Received: by 2002:a25:8b12:0:0:0:0:0 with SMTP id i18csp1019149ybl; Wed, 21 Aug 2019 08:56:46 -0700 (PDT) X-Google-Smtp-Source: APXvYqzvvWzEktIGnjG/diQAO4Bwelq3bAMyMGsCH88kfd81v71ABYZaqJmhiHw4SE1nqwND1sC7 X-Received: by 2002:a63:fe15:: with SMTP id p21mr20732128pgh.149.1566403006512; Wed, 21 Aug 2019 08:56:46 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1566403006; cv=none; d=google.com; s=arc-20160816; b=wlPXLhuUcb9vrxVD4szZjfp6QYQymFvmLFuv5V7aKH8DgW9woXN58j9KN4B7k1gmp6 4KMleykQWB84558miIH1Ko2kxjkjUiAQjkGMshsNWlAPjocDAuUi9fFJonUfRoigsmDr 4OyrCPSo6AyxuXMjrsixgvMe9pXMWJDCtuwO4fK6x4R63IT1YLLQSJ6izVI3tjjHrdd/ +peDey1EVrwjTf+9ucZYBVdTb2HopJNlPEPb+6XbMQQR2+BfyEg+dX0e3QT9NAeYRcTO JeX92GMU8Jey/WRnMugp+hgY722xayHKj5xPD0E7fIMyHu3hi7luPOWaGAFVJI92+DMa h/Mg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:message-id:in-reply-to :subject:cc:to:from:date; bh=b6JyCSKt95tg7/5Px3+55sPvZfLr9gR2Pf67PwJo18g=; b=ILHWEyu+S93d8RUOnRoxSmt70+hmzUxkKg5hK20Ah6Fm4mUlLdD69Uk7b9zpsP/6Jb BZHuIV6Oq/d/gLpliD18w8GQnWrPRjgWskheUcnrWcyoXVurXVcZGray1JeHsl0ENUVc VatjbhkXCnacH3AbMydKokdMybzq9v/01td0CSOVtSoGy5dzdFhVTAtFUc4Rs8pDxBrj K3JKfO6HDGbinvPeU26MqnyBJy1elNYUZeAx6LbZtG27JFTlNtNeIJsaosoe93mBDFLY DmcoN242NZu9WCV/CHPX2g05g0HH8utGt2fXxdVHftE6PiJovs+9jQjQkCKA39J2pc01 Uy9Q== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id c27si16209765pfp.269.2019.08.21.08.56.31; Wed, 21 Aug 2019 08:56:46 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728132AbfHUPxw (ORCPT + 99 others); Wed, 21 Aug 2019 11:53:52 -0400 Received: from iolanthe.rowland.org ([192.131.102.54]:53670 "HELO iolanthe.rowland.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with SMTP id S1727873AbfHUPxw (ORCPT ); Wed, 21 Aug 2019 11:53:52 -0400 Received: (qmail 5312 invoked by uid 2102); 21 Aug 2019 11:53:51 -0400 Received: from localhost (sendmail-bs@127.0.0.1) by localhost with SMTP; 21 Aug 2019 11:53:51 -0400 Date: Wed, 21 Aug 2019 11:53:51 -0400 (EDT) From: Alan Stern X-X-Sender: stern@iolanthe.rowland.org To: syzbot cc: andreyknvl@google.com, , , , , , Subject: Re: KASAN: slab-out-of-bounds Read in hidraw_ioctl In-Reply-To: <000000000000940ec30590a1b35e@google.com> Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, 21 Aug 2019, syzbot wrote: > Hello, > > syzbot has tested the proposed patch but the reproducer still triggered > crash: > KASAN: slab-out-of-bounds Read in hidraw_ioctl > > ================================================================== > BUG: KASAN: slab-out-of-bounds in strlen+0x79/0x90 lib/string.c:525 > Read of size 1 at addr ffff8881d619df38 by task syz-executor.5/2984 > > CPU: 0 PID: 2984 Comm: syz-executor.5 Not tainted 5.3.0-rc2+ #1 > Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS > Google 01/01/2011 > Call Trace: > __dump_stack lib/dump_stack.c:77 [inline] > dump_stack+0xca/0x13e lib/dump_stack.c:113 > print_address_description+0x6a/0x32c mm/kasan/report.c:351 > __kasan_report.cold+0x1a/0x33 mm/kasan/report.c:482 > kasan_report+0xe/0x12 mm/kasan/common.c:612 > strlen+0x79/0x90 lib/string.c:525 > strlen include/linux/string.h:281 [inline] > hidraw_ioctl+0x245/0xae0 drivers/hid/hidraw.c:446 > vfs_ioctl fs/ioctl.c:46 [inline] > file_ioctl fs/ioctl.c:509 [inline] > do_vfs_ioctl+0xd2d/0x1330 fs/ioctl.c:696 > ksys_ioctl+0x9b/0xc0 fs/ioctl.c:713 > __do_sys_ioctl fs/ioctl.c:720 [inline] > __se_sys_ioctl fs/ioctl.c:718 [inline] > __x64_sys_ioctl+0x6f/0xb0 fs/ioctl.c:718 > do_syscall_64+0xb7/0x580 arch/x86/entry/common.c:296 > entry_SYSCALL_64_after_hwframe+0x49/0xbe > RIP: 0033:0x459829 > Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 > 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff > ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 > RSP: 002b:00007f19881acc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 > RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459829 > RDX: 0000000000000000 RSI: 0000000080404805 RDI: 0000000000000004 > RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 > R10: 0000000000000000 R11: 0000000000000246 R12: 00007f19881ad6d4 > R13: 00000000004c21de R14: 00000000004d5620 R15: 00000000ffffffff Looks like a test is missing in hidraw_ioctl. Alan Stern #syz test: https://github.com/google/kasan.git e96407b4 Index: usb-devel/drivers/hid/hidraw.c =================================================================== --- usb-devel.orig/drivers/hid/hidraw.c +++ usb-devel/drivers/hid/hidraw.c @@ -370,7 +370,7 @@ static long hidraw_ioctl(struct file *fi mutex_lock(&minors_lock); dev = hidraw_table[minor]; - if (!dev) { + if (!dev || !dev->exist) { ret = -ENODEV; goto out; }