Received: by 2002:a25:1985:0:0:0:0:0 with SMTP id 127csp1207087ybz; Fri, 17 Apr 2020 18:34:24 -0700 (PDT) X-Google-Smtp-Source: APiQypJsmfX5PV245NoSlaUErOsUkgmlJ8kj8I67oUw8q8aPIzUEY3mJyx40qkGXPPQfjdZeyUzp X-Received: by 2002:a17:906:130e:: with SMTP id w14mr5928534ejb.155.1587173664844; Fri, 17 Apr 2020 18:34:24 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1587173664; cv=none; d=google.com; s=arc-20160816; b=UE8mYzPTbzn6OIk75IQ7lbKQcz4o4Xb3ckb+DJTglajEKjTAsuzqt1UdveyHh/2MN4 6WbxJPj4mDXNU3KKuOW+W5hPoavqjxBQC/lTZGPAL62GAjb/ppO09DkevNChBSab7L+T QyB6WzLqvL3p6r8ArLJakIQwLvQEWvAJIK9VzJpiX54Uu/N8jAEyfNlG3lLdYd3Ut6B1 IByIfwymVyL/hx28/5DAC0dseZ3WMUby85xmAmOsUqnUqPeAkx2djqtZqvIG5avVvMui NmmqLFMhyzFLMFTAVRUO8VGHSXUVKShDpwyMzK0VM4NFFcwxMSI50VuEIXFly4QPaTur T7Ug== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:message-id:in-reply-to :subject:cc:to:from:date; bh=MdSDRPtYQe9tr5WZWVegdNjzWqmiFbObYBRVXbVLHEs=; b=y7VNJNBCs1N9rLDvlUIMS1agRHvquKkFvVJAOnVzafVWBBcw+xIQMDh2ErE5ayXW2l S2dDX3z9cXrgNuXN2SdU5IceCXGISUMxLCh8Qs8D5lo0dVWftSqtLEUSUQIqxj2dOm8L zdT9m2k4SSY6uIhSGdeYMqdyiCe8ChUFWGqJ0k/fFOKBYlo+3Y75fjvxjOY/Bi3Gzqal RZNXjiYCEO115iGy3Xigz0V3lSLtuOlm8e6uvn2+szWnvhKbkzHS0LNUPfoeC8P57r1v o5fLE3xmLxjfMvIVozE0IkerZxIQbGEMoN+EusF+SNiOiMgaMkhq1a02FKRbvqucSRqQ MGUA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id o4si17377601edz.151.2020.04.17.18.33.48; Fri, 17 Apr 2020 18:34:24 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1725970AbgDRBaO (ORCPT + 99 others); Fri, 17 Apr 2020 21:30:14 -0400 Received: from netrider.rowland.org ([192.131.102.5]:36477 "HELO netrider.rowland.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with SMTP id S1725939AbgDRBaN (ORCPT ); Fri, 17 Apr 2020 21:30:13 -0400 Received: (qmail 23212 invoked by uid 500); 17 Apr 2020 21:30:12 -0400 Received: from localhost (sendmail-bs@127.0.0.1) by localhost with SMTP; 17 Apr 2020 21:30:12 -0400 Date: Fri, 17 Apr 2020 21:30:12 -0400 (EDT) From: Alan Stern X-X-Sender: stern@netrider.rowland.org To: syzbot cc: andreyknvl@google.com, , , , , Subject: Re: KASAN: use-after-free Read in usbhid_close (3) In-Reply-To: <0000000000005f3ae305a3823448@google.com> Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, 17 Apr 2020, syzbot wrote: > Hello, > > syzbot has tested the proposed patch but the reproducer still triggered crash: > WARNING in usbhid_stop > > usb 2-1: USB disconnect, device number 5 > ------------[ cut here ]------------ > usbhid 2-1:0.0: Stop while open (alloc = 1) Okay, good. usbhid_close() should have been called before this happened. Let's try tracing the pathway; maybe this will show where it goes off the rails. Alan Stern #syz test: https://github.com/google/kasan.git 0fa84af8 Index: usb-devel/drivers/hid/usbhid/hid-core.c =================================================================== --- usb-devel.orig/drivers/hid/usbhid/hid-core.c +++ usb-devel/drivers/hid/usbhid/hid-core.c @@ -747,6 +747,7 @@ static void usbhid_close(struct hid_devi return; hid_cancel_delayed_stuff(usbhid); + --hid->alan_open; usb_kill_urb(usbhid->urbin); usbhid->intf->needs_remote_wakeup = 0; } @@ -1177,6 +1178,7 @@ static int usbhid_start(struct hid_devic usbhid_set_leds(hid); device_set_wakeup_enable(&dev->dev, 1); } + ++hid->alan_open; return 0; fail: @@ -1197,6 +1199,10 @@ static void usbhid_stop(struct hid_devic if (WARN_ON(!usbhid)) return; + if (hid->alan_open > 0) + dev_WARN(&usbhid->intf->dev, "Stop while open = %d: %d %d %d\n", + hid->alan_open, + hid->alan1, hid->alan2, hid->alan3); if (hid->quirks & HID_QUIRK_ALWAYS_POLL) { clear_bit(HID_IN_POLLING, &usbhid->iofl); usbhid->intf->needs_remote_wakeup = 0; Index: usb-devel/drivers/hid/hid-input.c =================================================================== --- usb-devel.orig/drivers/hid/hid-input.c +++ usb-devel/drivers/hid/hid-input.c @@ -1960,6 +1960,7 @@ void hidinput_disconnect(struct hid_devi { struct hid_input *hidinput, *next; + ++hid->alan1; hidinput_cleanup_battery(hid); list_for_each_entry_safe(hidinput, next, &hid->inputs, list) { Index: usb-devel/drivers/input/evdev.c =================================================================== --- usb-devel.orig/drivers/input/evdev.c +++ usb-devel/drivers/input/evdev.c @@ -23,6 +23,7 @@ #include #include #include +#include #include "input-compat.h" struct evdev { @@ -1329,6 +1330,11 @@ static void evdev_mark_dead(struct evdev static void evdev_cleanup(struct evdev *evdev) { struct input_handle *handle = &evdev->handle; + struct hid_device *hid; + + hid = (struct hid_device *) input_get_drvdata(evdev->handle.dev); + if (hid) + ++hid->alan3; evdev_mark_dead(evdev); evdev_hangup(evdev); Index: usb-devel/drivers/input/input.c =================================================================== --- usb-devel.orig/drivers/input/input.c +++ usb-devel/drivers/input/input.c @@ -23,6 +23,7 @@ #include #include #include +#include #include "input-compat.h" #include "input-poller.h" @@ -2081,7 +2082,11 @@ static void input_cleanse_bitmasks(struc static void __input_unregister_device(struct input_dev *dev) { struct input_handle *handle, *next; + struct hid_device *hid; + hid = (struct hid_device *) input_get_drvdata(dev); + if (hid) + ++hid->alan2; input_disconnect_device(dev); mutex_lock(&input_mutex); Index: usb-devel/include/linux/hid.h =================================================================== --- usb-devel.orig/include/linux/hid.h +++ usb-devel/include/linux/hid.h @@ -618,6 +618,9 @@ struct hid_device { /* device repo struct list_head debug_list; spinlock_t debug_list_lock; wait_queue_head_t debug_wait; + + int alan_open; + int alan1, alan2, alan3; }; #define to_hid_device(pdev) \