Received: by 2002:ac0:a582:0:0:0:0:0 with SMTP id m2-v6csp1264377imm; Wed, 10 Oct 2018 11:40:58 -0700 (PDT) X-Google-Smtp-Source: ACcGV62xNYRLCCWqK70csyRwWUb3Xup5qImU5k+OnjIa3R7clgn3SMVagnQmTMML1yKoo4K9YwDp X-Received: by 2002:a62:c42:: with SMTP id u63-v6mr36123597pfi.43.1539196858508; Wed, 10 Oct 2018 11:40:58 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1539196858; cv=none; d=google.com; s=arc-20160816; b=agI9OugszByWowtAkb06Uthk3t4Dl7w9v5boJVIavnDUCUbHwmhDwotrBeowb9X7uu bFrKlRTfvWtYBuIxmVgC6z5Njcmid0+9zo1ARhdOrhsGk0fmNOkg0twqMwzvUMpH6m2T f/Ycx4+3YC794wc0vziBmDiGu4zTHc+YAs7bokPMTYVWlz2YS/vr4GLcoH66weTHnl0U axDPjcKEXHE5xfI1L0IUTWZKzjskJrP1sa3DLqTlsNKVOzTOGOBnKayI+WLhaKg2bYJR dZs60DVXGTaVDku1aEjUxCLvU2Wwz1+AihU6iuelEGko5q2Ih4j7vJbR9wiPrJcBmu4x 717g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=vPLZBrdyBxi2FWx0yEgEmHUbRdmPHdk0mdju5rgVGtw=; b=h+4VYTTXGv2V/5+MQTjVoAX4ItjCtvEN9yEpgbGg4CpnY4ElNZvFGmIac1NokST2db 1/pXh6W+s9/nqnLlcwWgLtfEbGs4s4OO9jWDJwz4E7+0h6/JgJckRBbDfSj2/Vj3K8WA OSTdAd7l/EpwDGO4ipaAHvXvDvQFbdHSJB4Vs0x6KVgSUo0KhPjqYgpgudlSDja0m19U fBmyd13zufuncOz7lpZZ3No33OD6OOa5vcW+Rer6PcYdJzvJiHkwk8cQmG1zOJN8DFKX 7Dpg7mhJFRqWfZZppm3UZ6ELZ5xuE00TOKXKORLAP+34yoOyT1VOfIN75iBmk0Lq/m4F aGRQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=qQL1Ifbr; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id g8-v6si26456599pli.338.2018.10.10.11.40.42; Wed, 10 Oct 2018 11:40:58 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=qQL1Ifbr; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727101AbeJKCDk (ORCPT + 99 others); Wed, 10 Oct 2018 22:03:40 -0400 Received: from mail-qt1-f195.google.com ([209.85.160.195]:46222 "EHLO mail-qt1-f195.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726718AbeJKCDk (ORCPT ); Wed, 10 Oct 2018 22:03:40 -0400 Received: by mail-qt1-f195.google.com with SMTP id d8-v6so6862305qtk.13; Wed, 10 Oct 2018 11:40:15 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to:user-agent; bh=vPLZBrdyBxi2FWx0yEgEmHUbRdmPHdk0mdju5rgVGtw=; b=qQL1IfbromwOI2wFYAeVDbbnhK6CjgnBqFC+bVBBEHLZbgRcoz8LFcSGnwkwSMUPRj F68PfK2CekvQ6sNUyuf536E+HBe0IH066xCFMPBQi234/f0sHGN4jiB5EEDdnu8NFCnw vniZONqq/gXyD/AOvroRnI4y0m805pzwBDTSVHKKv+q54Wud8Op3stsqif0aD/VduayZ CU9+gHc/2CyStTSRAB8y5jn88/NmVNSKeDWgCsIU6i1z9/1eLj/DKMLllfFvo3BlyJkV 4KgA4HnJS+55ym9r21XVgRbdPeBB+c/KaNG0DDc4L0MAlP7OF6WCymPJfvCSYocz+/FM UD2g== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to:user-agent; bh=vPLZBrdyBxi2FWx0yEgEmHUbRdmPHdk0mdju5rgVGtw=; b=INjD2DXulWKBqk8/jlKA/YRCBPIDgkgntIwelGjleLSiM/hdqqmVr3s8fMtWnCjPdf DeiczxwUWLvgWJhKJw4DV9SjO84cQrB6KRaKd1iTEJyoOpbZ/TBRegar+p2maDLv9RJT E/8OU4m68rbXxuY5TAiwhWCiWwSA303kmxRHkyMxRLjbDW9dMPfpDCGeYWD1P0E32jWp XgrbI/I3lAW7CCWrY3Q9zKet2ZODF65LrM1+hwrD4XGJ45mJiXFgGfuTKh8VSmqrwM57 ky8AHM68qL0+MnjLBZJ7Zhu4/kwiGRKpTtm0pVtA7H3CjLqj+m1TVXP81ciowFfaeTlG uncg== X-Gm-Message-State: ABuFfogBpuQ2viKYsK91X0EPowR3HfoQfo+qXKG9KxhB+kjjBC0XP3S0 KIOh4lgx7An/YhT/xP4zYsc= X-Received: by 2002:a0c:aa06:: with SMTP id d6-v6mr28539566qvb.26.1539196815341; Wed, 10 Oct 2018 11:40:15 -0700 (PDT) Received: from localhost.localdomain ([2001:1284:f022:f7f5:3ccf:a328:f8f8:94f8]) by smtp.gmail.com with ESMTPSA id r7-v6sm14715374qta.82.2018.10.10.11.40.13 (version=TLS1_2 cipher=ECDHE-RSA-CHACHA20-POLY1305 bits=256/256); Wed, 10 Oct 2018 11:40:14 -0700 (PDT) Received: by localhost.localdomain (Postfix, from userid 1000) id A35ED181183; Wed, 10 Oct 2018 15:40:11 -0300 (-03) Date: Wed, 10 Oct 2018 15:40:11 -0300 From: Marcelo Ricardo Leitner To: Dmitry Vyukov Cc: syzbot , David Miller , LKML , linux-sctp@vger.kernel.org, netdev , Neil Horman , syzkaller-bugs , Vladislav Yasevich Subject: Re: KASAN: use-after-free Read in sctp_id2assoc Message-ID: <20181010184011.GE6761@localhost.localdomain> References: <0000000000007e767d05776336da@google.com> <20181005145855.GB6761@localhost.localdomain> <20181010181325.GD6761@localhost.localdomain> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Oct 10, 2018 at 08:28:22PM +0200, Dmitry Vyukov wrote: > On Wed, Oct 10, 2018 at 8:13 PM, Marcelo Ricardo Leitner > wrote: > > On Wed, Oct 10, 2018 at 05:28:12PM +0200, Dmitry Vyukov wrote: > >> On Fri, Oct 5, 2018 at 4:58 PM, Marcelo Ricardo Leitner > >> wrote: > >> > On Thu, Oct 04, 2018 at 01:48:03AM -0700, syzbot wrote: > >> >> Hello, > >> >> > >> >> syzbot found the following crash on: > >> >> > >> >> HEAD commit: 4e6d47206c32 tls: Add support for inplace records encryption > >> >> git tree: net-next > >> >> console output: https://syzkaller.appspot.com/x/log.txt?x=13834b81400000 > >> >> kernel config: https://syzkaller.appspot.com/x/.config?x=e569aa5632ebd436 > >> >> dashboard link: https://syzkaller.appspot.com/bug?extid=c7dd55d7aec49d48e49a > >> >> compiler: gcc (GCC) 8.0.1 20180413 (experimental) > >> >> > >> >> Unfortunately, I don't have any reproducer for this crash yet. > >> >> > >> >> IMPORTANT: if you fix the bug, please add the following tag to the commit: > >> >> Reported-by: syzbot+c7dd55d7aec49d48e49a@syzkaller.appspotmail.com > >> >> > >> >> netlink: 'syz-executor1': attribute type 1 has an invalid length. > >> >> ================================================================== > >> >> BUG: KASAN: use-after-free in sctp_id2assoc+0x3a7/0x3e0 > >> >> net/sctp/socket.c:276 > >> >> Read of size 8 at addr ffff880195b3eb20 by task syz-executor2/15454 > >> >> > >> >> CPU: 1 PID: 15454 Comm: syz-executor2 Not tainted 4.19.0-rc5+ #242 > >> >> Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS > >> >> Google 01/01/2011 > >> >> Call Trace: > >> >> __dump_stack lib/dump_stack.c:77 [inline] > >> >> dump_stack+0x1c4/0x2b4 lib/dump_stack.c:113 > >> >> print_address_description.cold.8+0x9/0x1ff mm/kasan/report.c:256 > >> >> kasan_report_error mm/kasan/report.c:354 [inline] > >> >> kasan_report.cold.9+0x242/0x309 mm/kasan/report.c:412 > >> >> __asan_report_load8_noabort+0x14/0x20 mm/kasan/report.c:433 > >> >> sctp_id2assoc+0x3a7/0x3e0 net/sctp/socket.c:276 > >> > > >> > I'm not seeing yet how this could happen. > >> > All sockopts here are serialized by sock_lock. > >> > do_peeloff here would create another socket, but the issue was > >> > triggered before that. > >> > The same function that freed this memory, also removes the entry from > >> > idr mapping, so this entry shouldn't be there anymore. > >> > > >> > I have only two theories so far: > >> > - an issue with IDR/RCU. > >> > - something else happened that just the call stacks are not revealing. > >> > >> The "asoc->base.sk != sk" check after idr_find suggests that we don't > >> actually know what sock it belongs to. And if we don't know then > > > > Right. The check is more because the IDR is global and not per socket > > (and we don't want sockets accessing asocs from other sockets), and not > > that the asoc may move to another socket in between, but it also > > protects from such cases, yes. > > > >> locking this sock can't help keeping another sock association alive. > >> Am I missing something obvious here? Should we take assoc ref while we > > > > Not sure. Maybe I am. Thanks for looking into this, btw. > > > >> are still holding sctp_assocs_id_lock? > > > > Shouldn't be needed. > > > > Solely by the call stacks: > > - we tried to establish a new asoc from a sctp_connect() call, > > blocking one. > > - it slept waiting for the connect > > - (something closed the asoc in between the sleeps, because it freed > > the asoc right when waking up on sctp_wait_for_connect()) > > - it freed the asoc after sleeping on it on sctp_wait_for_connect [A] > > - another thread tried to peeloff that asoc [B] > > > > For [B] to access the asoc in question, it had to take the same sock > > lock [A] had taken, and then the idr should not return an asoc in > > sctp_i2asoc(). Note that we can't peeloff an asoc twice, thus why > > the certainty here. > > > > If [B] actually kicked in before the sleep resumed, that should have > > been fine because it took the same sock lock [A] would have to > > re-take. In this case an asoc would have been returned by > > sctp_id2asoc(), the asoc would have been moved to a new socket, but > > all while holding the original socket sock lock. > > But why A and B use the same lock? > > sctp_assocs_id is global, so it contains asocs from all sockets, right? > assoc id comes straight from userspaces. > So isn't it possible that B uses completely different sock but passes > assoc id from the A sock? Then B should find assoc in sctp_assocs_id, > and at the point of "asoc->base.sk != sk" check the assoc can be > already freed. That explains it. Somehow I was thinking the issue was for reading ->dead instead. Now it's pretty clear. Then this should be the patch we want. Can you please give it a spin? (only compile tested) While holding the spinlock, an entry cannot be removed from the idr and thus it cannot be freed. So even if the app uses an id from another socket, it will still be there. ---8<--- diff --git a/net/sctp/socket.c b/net/sctp/socket.c index f73e9d38d5ba..a7722f43aa69 100644 --- a/net/sctp/socket.c +++ b/net/sctp/socket.c @@ -271,11 +271,10 @@ struct sctp_association *sctp_id2assoc(struct sock *sk, sctp_assoc_t id) spin_lock_bh(&sctp_assocs_id_lock); asoc = (struct sctp_association *)idr_find(&sctp_assocs_id, (int)id); + if (asoc && (asoc->base.sk != sk || asoc->base.dead)) + asoc = NULL; spin_unlock_bh(&sctp_assocs_id_lock); - if (!asoc || (asoc->base.sk != sk) || asoc->base.dead) - return NULL; - return asoc; }