Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp5807120ybl; Tue, 10 Dec 2019 11:48:44 -0800 (PST) X-Google-Smtp-Source: APXvYqyil7CGnG/zqMS1hIPIfxwMXuQ4+d1dTLDHzFR+86A54xo8FIwc3IlCJ3AiXx7ELRuOW9Ar X-Received: by 2002:a9d:6183:: with SMTP id g3mr20955529otk.304.1576007324249; Tue, 10 Dec 2019 11:48:44 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1576007324; cv=none; d=google.com; s=arc-20160816; b=la5iCbK7CbEpNsw1nnpXCUSa6/XBOc32+2paOs8rMwCZhWcsL5naW25JJ+YmhspYx+ F/3GfG2jGYpJbTcewU66VYXYnC7CK6nrhgB3fFVeoJK7cNU9Rg0Aj+Dfa0nQh4zDFWdm aIGPVEQ542T1lx8UpvbUQixP8Fh9WPC0xN8d0pWj0Kdr2qK0qtjrQRG6VLDoBfMntDVF zJB6sthr/eAg69TrnjOU18FgElV6KZd4KW1ZvebksjHBTx+xYUjeNOnpJawSP6KbhEc6 9eO+Ffqist+WDL90T+HOeNgJ2nbhKnoUzO4NiFaPHdIctemavf6KmLpcls5OoW3Xaigz tdQw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:message-id:in-reply-to :subject:cc:to:from:date; bh=/2AE9MqiRUHAedsS6OcuV89/e0+cgd8Wwmk6Bk6V0NU=; b=onQONJ54q0QV0d+9ss1JaWl+7re1FbkD8jRAp2CX/W1bVQWgR/JpZPFWnCBZSgTSuY 85/Kqr6r+KrJOnLoSPDa9SkdxrjRH9NsRnudF1dUX3vrCgxDsxptCwZGR828AbJgNzql +UlN9n4hyfDi59MUemIRFBpb6W1CK8FgT+a7xKb/hBvxYWP3WP1bOq0KcRHWKDTtmOx9 cSaIB/FLkLqzmBnuS2OQ72K0kgQqXJuyoNmTOaBY94PZ49fl7bnKKJMWN2rDXA7Pa12V jOiBPF4e9lDGSTVBHxxqPQIXm2wLzMc5rH8uIX/ZQptV4mAfxBuY0QcAc+TTbopaSXrN 91/w== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id j6si1272869oij.197.2019.12.10.11.48.32; Tue, 10 Dec 2019 11:48:44 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726687AbfLJTsB (ORCPT + 99 others); Tue, 10 Dec 2019 14:48:01 -0500 Received: from iolanthe.rowland.org ([192.131.102.54]:51528 "HELO iolanthe.rowland.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with SMTP id S1726045AbfLJTsB (ORCPT ); Tue, 10 Dec 2019 14:48:01 -0500 Received: (qmail 6212 invoked by uid 2102); 10 Dec 2019 14:47:59 -0500 Received: from localhost (sendmail-bs@127.0.0.1) by localhost with SMTP; 10 Dec 2019 14:47:59 -0500 Date: Tue, 10 Dec 2019 14:47:59 -0500 (EST) From: Alan Stern X-X-Sender: stern@iolanthe.rowland.org To: syzbot cc: andreyknvl@google.com, , , , , , , , , Subject: Re: KASAN: use-after-free Read in usbvision_v4l2_open In-Reply-To: <0000000000006ab7cc05994cbae2@google.com> Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, 9 Dec 2019, syzbot wrote: > Hello, > > syzbot found the following crash on: > > HEAD commit: 1f22d15c usb: gadget: add raw-gadget interface > git tree: https://github.com/google/kasan.git usb-fuzzer > console output: https://syzkaller.appspot.com/x/log.txt?x=1296f42ae00000 > kernel config: https://syzkaller.appspot.com/x/.config?x=8ccee2968018adcb > dashboard link: https://syzkaller.appspot.com/bug?extid=c7b0ec009a216143df30 > compiler: gcc (GCC) 9.0.0 20181231 (experimental) > > Unfortunately, I don't have any reproducer for this crash yet. > > IMPORTANT: if you fix the bug, please add the following tag to the commit: > Reported-by: syzbot+c7b0ec009a216143df30@syzkaller.appspotmail.com > > ================================================================== > BUG: KASAN: use-after-free in __mutex_lock_common > kernel/locking/mutex.c:1043 [inline] > BUG: KASAN: use-after-free in __mutex_lock+0x124d/0x1360 > kernel/locking/mutex.c:1106 > Read of size 8 at addr ffff8881cad4d8b8 by task v4l_id/4526 > > CPU: 0 PID: 4526 Comm: v4l_id Not tainted 5.4.0-syzkaller #0 > Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS > Google 01/01/2011 > Call Trace: > __dump_stack lib/dump_stack.c:77 [inline] > dump_stack+0xef/0x16e lib/dump_stack.c:118 > print_address_description.constprop.0+0x36/0x50 mm/kasan/report.c:374 > __kasan_report.cold+0x1a/0x33 mm/kasan/report.c:506 > kasan_report+0xe/0x20 mm/kasan/common.c:638 > __mutex_lock_common kernel/locking/mutex.c:1043 [inline] > __mutex_lock+0x124d/0x1360 kernel/locking/mutex.c:1106 > usbvision_v4l2_open+0x77/0x340 > drivers/media/usb/usbvision/usbvision-video.c:314 > v4l2_open+0x20f/0x3d0 drivers/media/v4l2-core/v4l2-dev.c:423 > chrdev_open+0x219/0x5c0 fs/char_dev.c:414 > do_dentry_open+0x494/0x1120 fs/open.c:797 > do_last fs/namei.c:3412 [inline] > path_openat+0x142b/0x4030 fs/namei.c:3529 > do_filp_open+0x1a1/0x280 fs/namei.c:3559 > do_sys_open+0x3c0/0x580 fs/open.c:1097 > do_syscall_64+0xb7/0x5b0 arch/x86/entry/common.c:294 > entry_SYSCALL_64_after_hwframe+0x49/0xbe This looks like a race in v4l2_open(): The function drops the videodev_lock mutex before calling the video driver's open routine, and the device can be unregistered during the short time between. This patch tries to make the race much more likely to happen, for testing and verification. Andrey, will syzbot run the same test with this patch, even though it says it doesn't have a reproducer? Alan Stern #syz test: https://github.com/google/kasan.git 1f22d15c Index: usb-devel/drivers/media/usb/usbvision/usbvision-video.c =================================================================== --- usb-devel.orig/drivers/media/usb/usbvision/usbvision-video.c +++ usb-devel/drivers/media/usb/usbvision/usbvision-video.c @@ -1585,6 +1585,7 @@ static void usbvision_disconnect(struct wake_up_interruptible(&usbvision->wait_frame); wake_up_interruptible(&usbvision->wait_stream); } else { + msleep(100); usbvision_release(usbvision); } Index: usb-devel/drivers/media/v4l2-core/v4l2-dev.c =================================================================== --- usb-devel.orig/drivers/media/v4l2-core/v4l2-dev.c +++ usb-devel/drivers/media/v4l2-core/v4l2-dev.c @@ -419,9 +419,10 @@ static int v4l2_open(struct inode *inode video_get(vdev); mutex_unlock(&videodev_lock); if (vdev->fops->open) { - if (video_is_registered(vdev)) + if (video_is_registered(vdev)) { + msleep(200); ret = vdev->fops->open(filp); - else + } else ret = -ENODEV; }