Received: by 2002:ac0:a581:0:0:0:0:0 with SMTP id m1-v6csp3697768imm; Mon, 2 Jul 2018 04:05:51 -0700 (PDT) X-Google-Smtp-Source: ADUXVKLxRpLu084rCk3K474lc5ZluS5M3Iq15hm/vGWYytg1iYkwrzfG32wiXstNZRLLKfD8L6Jg X-Received: by 2002:a65:594b:: with SMTP id g11-v6mr21808673pgu.260.1530529551386; Mon, 02 Jul 2018 04:05:51 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1530529551; cv=none; d=google.com; s=arc-20160816; b=pBoKJyaH1PUKfwOTuPBCX59ORDDqRlfOET43/NSBpfT4EWVclmDoGFGtjJmhYEKbKW ewxelt2LlfwbhRW6ICPBHpOriYVn42XdXkv7uw6VvIztme7nsEboNf4pTDBHOeAbuVn9 jb4oD2bU+hwyRXCqtP45w3Ah/lTegI+x4Y/LjmezzIuJQ534cR39HFENfaLS66WPNnli m6A0ReQ+a7EKETn/txeNQDyO9iS5aEcslz+8jAacqI4v+sO+Bz+qFWoyuJj7VTTZathT HnwZHPNrjJ8xamdc/KNZmiHtQ/fMWD1Wx6J8fx+t8Sx6NjaxUwX4UVVqxO1pOkBj+oWo X1jg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-language :content-transfer-encoding:in-reply-to:mime-version:user-agent:date :message-id:autocrypt:openpgp:from:references:cc:to:subject :dkim-signature:arc-authentication-results; bh=8enanYlyaOgPAuM42MNyEFHMU/7McvSj3V+NZONR53U=; b=Kr0o/hKVVlbNzQr4Gahaoha0wQIh+WpWODqLE5kDLTpSicT+vRju+j8R2n6xqFcxhw 3tnOACcDC0/S1CDFB0zCJa9jbI7qzPfBunXTmtFMNohfKOm3mXt/mxBllahjL1GTv4iR zcwvL8uQOl7ty8q5wbUTUVbX3kPB/uSR+4uZOJFAidfsQ6+/mbXKr6pTZzmZY3CpzRqe DB1jggMAvOmhnDW/PMxsJReeHBGjObf/jMkLEJXoln+JZ7WJPU3Ou+sZQXTY/V8khNUb Udc/M01e01LRp4B+A9ueywPX0YmPGO0RT8h+wMdhX8rosf/JVkQHUEg9JJau+oAEKjoe 154A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=fA6w99Ka; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w123-v6si11484035pgw.360.2018.07.02.04.05.36; Mon, 02 Jul 2018 04:05:51 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=fA6w99Ka; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754195AbeGBIbp (ORCPT + 99 others); Mon, 2 Jul 2018 04:31:45 -0400 Received: from mail-ed1-f66.google.com ([209.85.208.66]:41075 "EHLO mail-ed1-f66.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752607AbeGBIbk (ORCPT ); Mon, 2 Jul 2018 04:31:40 -0400 Received: by mail-ed1-f66.google.com with SMTP id b12-v6so11107610edt.8; Mon, 02 Jul 2018 01:31:39 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=subject:to:cc:references:from:openpgp:autocrypt:message-id:date :user-agent:mime-version:in-reply-to:content-transfer-encoding :content-language; bh=8enanYlyaOgPAuM42MNyEFHMU/7McvSj3V+NZONR53U=; b=fA6w99KaahsG4xwXrUIxY7H3Ov81pwSWMB6ibrAhF5j7lLhN3APIuwqtM7MYEB7WR1 coKMrSApdcOt5C3R/zw3iSzp5LfxEQmftNFGCLHC0BtOX1L1T6diWYkc4wLsvB5kEUjK 1AhdUVD2ky4bSzrFBvcDZrSvRZ7fX7dNkyL6NRkkZrLE2nlke5RbkOrNSYtzhvZlMdhR 80uQfn7FBIqAnFneDS0y3cC1tCkMmqgSmqLmKb+Fx34G34AV5yOB0qjiJrGpzN7onCgh St+eR6BvJHRCQT8UiaV18kNLMcnizw2ppufYAy7ysNlXt2iwbj0XhOXWvUtz7vsUaHgZ 4pZA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:cc:references:from:openpgp:autocrypt :message-id:date:user-agent:mime-version:in-reply-to :content-transfer-encoding:content-language; bh=8enanYlyaOgPAuM42MNyEFHMU/7McvSj3V+NZONR53U=; b=SHBq2yfqFfHovmWgMIzzYYNGEzgeMktY47QwaSqnw6M/KRMbWRVdaarDX6tBqfozT7 sKkZrDCh8h4HPbbg0Tb8xFqEKvdrc+bSMJZ7VF43GzlmoY6AlRFZKmzXdkSwRVH/1JcJ 99Z3zzOg+v+zZzJV8tJ8hY4mP7F2HgIsS5Qedu+eFzC/gfULw4Joxl6f0hUdbWkxqQ4p FFVG6mWkpONGcYNpNmHRlxQvT0ymuUKrvy+5bjgxz8CvRq6B7biWWIjdKje6Vb9urae8 ooIQOlqlkTxigSXRqqbmQIRWMDtCCuK4E5HAApbUkz00qIieL98JLD32Y03W9d8vvO+c WNiQ== X-Gm-Message-State: APt69E2PUXl4SSVaQGhWRVMq7k/i3tsJPU45pygbBQE2CFy28YYu2TvL ylDZXeHfDfhMaEv2++UqtEtGAu7/ X-Received: by 2002:a50:d0ca:: with SMTP id g10-v6mr11446258edf.182.1530520298219; Mon, 02 Jul 2018 01:31:38 -0700 (PDT) Received: from [192.168.42.231] ([151.37.23.197]) by smtp.gmail.com with ESMTPSA id m4-v6sm1609128eda.74.2018.07.02.01.31.36 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Mon, 02 Jul 2018 01:31:37 -0700 (PDT) Subject: Re: [PATCH upstream] KASAN: slab-out-of-bounds Read in getname_kernel To: Ian Kent Cc: linux-kernel@vger.kernel.org, syzkaller@googlegroups.com, autofs@vger.kernel.org References: <38c5a8ad-c192-74b9-b2ff-9eb2a3386930@gmail.com> <1530493827.2749.8.camel@themaw.net> <1530495726.2749.13.camel@themaw.net> From: tomas Openpgp: preference=signencrypt Autocrypt: addr=tomasbortoli@gmail.com; prefer-encrypt=mutual; keydata= xsFNBFpCTZMBEADNZ1+Ibh0Z4pgGRcd1aOUMbe/YfHktmajjcoTnKmZZunjoUVAl8waeLITd BC2c8i1wHzHcnthrmb1izs5XlG6PZnl8n5tjysSNbwggzS1NcEK1qgn5VjNlHQ5aRMUwCC51 kicBiNmlQk2UuzzWwdheRGnaf+O1MNhC0GBeEDKQAL5obOU92pzflv6wWNACr+lHxdnpyies mOnRMjH16NjuTkrGbEmJe+MKp0qbjvR3R/dmFC1wczniRMQmV5w3MZ/N9wRappE+Atc1fOM+ wP7AWNuPvrKg4bN5uqKZLDFH7OFpxvjgVdWM40n0cQfqElWY9as+228Sltdd1XyHtUWRF2VW O1l5L0kX0+7+B5k/fpLhXqD3Z7DK7wRXpXmY59pofk7aFdcN97ZK+r6R7mqrwX4W9IpsPhkT kUyg3/Dx/khBZlJKFoUP325/hoH684bSiPEBroel9alB7gTq2ueoFwy6R3q5CMUw3D+CZWHA 3xllu46TRQ/Vt2g0cIHQNPoye2OWYFJ6kSEvaLpymjNDJ9ph2EuHegonDfOaYSq34ic2BcdB JkCgXRLP5K7KtRNJqqR+DM8xByeGmQv9yp6S97el+SiM9R53RhHawJZGz0EPl+2Q6+5mgh3u wXOlkmGrrSrlB8lc567l34ECl6NFtUPIL7H5vppIXAFl7JZUdQARAQABzR50b21hcyA8dG9t YXNib3J0b2xpQGdtYWlsLmNvbT7CwZQEEwEIAD4WIQSKOZIcNF9TdAG6W8ARUi5Y8x1zLgUC WkJNkwIbIwUJCWYBgAULCQgHAgYVCAkKCwIEFgIDAQIeAQIXgAAKCRARUi5Y8x1zLvCXD/9h iaZWJ6bC6jHHPGDMknFdbpNnB5w1hBivu9KwAm4LyEI+taWhmUg5WUNO1CmDa2WGSUSTk9lo uq7gH8Y7zwGrYOEDVuldjRjPFR/1yW2JdAmbwzcYkVU0ZUhyo2XzgFjsnv3vJGHk/afEopce U6mOc2BsGDpo2izVTE/HVaiLE9jyKQF6Riy04QBRAvxbDvx1rl26GIxVI6coBFf4SZhZOnc0 dzsip0/xaSRRIMG0d75weezIG49qK3IHyw2Fw5pEFY8tP0JJVxtrq2MZw+n4WmW9BVD/oCd/ b0JZ4volQbOFmdLzcAi2w7DMcKVkW11I1fiRZ/vLMvA4b79r6mn3WJ8aMIaodG6CQzmDNcsF br+XVp8rc58m9q69BTzDH0xTStxXiwozyISAe2VGbGUbK9ngU/H1RX0Y01uQ9Dz0KfyjA0/Z QOBa4N1n1qoKFzoxTpu0Vyumkc5EnTk8NdWszt7UAtNSaIZcBuWHR7Kp0DqRHwom0kgTiNXJ 8uNgvvFTkPd2Pdz1BqbpN1Fj856xPuKIiqs5qXI2yh3GhntFDbTOwOU3rr3x5NEv3wFVojdi HcLM+KVf29YkRHzuEQT5YT9h6qTk2aFRqq3HSXrP56hQ3whR7bQtziJspkuj+ekeTxcZ5lr4 9FJI03hQJ4HbHn6x/Xw0+WjIOo4jBeUEI87BTQRaQk2TARAA4JCPcQcISPAKKC1n9VQxgdH3 oMqxhJ+gh/0Yb394ZYWLf7qOVQf/MgALPQIIFpcwYrw7gK4hsN7kj1vwPFy9JIqZtkgbmJHm aCj1LkZuf8tp5uvqzMZGcgm28IO6qDhPggeUE3hfA/y5++Vt0Jsmrz5zVPY0bOrLh1bItLnF U3uoaHWkAi/rhM6WwlsxemefzKulXoR9PIGVZ/QGjBGsTkNbTpiz2KsN+Ff/ZgjBJzGQNgha kc6a+eXyGC0YE8fRoTQekTi/GqGY7gfRKkgZDPi0Ul0sPZQJo07Dpw0nh5l6sOO+1yXygcoA V7I4bUeANZ9QJzbzZALgtxbT6jTKC0HUbF9iFb0yEkffkQuhhIqud7RkITe25hZePN8Y6Px0 yF4lEVW/Ti91jMSb4mpZiAaIFcdDV0CAtIYHAcK1ZRVz//+72o4gMZlRxowxduMyRs3L5rE0 ZkFQ6aPan+NBtEk1v3RPqnsQwJsonmiEgfbvybyBpP5MzRZnoAxfQ9vyyXoI5ofbl/+l9wv8 mosKNWIjiQsX3KiyaqygtD/yed5diie5nA7eT6IjL92WfgSelhBCL4jV0fL4w8hah2Azu0Jg 1ZtjjgoDObcAKQ5dLJA0IDsgH/X/G+ZMvkPpPIVaS5QWkiv66hixdKte/4iUrN+4waxJLCit 1KGC2xPJ2UUAEQEAAcLBfAQYAQgAJhYhBIo5khw0X1N0AbpbwBFSLljzHXMuBQJaQk2TAhsM BQkJZgGAAAoJEBFSLljzHXMuOb0P/1EnY4Y6LfQ6bmhJQ6epA3fB70hRWCQsuPYLAgPKRoXy kmWH4ljqQDbA55TtIpnod/woR0IDnZcD7E9cyGzM2rHvSLXTkHhgIWacZHZopAUzq4j0lhiJ Wu57freQPU4rzMVGZXBktUsDMsJwp/3Tl2Kjqylh90qIOlB9laUusLIbl4w5J3EscIJzWvdL y1lJLtBmus/t75wN/aIB8l9YBKGuy0L4SAmjhN52pCgP/S+ANEKvdghQco51a4jD2Pv2uYH7 nUU/Y70AmqOHjPR+qZ0hAUw6B+UtWQ+Fl587Qqi2XPUzdA8G2EjGFFPRlnhf2H/gOyAfeVYL NDwDgm9Yzp7Rx0O1QOnQsXTHqk7K38AdSdM2li/I/zegeblInnLi08Gq6mT6RkD6wV9HE5U3 EIU0rDPyJo54MW39wGjfC2+PM5I0xebbxtnuTewRchVVfm7UWgLAy11pV3xM4wMSJOuqVMOz jYpWKYxDTpvsZ0ginUUY993Gb8k/CxjABEMUGVHhQPZ0OzjHIKS6cTzN6ue8bB+CGOLCaQp1 C0NRT5Tn9zpLxtf5nBExFd/zVENY5vAV2ZbKQdemO54O7j6B9DSgVRrm83GCZxbL4d+qTYBF 3tSCWw/6SG1F3q9gR9QrSC2YRjCmhijUVEh6FhZwB58TNZ1sEEttrps8TDa5tUd9 Message-ID: <1bbf3634-6c2a-f40e-a9d3-9d6ffc9a0562@gmail.com> Date: Mon, 2 Jul 2018 10:31:34 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.8.0 MIME-Version: 1.0 In-Reply-To: <1530495726.2749.13.camel@themaw.net> Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable Content-Language: en-US Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Ian, you are welcome! yes your patch is much better. You should just put the "_IOC_NR" macro around "cmd" in the lines added to "validate_dev_ioctl" to make it work. Tomas On 07/02/2018 03:42 AM, Ian Kent wrote: > On Mon, 2018-07-02 at 09:10 +0800, Ian Kent wrote: >> On Mon, 2018-07-02 at 00:04 +0200, tomas wrote: >>> Hi, >>> >>> I've looked into this issue found by Syzbot and I made a patch: >>> >>> https://syzkaller.appspot.com/bug?id=3Dd03abd8b42847f7f69b1d1d7f97208= ae425b116 >>> 3 >> Umm ... oops! >> >> Thanks for looking into this Tomas. >> >>> >>> The autofs subsystem does not check that the "path" parameter is pres= ent >>> within the "param" struct passed by the userspace in case the >>> AUTOFS_DEV_IOCTL_OPENMOUNT_CMD command is passed. Indeed, it assumes = a >>> path is always provided (though a path is not always present, as per = how >>> the struct is defined: >>> https://github.com/torvalds/linux/blob/master/include/uapi/linux/auto= _dev-io >>> ct >>> l.h#L89). >>> Skipping the check provokes an oob read in "strlen", called by >>> "getname_kernel", in turn called by the autofs to assess the length o= f >>> the non-existing path. >>> >>> To solve it, modify the "validate_dev_ioctl" function to check also t= hat >>> a path has been provided if the command is AUTOFS_DEV_IOCTL_OPENMOUNT= _CMD. >>> >>> >>> --- b/fs/autofs/dev-ioctl.c 2018-07-01 23:10:16.059728621 +0200aro= und >>> +++ a/fs/autofs/dev-ioctl.c 2018-07-01 23:10:24.311792133 +0200 >>> @@ -136,6 +136,9 @@ static int validate_dev_ioctl(int cmd, s >>> goto out; >>> } >>> } >>> + /* AUTOFS_DEV_IOCTL_OPENMOUNT_CMD without path */ >>> + else if(_IOC_NR(cmd) =3D=3D AUTOFS_DEV_IOCTL_OPENMOUNT_CMD) >>> + return -EINVAL; >> My preference is to put the comment inside the else but ... >> >> There's another question, should the check be done in >> autofs_dev_ioctl_openmount() in the same way it's checked in other >> ioctls that need a path, such as in autofs_dev_ioctl_requester() >> and autofs_dev_ioctl_ismountpoint()? >> >> For consistency I'd say it should. >> >>> =20 >>> err =3D 0;You should just put the "_IOC_NR" directive around "cm= d" in the lines added to "validate_dev_ioctl" to make it work. >>> out: >>> >>> >>> Tested and solves the issue on Linus' main git tree. >>> >>> > Or perhaps this (not even compile tested) patch would be better? > > autofs - fix slab out of bounds read in getname_kernel() > > From: Ian Kent > > The autofs subsystem does not check that the "path" parameter is > present for all cases where it is required when it is passed in > via the "param" struct. > > In particular it isn't checked for the AUTOFS_DEV_IOCTL_OPENMOUNT_CMD > ioctl command. > > To solve it, modify validate_dev_ioctl() function to check that a > path has been provided for ioctl commands that require it. > --- > fs/autofs/dev-ioctl.c | 15 +++++++-------- > 1 file changed, 7 insertions(+), 8 deletions(-) > > diff --git a/fs/autofs/dev-ioctl.c b/fs/autofs/dev-ioctl.c > index ea4ca1445ab7..61c63715c3fb 100644 > --- a/fs/autofs/dev-ioctl.c > +++ b/fs/autofs/dev-ioctl.c > @@ -135,6 +135,11 @@ static int validate_dev_ioctl(int cmd, struct auto= fs_dev_ioctl *param) > cmd); > goto out; > } > + } else if (cmd =3D=3D AUTOFS_DEV_IOCTL_OPENMOUNT_CMD || > + cmd =3D=3D AUTOFS_DEV_IOCTL_REQUESTER_CMD || > + cmd =3D=3D AUTOFS_DEV_IOCTL_ISMOUNTPOINT_CMD) { > + err =3D -EINVAL; > + goto out; > } > =20 > err =3D 0; > @@ -433,10 +438,7 @@ static int autofs_dev_ioctl_requester(struct file = *fp, > dev_t devid; > int err =3D -ENOENT; > =20 > - if (param->size <=3D AUTOFS_DEV_IOCTL_SIZE) { > - err =3D -EINVAL; > - goto out; > - } > + /* param->path has already been checked */ > =20 > devid =3D sbi->sb->s_dev; > =20 > @@ -521,10 +523,7 @@ static int autofs_dev_ioctl_ismountpoint(struct fi= le *fp, > unsigned int devid, magic; > int err =3D -ENOENT; > =20 > - if (param->size <=3D AUTOFS_DEV_IOCTL_SIZE) { > - err =3D -EINVAL; > - goto out; > - } > + /* param->path has already been checked */ > =20 > name =3D param->path; > type =3D param->ismountpoint.in.type;