Received: by 2002:a05:7412:37c9:b0:e2:908c:2ebd with SMTP id jz9csp2604946rdb; Fri, 22 Sep 2023 03:46:03 -0700 (PDT) X-Google-Smtp-Source: AGHT+IHQhl1Dkj8cSz0/sRB7lSzwONnyMY+cNlRWUJ1yu53ZfsBcMFbzIvrGFZ8nnb+tS9faYWHl X-Received: by 2002:a05:6358:4320:b0:13a:4120:ce2e with SMTP id r32-20020a056358432000b0013a4120ce2emr7405987rwc.20.1695379563307; Fri, 22 Sep 2023 03:46:03 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1695379563; cv=pass; d=google.com; s=arc-20160816; b=kO92qV3Fc5G1n4FDCwCzYnHtJ0pyCCF4ljHJDbkZ0JVZbW3b9JrP2vil12CWWQVAJy NydFoSUtNpoyb2j5TWrjpELAqcf832LxgAsnUVHO7jsiMgBSPADZl4m4l9gfIPZQd8oH WzQ1Lhe07FqbNu1uUMK6VI8NhPJ/k+R+n++fe0VC/VcLVC0iN4SQ818eEuWWNdpJhrK0 z0pJoQqa/KPDUWvtpbHCRwfrolypBFL+6LYZpMzOJkhlyiRtIJ4ggO5C7QJb0VG2L/Z5 xqu9F69DMZuw9VnFuhxyyKk5p3B1wQSb4GqBtC0LNqnUBYZ+8V2867FBNhNrhf/fTT/r RC+g== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=WoTf5e6rsMExBp3L8DfEZ2bSdB3f+6PoijVMaG/CS1w=; fh=FDHAnzJ2r+wejyrhwgd6aRUZvHO+ZfHbt0zjYlzd4bI=; b=JHoV0k967MijBdvd7wdxzsqaHetrfmi72IZxD+e/LV/4iCmYmiuUx/6yxnOVp1NDlv OQtCbJ7CkiSvBTpeX3+3WudF/9V/BH1BY3G4IzY3cuxOL6xWwk4bHAe30xfEPFjcDOGT wSaeQhVa4D0r2l01s3XeaOA0eP1xqB8jhgLy2v59wnytLMOltHdBToNG2VPOWF19iVvq 9EjgsIDkcnc+dUHafFC9/HB7yglQd5Rcw2c+aRs1d1QheZrSdGVaRWKp1jN8pvi/qe5b SZcCL3vUHxnhc0ov5HhSMLmZE3NUIGCv0gTLCXw/RU9ic2tYFXp8SW3pqiZ+xeKY9/e/ zGEA== ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@marliere.net header.s=zmail header.b=PRtL7Hu3; arc=pass (i=1 spf=pass spfdomain=marliere.net dkim=pass dkdomain=marliere.net dmarc=pass fromdomain=marliere.net>); spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:2 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from agentk.vger.email (agentk.vger.email. [2620:137:e000::3:2]) by mx.google.com with ESMTPS id bx23-20020a056a00429700b00690d4fad431si3577931pfb.260.2023.09.22.03.46.02 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 22 Sep 2023 03:46:03 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:2 as permitted sender) client-ip=2620:137:e000::3:2; Authentication-Results: mx.google.com; dkim=pass header.i=@marliere.net header.s=zmail header.b=PRtL7Hu3; arc=pass (i=1 spf=pass spfdomain=marliere.net dkim=pass dkdomain=marliere.net dmarc=pass fromdomain=marliere.net>); spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:2 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by agentk.vger.email (Postfix) with ESMTP id 2003980FF28B; Fri, 22 Sep 2023 03:38:12 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at agentk.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233354AbjIVKh3 (ORCPT + 99 others); Fri, 22 Sep 2023 06:37:29 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:54230 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233331AbjIVKh2 (ORCPT ); Fri, 22 Sep 2023 06:37:28 -0400 Received: from sender4-op-o15.zoho.com (sender4-op-o15.zoho.com [136.143.188.15]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 6B7AA99; Fri, 22 Sep 2023 03:37:21 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1695379027; cv=none; d=zohomail.com; s=zohoarc; b=gTVEPjztewFCN35bG7+dtuXMy47AxDrJwET5aPVGaqDAEvhNjQ53eWilFtedZni2R/6AqEEcey4VN8sLkFRB/nHB75qVEi44VsTaHB/zl02tm97Cofe+GkCvwRy/lmz61ObMFTc3++WZ+ZcOWDVPQhSHJlyqtwZYenYe5aHBFPc= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1695379027; h=Content-Type:Cc:Cc:Date:Date:From:From:In-Reply-To:MIME-Version:Message-ID:References:Subject:Subject:To:To:Message-Id:Reply-To; bh=WoTf5e6rsMExBp3L8DfEZ2bSdB3f+6PoijVMaG/CS1w=; b=j27HtRGvFk4vWGRzB7olmmFvOQT5vMPdJ/GvUviyGc0nC4yLKXTpnxD0g4ESJoS7Tvpes8RkHf/LBG0cZmkTb7sv+wbhLISZy+78otFlhJgbiWFslh7ztxbW9LWy+UVP1iU6FOahSoFmLDYDWEGuS847wmJqkJyjo1T0RgvBlxY= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass header.i=marliere.net; spf=pass smtp.mailfrom=ricardo@marliere.net; dmarc=pass header.from= DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; t=1695379027; s=zmail; d=marliere.net; i=ricardo@marliere.net; h=Date:Date:From:From:To:To:Cc:Cc:Subject:Subject:Message-ID:References:MIME-Version:Content-Type:In-Reply-To:Message-Id:Reply-To; bh=WoTf5e6rsMExBp3L8DfEZ2bSdB3f+6PoijVMaG/CS1w=; b=PRtL7Hu30kgnX/93wuL9Ux8Ed4433CzwMJV0skMg3ghqNgUBMUld+zHL6x44pgiB GmR8n3FtGsQOdutwIH6x51xZQ2+dqRxeNStfvAKQrPG4E02PuOpWiCRW0R/UKQwAo99 4LJDOjIQiwGQ3p9a0JHuluik1FnKNYQCY0jXoLSs= Received: from localhost (177.104.93.54 [177.104.93.54]) by mx.zohomail.com with SMTPS id 1695379025621916.7953876971129; Fri, 22 Sep 2023 03:37:05 -0700 (PDT) Date: Fri, 22 Sep 2023 07:37:02 -0300 From: "Ricardo B. Marliere" To: Takashi Iwai Cc: Jaroslav Kysela , Takashi Iwai , Ruslan Bilovol , Sean Young , Mauro Carvalho Chehab , linux-media@vger.kernel.org, alsa-devel@alsa-project.org, linux-kernel@vger.kernel.org, linux-kernel-mentees@lists.linuxfoundation.org, syzbot+59875ffef5cb9c9b29e9@syzkaller.appspotmail.com Subject: Re: [PATCH] sound: usb: increase snd_card alloc size Message-ID: References: <20230922005152.163640-1-ricardo@marliere.net> <87h6nmegt9.wl-tiwai@suse.de> <877coiedwm.wl-tiwai@suse.de> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <877coiedwm.wl-tiwai@suse.de> X-ZohoMailClient: External X-Spam-Status: No, score=-0.8 required=5.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI, SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on agentk.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (agentk.vger.email [0.0.0.0]); Fri, 22 Sep 2023 03:38:12 -0700 (PDT) On 23/09/22 11:49AM, Takashi Iwai wrote: > On Fri, 22 Sep 2023 10:46:26 +0200, > Takashi Iwai wrote: > > > > On Fri, 22 Sep 2023 02:51:53 +0200, > > Ricardo B. Marliere wrote: > > > > > > Syzbot reports a slab-out-of-bounds read of a snd_card object. When > > > snd_usb_audio_create calls snd_card_new, it passes sizeof(*chip) as the > > > extra_size argument, which is not enough in this case. > > > > > > Relevant logs below: > > > > > > BUG: KASAN: slab-out-of-bounds in imon_probe+0x2983/0x3910 > > > Read of size 1 at addr ffff8880436a2c71 by task kworker/1:2/777 > > > (...) > > > The buggy address belongs to the object at ffff8880436a2000 > > > which belongs to the cache kmalloc-4k of size 4096 > > > The buggy address is located 1 bytes to the right of > > > allocated 3184-byte region [ffff8880436a2000, ffff8880436a2c70) > > > > > > Reported-by: syzbot+59875ffef5cb9c9b29e9@syzkaller.appspotmail.com > > > Closes: https://lore.kernel.org/all/000000000000a838aa0603cc74d6@google.co/m > > > Signed-off-by: Ricardo B. Marliere > > > --- > > > sound/usb/card.c | 2 +- > > > 1 file changed, 1 insertion(+), 1 deletion(-) > > > > > > diff --git a/sound/usb/card.c b/sound/usb/card.c > > > index 1b2edc0fd2e9..6578326d33e8 100644 > > > --- a/sound/usb/card.c > > > +++ b/sound/usb/card.c > > > @@ -619,7 +619,7 @@ static int snd_usb_audio_create(struct usb_interface *intf, > > > } > > > > > > err = snd_card_new(&intf->dev, index[idx], id[idx], THIS_MODULE, > > > - sizeof(*chip), &card); > > > + sizeof(*chip) + 2, &card); > > > > Sorry, it's no-no. We have to fix the cause of the OOB access instead > > of papering over with a random number of increase. > > > > Unfortunately, most important piece of information is trimmed in the > > changelog, so I can't judge what's going on. The only useful info > > there is that it's something to do with imon driver, but it's > > completely independent from USB-audio. How does it access to the > > external memory allocated by snd-usb-audio driver at all? > > > > Before jumping to the solution, we must understand the problem. > > Now I took a look at the syzbot URL and got more info. > > Through a quick glance, my wild guess is that two different drivers > are bound to two interfaces of the device, the first one to usb-audio > and the second one to imon. And imon driver blindly assumes that the > first interface is bound with imon, too, and that can be the cause. > A patch like below (totally untested!) might fix the problem. > > Can you reproduce the problem in your side? Or did you pick this up > randomly without testing? Thanks for the valuable info! I tested your proposed patch and it works. Will you send it as a proper patch or can the maintainers pick it from here? > > In anyway, let's put media people to Cc. > > > thanks, > > Takashi > > --- a/drivers/media/rc/imon.c > +++ b/drivers/media/rc/imon.c > @@ -2427,6 +2427,12 @@ static int imon_probe(struct usb_interface *interface, > goto fail; > } > > + if (first_if->dev.driver != interface->dev.driver) { > + dev_err(&interface->dev, "inconsistent driver matching\n"); > + ret = -EINVAL; > + goto fail; > + } > + > if (ifnum == 0) { > ictx = imon_init_intf0(interface, id); > if (!ictx) { Tested-by: Ricardo B. Marliere Linux garage 6.6.0-rc2-next-20230921-dirty #15 SMP PREEMPT_DYNAMIC Fri Sep 22 07:29:07 -03 2023 x86_64 The programs included with the Debian GNU/Linux system are free software; the exact distribution terms for each program are described in the individual files in /usr/share/doc/*/copyright. Debian GNU/Linux comes with ABSOLUTELY NO WARRANTY, to the extent permitted by applicable law. Last login: Tue Sep 19 21:04:06 UTC 2023 on ttyS0 10:31:03 root@garage ~ # ./syz-execprog repsyz 2023/09/22 10:31:08 parsed 1 programs [ 43.416521][ T8175] cc1plus (8175) used greatest stack depth: 22080 bytes left [ 43.470240][ T8179] cc1plus (8179) used greatest stack depth: 22008 bytes left [ 49.171720][ T8224] Adding 124996k swap on ./swap-file. Priority:0 extents:23 across:1427660k [ 49.178542][ T8224] syz-executor (8224) used greatest stack depth: 21096 bytes left 2023/09/22 10:31:15 executed programs: 0 [ 49.233026][ T55] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 49.234270][ T55] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 49.235218][ T55] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 49.236338][ T55] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 49.237283][ T55] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 49.238146][ T55] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 49.355885][ T8240] chnl_net:caif_netlink_parms(): no params data found [ 49.395950][ T8240] bridge0: port 1(bridge_slave_0) entered blocking state [ 49.396944][ T8240] bridge0: port 1(bridge_slave_0) entered disabled state [ 49.397714][ T8240] bridge_slave_0: entered allmulticast mode [ 49.398831][ T8240] bridge_slave_0: entered promiscuous mode [ 49.401610][ T8240] bridge0: port 2(bridge_slave_1) entered blocking state [ 49.402380][ T8240] bridge0: port 2(bridge_slave_1) entered disabled state [ 49.403189][ T8240] bridge_slave_1: entered allmulticast mode [ 49.404311][ T8240] bridge_slave_1: entered promiscuous mode [ 49.421315][ T8240] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 49.423376][ T8240] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 49.440902][ T8240] team0: Port device team_slave_0 added [ 49.442592][ T8240] team0: Port device team_slave_1 added [ 49.457205][ T8240] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 49.458088][ T8240] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 49.461793][ T8240] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 49.464566][ T8240] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 49.465329][ T8240] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 49.468023][ T8240] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 49.491775][ T8240] hsr_slave_0: entered promiscuous mode [ 49.493000][ T8240] hsr_slave_1: entered promiscuous mode [ 49.576424][ T8240] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 49.580029][ T8240] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 49.582870][ T8240] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 49.585559][ T8240] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 49.598460][ T8240] bridge0: port 2(bridge_slave_1) entered blocking state [ 49.599405][ T8240] bridge0: port 2(bridge_slave_1) entered forwarding state [ 49.600596][ T8240] bridge0: port 1(bridge_slave_0) entered blocking state [ 49.601368][ T8240] bridge0: port 1(bridge_slave_0) entered forwarding state [ 49.632834][ T8240] 8021q: adding VLAN 0 to HW filter on device bond0 [ 49.638691][ T23] bridge0: port 1(bridge_slave_0) entered disabled state [ 49.651679][ T23] bridge0: port 2(bridge_slave_1) entered disabled state [ 49.656749][ T8240] 8021q: adding VLAN 0 to HW filter on device team0 [ 49.661350][ T31] bridge0: port 1(bridge_slave_0) entered blocking state [ 49.662190][ T31] bridge0: port 1(bridge_slave_0) entered forwarding state [ 49.673212][ T765] bridge0: port 2(bridge_slave_1) entered blocking state [ 49.674679][ T765] bridge0: port 2(bridge_slave_1) entered forwarding state [ 49.698632][ T8240] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 49.702458][ T8240] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 49.778155][ T8240] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 49.802649][ T8240] veth0_vlan: entered promiscuous mode [ 49.806107][ T8240] veth1_vlan: entered promiscuous mode [ 49.818270][ T8240] veth0_macvtap: entered promiscuous mode [ 49.822124][ T8240] veth1_macvtap: entered promiscuous mode [ 49.829757][ T8240] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 49.833955][ T8240] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 49.836876][ T8240] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 49.837861][ T8240] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 49.838840][ T8240] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 49.840126][ T8240] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 49.893587][ T8569] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 49.894469][ T8569] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 49.917314][ T8569] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 49.918127][ T8569] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 49.961690][ T8587] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 49.965046][ T8587] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 50.219962][ T765] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 50.459682][ T765] usb 2-1: Using ep0 maxpacket: 16 [ 50.579830][ T765] usb 2-1: config 1 has too many interfaces: 163, using maximum allowed: 32 [ 50.581753][ T765] usb 2-1: config 1 has an invalid descriptor of length 7, skipping remainder of the config [ 50.583812][ T765] usb 2-1: config 1 has 3 interfaces, different from the descriptor's value: 163 [ 50.585682][ T765] usb 2-1: config 1 interface 1 altsetting 1 endpoint 0x1 has an invalid bInterval 0, changing to 7 [ 50.587870][ T765] usb 2-1: config 1 interface 1 altsetting 1 endpoint 0x1 has invalid wMaxPacketSize 0 [ 50.590104][ T765] usb 2-1: too many endpoints for config 1 interface 2 altsetting 0: 128, using maximum allowed: 30 [ 50.592292][ T765] usb 2-1: config 1 interface 2 altsetting 0 has 0 endpoint descriptors, different from the interface descriptor's value: 128 [ 50.594921][ T765] usb 2-1: config 1 interface 2 altsetting 1 endpoint 0x82 has an invalid bInterval 62, changing to 7 [ 50.597128][ T765] usb 2-1: config 1 interface 2 altsetting 1 endpoint 0x82 has invalid maxpacket 41992, setting to 1024 [ 50.749794][ T765] usb 2-1: New USB device found, idVendor=15c2, idProduct=0039, bcdDevice=80.f3 [ 50.751765][ T765] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 50.753415][ T765] usb 2-1: Product: syz [ 50.754255][ T765] usb 2-1: Manufacturer: syz [ 50.755247][ T765] usb 2-1: SerialNumber: syz [ 50.805761][ T765] imon:imon_find_endpoints: no valid input (IR) endpoint found [ 50.807506][ T765] imon 2-1:1.0: unable to initialize intf0, err -19 [ 50.808934][ T765] imon:imon_probe: failed to initialize context! [ 50.810288][ T765] imon 2-1:1.0: unable to register, err -19 [ 51.069921][ T765] usb 2-1: 2:1 : UAC_AS_GENERAL descriptor not found [ 51.113716][ T765] imon 2-1:1.1: inconsistent driver matching [ 51.121438][ T765] imon 2-1:1.1: unable to register, err -22 [ 51.122866][ T765] imon: probe of 2-1:1.1 failed with error -22 [ 51.132274][ T765] usb 2-1: USB disconnect, device number 2 [ 51.270491][ T4485] Bluetooth: hci0: command 0x0409 tx timeout 10:31:17 root@garage ~ #