Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp5388199ybl; Tue, 14 Jan 2020 08:09:11 -0800 (PST) X-Google-Smtp-Source: APXvYqyzElSIJ7D6s/U3KQUC00nzSZinJkaiMa3s+hPSH62rkRPyh/dfsLIUgNzXDMDoB45vf0xF X-Received: by 2002:a9d:7519:: with SMTP id r25mr17241374otk.284.1579018151635; Tue, 14 Jan 2020 08:09:11 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1579018151; cv=none; d=google.com; s=arc-20160816; b=T8EDxZhc5sPn92TgG1BElmPRD2TvylY2F5Kw7GwfTH09jTXGcnccMswIQrlV5/lxj7 33EekeG6I6l+ipq7BJn6y061/oMLGCteCA0fxq7VZapqY3ATM28Ity4fX7OCuFf/WnZL +hBZ45P84fSzi5YCIJcqWxUqMPiulE2CjbSrKVLC7KI2cB7agQnSS1MDKPNACBrT1vAk f6S2N0gZ+ZMmO7bZyykGQMH2HvuZTsxh9DtSiZPWWlmYLUPPQjh6VrnXKi9ZaPP3GHE3 Fg9HnPmFmf6HYJenp20iLf3Kg14oJhGuQP6KGctRWabu8sG/15phUznZcj7PIn7jnBG8 BDfQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:message-id:in-reply-to :subject:cc:to:from:date; bh=720VGHKEy7NDZVWdLGjd2SpqaBv92FLknPusEcV4Wag=; b=uFuTM8xRkHMP85Ez+6gWRUOUG7P0RNB3DCdkXUh0bo3h+c38p+4TFvVzjqWPZzdWur bdMtIAiVhoki6i39N+WPpm1ef7swTA0BUukrnItGfY3sPqLAAmkg2lhRx/gIVst1/tqz S9l5r39DkKrF/h+GUEjgWg9Y5tU7fDVOWCplS1utD3QywDPDHJTK4nO+3UirCSbbEQYP BQoN54thu/eDRvAHuKFSus4RDl/jNyoOr6dQXZJu9RiMNWaL6AfBB3MuQoWjbBdcki9R pWInfh5h1UkiQbZ8E3gKS1j5dVhIq7MUq1uQXUMDH1ejOlcjvQ6NocOjp+r4SLoS2lR6 WtZQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id o7si9051692otk.185.2020.01.14.08.08.59; Tue, 14 Jan 2020 08:09:11 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728778AbgANQGY (ORCPT + 99 others); Tue, 14 Jan 2020 11:06:24 -0500 Received: from iolanthe.rowland.org ([192.131.102.54]:50728 "HELO iolanthe.rowland.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with SMTP id S1728943AbgANQGY (ORCPT ); Tue, 14 Jan 2020 11:06:24 -0500 Received: (qmail 4192 invoked by uid 2102); 14 Jan 2020 11:06:22 -0500 Received: from localhost (sendmail-bs@127.0.0.1) by localhost with SMTP; 14 Jan 2020 11:06:22 -0500 Date: Tue, 14 Jan 2020 11:06:22 -0500 (EST) From: Alan Stern X-X-Sender: stern@iolanthe.rowland.org To: Dan Carpenter cc: syzbot , , , , , , , Subject: Re: KASAN: use-after-free Write in hiddev_disconnect In-Reply-To: <20200114152414.GC3719@kadam> Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, 14 Jan 2020, Dan Carpenter wrote: > I'm trying to take a stab at diagnosing these bugs. (But I'm seldom > smart enough to actually fix anything). These hiddev_disconnect() bugs > are a race condition: > > devel/drivers/hid/usbhid/hiddev.c > 924 void hiddev_disconnect(struct hid_device *hid) > 925 { > 926 struct hiddev *hiddev = hid->hiddev; > 927 struct usbhid_device *usbhid = hid->driver_data; > 928 > 929 usb_deregister_dev(usbhid->intf, &hiddev_class); > 930 > 931 mutex_lock(&hiddev->existancelock); > 932 hiddev->exist = 0; > ^^^^^^^^^^^^^^^^^^ > We set "exist = 0;" > > 933 > 934 if (hiddev->open) { > 935 mutex_unlock(&hiddev->existancelock); > ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ > Then we drop the lock. > > 936 hid_hw_close(hiddev->hid); > 937 wake_up_interruptible(&hiddev->wait); > ^^^^^^ > The other thread frees hiddev and it crashes here. > > 938 } else { > 939 mutex_unlock(&hiddev->existancelock); > 940 kfree(hiddev); > 941 } > 942 } > > The other thread is doing: > > drivers/hid/usbhid/hiddev.c > 216 static int hiddev_release(struct inode * inode, struct file * file) > 217 { > 218 struct hiddev_list *list = file->private_data; > 219 unsigned long flags; > 220 > 221 spin_lock_irqsave(&list->hiddev->list_lock, flags); > 222 list_del(&list->node); > 223 spin_unlock_irqrestore(&list->hiddev->list_lock, flags); > 224 > 225 mutex_lock(&list->hiddev->existancelock); > ^^^^^^^^^^^^^^^^^^^^^^^^^^^ > Takes the lock. > > 226 if (!--list->hiddev->open) { > ^^^^^^^^^^^^^^^^^^^^ > Decrements open. > > 227 if (list->hiddev->exist) { > ^^^^^^^^^^^^^^^^^^^ > This is false. > > 228 hid_hw_close(list->hiddev->hid); > 229 hid_hw_power(list->hiddev->hid, PM_HINT_NORMAL); > 230 } else { > 231 mutex_unlock(&list->hiddev->existancelock); > 232 kfree(list->hiddev); > ^^^^^^^^^^^^ > Freed here. > > 233 vfree(list); > 234 return 0; > 235 } > 236 } > 237 > 238 mutex_unlock(&list->hiddev->existancelock); > 239 vfree(list); > 240 > 241 return 0; > 242 } > > I'm not sure what the fix should be though. Good sleuthing! It certainly looks as though hiddev_disconnect() should not try to reference hiddev after dropping the existance_lock -- at least, not in the case that the device file is still open. So I suggest reordering the statements in that routine: First call hid_hw_close() and wake_up_interruptible(), then drop the mutex. Too bad syzbot doesn't have a reproducer to test this, though. Alan Stern