Received: by 2002:a25:ad19:0:0:0:0:0 with SMTP id y25csp4581843ybi; Mon, 15 Jul 2019 11:12:52 -0700 (PDT) X-Google-Smtp-Source: APXvYqwsHBYZcyApDAXgigp6r47nYCXx79fi6hvtdr0BHrdrE5QUAvC04dWXh6hvlyc9yghYFycA X-Received: by 2002:a17:90a:30aa:: with SMTP id h39mr30910978pjb.32.1563214372764; Mon, 15 Jul 2019 11:12:52 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1563214372; cv=none; d=google.com; s=arc-20160816; b=Uno691pFmp97vRxSLoSNttC2SY5q6lgDSBD7c38+6VvWZbkrAZM7u7eOk0NyeBXBjS 2UG1GYlRK61W3JwAwe5mPjCyX4Cvmv0H1VudZhjF6MTQ0my6V5DGdhztpG+EeD5++Grd uhbxF+5q3PScFz0+2hKYOrwbM6nncaRBaJ2wbqQCE7I1DHV86MLQI2Fea1K6n0TElrSY ctb5pU8J9Vx/k3VbMhmBARzO8dsbka2YA0VqJaSCEskcoeXbRlM/UA4plwFGXWcPfHtm 9uhB2W07t7XU0bTUUkGUVJTWXj44KE2eS+65AcGqBU6AC+pE1hT2peFdJ/ukmEUI5ruP 7Biw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:from:subject:cc:to:message-id:date; bh=4OhljvEoPwn8Zn+KpBgwMlb05V6jtr7H49A3BtI+fgk=; b=eFKnaL/Qf1Ul9VoRqQDBs4GNsUPBU0glpV0UjCMR5ao+v9Mm2rGVnWA9pC1TpIPswM IJjXL5aRom0/F8LmSxylXbHZR6AhHRFJsfXe1Y83sAfkJUVQbs59wg21tykUXurYC6TG 5F5LTlHVLHpXXgfIiR39mJpDSKvlYHKC6E+PeTynd6fW9qgz9/6t8thqG7YP4Mg3SCo3 BRT4AKENWRMoe7Mw+iKSQ2miGZjmlTTmFNzbS0Dg434PCogSD7cW3uiHPuMwP69V0DBX ryV6gXAPFaU5COtqfzP6PLAMB5zY2lOdnZVkT1RAyo9zqacn0sXVTPQlCzEUSBoh/QeG 7uIg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 79si16457985pga.276.2019.07.15.11.12.35; Mon, 15 Jul 2019 11:12:52 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732044AbfGOSKu (ORCPT + 99 others); Mon, 15 Jul 2019 14:10:50 -0400 Received: from shards.monkeyblade.net ([23.128.96.9]:40196 "EHLO shards.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729277AbfGOSKu (ORCPT ); Mon, 15 Jul 2019 14:10:50 -0400 Received: from localhost (unknown [IPv6:2601:601:9f80:35cd::d71]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (Client did not present a certificate) (Authenticated sender: davem-davemloft) by shards.monkeyblade.net (Postfix) with ESMTPSA id 1692914EB4AF1; Mon, 15 Jul 2019 11:10:49 -0700 (PDT) Date: Mon, 15 Jul 2019 11:10:48 -0700 (PDT) Message-Id: <20190715.111048.106149919999844475.davem@davemloft.net> To: tranmanphong@gmail.com Cc: syzbot+8750abbc3a46ef47d509@syzkaller.appspotmail.com, isdn@linux-pingi.de, gregkh@linuxfoundation.org, andreyknvl@google.com, bigeasy@linutronix.de, gustavo@embeddedor.com, pakki001@umn.edu, linux-kernel@vger.kernel.org, linux-usb@vger.kernel.org, syzkaller-bugs@googlegroups.com, netdev@vger.kernel.org, linux-kernel-mentees@lists.linuxfoundation.org, skhan@linuxfoundation.org Subject: Re: [PATCH] ISDN: hfcsusb: checking idx of ep configuration From: David Miller In-Reply-To: <20190715150814.20022-1-tranmanphong@gmail.com> References: <000000000000f2b23d05868310f9@google.com> <20190715150814.20022-1-tranmanphong@gmail.com> X-Mailer: Mew version 6.8 on Emacs 26.1 Mime-Version: 1.0 Content-Type: Text/Plain; charset=us-ascii Content-Transfer-Encoding: 7bit X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.5.12 (shards.monkeyblade.net [149.20.54.216]); Mon, 15 Jul 2019 11:10:49 -0700 (PDT) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Phong Tran Date: Mon, 15 Jul 2019 22:08:14 +0700 > The syzbot test with random endpoint address which made the idx is > overflow in the table of endpoint configuations. > > this adds the checking for fixing the error report from > syzbot > > KASAN: stack-out-of-bounds Read in hfcsusb_probe [1] > The patch tested by syzbot [2] > > Reported-by: syzbot+8750abbc3a46ef47d509@syzkaller.appspotmail.com > > [1]: > https://syzkaller.appspot.com/bug?id=30a04378dac680c5d521304a00a86156bb913522 > [2]: > https://groups.google.com/d/msg/syzkaller-bugs/_6HBdge8F3E/OJn7wVNpBAAJ > > Signed-off-by: Phong Tran Applied.