Received: by 2002:a05:6a10:9e8c:0:0:0:0 with SMTP id y12csp2375055pxx; Sat, 31 Oct 2020 18:42:37 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwbpnASjUQSmzw4PLbAyDn0rhNINaNQgwAXSQpZKkQ5qPotucDArTvhZW617dKY9VE66KAP X-Received: by 2002:a17:906:3a8d:: with SMTP id y13mr9648351ejd.460.1604194956972; Sat, 31 Oct 2020 18:42:36 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1604194956; cv=none; d=google.com; s=arc-20160816; b=ihZyJEA9yVysGWb0Ir8yhe1MwRXa7flVhBEUnFlxBy2nDYq9JRg48aZpQP24DUvOvC /KFXpRQ/GDzfGPt94NnG85NkohnUbWFPO+sDvTwMJvAcDQ3Srq0Nseo9zDZugaP0a7MU j/7ox48+9rM3CTZHFEXvg5lfblDiB4seOZ06583PjpDe/7dF7Arbac26ZwpEp/0Ebdsz 86jwFcDfudaxjxyrsuBZSvQIPP6zQRrBbnBE1Zkr4YmfEqNlwiS9KNgn3HJIvLdBNBgG f4runSiNrIjlvziQjlobssWBLrFPVkS07ff9klcYEcIQvinXgCPEAOt7BWFVHFSvM2Kn lz1Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:user-agent:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date; bh=S/jC+GMh89YAwpR0pjBAueNMr9FtsKH4fj5juu76ljg=; b=i9V3OhHlOvJpCNJK17hon8Hp1KPcnksut8DvVA3YhBnSjFTwZhvezVkOJ+D0NlvdZ/ +H4zNlYCT66db1EvTRTGUTp+KvKelxl3a2ZMiVsr/7VmnPtxxMgQ6ckmb1yQlQ6+vSlZ djaFkEzass7flYhRTX5b8t89NL/a2caGu9UTHVs64+bZzrSXdPwuv60RsTmj187Xlhdo 2yw7mVsVSQRprtxAc0VGgjSGy2PObdCL/4sDDh/b4Pi0Ag/rMyGq4Up++W9TE5XnJwCe lUPoZ+1QQtrEPzO8snmIg63RNglswTHOYTCOiLfoTur+aTULvQlzIZxTR6oP8kBNLauO 0Qfw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id qh16si7413073ejb.677.2020.10.31.18.42.12; Sat, 31 Oct 2020 18:42:36 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726352AbgKABkm (ORCPT + 99 others); Sat, 31 Oct 2020 21:40:42 -0400 Received: from netrider.rowland.org ([192.131.102.5]:49729 "HELO netrider.rowland.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with SMTP id S1726335AbgKABkl (ORCPT ); Sat, 31 Oct 2020 21:40:41 -0400 Received: (qmail 1428690 invoked by uid 1000); 31 Oct 2020 21:40:40 -0400 Date: Sat, 31 Oct 2020 21:40:40 -0400 From: Alan Stern To: Kyungtae Kim Cc: Felipe Balbi , Greg KH , USB list , LKML , syzkaller Subject: Re: KASAN: use-after-free Read in do_set_interface Message-ID: <20201101014040.GA1428475@rowland.harvard.edu> References: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.10.1 (2018-07-13) Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Oct 28, 2020 at 04:51:09PM -0400, Kyungtae Kim wrote: > We report a bug (in linux-5.8.13) found by FuzzUSB (a modified version > of syzkaller). > > The bug happened when accessing a freed instance of struct fsg_dev > (i.e., fsg->bulk_in) in do_set_interface() (line 2245). > > ================================================================== > BUG: KASAN: use-after-free in do_set_interface.part.7+0xa6b/0xd90 > drivers/usb/gadget/function/f_mass_storage.c:2245 > Read of size 8 at addr ffff88806bc940f8 by task file-storage/2063 > > CPU: 3 PID: 2063 Comm: file-storage Not tainted 5.8.13 #4 > Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS Bochs 01/01/2011 > Call Trace: > __dump_stack lib/dump_stack.c:77 [inline] > dump_stack+0xa7/0xea lib/dump_stack.c:118 > print_address_description.constprop.8+0x3f/0x60 mm/kasan/report.c:383 > kasan_report.cold.11+0x20/0x37 mm/kasan/report.c:513 > __asan_report_load8_noabort+0x14/0x20 mm/kasan/generic_report.c:146 > do_set_interface.part.7+0xa6b/0xd90 > drivers/usb/gadget/function/f_mass_storage.c:2245 > do_set_interface drivers/usb/gadget/function/f_mass_storage.c:2202 [inline] > handle_exception drivers/usb/gadget/function/f_mass_storage.c:2426 [inline] > fsg_main_thread+0x12c7/0x59f1 drivers/usb/gadget/function/f_mass_storage.c:2466 > kthread+0x374/0x480 kernel/kthread.c:291 > ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:293 Is this reproducible? Can you test patches? Alan Stern