On Wed, Aug 7, 2019 at 4:34 PM Andrey Konovalov <andreyk...@google.com> wrote: > > On Wed, Aug 7, 2019 at 4:24 PM Andrey Konovalov <andreyk...@google.com> wrote: > > > > On Wed, Aug 7, 2019 at 4:01 PM Alan Stern <st...@rowland.harvard.edu> wrote: > > > > > > On Wed, 7 Aug 2019, Andrey Konovalov wrote: > > > > > > > On Tue, Aug 6, 2019 at 9:13 PM Alan Stern <st...@rowland.harvard.edu> > > > > wrote: > > > > > > > > > > On Thu, 1 Aug 2019, syzbot wrote: > > > > > > > > > > > Hello, > > > > > > > > > > > > syzbot found the following crash on: > > > > > > > > > > > > HEAD commit: 7f7867ff usb-fuzzer: main usb gadget fuzzer driver > > > > > > git tree: https://github.com/google/kasan.git usb-fuzzer > > > > > > console output: > > > > > > https://syzkaller.appspot.com/x/log.txt?x=136b6aec600000 > > > > > > kernel config: > > > > > > https://syzkaller.appspot.com/x/.config?x=792eb47789f57810 > > > > > > dashboard link: > > > > > > https://syzkaller.appspot.com/bug?extid=7bbcbe9c9ff0cd49592a > > > > > > compiler: gcc (GCC) 9.0.0 20181231 (experimental) > > > > > > > > > > > > Unfortunately, I don't have any reproducer for this crash yet. > > > > > > > > > > > > IMPORTANT: if you fix the bug, please add the following tag to the > > > > > > commit: > > > > > > Reported-by: syzbot+7bbcbe9c9ff0cd495...@syzkaller.appspotmail.com > > > > > > > > > > > > ====================================================== > > > > > > WARNING: possible circular locking dependency detected > > > > > > 5.3.0-rc2+ #23 Not tainted > > > > > > ------------------------------------------------------ > > > > > > > > > > Andrey: > > > > > > > > > > This should be completely reproducible, since it's a simple ABBA > > > > > locking violation. Maybe just introducing a time delay (to avoid > > > > > races > > > > > and give the open() call time to run) between the gadget creation and > > > > > gadget removal would be enough to do it. > > > > > > > > I've tried some simple approaches to reproducing this, but failed. > > > > Should this require two rio500 devices to trigger? > > > > > > No, one device should be enough. Just plug it in and then try to open > > > the character device file. > > > > OK, I've reproduced it, so I can test a patch manually. The reason > > syzbot couldn't do that, is because it doesn't open character devices. > > Right now the USB fuzzing instance only opens /dev/input*, > > /dev/hidraw* and /dev/usb/hiddev* (only the devices that are created > > by USB HID devices as I've been working on adding USB HID targeted > > fuzzing support lately). > > > > I guess we should open /dev/chr/* as well. The problem is that there > > 300+ devices there even without connecting USB devices and opening > > them blindly probably won't work. Is there a way to know which > > character devices are created by USB devices? Maybe they are exposed > > over /sys/bus/usb or via some other way? > > Ah, OK, I see that it's also exposed as /dev/rio500 for this > particular driver. This doesn't really help, as these names will > differ for different drivers, and this will require custom syzkaller > descriptions for each driver. I'm planning to add them for some > widely-used (i.e. enabled on Android) drivers at some point, but it's > too much work to do it for all the drivers enabled on e.g. Ubuntu.
BTW, the deadlock report is actually followed by another one, which looks like a different bug: usercopy: Kernel memory exposure attempt detected from wrapped address (offset 0, size 184466! ------------[ cut here ]------------ kernel BUG at mm/usercopy.c:98! invalid opcode: 0000 [#1] SMP KASAN CPU: 1 PID: 2287 Comm: cat Not tainted 5.3.0-rc2+ #126 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 RIP: 0010:usercopy_abort+0xb9/0xbb mm/usercopy.c:86 Code: e8 b1 f5 d6 ff 49 89 d9 4d 89 e8 4c 89 e1 41 56 48 89 ee 48 c7 c7 20 f4 cd 85 ff 74 24 1 RSP: 0018:ffff88806655fc60 EFLAGS: 00010282 RAX: 000000000000006d RBX: ffffffff85cdf140 RCX: 0000000000000000 RDX: 0000000000000000 RSI: ffffffff8128a0fd RDI: ffffed100ccabf7e RBP: ffffffff85cdf300 R08: 000000000000006d R09: ffffed100d965d60 R10: ffffed100d965d5f R11: ffff88806cb2eaff R12: ffffffff85cdf4a0 R13: ffffffff85cdf140 R14: ffff887feae14e00 R15: ffffffff85cdf140 FS: 00007f4ab703f700(0000) GS:ffff88806cb00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00000000008cd068 CR3: 0000000065ffa000 CR4: 00000000000006e0 Call Trace: check_bogus_address mm/usercopy.c:151 __check_object_size mm/usercopy.c:260 __check_object_size.cold+0xb2/0xba mm/usercopy.c:250 check_object_size ./include/linux/thread_info.h:119 check_copy_size ./include/linux/thread_info.h:150 copy_to_user ./include/linux/uaccess.h:151 read_rio+0x223/0x480 drivers/usb/misc/rio500.c:423 __vfs_read+0x76/0x100 fs/read_write.c:425 vfs_read+0x1ea/0x430 fs/read_write.c:461 ksys_read+0x127/0x250 fs/read_write.c:587 do_syscall_64+0xb7/0x580 arch/x86/entry/common.c:296 entry_SYSCALL_64_after_hwframe+0x49/0xbe arch/x86/entry/entry_64.S:175 RIP: 0033:0x7f4ab6b6d310 Code: 73 01 c3 48 8b 0d 28 4b 2b 00 31 d2 48 29 c2 64 89 11 48 83 c8 ff eb ea 90 90 83 3d e5 4 RSP: 002b:00007fff2ba3e448 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 RAX: ffffffffffffffda RBX: 0000000000008000 RCX: 00007f4ab6b6d310 RDX: 0000000000008000 RSI: 00000000008c5000 RDI: 0000000000000003 RBP: 0000000000008000 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00000000008c5000 R13: 0000000000000003 R14: 0000000000000000 R15: 0000000000008000 Modules linked in: ---[ end trace 01dee08b337d41c2 ]--- RIP: 0010:usercopy_abort+0xb9/0xbb mm/usercopy.c:86 Code: e8 b1 f5 d6 ff 49 89 d9 4d 89 e8 4c 89 e1 41 56 48 89 ee 48 c7 c7 20 f4 cd 85 ff 74 24 1 RSP: 0018:ffff88806655fc60 EFLAGS: 00010282 RAX: 000000000000006d RBX: ffffffff85cdf140 RCX: 0000000000000000 RDX: 0000000000000000 RSI: ffffffff8128a0fd RDI: ffffed100ccabf7e RBP: ffffffff85cdf300 R08: 000000000000006d R09: ffffed100d965d60 R10: ffffed100d965d5f R11: ffff88806cb2eaff R12: ffffffff85cdf4a0 R13: ffffffff85cdf140 R14: ffff887feae14e00 R15: ffffffff85cdf140 FS: 00007f4ab703f700(0000) GS:ffff88806cb00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00000000008cd068 CR3: 0000000065ffa000 CR4: 00000000000006e0 usb 1-1: USB disconnect, device number 3 > > > > > > > > > Alan Stern > > > > > > > > Is there any way you can test this? > > > > > > > > Not yet. > > > > > > > > > > > > > > Alan Stern > > >