Re: usb/media/uvc: slab-out-of-bounds in uvc_probe
From: Andrey Konovalov
Date: Thu Nov 09 2017 - 07:28:13 EST
On Thu, Nov 9, 2017 at 2:35 AM, <ansonjacob.aj@xxxxxxxxx> wrote:
> Hi,
>
> Could you try this untested patch.
>
> Anson
Hi!
This patch doesn't compile.
drivers/media/usb/uvc/uvc_driver.c: In function âuvc_parse_standard_controlâ:
drivers/media/usb/uvc/uvcvideo.h:29:43: error: invalid type argument
of â->â (have âintâ)
#define UVC_ENTITY_TYPE(entity) ((entity)->type & 0x7fff)
^~
drivers/media/usb/uvc/uvc_driver.c:1074:7: note: in expansion of macro
âUVC_ENTITY_TYPEâ
if (UVC_ENTITY_TYPE(type) == UVC_ITT_CAMERA) {
I see what you're trying to do though and I'd say a better patch would
be to reset the UVC_TERM_INPUT flag or fail when this flag is set. But
it's up to maintainers.
Thanks!
>
>
> On Monday, November 6, 2017 at 8:27:23 AM UTC-5, Andrey Konovalov wrote:
>>
>> Hi!
>>
>> I've got the following report while fuzzing the kernel with syzkaller.
>>
>> On commit 39dae59d66acd86d1de24294bd2f343fd5e7a625 (4.14-rc8).
>>
>> It seems that type == UVC_ITT_CAMERA | 0x8000, that's why the (type ==
>> UVC_ITT_CAMERA) check fails and (UVC_ENTITY_TYPE(term) ==
>> UVC_ITT_CAMERA) passes, so len ends up being 8 instead of 15.
>>
>> ==================================================================
>> BUG: KASAN: slab-out-of-bounds in uvc_probe+0x6469/0x6dd0
>> Read of size 2 at addr ffff88006975864e by task kworker/1:1/33
>>
>> CPU: 1 PID: 33 Comm: kworker/1:1 Not tainted
>> 4.14.0-rc8-44453-g1fdc1a82c34f #56
>> Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS Bochs
>> 01/01/2011
>> Workqueue: usb_hub_wq hub_event
>> Call Trace:
>> __dump_stack lib/dump_stack.c:17
>> dump_stack+0xe1/0x157 lib/dump_stack.c:53
>> print_address_description+0x71/0x234 mm/kasan/report.c:252
>> kasan_report_error mm/kasan/report.c:351
>> kasan_report+0x173/0x270 mm/kasan/report.c:409
>> __asan_report_load2_noabort+0x19/0x20 mm/kasan/report.c:428
>> __le16_to_cpup ./include/uapi/linux/byteorder/little_endian.h:66
>> get_unaligned_le16 ./include/linux/unaligned/access_ok.h:10
>> uvc_parse_standard_control drivers/media/usb/uvc/uvc_driver.c:1104
>> uvc_parse_control drivers/media/usb/uvc/uvc_driver.c:1281
>> uvc_probe+0x6469/0x6dd0 drivers/media/usb/uvc/uvc_driver.c:2064
>> usb_probe_interface+0x324/0x940 drivers/usb/core/driver.c:361
>> really_probe drivers/base/dd.c:413
>> driver_probe_device+0x522/0x740 drivers/base/dd.c:557
>> __device_attach_driver+0x25d/0x2d0 drivers/base/dd.c:653
>> bus_for_each_drv+0xff/0x160 drivers/base/bus.c:463
>> __device_attach+0x1a8/0x2a0 drivers/base/dd.c:710
>> device_initial_probe+0x1f/0x30 drivers/base/dd.c:757
>> bus_probe_device+0x1fc/0x2a0 drivers/base/bus.c:523
>> device_add+0xc27/0x15a0 drivers/base/core.c:1835
>> usb_set_configuration+0xd4f/0x17a0 drivers/usb/core/message.c:1932
>> generic_probe+0xbb/0x120 drivers/usb/core/generic.c:174
>> usb_probe_device+0xab/0x100 drivers/usb/core/driver.c:266
>> really_probe drivers/base/dd.c:413
>> driver_probe_device+0x522/0x740 drivers/base/dd.c:557
>> __device_attach_driver+0x25d/0x2d0 drivers/base/dd.c:653
>> bus_for_each_drv+0xff/0x160 drivers/base/bus.c:463
>> __device_attach+0x1a8/0x2a0 drivers/base/dd.c:710
>> device_initial_probe+0x1f/0x30 drivers/base/dd.c:757
>> bus_probe_device+0x1fc/0x2a0 drivers/base/bus.c:523
>> device_add+0xc27/0x15a0 drivers/base/core.c:1835
>> usb_new_device+0x7fa/0x1090 drivers/usb/core/hub.c:2538
>> hub_port_connect drivers/usb/core/hub.c:4987
>> hub_port_connect_change drivers/usb/core/hub.c:5093
>> port_event drivers/usb/core/hub.c:5199
>> hub_event_impl+0x17b8/0x3440 drivers/usb/core/hub.c:5311
>> hub_event+0x38/0x50 drivers/usb/core/hub.c:5209
>> process_one_work+0x925/0x15d0 kernel/workqueue.c:2113
>> worker_thread+0xef/0x10d0 kernel/workqueue.c:2247
>> kthread+0x346/0x410 kernel/kthread.c:231
>> ret_from_fork+0x2a/0x40 arch/x86/entry/entry_64.S:432
>>
>> Allocated by task 33:
>> save_stack_trace+0x1b/0x20 arch/x86/kernel/stacktrace.c:59
>> save_stack+0x43/0xd0 mm/kasan/kasan.c:447
>> set_track mm/kasan/kasan.c:459
>> kasan_kmalloc+0xc4/0xe0 mm/kasan/kasan.c:551
>> __kmalloc+0x1bc/0x300 mm/slub.c:3783
>> kmalloc ./include/linux/slab.h:499
>> usb_get_configuration+0x299/0x4e60 drivers/usb/core/config.c:856
>> usb_enumerate_device drivers/usb/core/hub.c:2371
>> usb_new_device+0xab1/0x1090 drivers/usb/core/hub.c:2507
>> hub_port_connect drivers/usb/core/hub.c:4987
>> hub_port_connect_change drivers/usb/core/hub.c:5093
>> port_event drivers/usb/core/hub.c:5199
>> hub_event_impl+0x17b8/0x3440 drivers/usb/core/hub.c:5311
>> hub_event+0x38/0x50 drivers/usb/core/hub.c:5209
>> process_one_work+0x925/0x15d0 kernel/workqueue.c:2113
>> worker_thread+0xef/0x10d0 kernel/workqueue.c:2247
>> kthread+0x346/0x410 kernel/kthread.c:231
>> ret_from_fork+0x2a/0x40 arch/x86/entry/entry_64.S:432
>>
>> Freed by task 1:
>> save_stack_trace+0x1b/0x20 arch/x86/kernel/stacktrace.c:59
>> save_stack+0x43/0xd0 mm/kasan/kasan.c:447
>> set_track mm/kasan/kasan.c:459
>> kasan_slab_free+0x72/0xc0 mm/kasan/kasan.c:524
>> slab_free_hook mm/slub.c:1391
>> slab_free_freelist_hook mm/slub.c:1413
>> slab_free mm/slub.c:2989
>> kfree+0xf2/0x2e0 mm/slub.c:3920
>> kobject_uevent_env+0x249/0xd40 lib/kobject_uevent.c:533
>> kobject_uevent+0x1f/0x30 lib/kobject_uevent.c:550
>> tty_register_device_attr+0x505/0x650 drivers/tty/tty_io.c:2976
>> tty_register_device drivers/tty/tty_io.c:2889
>> tty_register_driver+0x3ed/0x770 drivers/tty/tty_io.c:3160
>> vty_init+0x337/0x374 drivers/tty/vt/vt.c:3100
>> tty_init+0x192/0x197 drivers/tty/tty_io.c:3318
>> chr_dev_init+0x14b/0x15d drivers/char/mem.c:921
>> do_one_initcall+0x6d/0x177 init/main.c:826
>> do_initcall_level init/main.c:892
>> do_initcalls init/main.c:900
>> do_basic_setup init/main.c:918
>> kernel_init_freeable+0x3b5/0x49e init/main.c:1066
>> kernel_init+0x16/0x1b7 init/main.c:993
>> ret_from_fork+0x2a/0x40 arch/x86/entry/entry_64.S:432
>>
>> The buggy address belongs to the object at ffff880069758630
>> which belongs to the cache kmalloc-32 of size 32
>> The buggy address is located 30 bytes inside of
>> 32-byte region [ffff880069758630, ffff880069758650)
>> The buggy address belongs to the page:
>> page:ffffea0001a5d600 count:1 mapcount:0 mapping: (null)
>> index:0x0
>> flags: 0x100000000000100(slab)
>> raw: 0100000000000100 0000000000000000 0000000000000000 0000000180550055
>> raw: dead000000000100 dead000000000200 ffff88006c403980 0000000000000000
>> page dumped because: kasan: bad access detected
>>
>> Memory state around the buggy address:
>> ffff880069758500: fc fc fb fb fb fb fc fc fb fb fb fb fc fc fb fb
>> ffff880069758580: fb fb fc fc fb fb fb fb fc fc fb fb fb fb fc fc
>> >ffff880069758600: fb fb fb fb fc fc 00 00 00 06 fc fc fb fb fb fb
>> ^
>> ffff880069758680: fc fc fb fb fb fb fc fc fb fb fb fb fc fc fb fb
>> ffff880069758700: fb fb fc fc fb fb fb fb fc fc fb fb fb fb fc fc
>> ==================================================================
>
> --
> You received this message because you are subscribed to the Google Groups
> "syzkaller" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to syzkaller+unsubscribe@xxxxxxxxxxxxxxxxx
> For more options, visit https://groups.google.com/d/optout.