Am Montag, den 23.03.2020, 02:18 -0400 schrieb Kyungtae Kim: > We report a bug (in linux-5.5.11) found by FuzzUSB (a modified version > of syzkaller) Hi, thank you for the report. Is this a reproducible bug? > In function usb_hcd_unlink_urb (driver/usb/core/hcd.c:1607), it tries to > read "urb->use_count". But it seems the instance "urb" was > already freed (right after urb->dev at line 1597) by the function "urb_destroy" > in a different thread, which caused memory access violation. Yes. > To solve, it may need to check if urb is valid before urb->use_count, > to avoid such freed memory access. Difficult to do as the URB itself would be invalid. I am afraid there is a race in here: if (test_bit(US_FLIDX_ABORTING, &us->dflags)) { /* cancel the request, if it hasn't been cancelled already */ if (test_and_clear_bit(US_FLIDX_SG_ACTIVE, &us->dflags)) { usb_stor_dbg(us, "-- cancelling sg request\n"); usb_sg_cancel(&us->current_sg); } } /* wait for the completion of the transfer */ usb_sg_wait(&us->current_sg); clear_bit(US_FLIDX_SG_ACTIVE, &us->dflags); What keeps the request alive while usb_sg_wait() is running? Regards Oliver >