* [PATCH] usb: raw_gadget: Add debug logs to a troubleshoot a double-free bug in raw_release.
@ 2024-11-06 4:11 Chang Yu
2024-11-06 4:35 ` Andrey Konovalov
2024-11-06 5:05 ` Greg KH
0 siblings, 2 replies; 5+ messages in thread
From: Chang Yu @ 2024-11-06 4:11 UTC (permalink / raw)
To: andreyknvl
Cc: gregkh, viro, linux-usb, linux-kernel, stern, skhan, marcus.yu.56,
syzbot+3e563d99e70973c0755c
syzkaller reported a double free bug
(https://syzkaller.appspot.com/bug?extid=3e563d99e70973c0755c) in
raw_release.
From the stack traces it looks like either raw_release was invoked
twice or there were some between kref_get in raw_ioctl_run and
kref_put raw_release. But these should not be possible. We need
more logs to understand the cause.
Make raw_release and raw_ioctl_run report the ref count before
and after get/put to help debug this.
Signed-off-by: Chang Yu <marcus.yu.56@gmail.com>
Reported-by: syzbot+3e563d99e70973c0755c@syzkaller.appspotmail.com
Link: https://syzkaller.appspot.com/bug?extid=3e563d99e70973c0755c
---
drivers/usb/gadget/legacy/raw_gadget.c | 14 ++++++++++++++
1 file changed, 14 insertions(+)
diff --git a/drivers/usb/gadget/legacy/raw_gadget.c b/drivers/usb/gadget/legacy/raw_gadget.c
index 112fd18d8c99..ac4e319c743f 100644
--- a/drivers/usb/gadget/legacy/raw_gadget.c
+++ b/drivers/usb/gadget/legacy/raw_gadget.c
@@ -194,6 +194,8 @@ static struct raw_dev *dev_new(void)
return NULL;
/* Matches kref_put() in raw_release(). */
kref_init(&dev->count);
+ dev_dbg(dev->dev, "%s kref count initialized: %d\n",
+ __func__, kref_read(&dev->count));
spin_lock_init(&dev->lock);
init_completion(&dev->ep0_done);
raw_event_queue_init(&dev->queue);
@@ -464,13 +466,21 @@ static int raw_release(struct inode *inode, struct file *fd)
dev_err(dev->dev,
"usb_gadget_unregister_driver() failed with %d\n",
ret);
+ dev_dbg(dev->dev, "%s kref count before unregister driver put: %d\n",
+ __func__, kref_read(&dev->count));
/* Matches kref_get() in raw_ioctl_run(). */
kref_put(&dev->count, dev_free);
+ dev_dbg(dev->dev, "%s kref count after unregister driver put: %d\n",
+ __func__, kref_read(&dev->count));
}
out_put:
+ dev_dbg(dev->dev, "%s kref count before final put: %d\n",
+ __func__, kref_read(&dev->count));
/* Matches dev_new() in raw_open(). */
kref_put(&dev->count, dev_free);
+ dev_dbg(dev->dev, "%s kref count after final put: %d\n",
+ __func__, kref_read(&dev->count));
return ret;
}
@@ -603,8 +613,12 @@ static int raw_ioctl_run(struct raw_dev *dev, unsigned long value)
}
dev->gadget_registered = true;
dev->state = STATE_DEV_RUNNING;
+ dev_dbg(dev->dev, "%s kref count before get: %d\n",
+ __func__, kref_read(&dev->count));
/* Matches kref_put() in raw_release(). */
kref_get(&dev->count);
+ dev_dbg(dev->dev, "%s kref count after get: %d\n",
+ __func__, kref_read(&dev->count));
out_unlock:
spin_unlock_irqrestore(&dev->lock, flags);
--
2.47.0
^ permalink raw reply related [flat|nested] 5+ messages in thread
* Re: [PATCH] usb: raw_gadget: Add debug logs to a troubleshoot a double-free bug in raw_release.
2024-11-06 4:11 [PATCH] usb: raw_gadget: Add debug logs to a troubleshoot a double-free bug in raw_release Chang Yu
@ 2024-11-06 4:35 ` Andrey Konovalov
2024-11-06 4:41 ` Chang Yu
2024-11-06 15:24 ` Alan Stern
2024-11-06 5:05 ` Greg KH
1 sibling, 2 replies; 5+ messages in thread
From: Andrey Konovalov @ 2024-11-06 4:35 UTC (permalink / raw)
To: Chang Yu
Cc: gregkh, viro, linux-usb, linux-kernel, stern, skhan,
syzbot+3e563d99e70973c0755c
On Wed, Nov 6, 2024 at 1:11 PM Chang Yu <marcus.yu.56@gmail.com> wrote:
>
> syzkaller reported a double free bug
> (https://syzkaller.appspot.com/bug?extid=3e563d99e70973c0755c) in
> raw_release.
>
> From the stack traces it looks like either raw_release was invoked
> twice or there were some between kref_get in raw_ioctl_run and
> kref_put raw_release. But these should not be possible. We need
> more logs to understand the cause.
>
> Make raw_release and raw_ioctl_run report the ref count before
> and after get/put to help debug this.
>
> Signed-off-by: Chang Yu <marcus.yu.56@gmail.com>
> Reported-by: syzbot+3e563d99e70973c0755c@syzkaller.appspotmail.com
> Link: https://syzkaller.appspot.com/bug?extid=3e563d99e70973c0755c
> ---
> drivers/usb/gadget/legacy/raw_gadget.c | 14 ++++++++++++++
> 1 file changed, 14 insertions(+)
>
> diff --git a/drivers/usb/gadget/legacy/raw_gadget.c b/drivers/usb/gadget/legacy/raw_gadget.c
> index 112fd18d8c99..ac4e319c743f 100644
> --- a/drivers/usb/gadget/legacy/raw_gadget.c
> +++ b/drivers/usb/gadget/legacy/raw_gadget.c
> @@ -194,6 +194,8 @@ static struct raw_dev *dev_new(void)
> return NULL;
> /* Matches kref_put() in raw_release(). */
> kref_init(&dev->count);
> + dev_dbg(dev->dev, "%s kref count initialized: %d\n",
> + __func__, kref_read(&dev->count));
> spin_lock_init(&dev->lock);
> init_completion(&dev->ep0_done);
> raw_event_queue_init(&dev->queue);
> @@ -464,13 +466,21 @@ static int raw_release(struct inode *inode, struct file *fd)
> dev_err(dev->dev,
> "usb_gadget_unregister_driver() failed with %d\n",
> ret);
> + dev_dbg(dev->dev, "%s kref count before unregister driver put: %d\n",
> + __func__, kref_read(&dev->count));
> /* Matches kref_get() in raw_ioctl_run(). */
> kref_put(&dev->count, dev_free);
> + dev_dbg(dev->dev, "%s kref count after unregister driver put: %d\n",
> + __func__, kref_read(&dev->count));
> }
>
> out_put:
> + dev_dbg(dev->dev, "%s kref count before final put: %d\n",
> + __func__, kref_read(&dev->count));
> /* Matches dev_new() in raw_open(). */
> kref_put(&dev->count, dev_free);
> + dev_dbg(dev->dev, "%s kref count after final put: %d\n",
> + __func__, kref_read(&dev->count));
> return ret;
> }
>
> @@ -603,8 +613,12 @@ static int raw_ioctl_run(struct raw_dev *dev, unsigned long value)
> }
> dev->gadget_registered = true;
> dev->state = STATE_DEV_RUNNING;
> + dev_dbg(dev->dev, "%s kref count before get: %d\n",
> + __func__, kref_read(&dev->count));
> /* Matches kref_put() in raw_release(). */
> kref_get(&dev->count);
> + dev_dbg(dev->dev, "%s kref count after get: %d\n",
> + __func__, kref_read(&dev->count));
>
> out_unlock:
> spin_unlock_irqrestore(&dev->lock, flags);
> --
> 2.47.0
>
Hi Chang,
This patch looks very specific to the bug we're trying to debug - I
don't think it makes sense to apply it to the mainline.
What you can do instead is ask syzbot to run the reproducer it has
with this patch applied via the #syz test command.
Thank you!
^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: [PATCH] usb: raw_gadget: Add debug logs to a troubleshoot a double-free bug in raw_release.
2024-11-06 4:35 ` Andrey Konovalov
@ 2024-11-06 4:41 ` Chang Yu
2024-11-06 15:24 ` Alan Stern
1 sibling, 0 replies; 5+ messages in thread
From: Chang Yu @ 2024-11-06 4:41 UTC (permalink / raw)
To: Andrey Konovalov
Cc: Chang Yu, gregkh, viro, linux-usb, linux-kernel, stern, skhan,
syzbot+3e563d99e70973c0755c
On Wed, Nov 06, 2024 at 01:35:27PM +0900, Andrey Konovalov wrote:
> On Wed, Nov 6, 2024 at 1:11 PM Chang Yu <marcus.yu.56@gmail.com> wrote:
> >
> > syzkaller reported a double free bug
> > (https://syzkaller.appspot.com/bug?extid=3e563d99e70973c0755c) in
> > raw_release.
> >
> > From the stack traces it looks like either raw_release was invoked
> > twice or there were some between kref_get in raw_ioctl_run and
> > kref_put raw_release. But these should not be possible. We need
> > more logs to understand the cause.
> >
> > Make raw_release and raw_ioctl_run report the ref count before
> > and after get/put to help debug this.
> >
> > Signed-off-by: Chang Yu <marcus.yu.56@gmail.com>
> > Reported-by: syzbot+3e563d99e70973c0755c@syzkaller.appspotmail.com
> > Link: https://syzkaller.appspot.com/bug?extid=3e563d99e70973c0755c
> > ---
> > drivers/usb/gadget/legacy/raw_gadget.c | 14 ++++++++++++++
> > 1 file changed, 14 insertions(+)
> >
> > diff --git a/drivers/usb/gadget/legacy/raw_gadget.c b/drivers/usb/gadget/legacy/raw_gadget.c
> > index 112fd18d8c99..ac4e319c743f 100644
> > --- a/drivers/usb/gadget/legacy/raw_gadget.c
> > +++ b/drivers/usb/gadget/legacy/raw_gadget.c
> > @@ -194,6 +194,8 @@ static struct raw_dev *dev_new(void)
> > return NULL;
> > /* Matches kref_put() in raw_release(). */
> > kref_init(&dev->count);
> > + dev_dbg(dev->dev, "%s kref count initialized: %d\n",
> > + __func__, kref_read(&dev->count));
> > spin_lock_init(&dev->lock);
> > init_completion(&dev->ep0_done);
> > raw_event_queue_init(&dev->queue);
> > @@ -464,13 +466,21 @@ static int raw_release(struct inode *inode, struct file *fd)
> > dev_err(dev->dev,
> > "usb_gadget_unregister_driver() failed with %d\n",
> > ret);
> > + dev_dbg(dev->dev, "%s kref count before unregister driver put: %d\n",
> > + __func__, kref_read(&dev->count));
> > /* Matches kref_get() in raw_ioctl_run(). */
> > kref_put(&dev->count, dev_free);
> > + dev_dbg(dev->dev, "%s kref count after unregister driver put: %d\n",
> > + __func__, kref_read(&dev->count));
> > }
> >
> > out_put:
> > + dev_dbg(dev->dev, "%s kref count before final put: %d\n",
> > + __func__, kref_read(&dev->count));
> > /* Matches dev_new() in raw_open(). */
> > kref_put(&dev->count, dev_free);
> > + dev_dbg(dev->dev, "%s kref count after final put: %d\n",
> > + __func__, kref_read(&dev->count));
> > return ret;
> > }
> >
> > @@ -603,8 +613,12 @@ static int raw_ioctl_run(struct raw_dev *dev, unsigned long value)
> > }
> > dev->gadget_registered = true;
> > dev->state = STATE_DEV_RUNNING;
> > + dev_dbg(dev->dev, "%s kref count before get: %d\n",
> > + __func__, kref_read(&dev->count));
> > /* Matches kref_put() in raw_release(). */
> > kref_get(&dev->count);
> > + dev_dbg(dev->dev, "%s kref count after get: %d\n",
> > + __func__, kref_read(&dev->count));
> >
> > out_unlock:
> > spin_unlock_irqrestore(&dev->lock, flags);
> > --
> > 2.47.0
> >
>
> Hi Chang,
>
> This patch looks very specific to the bug we're trying to debug - I
> don't think it makes sense to apply it to the mainline.
>
> What you can do instead is ask syzbot to run the reproducer it has
> with this patch applied via the #syz test command.
>
> Thank you!
Thank you for the tips, Andrey. I will do that. My apologies for the
rookie mistake. I'm pretty new to kernel patching/debugging and I'm
still learning the correct way to do stuff.
Thank you again for your help!
^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: [PATCH] usb: raw_gadget: Add debug logs to a troubleshoot a double-free bug in raw_release.
2024-11-06 4:11 [PATCH] usb: raw_gadget: Add debug logs to a troubleshoot a double-free bug in raw_release Chang Yu
2024-11-06 4:35 ` Andrey Konovalov
@ 2024-11-06 5:05 ` Greg KH
1 sibling, 0 replies; 5+ messages in thread
From: Greg KH @ 2024-11-06 5:05 UTC (permalink / raw)
To: Chang Yu
Cc: andreyknvl, viro, linux-usb, linux-kernel, stern, skhan,
syzbot+3e563d99e70973c0755c
On Tue, Nov 05, 2024 at 08:11:47PM -0800, Chang Yu wrote:
> syzkaller reported a double free bug
> (https://syzkaller.appspot.com/bug?extid=3e563d99e70973c0755c) in
> raw_release.
>
> >From the stack traces it looks like either raw_release was invoked
> twice or there were some between kref_get in raw_ioctl_run and
> kref_put raw_release. But these should not be possible. We need
> more logs to understand the cause.
>
> Make raw_release and raw_ioctl_run report the ref count before
> and after get/put to help debug this.
>
> Signed-off-by: Chang Yu <marcus.yu.56@gmail.com>
> Reported-by: syzbot+3e563d99e70973c0755c@syzkaller.appspotmail.com
> Link: https://syzkaller.appspot.com/bug?extid=3e563d99e70973c0755c
> ---
> drivers/usb/gadget/legacy/raw_gadget.c | 14 ++++++++++++++
> 1 file changed, 14 insertions(+)
>
> diff --git a/drivers/usb/gadget/legacy/raw_gadget.c b/drivers/usb/gadget/legacy/raw_gadget.c
> index 112fd18d8c99..ac4e319c743f 100644
> --- a/drivers/usb/gadget/legacy/raw_gadget.c
> +++ b/drivers/usb/gadget/legacy/raw_gadget.c
> @@ -194,6 +194,8 @@ static struct raw_dev *dev_new(void)
> return NULL;
> /* Matches kref_put() in raw_release(). */
> kref_init(&dev->count);
> + dev_dbg(dev->dev, "%s kref count initialized: %d\n",
> + __func__, kref_read(&dev->count));
Please note that you never need to add a __func__ to a dev_dbg() call,
as it is already present automatically for you.
thanks,
greg k-h
^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: [PATCH] usb: raw_gadget: Add debug logs to a troubleshoot a double-free bug in raw_release.
2024-11-06 4:35 ` Andrey Konovalov
2024-11-06 4:41 ` Chang Yu
@ 2024-11-06 15:24 ` Alan Stern
1 sibling, 0 replies; 5+ messages in thread
From: Alan Stern @ 2024-11-06 15:24 UTC (permalink / raw)
To: Andrey Konovalov
Cc: Chang Yu, gregkh, viro, linux-usb, linux-kernel, skhan,
syzbot+3e563d99e70973c0755c
On Wed, Nov 06, 2024 at 01:35:27PM +0900, Andrey Konovalov wrote:
> On Wed, Nov 6, 2024 at 1:11 PM Chang Yu <marcus.yu.56@gmail.com> wrote:
> >
> > syzkaller reported a double free bug
> > (https://syzkaller.appspot.com/bug?extid=3e563d99e70973c0755c) in
> > raw_release.
> >
> > From the stack traces it looks like either raw_release was invoked
> > twice or there were some between kref_get in raw_ioctl_run and
> > kref_put raw_release. But these should not be possible. We need
> > more logs to understand the cause.
> >
> > Make raw_release and raw_ioctl_run report the ref count before
> > and after get/put to help debug this.
> >
> > Signed-off-by: Chang Yu <marcus.yu.56@gmail.com>
> > Reported-by: syzbot+3e563d99e70973c0755c@syzkaller.appspotmail.com
> > Link: https://syzkaller.appspot.com/bug?extid=3e563d99e70973c0755c
> > ---
> > drivers/usb/gadget/legacy/raw_gadget.c | 14 ++++++++++++++
> > 1 file changed, 14 insertions(+)
> >
> > diff --git a/drivers/usb/gadget/legacy/raw_gadget.c b/drivers/usb/gadget/legacy/raw_gadget.c
> > index 112fd18d8c99..ac4e319c743f 100644
> > --- a/drivers/usb/gadget/legacy/raw_gadget.c
> > +++ b/drivers/usb/gadget/legacy/raw_gadget.c
> > @@ -194,6 +194,8 @@ static struct raw_dev *dev_new(void)
> > return NULL;
> > /* Matches kref_put() in raw_release(). */
> > kref_init(&dev->count);
> > + dev_dbg(dev->dev, "%s kref count initialized: %d\n",
> > + __func__, kref_read(&dev->count));
> > spin_lock_init(&dev->lock);
> > init_completion(&dev->ep0_done);
> > raw_event_queue_init(&dev->queue);
> > @@ -464,13 +466,21 @@ static int raw_release(struct inode *inode, struct file *fd)
> > dev_err(dev->dev,
> > "usb_gadget_unregister_driver() failed with %d\n",
> > ret);
> > + dev_dbg(dev->dev, "%s kref count before unregister driver put: %d\n",
> > + __func__, kref_read(&dev->count));
> > /* Matches kref_get() in raw_ioctl_run(). */
> > kref_put(&dev->count, dev_free);
> > + dev_dbg(dev->dev, "%s kref count after unregister driver put: %d\n",
> > + __func__, kref_read(&dev->count));
> > }
> >
> > out_put:
> > + dev_dbg(dev->dev, "%s kref count before final put: %d\n",
> > + __func__, kref_read(&dev->count));
> > /* Matches dev_new() in raw_open(). */
> > kref_put(&dev->count, dev_free);
> > + dev_dbg(dev->dev, "%s kref count after final put: %d\n",
> > + __func__, kref_read(&dev->count));
> > return ret;
> > }
> >
> > @@ -603,8 +613,12 @@ static int raw_ioctl_run(struct raw_dev *dev, unsigned long value)
> > }
> > dev->gadget_registered = true;
> > dev->state = STATE_DEV_RUNNING;
> > + dev_dbg(dev->dev, "%s kref count before get: %d\n",
> > + __func__, kref_read(&dev->count));
> > /* Matches kref_put() in raw_release(). */
> > kref_get(&dev->count);
> > + dev_dbg(dev->dev, "%s kref count after get: %d\n",
> > + __func__, kref_read(&dev->count));
> >
> > out_unlock:
> > spin_unlock_irqrestore(&dev->lock, flags);
> > --
> > 2.47.0
> >
>
> Hi Chang,
>
> This patch looks very specific to the bug we're trying to debug - I
> don't think it makes sense to apply it to the mainline.
>
> What you can do instead is ask syzbot to run the reproducer it has
> with this patch applied via the #syz test command.
>
> Thank you!
In addition you should change your dev_dbg() calls to dev_info(),
because dev_dbg() output will not show up in the syzbot console log.
Alan Stern
^ permalink raw reply [flat|nested] 5+ messages in thread
end of thread, other threads:[~2024-11-06 15:24 UTC | newest]
Thread overview: 5+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2024-11-06 4:11 [PATCH] usb: raw_gadget: Add debug logs to a troubleshoot a double-free bug in raw_release Chang Yu
2024-11-06 4:35 ` Andrey Konovalov
2024-11-06 4:41 ` Chang Yu
2024-11-06 15:24 ` Alan Stern
2024-11-06 5:05 ` Greg KH
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).