off-by: Sasha Levin <sashal@kernel.org>
2024-11-08 11:24:51 +01:00
Ksawlii
fad7fd859f linux-stable.sh: Added for upstream 2024-11-08 11:11:32 +01:00
Gabriel2392
5ea09e31c9 gpu: exynos: Allow 2093MHz memory frequency 2024-10-17 12:53:13 -03:00
Gabriel2392
f35c27aba8 s5e8825: Tuning 2024-10-17 12:50:20 -03:00
Felix Fietkau
555d8a35de wifi: mt76: replace skb_put with skb_put_zero
[ Upstream commit 7f819a2f4fbc510e088b49c79addcf1734503578 ]

Avoid potentially reusing uninitialized data

Signed-off-by: Felix Fietkau <nbd@nbd.name>
Signed-off-by: Sasha Levin <sashal@kernel.org>
2024-10-04 20:09:30 -03:00
Gabriel2392
bd0b6e9f2b Uprev R3.2 2024-10-04 20:09:30 -03:00
Gabriel2392
b9274ff5bf bootimg: Update patch level 2024-10-04 20:09:30 -03:00
Gabriel2392
bcec93dfdf Revert "a53x: Get, fix, build and load zfs as module"
This reverts commit d647d8588c15ccd1a8fa96d20fed65b6c5c61f9d.
2024-10-04 20:09:30 -03:00
Gabriel
fedefb31d3 zram: Switch back to lz4 2024-10-04 20:09:30 -03:00
Gabriel
ea8931ae2b config: Enable CONFIG_USB_MON 2024-10-04 20:09:30 -03:00
Gabriel
eb2211b3d8 config: Enable CONFIG_PID_NS 2024-10-04 20:09:30 -03:00
Gabriel2392
cf1963e343 build: Fix device name 2024-10-04 20:09:30 -03:00
Gabriel
80e4b2d56f a53x: Enable CONFIG_USER_NS 2024-10-04 20:09:30 -03:00
Gabriel2392
913c07543f bootimg: Update patch level 2024-10-04 20:09:30 -03:00
Gabriel2392
707896531b a53x: Get, fix, build and load zfs as module 2024-10-04 20:09:30 -03:00
Gabriel2392
1926f22651 Uprev R3.1 2024-10-04 20:09:29 -03:00
Gabriel2392
9e6b7e114f gpu/exynos: Make 'gpu_mm_min_clock' readonly too 2024-10-04 20:09:29 -03:00
Gabriel2392
23eb121cf8 zram: Use lz4fast as default 2024-10-04 20:09:29 -03:00
Gabriel2392
0e1e7afdf9 crypto/zram: Add lz4fast algorithm
> Up to 3 times faster than default lz4
> Uses LZ4_compress_fast level 32
2024-10-04 20:09:29 -03:00
Gabriel2392
f2e3b984f5 gpu/exynos: Create sysfs 'gpu_unlock' to control such feature 2024-10-04 20:09:29 -03:00
Daniel Micay
27a7d44ba5 drivers: usb: add toggle for disabling newly added USB devices
Based on the public grsecurity patches.

Signed-off-by: anupritaisno1 <www.anuprita804@gmail.com>
2024-10-04 20:09:29 -03:00
Gabriel2392
9b8f55709b gpu: exynos: imprison userspace requests for changing min/max frequencies
> RIP OneUI desires
2024-10-04 20:09:13 -03:00
Gabriel2392
f0e1d81647 Add build stuff 2024-06-15 16:48:05 -03:00
Gabriel
7370a77c88 a53x: enable squashfs, btrfs and xfs 2024-06-15 16:43:02 -03:00
Gabriel2392
41e0f4c931 net: reg: Unlock all channels 2024-06-15 16:29:21 -03:00
Gabriel2392
f90e6ebad0 Backport mt76 driver from linux-6.1.y 2024-06-15 16:29:21 -03:00
Gabriel2392
d04378f078 Backport mac80211 patches from linux-6.1.y 2024-06-15 16:29:20 -03:00
Gabriel2392
c58c7488b1 Add rtl8821au drivers
From https://github.com/morrownr/8821au-20210708 with fixes from https://github.com/aircrack-ng/rtl8812au and some other fixes for clang / 5.10 android kernel.
2024-06-15 16:29:05 -03:00
Gabriel2392
5e81baf4b1 Kperfmon: add xyunbound version 2024-06-15 16:28:49 -03:00
Gabriel2392
9721b7ac13 treewide: Fix build errors with clang18 2024-06-15 16:28:49 -03:00
Gabriel2392
ec54855c0d config: Enable CONFIG_CC_OPTIMIZE_FOR_PERFORMANCE_O3 2024-06-15 16:28:49 -03:00
Gabriel2392
34dfdeb497 block: set zram default compressor to lz4 2024-06-15 16:28:49 -03:00
Gabriel2392
f90e79c77b drivers: add stub kperfmon 2024-06-15 16:28:49 -03:00
Gabriel2392
fdef7b54c3 exynos_gpu: Don't allow userspace to control freqs 2024-06-15 16:28:49 -03:00
Gabriel2392
2de2633674 gpu: exynos: don't read dvfs table from dtb
-> Hardcode in kernel module
-> Unlock all frequencies up to 1.2GHz

Signed-off-by: Gabriel2392 <gabriel824m@gmail.com>
2024-06-15 16:28:49 -03:00
Gabriel2392
a839ab2b13 drivers: itmon: Fix error 2024-06-15 16:28:49 -03:00
Gabriel2392
1d74975a8d Makefile: export some more variables 2024-06-15 16:28:48 -03:00
Gabriel2392
0e12bd998e drivers: fmp: remove failing command 2024-06-15 16:28:48 -03:00
TALU
2a549c0e64 Revert "arm64: sigcontext: use standard __uint128_t type for vregs in struct fpsimd_context."
This reverts commit 447dabc1fedbafb1f9894e0c3054bf546a1af913
as it causes this issue with the Android build system:

out/soong/.intermediates/vendor/lineage/build/soong/generated_kernel_includes/ge
n/usr/include/asm/sigcontext.h:53:2: error: unknown type name '__uint128_t'
        __uint128_t vregs[32];
        ^
1 error generated.
2024-06-15 16:28:48 -03:00
roynatech2544
0e2c60f465 drivers/nfc_logger: Fix implicit int 2024-06-15 16:28:48 -03:00
roynatech2544
0db070a424 Fix clang 16 errors treewide
- misleading indentation
- strict prototypes [1]

[1]
int foo(void) {...}
instead of
int foo() {...}

drivers: usb: Fix misleading indentation
2024-06-15 16:28:48 -03:00
roynatech2544
19a708f67f Makefile: export TARGET_SOC variable 2024-06-15 16:28:48 -03:00
roynatech2544
c8fe547dae soc/samsung: Fix strict prototypes 2024-06-15 16:28:48 -03:00
roynatech2544
e7f00dab6d sound: tfa9872: Slience enum conversion error 2024-06-15 16:28:48 -03:00
roynatech2544
79d88bc5f0 ARM64: boot: dts: Use always-y
always is deprecated
2024-06-15 16:28:20 -03:00
Gabriel2392
8ed10b410f dts: Remove useless dtbs 2024-06-15 16:27:09 -03:00