Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp1225729pxb; Thu, 4 Mar 2021 06:33:43 -0800 (PST) X-Google-Smtp-Source: ABdhPJxyxoOnhd2ktlj9qY3xmDa7hyTurrKeMEBB04VmAMF/D0+zkTQZouYEqfOu+E/UQfGCjgLy X-Received: by 2002:a05:6402:2058:: with SMTP id bc24mr4684135edb.243.1614868423257; Thu, 04 Mar 2021 06:33:43 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1614868423; cv=none; d=google.com; s=arc-20160816; b=mVJCPntqn62P8XsA/kXGDOu8HrfO4ev5fOdxSfzmt7QLJgPwVeukSK7vN+ZVnsjHym P5mc5WnKe/dHE/GVmO+4aJfrauMHzI8GnevY/8VBSuBxJFey5f6tuiAbk1R/s8mG+XSE xOie3hXfpk2QUSwow4Eb0/salKF5R9KVIftRmMEq7r/YNfrshhS0OmyN2WcQp2fJM41M Vr7ZzPfrIB6OGKFtWLKi1Kxs40AzkebGOq/gcigaDGxhBKwlUrJ5CBeElySscvIfQGJ7 kD2dOaLDT7QueZ4HwQIUHAbTRnm3n3LhFPKy5pFWRDclowNBDbfMrs9swflQrqkw5taC LBgQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=JMOAoKv46pbLWuzklGj9HANrKw8HcT4/68qmxCFcggQ=; b=C4uF30XRzeLsZ5ZJdk5rOPTc3ZPx0qZY1d8WIgXJpezZOzTbG6dV9uZF3RkGeCmPa2 uLOX1IhBjuaoVgY3tUK15tbg5NSHVA7LAwRse2YToG7aU4KdF07Nyila6WhP7Kl+X17V rnte6BhblQ9dpKV665FpLZq64I7azAPqfKGeFxFydB9tchKSqiIX/U21MdTeUcpBmInv gGVuOc0OavFhgU49N4eH3awvRCKPQY46S018w3EApLN04oKQsh9fyEucZrttVgqJuWKi +PWTfizCJIQOEKFyTor+kmMFKl8njCIp1slJFDSR9A6Qz68FtgrPlBg4pOXR/x5EgpsD hNmQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=baBwwf92; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id t23si15387841eji.717.2021.03.04.06.33.10; Thu, 04 Mar 2021 06:33:43 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=baBwwf92; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231341AbhCDCmF (ORCPT + 99 others); Wed, 3 Mar 2021 21:42:05 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:51086 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229791AbhCDClf (ORCPT ); Wed, 3 Mar 2021 21:41:35 -0500 Received: from mail-ot1-x333.google.com (mail-ot1-x333.google.com [IPv6:2607:f8b0:4864:20::333]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 13DAFC061756; Wed, 3 Mar 2021 18:40:55 -0800 (PST) Received: by mail-ot1-x333.google.com with SMTP id h22so25795390otr.6; Wed, 03 Mar 2021 18:40:55 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=JMOAoKv46pbLWuzklGj9HANrKw8HcT4/68qmxCFcggQ=; b=baBwwf92MdQ53FQXgBhJxFq1OjJZWlbSiKo6rKrk81d07WzGPcDJwLXDgfQSge/uaM MRaI7S0ddpyzxDc9dccfVOdk4o+SqYcf1zKCSNOBtWZX+QFNtIH9TLErLmMBs1IYJMjd CpPngWeSGZ3kfJxkpUimjdJ8DHbrml4Q+9aJyxnRSy9BNcDWW3Uo9lKz0gEhkp7Up4AZ jbfDlwCnXLEJ1nTbUwqRYd56XsnVNj8pbxwQCbF6yTOh5gvoVzlPA6n/QEcLNby+7hxl M6cdZqOH94Jz9ypSthyIxxOYKAs2ctpxnWoH3C4fnwVhWd4ZO7rIZZuNCLG8TsJEp2bl csMQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=JMOAoKv46pbLWuzklGj9HANrKw8HcT4/68qmxCFcggQ=; b=VUmBFxsJCsU9NVsNH8eOa8JgBq1BwSZvANDU0XTz50DXFfJLhueva6PaEnw5+nZwkd bzx3FagThWXf+6bCQH7jWHSr1TMylWM50kb6SEPPmNfl1j0/LJhYWzdWTdbHkUjanbNA 2tnhZ5u4Jpj045U+/CqwFQnC95m/9qf3RyyJWIMFKbThSWnQPEa1UiReTPMAFGuAxT2V FWGS2W7j5cCTaj4AIx+6jerhqdUXzfXUNby2Rlu01Rjbr+TjEy8ytcfLQSqqVNUFbdA5 qBY1IOPkJEpRyj6iyT2kmKUmj0IZT09Z8Td6CL8EP1hOLWVL+rpGNOJnv5XXX6VSsxMW IkRw== X-Gm-Message-State: AOAM533ZdDj9vt/Rvzrd/KeMEtOMU7rEKQ2O5K+JwOOHF1W1xTpqn+X5 VD/DnxMM54w4ew69Hgqdf1IIc315E/WXVVeQcKutI3dZ7Kk= X-Received: by 2002:a05:6830:80b:: with SMTP id r11mr1728934ots.329.1614825654567; Wed, 03 Mar 2021 18:40:54 -0800 (PST) MIME-Version: 1.0 References: <20210303162757.763502-1-paskripkin@gmail.com> In-Reply-To: <20210303162757.763502-1-paskripkin@gmail.com> From: Alexander Aring Date: Wed, 3 Mar 2021 21:40:43 -0500 Message-ID: Subject: Re: [PATCH] net: mac802154: Fix null pointer dereference To: Pavel Skripkin Cc: Stefan Schmidt , "David S. Miller" , linux-wpan - ML , "open list:NETWORKING [GENERAL]" , kernel list , syzbot+12cf5fbfdeba210a89dd@syzkaller.appspotmail.com Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi, On Wed, 3 Mar 2021 at 11:28, Pavel Skripkin wrote: > > syzbot found general protection fault in crypto_destroy_tfm()[1]. > It was caused by wrong clean up loop in llsec_key_alloc(). > If one of the tfm array members won't be initialized it will cause > NULL dereference in crypto_destroy_tfm(). > > Call Trace: > crypto_free_aead include/crypto/aead.h:191 [inline] [1] > llsec_key_alloc net/mac802154/llsec.c:156 [inline] > mac802154_llsec_key_add+0x9e0/0xcc0 net/mac802154/llsec.c:249 > ieee802154_add_llsec_key+0x56/0x80 net/mac802154/cfg.c:338 > rdev_add_llsec_key net/ieee802154/rdev-ops.h:260 [inline] > nl802154_add_llsec_key+0x3d3/0x560 net/ieee802154/nl802154.c:1584 > genl_family_rcv_msg_doit+0x228/0x320 net/netlink/genetlink.c:739 > genl_family_rcv_msg net/netlink/genetlink.c:783 [inline] > genl_rcv_msg+0x328/0x580 net/netlink/genetlink.c:800 > netlink_rcv_skb+0x153/0x420 net/netlink/af_netlink.c:2502 > genl_rcv+0x24/0x40 net/netlink/genetlink.c:811 > netlink_unicast_kernel net/netlink/af_netlink.c:1312 [inline] > netlink_unicast+0x533/0x7d0 net/netlink/af_netlink.c:1338 > netlink_sendmsg+0x856/0xd90 net/netlink/af_netlink.c:1927 > sock_sendmsg_nosec net/socket.c:654 [inline] > sock_sendmsg+0xcf/0x120 net/socket.c:674 > ____sys_sendmsg+0x6e8/0x810 net/socket.c:2350 > ___sys_sendmsg+0xf3/0x170 net/socket.c:2404 > __sys_sendmsg+0xe5/0x1b0 net/socket.c:2433 > do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 > entry_SYSCALL_64_after_hwframe+0x44/0xae > > Signed-off-by: Pavel Skripkin > Reported-by: syzbot+12cf5fbfdeba210a89dd@syzkaller.appspotmail.com > --- > net/mac802154/llsec.c | 2 +- > 1 file changed, 1 insertion(+), 1 deletion(-) > > diff --git a/net/mac802154/llsec.c b/net/mac802154/llsec.c > index 585d33144c33..6709f186f777 100644 > --- a/net/mac802154/llsec.c > +++ b/net/mac802154/llsec.c > @@ -151,7 +151,7 @@ llsec_key_alloc(const struct ieee802154_llsec_key *template) > err_tfm0: > crypto_free_sync_skcipher(key->tfm0); > err_tfm: > - for (i = 0; i < ARRAY_SIZE(key->tfm); i++) > + for (; i >= 0; i--) > if (key->tfm[i]) I think this need to be: if (!IS_ERR_OR_NULL(key->tfm[i])) otherwise we still run into issues for the current iterator when key->tfm[i] is in range of IS_ERR(). - Alex