Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp7450ybt; Tue, 7 Jul 2020 14:28:59 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyV3nCTljVp4aFX4IX2/V92qqq+U3MiR58xL1nbdUUxwTJRVqsPKDjER4UKGrx03wG4KMoB X-Received: by 2002:a17:906:38d6:: with SMTP id r22mr47841780ejd.219.1594157339784; Tue, 07 Jul 2020 14:28:59 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1594157339; cv=none; d=google.com; s=arc-20160816; b=WetjVedW/Id7BfjPo4Fo0MBvTAe2U1amGqiLXVMU3oQaOQzfQW7rK+K5rEPkdt1wln 101bEUeCxPQlSZqHuNkuiN6V4IJSfqW0bTMI/zXoqwFtUq3lA2VvTjKnLCYeQ3QPpWdS 2mJlKjcJcJUFqH1gty23IRM3zGwjKFptIAAAp/bdXsqverCRnUSEAy6ncnrpNOqgqhAz 3AWPQQvEhLhkBnLjx86EjJ8U7x02/Tp600osUHIP86WsQT0GIlVxrjv2ujXr2SVVKYgD hsA7EvCjUH7nTe+EhOIIhbd5y/lszemcLSG1Gk3YV7kK2dg5lZCljQ67UoTHnK5/qYff TEfA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=Est5EcOrRLVXcW2Q/YTpeP1IT60M40eRSZxfe0S9GlQ=; b=rHvp7jpHtWV7eRPTwYbTL64hGFQSEFoZgFlGOW8e2JI/Vv36/a32LjXTJcO847oRkg 4Ouv+ZdFedWJNASohd/uJF7aO71CLJjWNLTUlkJrqyZ78d+NbED4zEAqchfYqOVdi8jM VEVEuOrSBCyp9qyabTsiTLCypKJiNrqUD38pmYhW0DpbgEFciB83N/oy4Gw6jN2GxnFf bMyif/ucbIaGs+AihSsMGKOYSeItIX08u5Ts/2WcVzNntU8MSrRIFtWU+Bp3wcssX2E8 f0EPoilHR4XAAeFQVNJZgqrPsFZEPNiNbA8+9V8eIks68uvIp8bSen8zSJw4YvBHNLf/ kD8g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id y25si15852677edm.63.2020.07.07.14.28.37; Tue, 07 Jul 2020 14:28:59 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729203AbgGGVZe (ORCPT + 99 others); Tue, 7 Jul 2020 17:25:34 -0400 Received: from jabberwock.ucw.cz ([46.255.230.98]:34420 "EHLO jabberwock.ucw.cz" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728790AbgGGVZd (ORCPT ); Tue, 7 Jul 2020 17:25:33 -0400 Received: by jabberwock.ucw.cz (Postfix, from userid 1017) id 82A871C0C10; Tue, 7 Jul 2020 23:25:31 +0200 (CEST) Date: Tue, 7 Jul 2020 23:25:31 +0200 From: Pavel Machek To: Greg Kroah-Hartman Cc: linux-kernel@vger.kernel.org, stable@vger.kernel.org, Brian Moyles , Mauricio Faria de Oliveira , Herbert Xu Subject: Re: [PATCH 4.19 13/36] crypto: af_alg - fix use-after-free in af_alg_accept() due to bh_lock_sock() Message-ID: <20200707212530.GA11158@amd> References: <20200707145749.130272978@linuxfoundation.org> <20200707145749.760045378@linuxfoundation.org> MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="sm4nu43k4a2Rpi4c" Content-Disposition: inline In-Reply-To: <20200707145749.760045378@linuxfoundation.org> User-Agent: Mutt/1.5.23 (2014-03-12) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org --sm4nu43k4a2Rpi4c Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable Hi! > This patch also modifies the main refcnt to include both normal > and nokey sockets. This way we don't have to fudge the nokey > ref count when a socket changes from nokey to normal. >=20 > Credits go to Mauricio Faria de Oliveira who diagnosed this bug > and sent a patch for it: > @@ -308,12 +302,14 @@ int af_alg_accept(struct sock *sk, struc > =20 > sk2->sk_family =3D PF_ALG; > =20 > - if (nokey || !ask->refcnt++) > + if (atomic_inc_return_relaxed(&ask->refcnt) =3D=3D 1) > sock_hold(sk); > - ask->nokey_refcnt +=3D nokey; > + if (nokey) { > + atomic_inc(&ask->nokey_refcnt); > + atomic_set(&alg_sk(sk2)->nokey_refcnt, 1); > + } Should we set the nokey_refcnt to 0 using atomic_set, too? Aternatively, should the nokey_refcnt be initialized using ATOMIC_INIT()? Best regards, Pavel --=20 (english) http://www.livejournal.com/~pavelmachek (cesky, pictures) http://atrey.karlin.mff.cuni.cz/~pavel/picture/horses/blo= g.html --sm4nu43k4a2Rpi4c Content-Type: application/pgp-signature; name="signature.asc" Content-Description: Digital signature -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iEYEARECAAYFAl8E6EoACgkQMOfwapXb+vIzPQCfUWlLGyhpkXge1oeg0coA6HJH KfsAmgJKYu3lRraU1nqAFtOB1TkosHaF =raSn -----END PGP SIGNATURE----- --sm4nu43k4a2Rpi4c--