Received: by 2002:a5d:9c59:0:0:0:0:0 with SMTP id 25csp95302iof; Sun, 5 Jun 2022 22:12:36 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyTBkW2UC27Z1YFxxtGvFY98B8ninykZnxnVegSu1kyBP2cdcGt3aEMTme14kFkBk7sBDoA X-Received: by 2002:a05:6a00:22d1:b0:51c:15ac:396e with SMTP id f17-20020a056a0022d100b0051c15ac396emr4462922pfj.58.1654492356615; Sun, 05 Jun 2022 22:12:36 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1654492356; cv=none; d=google.com; s=arc-20160816; b=DD1IsmBc+mUvH/JqQlmZqJJSdcKXeHIHH2zK89wuq4GOsb/IqhyM7cjfquAHkrqiRt 79pJGZQnCphvXjVMgDSUlDBPcodGV/tixNjJQzqEjpT2wF1HF6YWpqO652xchdw5cMBk be5qITGSVaExPEP/vj75fZCLpO3qBkU5x4QCuDY5WAW8wvVm7A/2jDHqc7ouAjzTVjN0 3BO+IT0sEKaWaXGR6vjRGMJTO8y80rjUrpm/i77//dM94fQEBi7YK3p1vJ4cg2K1h+Ek THNCh4dPWHGDmdKYf5EYoroUjbc+N1gvhwjMt/xLtxu33e9pcFdnJjcK+cvsP4B+myvD 1t9g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=77zwxKES/IWYWlVbSM0xwDn4N9lMEFjdePVJCJXZqLo=; b=yA6TcbQhL9yBsx5J7WtlWO9Sb+mimVJF90RqAmKoZEQ3pYMVJSAkuW6SYK+zdVBXc9 VRLvD+61A5ZGQutDZDHo4Pt97xc9M+bphLQ443Q2bo2iZVnfp3Y2K9M/3pPD+/bu/oYv SjZrI/Jz280eJXfeeGyrE/44CvzAgTKfGmT74VoAPtgzU62SS4VsdvVK9rD6x5nDJmyA 5XPBwjE8ALA9y9rqVECMtRL0CbjViq2JXi8t9jiRyYP6wHglQ63qJsJgm4ddyZoJeubd e+PW3RGxhH707gCeiFNeyO3nHqoR+9B2R+Svs+xbQPY4+1hFgH+NqwzKBWwrV9O0bQZZ dbQw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=N1xbAa9Q; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [23.128.96.19]) by mx.google.com with ESMTPS id 144-20020a630096000000b003fdcf4695c8si2054377pga.400.2022.06.05.22.12.36 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sun, 05 Jun 2022 22:12:36 -0700 (PDT) Received-SPF: softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) client-ip=23.128.96.19; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=N1xbAa9Q; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 07D2014D78C; Sun, 5 Jun 2022 21:18:28 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S245758AbiFCPxX (ORCPT + 99 others); Fri, 3 Jun 2022 11:53:23 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:55550 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S245746AbiFCPxW (ORCPT ); Fri, 3 Jun 2022 11:53:22 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 32C03BE04; Fri, 3 Jun 2022 08:53:21 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id C3322618EA; Fri, 3 Jun 2022 15:53:20 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 9A52AC385A9; Fri, 3 Jun 2022 15:53:19 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1654271600; bh=BSsxCUjvHnMHsWdDP5bKcDrYnrEorYKAbCgrI7QnQlI=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=N1xbAa9Qa7xu/WGbuV8KBNO/vbVHdNpsVDcbRLTkU6gKPqljWMncNQZnDHFZrf3TK hE61syou/ot0f8G+XQiP7D6MP1bNyKXVVF25z8PgZoFbjCyd/lnMNeIKLPL+3Hh8oU 4jgQw74y1MuxReWAIfnfXfsm4q9SRXeISlvEjjkE= Date: Fri, 3 Jun 2022 17:52:38 +0200 From: Greg KH To: Alan Stern Cc: Andy Shevchenko , syzbot , hdanton@sina.com, lenb@kernel.org, linux-acpi@vger.kernel.org, linux-kernel@vger.kernel.org, rafael.j.wysocki@intel.com, rafael@kernel.org, rjw@rjwysocki.net, syzkaller-bugs@googlegroups.com, linux-usb@vger.kernel.org Subject: Re: [syzbot] general protection fault in __device_attach Message-ID: References: <000000000000bb7f1c05da29b601@google.com> <00000000000010b7d305e08837c8@google.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: X-Spam-Status: No, score=-3.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,RDNS_NONE,SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Jun 03, 2022 at 11:42:19AM -0400, Alan Stern wrote: > On Fri, Jun 03, 2022 at 02:04:04PM +0300, Andy Shevchenko wrote: > > On Fri, Jun 03, 2022 at 03:02:07AM -0700, syzbot wrote: > > > syzbot has bisected this issue to: > > > > > > commit a9c4cf299f5f79d5016c8a9646fa1fc49381a8c1 > > > Author: Andy Shevchenko > > > Date: Fri Jun 18 13:41:27 2021 +0000 > > > > > > ACPI: sysfs: Use __ATTR_RO() and __ATTR_RW() macros > > > > Hmm... It's not obvious at all how this change can alter the behaviour so > > drastically. device_add() is called from USB core with intf->dev.name == NULL > > by some reason. A-ha, seems like fault injector, which looks like > > > > dev_set_name(&intf->dev, "%d-%s:%d.%d", dev->bus->busnum, > > dev->devpath, configuration, ifnum); > > > > missed the return code check. > > > > But I'm not familiar with that code at all, adding Linux USB ML and Alan. > > I can't see any connection between this bug and acpi/sysfs.c. Is it a > bad bisection? > > It looks like you're right about dev_set_name() failing. In fact, the > kernel appears to be littered with calls to that routine which do not > check the return code (the entire subtree below drivers/usb/ contains > only _one_ call that does check the return code!). The function doesn't > have any __must_check annotation, and its kerneldoc doesn't mention the > return code or the possibility of a failure. > > Apparently the assumption is that if dev_set_name() fails then > device_add() later on will also fail, and the problem will be detected > then. > > So now what should happen when device_add() for an interface fails in > usb_set_configuration()? But how can that really fail on a real system? Is this just due to error-injection stuff? If so, I'm really loath to rework the world for something that can never happen in real life. Or is this a real syzbot-found-with-reproducer issue? thanks, greg k-h