Received: by 2002:a05:6a10:413:0:0:0:0 with SMTP id 19csp707298pxp; Fri, 11 Mar 2022 12:55:40 -0800 (PST) X-Google-Smtp-Source: ABdhPJz0pmTG9kXWQfkjnnF+ntEt7wZIpk+jWG18mP1MI/jhDZhyF+cNtTHcQOMu/xLKI6vxDUCN X-Received: by 2002:a17:902:7088:b0:153:10ec:c5ef with SMTP id z8-20020a170902708800b0015310ecc5efmr12235586plk.18.1647032140517; Fri, 11 Mar 2022 12:55:40 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1647032140; cv=none; d=google.com; s=arc-20160816; b=evzpQZyY3Lh8zqHgfQwScgJRzG8dX+QlgHRK9y53pcxHK3V99TIPZ/lZA9d0No2EPP AiWNfSvSPmf6oXkf7VVW20kFmOZmP4Lx8hQXH3wMBLkjOwndE+KpAWJ3qEsdApsHKbtr ameg1++nsCll8iTS/sWze9VewRMsXzWKe86itPP3d82rZNq0znrvgVkbxm+CPCy9vy1L J6uHuSZh7NfhJnkKb06oxQz7P4WXGrkr7jpX91y0uupWiAHxhSR9jdFaAXjyAG+cNNw6 wh2iNqSLkgwtGMtagLXRhk8BDufwTycJggqzs0vmOrV5F1LzEodRefZkPeuC7xdtyNQk 49lg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:content-language:subject:user-agent:mime-version :date:message-id:dkim-signature; bh=tfG6NA9TljjE9JUfuXGD7jLzBJpRfBuiNXsgSuyR/Ok=; b=RQw/jDiKUpsHMYYciPqHXik99B15kRvAMICv7SNW9wbFU5qtjPwKiPyncDsWUcHhKs /jif0JnVudUSO7oaAvsSmmkNAPg/HJ433GVVNBrs0Ru4GSERTyVhU5l7yXVuXglERWnm FN3w9qLT7pYv8XQFcH/L49KTffKobrg85oyKCtAeT1BvhBFoC4WYZ3t8g3Nss+aE1ve5 zPBSX9RG1vb1eocfgXlKjzgVgGOetfIQS6j0eVMYRaA0fhPrcxMYe3vcKeNzeug8h93u 0xr6kluFQKAcJSRgMQ8UcnZDOXdO7zpfMfVQkw/K7lA6vTHMPEyf7lRbAXbRU/l4ur/a dqTg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=F4KUSzFW; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [2620:137:e000::1:18]) by mx.google.com with ESMTPS id h6-20020a056a00218600b004f3f63e2281si8716551pfi.367.2022.03.11.12.55.40 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 11 Mar 2022 12:55:40 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) client-ip=2620:137:e000::1:18; Authentication-Results: mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=F4KUSzFW; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 7AE4A1F4864; Fri, 11 Mar 2022 12:46:28 -0800 (PST) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1343914AbiCJVPp (ORCPT + 99 others); Thu, 10 Mar 2022 16:15:45 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:56418 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1343909AbiCJVPn (ORCPT ); Thu, 10 Mar 2022 16:15:43 -0500 Received: from mail-pl1-x633.google.com (mail-pl1-x633.google.com [IPv6:2607:f8b0:4864:20::633]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id D817916AA69 for ; Thu, 10 Mar 2022 13:14:40 -0800 (PST) Received: by mail-pl1-x633.google.com with SMTP id 9so5987114pll.6 for ; Thu, 10 Mar 2022 13:14:40 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=message-id:date:mime-version:user-agent:subject:content-language:to :cc:references:from:in-reply-to:content-transfer-encoding; bh=tfG6NA9TljjE9JUfuXGD7jLzBJpRfBuiNXsgSuyR/Ok=; b=F4KUSzFWvkikwF0SvA/qDB9X8w9nBp7jy5EUYNotdSB/O1cQAaoC2n7smN/xhKFsVq lgRimNXnnzTKQgAh36ozzlolX/oy5+CPtGHsIUTg84w2InqGzLK4Aewua7oqCR5ljjSf BZof0xl6VEUrIKuVpByM72uCjVnd8VV3pA00cXVhILzl0ag0zPJEoCkLV8tZtydKA34V R+L2NX89mBNmGhMrs2BO6fwlAQxlBJDvHsFhqSmwHZziLvEhypYWJ9qmSeyBDNa+bJsA VtYSmUdIqKB+Nn9zeXP2Go85oPJ/3satZnDkEMcgLKXfYwbxJ2IBewpYwktqTmKcv+MX 4oSQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:message-id:date:mime-version:user-agent:subject :content-language:to:cc:references:from:in-reply-to :content-transfer-encoding; bh=tfG6NA9TljjE9JUfuXGD7jLzBJpRfBuiNXsgSuyR/Ok=; b=VA0zq4Q4JjVsE4WiCYmllf8Ly2rgFogVO3iZJI47sKdwxXYUOqtgl7v9UAy4wqZYxu R7CnwT3UROMGrXFl78WJcJ9UH7/tAnp+bGiYPbf0U4trnqXOUQr3/zUFwm0vQWqi/DjK 8Xq0knPn8VLRyLJ1GTx7Q9RSfZeqd5L/k/TH9uIrVE2wHtmFD8OFqTnrTTCDXczCrQTg iPNmFJtn1qef8C19CRLJ7KFLKnbMicBrCUN9r73fxUo8HKbfUCTGDXeaWqQHB7ro2Tjk rPeQkQ+8uRVO0Ik25SHwbXfMAutyOBc+WsZYxBEJALc+0X0xt9UmF2dI70wAD5tspNKb 7avg== X-Gm-Message-State: AOAM5308U4KjHWiQ9O8ZQTnyJ0o3IE3dT4JO0AbwsiD7x0mwPbKSjWaM HQBK6jPSzvu5xbUW7Cxec28Ydg== X-Received: by 2002:a17:90b:4ac1:b0:1bf:6d51:1ad9 with SMTP id mh1-20020a17090b4ac100b001bf6d511ad9mr18019630pjb.199.1646946880235; Thu, 10 Mar 2022 13:14:40 -0800 (PST) Received: from [192.168.254.17] ([50.39.160.154]) by smtp.gmail.com with ESMTPSA id m7-20020a056a00080700b004f6ff260c9dsm8453837pfk.154.2022.03.10.13.14.39 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Thu, 10 Mar 2022 13:14:39 -0800 (PST) Message-ID: Date: Thu, 10 Mar 2022 13:14:38 -0800 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Thunderbird/91.5.0 Subject: Re: [PATCH] net: ipv6: fix invalid alloclen in __ip6_append_data Content-Language: en-US To: Willem de Bruijn Cc: David Ahern , David Laight , "davem@davemloft.net" , Hideaki YOSHIFUJI , Jakub Kicinski , Alexei Starovoitov , Daniel Borkmann , Andrii Nakryiko , Martin KaFai Lau , Song Liu , Yonghong Song , John Fastabend , KP Singh , "netdev@vger.kernel.org" , "bpf@vger.kernel.org" , "linux-kernel@vger.kernel.org" , "stable@vger.kernel.org" , "syzbot+e223cf47ec8ae183f2a0@syzkaller.appspotmail.com" References: <20220308000146.534935-1-tadeusz.struk@linaro.org> <14626165dad64bbaabed58ba7d59e523@AcuMS.aculab.com> <6155b68c-161b-0745-b303-f7e037b56e28@linaro.org> <66463e26-8564-9f58-ce41-9a2843891d1a@kernel.org> <45522c89-a3b4-4b98-232b-9c69470124a3@linaro.org> <8fdab42f-171f-53d7-8e0e-b29161c0e3e2@linaro.org> From: Tadeusz Struk In-Reply-To: Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-2.0 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,NICE_REPLY_A,RDNS_NONE,SPF_HELO_NONE, T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 3/10/22 09:32, Willem de Bruijn wrote: > On Thu, Mar 10, 2022 at 11:06 AM Tadeusz Struk wrote: >> >> On 3/10/22 06:39, Willem de Bruijn wrote: >>> On Wed, Mar 9, 2022 at 4:37 PM Tadeusz Struk wrote: >>>> >>>> On 3/8/22 21:01, David Ahern wrote: >>>>> On 3/8/22 12:46 PM, Tadeusz Struk wrote: >>>>>> That fails in the same way: >>>>>> >>>>>> skbuff: skb_over_panic: text:ffffffff83e7b48b len:65575 put:65575 >>>>>> head:ffff888101f8a000 data:ffff888101f8a088 tail:0x100af end:0x6c0 >>>>>> dev: >>>>>> ------------[ cut here ]------------ >>>>>> kernel BUG at net/core/skbuff.c:113! >>>>>> invalid opcode: 0000 [#1] PREEMPT SMP KASAN >>>>>> CPU: 0 PID: 1852 Comm: repro Not tainted >>>>>> 5.17.0-rc7-00020-gea4424be1688-dirty #19 >>>>>> Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1.fc35 >>>>>> RIP: 0010:skb_panic+0x173/0x175 >>>>>> >>>>>> I'm not sure how it supposed to help since it doesn't change the >>>>>> alloclen at all. >>>>> >>>>> alloclen is a function of fraglen and fraglen is a function of datalen. >>>> >>>> Ok, but in this case it doesn't affect the alloclen and it still fails. >>> >>> This is some kind of non-standard packet that is being constructed. Do >>> we understand how it is different? >>> >>> The .syz reproducer is generally a bit more readable than the .c >>> equivalent. Though not as much as an strace of the binary, if you >>> can share that. >>> >>> r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) >>> connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) >>> setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, >>> &(0x7f0000000100)=ANY=[@ANYBLOB="52b3"], 0x5a0) >>> sendmmsg$inet(r0, &(0x7f00000002c0)=[{{0x0, 0x0, >>> &(0x7f0000000000)=[{&(0x7f00000000c0)="1d2d", 0xfa5f}], 0x1}}], 0x1, >>> 0xfe80) >> >> Here it is: >> https://termbin.com/krtr >> It won't be of much help, I'm afraid, as the offending sendmmsg() >> call isn't fully printed. > > Thanks. It does offer some hints on the other two syscalls: > > [pid 644] connect(3, {sa_family=AF_INET6, sin6_port=htons(0), > sin6_flowinfo=htonl(0), inet_pton(AF_INET6, "fe80::", &sin6_addr), > sin6_scope_id=if_nametoindex("tunl0")}, 28) = 0 > [pid 644] setsockopt(3, SOL_IPV6, IPV6_HOPOPTS, > "R\263\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0"..., > 1440) = 0 > > IPV6_HOPOPTS is ns_capable CAP_NET_RAW. > > So this adds 1440 bytes to opt_nflen, which is included in > fragheaderlen, causing that to be exactly mtu. This means that the > payload can never be sent, as each fragment header eats up the entire > mtu? This is without any transport headers that would only be part of > the first fragment (which go into opt_flen). > > If you can maybe catch the error before the skb_put and just return > EINVAL, we might see whether sendmmsg is relevant or a simple send > would be equivalent. (not super important, that appears unrelated.) Do you mean something like this: diff --git a/net/ipv6/ip6_output.c b/net/ipv6/ip6_output.c index 622345af323e..6d45112322a0 100644 @@ -1656,6 +1649,16 @@ static int __ip6_append_data(struct sock *sk, skb->protocol = htons(ETH_P_IPV6); skb->ip_summed = csummode; skb->csum = 0; + + /* + * Check if there is still room for the payload + */ + if (fragheaderlen >= mtu) { + err = -EMSGSIZE; + kfree_skb(skb); + goto error; + } + /* reserve for fragmentation and ipsec header */ skb_reserve(skb, hh_len + sizeof(struct frag_hdr) + dst_exthdrlen); That works as well. -- Thanks, Tadeusz