* Analyze syzbot report technisat_usb2_rc_query KASAN
@ 2019-07-02 0:49 Phong Tran
2019-07-02 4:45 ` [Linux-kernel-mentees] " Greg KH
0 siblings, 1 reply; 3+ messages in thread
From: Phong Tran @ 2019-07-02 0:49 UTC (permalink / raw)
To: mchehab, hans.verkuil, keescook, skhan
Cc: tranmanphong, linux-media, linux-kernel-mentees
Hello,
I did a checking for this report of syzbot [1]
From the call stack of dump log:
There shows that a problem within technisat_usb2_get_ir()
BUG: KASAN: slab-out-of-bounds in technisat_usb2_get_ir
drivers/media/usb/dvb-usb/technisat-usb2.c:664 [inline]
BUG: KASAN: slab-out-of-bounds in technisat_usb2_rc_query+0x5fa/0x660
drivers/media/usb/dvb-usb/technisat-usb2.c:679
Read of size 1 at addr ffff8880a8791ea8 by task kworker/0:1/12
Take a look into while loop in technisat_usb2_get_ir().
I recognized that a problem. The loop will not break out with the
condition doesn't reach. Then "b++" will go wrong and buffer will be
overflow.
while (1) {
[...]
b++;
if (*b == 0xff) {
ev.pulse = 0;
ev.duration = 888888*2;
ir_raw_event_store(d->rc_dev, &ev);
break;
}
}
I would propose changing the loop condition by checking the address of
the buffer. If acceptable, I will send this patch to the mailing-list.
eg:
- while (1) {
+ while (b != (buf + 63)) {
[...]
}
Tested with syzbot, result is good [2].
[1] https://syzkaller.appspot.com/bug?extid=eaaaf38a95427be88f4b
[2] https://groups.google.com/d/msg/syzkaller-bugs/CySBCKuUOOs/0hKq1CdjCwAJ
Phong
^ permalink raw reply [flat|nested] 3+ messages in thread
* Re: [Linux-kernel-mentees] Analyze syzbot report technisat_usb2_rc_query KASAN
2019-07-02 0:49 Analyze syzbot report technisat_usb2_rc_query KASAN Phong Tran
@ 2019-07-02 4:45 ` Greg KH
2019-07-02 14:06 ` Phong Tran
0 siblings, 1 reply; 3+ messages in thread
From: Greg KH @ 2019-07-02 4:45 UTC (permalink / raw)
To: Phong Tran
Cc: mchehab, hans.verkuil, keescook, skhan, linux-kernel-mentees,
linux-media
On Tue, Jul 02, 2019 at 07:49:26AM +0700, Phong Tran wrote:
> Hello,
>
> I did a checking for this report of syzbot [1]
> From the call stack of dump log:
>
> There shows that a problem within technisat_usb2_get_ir()
>
> BUG: KASAN: slab-out-of-bounds in technisat_usb2_get_ir
> drivers/media/usb/dvb-usb/technisat-usb2.c:664 [inline]
> BUG: KASAN: slab-out-of-bounds in technisat_usb2_rc_query+0x5fa/0x660
> drivers/media/usb/dvb-usb/technisat-usb2.c:679
> Read of size 1 at addr ffff8880a8791ea8 by task kworker/0:1/12
>
> Take a look into while loop in technisat_usb2_get_ir().
> I recognized that a problem. The loop will not break out with the condition
> doesn't reach. Then "b++" will go wrong and buffer will be overflow.
>
> while (1) {
> [...]
> b++;
> if (*b == 0xff) {
> ev.pulse = 0;
> ev.duration = 888888*2;
> ir_raw_event_store(d->rc_dev, &ev);
> break;
> }
> }
>
> I would propose changing the loop condition by checking the address of the
> buffer. If acceptable, I will send this patch to the mailing-list.
> eg:
>
> - while (1) {
> + while (b != (buf + 63)) {
> [...]
> }
>
> Tested with syzbot, result is good [2].
>
> [1] https://syzkaller.appspot.com/bug?extid=eaaaf38a95427be88f4b
> [2] https://groups.google.com/d/msg/syzkaller-bugs/CySBCKuUOOs/0hKq1CdjCwAJ
Great, can you submit a patch for this?
thanks,
greg k-h
^ permalink raw reply [flat|nested] 3+ messages in thread
* Re: [Linux-kernel-mentees] Analyze syzbot report technisat_usb2_rc_query KASAN
2019-07-02 4:45 ` [Linux-kernel-mentees] " Greg KH
@ 2019-07-02 14:06 ` Phong Tran
0 siblings, 0 replies; 3+ messages in thread
From: Phong Tran @ 2019-07-02 14:06 UTC (permalink / raw)
To: Greg KH
Cc: tranmanphong, mchehab, hans.verkuil, keescook, skhan,
linux-kernel-mentees, linux-media
On 7/2/19 11:45 AM, Greg KH wrote:
> On Tue, Jul 02, 2019 at 07:49:26AM +0700, Phong Tran wrote:
>> Hello,
>>
>> I did a checking for this report of syzbot [1]
>> From the call stack of dump log:
>>
>> There shows that a problem within technisat_usb2_get_ir()
>>
>> BUG: KASAN: slab-out-of-bounds in technisat_usb2_get_ir
>> drivers/media/usb/dvb-usb/technisat-usb2.c:664 [inline]
>> BUG: KASAN: slab-out-of-bounds in technisat_usb2_rc_query+0x5fa/0x660
>> drivers/media/usb/dvb-usb/technisat-usb2.c:679
>> Read of size 1 at addr ffff8880a8791ea8 by task kworker/0:1/12
>>
>> Take a look into while loop in technisat_usb2_get_ir().
>> I recognized that a problem. The loop will not break out with the condition
>> doesn't reach. Then "b++" will go wrong and buffer will be overflow.
>>
>> while (1) {
>> [...]
>> b++;
>> if (*b == 0xff) {
>> ev.pulse = 0;
>> ev.duration = 888888*2;
>> ir_raw_event_store(d->rc_dev, &ev);
>> break;
>> }
>> }
>>
>> I would propose changing the loop condition by checking the address of the
>> buffer. If acceptable, I will send this patch to the mailing-list.
>> eg:
>>
>> - while (1) {
>> + while (b != (buf + 63)) {
>> [...]
>> }
>>
>> Tested with syzbot, result is good [2].
>>
>> [1] https://syzkaller.appspot.com/bug?extid=eaaaf38a95427be88f4b
>> [2] https://groups.google.com/d/msg/syzkaller-bugs/CySBCKuUOOs/0hKq1CdjCwAJ
>
> Great, can you submit a patch for this?
>
Yes, sent a patch
https://lore.kernel.org/lkml/20190702140211.28399-1-tranmanphong@gmail.com/
Phong.
> thanks,
>
> greg k-h
>
^ permalink raw reply [flat|nested] 3+ messages in thread
end of thread, other threads:[~2019-07-02 14:06 UTC | newest]
Thread overview: 3+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2019-07-02 0:49 Analyze syzbot report technisat_usb2_rc_query KASAN Phong Tran
2019-07-02 4:45 ` [Linux-kernel-mentees] " Greg KH
2019-07-02 14:06 ` Phong Tran
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).