Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp2259483pxb; Thu, 11 Feb 2021 08:07:40 -0800 (PST) X-Google-Smtp-Source: ABdhPJwdI8S4FXXIY6egNe+C86Z7H4j0ISWZrgjDfHK5dHp/tQ8rK3OwxWNP95eowXmk8hbNzLQo X-Received: by 2002:a05:6402:3590:: with SMTP id y16mr9114708edc.21.1613059657985; Thu, 11 Feb 2021 08:07:37 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1613059657; cv=none; d=google.com; s=arc-20160816; b=0ksYR09IEBuw5a7/T3AJHE5NLe12JJLZl6SIMLztOcT1cYIMopk1r0NXegFZO9ABiM I7xVgH2Ikseqx37zG0uA2FcXGzS0eODY3CTy3qgDG0R2CPBfPYDrSp2dv9u8tblsCXbV 3JJum/HfhWzCAMMOTxA7Gr4Pmss5D/bTAKD8s177tUVIpJ9WoREBupRKHeAeOTocxwBr 15PH4mEzgT87g3mu4F+nMnlnQvBKloKKwn3gt0xe7Jb9nRuJGwVuYTAENVgx1+AAEQq1 aXIZWTQ8ex/n/3/M19+EZUEONS6bSK2zPhOVuF4/AVmyS+wdl6cqGrMJ5fQvRcKkGKru jqSg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=emLfk77CrBEmkO0MvVKbMIQAkhMSY9tv/kRAOnrraZM=; b=g8KnXm7KlW1ICrTp6SDSJBfmR5xmFlgGFYIuPZrVxJG/H8g/++I0KM5NlQ+FIeE46g 88DAVNZugUrrP2Wxe3OKmj++W5LQhXDBzUnLr8WE17jxxwYxjCo6W/JAzygl2DINIeMZ 24XeoeHosC1kz6sA03knVY73vcN+GY+k8AscD7Yl4Az6a8d2Ox4qFtYql6Jx7GsEIZHH Ftl5GAWhGdFe8xlPLm+1yLRWTOgAm48x/N1vjppCFZ6RsQNKbZlC4FHQfXRov40SFFv2 tHMFpiWu1RgSeGmqWEYwTz+Yat++ujNeaqynqgixWFbIzNuFN1gt/KM1dGR9MT5USasd D2tg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=T8U+6SE5; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id w14si4078992ede.222.2021.02.11.08.07.07; Thu, 11 Feb 2021 08:07:37 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=T8U+6SE5; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231699AbhBKQGL (ORCPT + 99 others); Thu, 11 Feb 2021 11:06:11 -0500 Received: from mail.kernel.org ([198.145.29.99]:52616 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230155AbhBKPUg (ORCPT ); Thu, 11 Feb 2021 10:20:36 -0500 Received: by mail.kernel.org (Postfix) with ESMTPSA id B1E5C64F1F; Thu, 11 Feb 2021 15:06:49 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1613056010; bh=7HAX9sU+l6BNdNYSlFXNawad2Tcj2aC8xHHqNBYP1s8=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=T8U+6SE5b4hCWscGOsqBuE7ajrW4PrJkF0Vs24QDqkr1IpzuB/l/q3xNCWB57u4cS gOdODZ/BYITfpE9wmA3sgkRDMLKYn1vcI5ZpNqMqaaDLwE3y8NbyFHbp19pDlGBIQT Snl0jaO5SvC6CgNHtsZxW2f61RU+pOFSJyivex0o= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Dave Wysochanski , Trond Myklebust , Sasha Levin Subject: [PATCH 4.19 15/24] SUNRPC: Handle 0 length opaque XDR object data properly Date: Thu, 11 Feb 2021 16:02:49 +0100 Message-Id: <20210211150148.417533976@linuxfoundation.org> X-Mailer: git-send-email 2.30.1 In-Reply-To: <20210211150147.743660073@linuxfoundation.org> References: <20210211150147.743660073@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Dave Wysochanski [ Upstream commit e4a7d1f7707eb44fd953a31dd59eff82009d879c ] When handling an auth_gss downcall, it's possible to get 0-length opaque object for the acceptor. In the case of a 0-length XDR object, make sure simple_get_netobj() fills in dest->data = NULL, and does not continue to kmemdup() which will set dest->data = ZERO_SIZE_PTR for the acceptor. The trace event code can handle NULL but not ZERO_SIZE_PTR for a string, and so without this patch the rpcgss_context trace event will crash the kernel as follows: [ 162.887992] BUG: kernel NULL pointer dereference, address: 0000000000000010 [ 162.898693] #PF: supervisor read access in kernel mode [ 162.900830] #PF: error_code(0x0000) - not-present page [ 162.902940] PGD 0 P4D 0 [ 162.904027] Oops: 0000 [#1] SMP PTI [ 162.905493] CPU: 4 PID: 4321 Comm: rpc.gssd Kdump: loaded Not tainted 5.10.0 #133 [ 162.908548] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [ 162.910978] RIP: 0010:strlen+0x0/0x20 [ 162.912505] Code: 48 89 f9 74 09 48 83 c1 01 80 39 00 75 f7 31 d2 44 0f b6 04 16 44 88 04 11 48 83 c2 01 45 84 c0 75 ee c3 0f 1f 80 00 00 00 00 <80> 3f 00 74 10 48 89 f8 48 83 c0 01 80 38 00 75 f7 48 29 f8 c3 31 [ 162.920101] RSP: 0018:ffffaec900c77d90 EFLAGS: 00010202 [ 162.922263] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00000000fffde697 [ 162.925158] RDX: 000000000000002f RSI: 0000000000000080 RDI: 0000000000000010 [ 162.928073] RBP: 0000000000000010 R08: 0000000000000e10 R09: 0000000000000000 [ 162.930976] R10: ffff8e698a590cb8 R11: 0000000000000001 R12: 0000000000000e10 [ 162.933883] R13: 00000000fffde697 R14: 000000010034d517 R15: 0000000000070028 [ 162.936777] FS: 00007f1e1eb93700(0000) GS:ffff8e6ab7d00000(0000) knlGS:0000000000000000 [ 162.940067] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 162.942417] CR2: 0000000000000010 CR3: 0000000104eba000 CR4: 00000000000406e0 [ 162.945300] Call Trace: [ 162.946428] trace_event_raw_event_rpcgss_context+0x84/0x140 [auth_rpcgss] [ 162.949308] ? __kmalloc_track_caller+0x35/0x5a0 [ 162.951224] ? gss_pipe_downcall+0x3a3/0x6a0 [auth_rpcgss] [ 162.953484] gss_pipe_downcall+0x585/0x6a0 [auth_rpcgss] [ 162.955953] rpc_pipe_write+0x58/0x70 [sunrpc] [ 162.957849] vfs_write+0xcb/0x2c0 [ 162.959264] ksys_write+0x68/0xe0 [ 162.960706] do_syscall_64+0x33/0x40 [ 162.962238] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 162.964346] RIP: 0033:0x7f1e1f1e57df Signed-off-by: Dave Wysochanski Signed-off-by: Trond Myklebust Signed-off-by: Sasha Levin --- net/sunrpc/auth_gss/auth_gss_internal.h | 9 ++++++--- 1 file changed, 6 insertions(+), 3 deletions(-) diff --git a/net/sunrpc/auth_gss/auth_gss_internal.h b/net/sunrpc/auth_gss/auth_gss_internal.h index c5603242b54bf..f6d9631bd9d00 100644 --- a/net/sunrpc/auth_gss/auth_gss_internal.h +++ b/net/sunrpc/auth_gss/auth_gss_internal.h @@ -34,9 +34,12 @@ simple_get_netobj(const void *p, const void *end, struct xdr_netobj *dest) q = (const void *)((const char *)p + len); if (unlikely(q > end || q < p)) return ERR_PTR(-EFAULT); - dest->data = kmemdup(p, len, GFP_NOFS); - if (unlikely(dest->data == NULL)) - return ERR_PTR(-ENOMEM); + if (len) { + dest->data = kmemdup(p, len, GFP_NOFS); + if (unlikely(dest->data == NULL)) + return ERR_PTR(-ENOMEM); + } else + dest->data = NULL; dest->len = len; return q; } -- 2.27.0