Received: by 2002:a05:6a10:af89:0:0:0:0 with SMTP id iu9csp2563602pxb; Mon, 17 Jan 2022 00:50:27 -0800 (PST) X-Google-Smtp-Source: ABdhPJyLrDDp9V6TTsCndHVkXCmIUZX5Eu1ymR19Ckq0L0Ycr95N8YEACM2lqptxx7lsQA73JnE3 X-Received: by 2002:a17:90b:4acf:: with SMTP id mh15mr19498725pjb.73.1642409426910; Mon, 17 Jan 2022 00:50:26 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1642409426; cv=none; d=google.com; s=arc-20160816; b=vcuNpXVQmlma1MY1Hr/GE8GC8DgItuArMMutt/pl1GSj7WfnYHhtWL3kDcUtmfimcw GbCalVpfSeA9ACm2vGamjrc54ZM9blaFEbB6K6lXlqAHEkf2GEd65E3KX9lEGSYzBMFq 2QLHdny+mw/Gh6tNYB/rmogHCNkSWkdzdbFUWC6NhdXIIYePpFeEfKxNzxM4L5tF7CAV DA0G6l0++zeg2BBAjcM6EVp6kU8QlFa/KAQK+gVtCvuGmffhub9un0S/cz2Hmts9lLZW rDKpQyBuGLIGS9wvnt1sTVIKvr0cBSMj1vEiGJSKpQCzRo/zW7pzpsuWFeN5X93sVFIY Aq4A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:content-language:subject:user-agent:mime-version :date:message-id:dkim-signature; bh=uu9EwQyUbuYOtlXdv8X6YvDBdNAXZT2Hiy2y1K9OCsE=; b=dLHVw/EYCn0Xzj1IeyhbuOwXTvleptX6QjXrAmjJfezXSpP5dOinkUlaiFBUKcNhjJ 72xjS8asDD9stJfRD4Ies9xwxrGImWpzpFqpfbfngTJKhqKTpssOCmb3FcjZEhG68/zl 6CDyTlmyI4K3dcXI8G4a1uM3+yLiZ6Mc1e75HnyEk7lWfGhuCJfs2qdN+5mjfuHbqGoR UHznvS57ME1LBcWjrqphCgHNJHpIzf4ecIUGV+6piY+DVTnG6eo0XT/RJQrCBNWq1r3s 2l72VYX0cGuJ/h+X5XDcGyg6SmBuYnKbbFD1uIm3BlXGFjJtj9IoqAmUCBCS6bGBVFrY QSug== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@canonical.com header.s=20210705 header.b=Ah6xF7eC; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=canonical.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id p11si12371425plk.306.2022.01.17.00.50.14; Mon, 17 Jan 2022 00:50:26 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@canonical.com header.s=20210705 header.b=Ah6xF7eC; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=canonical.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235566AbiAPQuY (ORCPT + 99 others); Sun, 16 Jan 2022 11:50:24 -0500 Received: from smtp-relay-internal-1.canonical.com ([185.125.188.123]:49428 "EHLO smtp-relay-internal-1.canonical.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232585AbiAPQuX (ORCPT ); Sun, 16 Jan 2022 11:50:23 -0500 Received: from mail-ed1-f70.google.com (mail-ed1-f70.google.com [209.85.208.70]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by smtp-relay-internal-1.canonical.com (Postfix) with ESMTPS id 2291E3F1E3 for ; Sun, 16 Jan 2022 16:50:16 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=canonical.com; s=20210705; t=1642351816; bh=uu9EwQyUbuYOtlXdv8X6YvDBdNAXZT2Hiy2y1K9OCsE=; h=Message-ID:Date:MIME-Version:Subject:To:Cc:References:From: In-Reply-To:Content-Type; b=Ah6xF7eC0TWXBsxmFjXPvU/9YqyLg9qkw/JSvMksPcoP/cYbJzPpp5jwtVWtLc3lO ok+ELGEZbh1r+cd3JC+SsBQHUiSYvViwGmSVgKu0RwmC83eoK6LW6uU6NV7A7mrCcj LflY1FAMO2o7ZBIej/P8VK+KAEm54Y9SlMirn/fu0MZBoRRYnsh8wuirF/XLWuoMY/ t3dEfBNQuLTgyzQtdunvgQpUdzQxfrOR6+iaNEPPZhVyZfi/J7gIO7dddnI7XWbxPG OGMZ8oLqRK9//k38WNFqJhEfVDHIf0e2cR2ReHZUNjtntLGDscXZ+fnf/aOmXFdgRr sVLE7l7fCQrqQ== Received: by mail-ed1-f70.google.com with SMTP id a8-20020a056402168800b004022fcdeb25so1432360edv.21 for ; Sun, 16 Jan 2022 08:50:16 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:message-id:date:mime-version:user-agent:subject :content-language:to:cc:references:from:in-reply-to :content-transfer-encoding; bh=uu9EwQyUbuYOtlXdv8X6YvDBdNAXZT2Hiy2y1K9OCsE=; b=Y7b1HRfMmy5b1HzdAIz1my2tTZs404jk52ApPLSPWsn2MFFhpfvRbjWBEqSXi9Gowq 146nJs+OTtCrt72tVHY2P+obAd5dx2l7NyGvZc8MfKk/T7XaTPISJ+eqcFnitQnp7BhK UjPvHv3DSuvpxQtxtcKQGRo2xqPAKjtBz4y5VfLWwQu37mGI8ODiAtZr4HdXQczawmj4 ODu98lhzjxzVtQkm+x1GVqKwH8+56HVmb1M0WpfHaspDwzKMrLYE2aS5ZYvxJCgYsgIf GMsNvknQx4+nSA/mB0o6TPrm1o0NZzFYckngUoN0KJaFV1Mp+i9JCVBo5J+rXUlSPk++ CYAg== X-Gm-Message-State: AOAM533AjjHIYxcLwlDHdtG+xXutdnpqbIjMjpZWLTPmcPfJTcqSoDLw 4vexExFumdCI/33YwPZiezwXKuq1SxqLYM8XmUn1tkgp0ML6kFk43nKutzVqDfjmcxHXauJHlKH XtYpwr1J+t3jhGJ7CJU5eWDZV0tmDIwGKQvxhuMsQ2A== X-Received: by 2002:a17:906:3e8a:: with SMTP id a10mr13816078ejj.612.1642351815015; Sun, 16 Jan 2022 08:50:15 -0800 (PST) X-Received: by 2002:a17:906:3e8a:: with SMTP id a10mr13816070ejj.612.1642351814769; Sun, 16 Jan 2022 08:50:14 -0800 (PST) Received: from [192.168.0.35] (xdsl-188-155-168-84.adslplus.ch. [188.155.168.84]) by smtp.gmail.com with ESMTPSA id 7sm3585082ejh.161.2022.01.16.08.50.13 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Sun, 16 Jan 2022 08:50:14 -0800 (PST) Message-ID: Date: Sun, 16 Jan 2022 17:50:13 +0100 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Thunderbird/91.3.1 Subject: Re: [PATCH 1/7] nfc: llcp: fix NULL error pointer dereference on sendmsg() after failed bind() Content-Language: en-US To: Hillf Danton Cc: linux-nfc@lists.01.org, netdev@vger.kernel.org, linux-kernel@vger.kernel.org, syzbot+7f23bcddf626e0593a39@syzkaller.appspotmail.com References: <20220115122650.128182-1-krzysztof.kozlowski@canonical.com> <20220116134122.2197-1-hdanton@sina.com> From: Krzysztof Kozlowski In-Reply-To: <20220116134122.2197-1-hdanton@sina.com> Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 16/01/2022 14:41, Hillf Danton wrote: > Hey Krzysztof > > On Sat, 15 Jan 2022 13:26:44 +0100 Krzysztof Kozlowski wrote: >> +++ b/net/nfc/llcp_sock.c >> @@ -789,6 +789,11 @@ static int llcp_sock_sendmsg(struct socket *sock, struct msghdr *msg, >> >> lock_sock(sk); >> >> + if (!llcp_sock->local) { >> + release_sock(sk); >> + return -ENODEV; >> + } >> + >> if (sk->sk_type == SOCK_DGRAM) { >> DECLARE_SOCKADDR(struct sockaddr_nfc_llcp *, addr, >> msg->msg_name); >> -- >> 2.32.0 > > Given the same check for llcp local in nfc_llcp_send_ui_frame(), adding > another check does not help. Helps, because other is not protected with lock. The other could be removed, because it is simply wrong, but I did not check it. The patch fixes the report and reproducible race, but maybe does not necessarily fix entirely the race (which maybe this is what you meant by "does not help"?). Best regards, Krzysztof