Received: by 2002:a05:6a10:af89:0:0:0:0 with SMTP id iu9csp1938223pxb; Sat, 22 Jan 2022 10:36:22 -0800 (PST) X-Google-Smtp-Source: ABdhPJwalaJFlufNcu3Vb5HvNE4pNoOzax6p0UHd/YONDGBVgpcTlS58u6TqwJjY7ITf3D5h/q63 X-Received: by 2002:a63:154f:: with SMTP id 15mr6569271pgv.521.1642876582274; Sat, 22 Jan 2022 10:36:22 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1642876582; cv=none; d=google.com; s=arc-20160816; b=h5kQnRm5miLxrfgxoYImjuxEU2nTKDAiWEl0ciOERO1iS/p28fCtZesFKDY1gmVHaN jvxChFtvXtMvxH5585jMPDoJ/ZOJ7+aXhtpq0nYZg9bT2UuuDd+OaL26/hDUuyQ+6RCX kFAfoTeXo00xJuxFaJRtHOKLExgB4vRGls6YmE5agXexB4oHHfY4Jz7h477Nm5JbiEXM xFt5Qmm92AJNFUYFNc9tAZWVVSxEPVDiML6FnA9pietIQvWo1obdHdjv8Ri66W+jryNP w2iF9xcjdWPUQhhGgjcf/vEByD2VJxl8D+T592LcHt8z0rUrc5KdJBzhQPmzPc1ChfA8 GkNQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:subject :from:references:cc:to:content-language:user-agent:mime-version:date :message-id; bh=HHCBiahy7uGtunJGv+By993lcvuP9Vif9LxDZQyGqKo=; b=e/JpZsSqYU7sH9T0AqA0nxjkW71g6a379wZb0FBdRyWDuoZb42rtMxa8OOfY2zHvMv bc4cJJwSlJ5q0nDh+yIy5YpgjHqAN2wl3qk1Ktl43ubGAgYtkRuoZL276V8cVL6zSrni R2dmOSVeM6H+V9udF9WRVppxWJ00oUBO+sTwhxJqXeK4aeg4mr7s0/fvpBP4+az2b0lQ hv1ZnGRZTIdokgrfjwqT/Ab2/Z7xV0/c+Vo3mv54BvsIdbf0K22LLlvbC3OAlgpPSXRo 0wc/1Y6uQINlDqnm3/eWprRwv1Up1F9KJCDHjcsxxFr6RDwQpyxp1t71N1JNltUl4gbp W+gA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id w7si9262050plz.237.2022.01.22.10.36.09; Sat, 22 Jan 2022 10:36:22 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230484AbiAUXSE (ORCPT + 99 others); Fri, 21 Jan 2022 18:18:04 -0500 Received: from giacobini.uberspace.de ([185.26.156.129]:49444 "EHLO giacobini.uberspace.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229557AbiAUXSE (ORCPT ); Fri, 21 Jan 2022 18:18:04 -0500 Received: (qmail 11843 invoked by uid 990); 21 Jan 2022 23:18:02 -0000 Authentication-Results: giacobini.uberspace.de; auth=pass (plain) Message-ID: <995e58bb-6dfb-b3db-c8a5-b9e30dbb104d@eknoes.de> Date: Sat, 22 Jan 2022 00:18:01 +0100 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Thunderbird/91.5.0 Content-Language: en-US To: Luiz Augusto von Dentz Cc: Marcel Holtmann , Johan Hedberg , "David S. Miller" , Jakub Kicinski , "linux-bluetooth@vger.kernel.org" , "open list:NETWORKING [GENERAL]" , Linux Kernel Mailing List References: <20220121173622.192744-1-soenke.huster@eknoes.de> <4f3d6dcf-c142-9a99-df97-6190c8f2abc9@eknoes.de> From: =?UTF-8?Q?S=c3=b6nke_Huster?= Subject: Re: [RFC PATCH] Bluetooth: hci_event: Ignore multiple conn complete events In-Reply-To: Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Rspamd-Bar: - X-Rspamd-Report: MIME_GOOD(-0.1) BAYES_HAM(-2.999892) SUSPICIOUS_RECIPS(1.5) X-Rspamd-Score: -1.599892 Received: from unknown (HELO unkown) (::1) by giacobini.uberspace.de (Haraka/2.8.28) with ESMTPSA; Sat, 22 Jan 2022 00:18:02 +0100 Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Luiz, On 21.01.22 22:31, Luiz Augusto von Dentz wrote: > Hi Sönke, > > On Fri, Jan 21, 2022 at 10:22 AM Sönke Huster wrote: >> >> I just noticed that just checking for handle does not work, as obviously 0x0 could also be a handle value and therefore it can't be distinguished, whether it is not set yet or it is 0x0. > > Yep, we should probably check its state, check for state != BT_OPEN > since that is what hci_conn_add initialize the state. > I thought there are more valid connection states for the first HCI_CONNECTION_COMPLETE event, as it also occurs e.g. after an HCI_Create_Connection command, see Core 5.3 p.2170: > This event also indicates to the Host which issued the HCI_Create_Connection, HCI_Accept_- > Connection_Request, or HCI_Reject_Connection_Request command, and > then received an HCI_Command_Status event, if the issued command failed or > was successful. For example in hci_conn.c hci_acl_create_connection (which triggers a HCI_Create_Connection command as far as I understand), the state of the connection is changed to BT_CONNECT or BT_CONNECT2. But as I am quite new in the (Linux) Bluetooth world, I might have a wrong understanding of that. >> On 21.01.22 18:36, Soenke Huster wrote: >>> When a HCI_CONNECTION_COMPLETE event is received multiple times >>> for the same handle, the device is registered multiple times which leads >>> to memory corruptions. Therefore, consequent events for a single >>> connection are ignored. >>> >>> The conn->state can hold different values so conn->handle is >>> checked to detect whether a connection is already set up. >>> >>> Buglink: https://bugzilla.kernel.org/show_bug.cgi?id=215497 >>> Signed-off-by: Soenke Huster >>> --- >>> This fixes the referenced bug and several use-after-free issues I discovered. >>> I tagged it as RFC, as I am not 100% sure if checking the existence of the >>> handle is the correct approach, but to the best of my knowledge it must be >>> set for the first time in this function for valid connections of this event, >>> therefore it should be fine. >>> >>> net/bluetooth/hci_event.c | 11 +++++++++++ >>> 1 file changed, 11 insertions(+) >>> >>> diff --git a/net/bluetooth/hci_event.c b/net/bluetooth/hci_event.c >>> index 681c623aa380..71ccb12c928d 100644 >>> --- a/net/bluetooth/hci_event.c >>> +++ b/net/bluetooth/hci_event.c >>> @@ -3106,6 +3106,17 @@ static void hci_conn_complete_evt(struct hci_dev *hdev, void *data, >>> } >>> } >>> >>> + /* The HCI_Connection_Complete event is only sent once per connection. >>> + * Processing it more than once per connection can corrupt kernel memory. >>> + * >>> + * As the connection handle is set here for the first time, it indicates >>> + * whether the connection is already set up. >>> + */ >>> + if (conn->handle) { >>> + bt_dev_err(hdev, "Ignoring HCI_Connection_Complete for existing connection"); >>> + goto unlock; >>> + } >>> + >>> if (!ev->status) { >>> conn->handle = __le16_to_cpu(ev->handle); >>> > > > Best Sönke