Received: by 2002:a05:7412:d024:b0:f9:90c9:de9f with SMTP id bd36csp33675rdb; Wed, 20 Dec 2023 05:42:19 -0800 (PST) X-Google-Smtp-Source: AGHT+IE9NfXoTgxQhyhbg/HAMabHc68v69lmaPQHrdWHCIRFcht12hzqzOWHpJSSOQykU2FHkJYJ X-Received: by 2002:a05:6358:52c6:b0:172:8976:49be with SMTP id z6-20020a05635852c600b00172897649bemr17790076rwz.34.1703079739032; Wed, 20 Dec 2023 05:42:19 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1703079738; cv=none; d=google.com; s=arc-20160816; b=evFHsHoz4gNOEquWQ9plrWwO+cC3sCZ7maSAjd10v30yLzbg/9bVdgMGXOgwjPDo0z SCEO33Wd44Ald0NVXETfd1yU8kVCJwMCua4UM0PQ8jrIhwmHeoD28PT50T06hei3X6OJ go3qnp/5+EYBcpiOCl3QSmD6GtITtLzbP4Zj1cIWUoQUlFtJsshx2vx0kqr+NxE2oCB3 Ou3FOQNYo+5S+/WumjynvZk8PCh72oI9u98+s7lz7HFB18H4StZTa1gXazx9Asux78Dn h8VyOtXUTvjcms2+sBmIKxinzDTPFiAxe+Cn8LzJXzMso3SPGMHbG5gnIC8foIm+gFmV twrg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:in-reply-to:date :subject:cc:to:from:message-id:dkim-signature; bh=1+yL4gGE9+NGHEgkyt7frrtI1/QrZQBFYggsrD23Jlg=; fh=yaQkdegXwatWYTBgoUmiAv2XKhhUXDlQLZIOKPKJGLk=; b=oG7NqLKdUJQqmMOWlYP4So5DAMwn/esgCBSkXuLXn/onllVUC3S11aUi2xxVk4UJtB 0aOMJIgLePj5ERJhJu86n4qU4IXpbnrYQjk01IuQ16gGgl9/HdUk2RWMhiJ09neJubiI Yne5y0N/P1AQmJIpuJR8Dr3scrxP7VtH/LyAYNZWZeG3vaTf10mtl5AtxDkUi7dM+Afu zf5wvAKkBhAGdh4SNlaXtfnewKkdljlW+4axpp3hPPNNBN0oREcE8+PhiZnGLqfZQs9j vURPWuH+T0Clyt9VU1OfY9rE0aUcrsSakB2eZPW+Ql9AMtSV4MZb5ZLqGlFW6s7Wob5y FadA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@qq.com header.s=s201512 header.b=pBN07i0M; spf=pass (google.com: domain of linux-kernel+bounces-6979-linux.lists.archive=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) smtp.mailfrom="linux-kernel+bounces-6979-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=qq.com Return-Path: Received: from sv.mirrors.kernel.org (sv.mirrors.kernel.org. [139.178.88.99]) by mx.google.com with ESMTPS id dw21-20020a056a00369500b006d947840c8bsi1340148pfb.334.2023.12.20.05.42.18 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 20 Dec 2023 05:42:18 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-6979-linux.lists.archive=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) client-ip=139.178.88.99; Authentication-Results: mx.google.com; dkim=pass header.i=@qq.com header.s=s201512 header.b=pBN07i0M; spf=pass (google.com: domain of linux-kernel+bounces-6979-linux.lists.archive=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) smtp.mailfrom="linux-kernel+bounces-6979-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=qq.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sv.mirrors.kernel.org (Postfix) with ESMTPS id B4F782833EB for ; Wed, 20 Dec 2023 13:42:17 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id AFED9358B2; Wed, 20 Dec 2023 13:42:15 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=qq.com header.i=@qq.com header.b="pBN07i0M" X-Original-To: linux-kernel@vger.kernel.org Received: from out203-205-221-205.mail.qq.com (out203-205-221-205.mail.qq.com [203.205.221.205]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 4453424B4B for ; Wed, 20 Dec 2023 13:42:09 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=quarantine dis=none) header.from=qq.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=qq.com DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=qq.com; s=s201512; t=1703079421; bh=1+yL4gGE9+NGHEgkyt7frrtI1/QrZQBFYggsrD23Jlg=; h=From:To:Cc:Subject:Date:In-Reply-To:References; b=pBN07i0MrZv5X0hICU2DIWkTufmsx6Jx85jasot7c/gwiuROsNBELnWuxBkfEccOp cyteFOVLf5H4PJKFRjsrOWPRuG0O0qfiEXiItEQnXLDMKv0w5qkGrokcy7g7ZKuMKz h5dHNx0S5gCTlSmeJ+DGQ599iHKknOJ8Yrekl0Hg= Received: from pek-lxu-l1.wrs.com ([111.198.225.215]) by newxmesmtplogicsvrsza1-0.qq.com (NewEsmtp) with SMTP id 93B8AAD4; Wed, 20 Dec 2023 21:36:59 +0800 X-QQ-mid: xmsmtpt1703079419trhplsea4 Message-ID: X-QQ-XMAILINFO: OORdZW5aAcVyqp13AiMh2g6/cPk8RtxT1PCiOcfac1XfhcT5kXJlsFw0ZnQTzh pR8qsaAx2S+1BTyjfAXgP5onxyM+siwnYotn0W3RlqkTJ+vu/M6EZAH+w0FLmhG2vdyEi8PmK0W1 QPsOXVJCOfi5OoSsMRYQxwsgngraFFjJ5lRG1CR1NzNeXN0bsh7TN34sQswlprBjn+yusgHHIoqf ixfIP9BMF4gJmMgRAN/KabxCqMuS6ogqSc7eQyaSudQAqUxonhxw/v1e159vIkIam5hKJ8Wkeyo0 m4q0mQaHlD2FL6/HxPwfTr0xM90u6k6E35MJ+eTJDjLXcsSt/fZl/t6PyPbDCaiXZebgkWm6pdJY /aCbeYmTPf+US90F2aDtxrR/j5QWFw9UgYwXUqqk+9cvTqx5j/FiOe99ryNUbjuSkdthLGwTCM1A 75XNS6aFEWGXfijjlH09dIvvEWrEsBfqPKGZ8R/XzxOZwNmV7u2Tr2EAzst41Om0WuUKPdbQBPON HwHGrIq37kzzVD5mkAQMpp91JixZJUz800HG8kqc1434reIkMsIUqlLgAQHq6t2MM5Q2KTA5YyUN njA8ZNUyKmTdRVHYC6a5dSRx7Xr0JkFrHZdJn3+72YmLLtjbKp5PwjU04irWx6bLcTijR0vWlQzG 6e9sCC/PU9IThh29WfsFWbQNunDEr+yW/sc4+BU2a4dlHHHCqUaIlKI9qg4XHy5EYdXj0r+XdzqK eOiHYX7AI0PrJd1TF8ZqESkvI0HyJtPlXGPdAAf9f77fB0tBifyXjhxnuVlcoAHZ14Ws7efkxcnY ujHbPiSdaEHnliPS5QvKRbbN16PzZAWzpOLBJ8ivzrS3qc9vPS33/x6HrPoqrSb8/gN+ZnK+bE39 sAkaj2Qe0FYwZwpqGYZPM/GUq8PCTeZ+CaThe7Ht/8TDxoKKeBZY0rYSNud32HTy6oHYFJAdpxOh 1XA9LcorhlUIFeVCdLNQtAc95elTmUw1gGHfuxcMw= X-QQ-XMRINFO: NI4Ajvh11aEj8Xl/2s1/T8w= From: Edward Adam Davis To: syzbot+8ffb0839a24e9c6bfa76@syzkaller.appspotmail.com Cc: linux-kernel@vger.kernel.org, syzkaller-bugs@googlegroups.com Subject: Re: [syzbot] [crypto?] KASAN: slab-out-of-bounds Read in arc4_crypt Date: Wed, 20 Dec 2023 21:37:00 +0800 X-OQ-MSGID: <20231220133659.3639130-2-eadavis@qq.com> X-Mailer: git-send-email 2.42.0 In-Reply-To: <000000000000d52e14060cc9c551@google.com> References: <000000000000d52e14060cc9c551@google.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit please test slab-out-of-bounds Read in arc4_crypt #syz test https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git 17cb8a20bde6 diff --git a/crypto/algif_skcipher.c b/crypto/algif_skcipher.c index 02cea2149504..72ce8e9c16d5 100644 --- a/crypto/algif_skcipher.c +++ b/crypto/algif_skcipher.c @@ -33,6 +33,7 @@ #include #include #include +#include static int skcipher_sendmsg(struct socket *sock, struct msghdr *msg, size_t size) @@ -102,11 +103,12 @@ static int _skcipher_recvmsg(struct socket *sock, struct msghdr *msg, struct alg_sock *pask = alg_sk(psk); struct af_alg_ctx *ctx = ask->private; struct crypto_skcipher *tfm = pask->private; + struct skcipher_alg *alg = crypto_skcipher_alg(tfm); unsigned int bs = crypto_skcipher_chunksize(tfm); struct af_alg_async_req *areq; unsigned cflags = 0; int err = 0; - size_t len = 0; + size_t len = 0, aqlen; if (!ctx->init || (ctx->more && ctx->used < bs)) { err = af_alg_wait_for_data(sk, flags, bs); @@ -115,8 +117,11 @@ static int _skcipher_recvmsg(struct socket *sock, struct msghdr *msg, } /* Allocate cipher request for current operation. */ - areq = af_alg_alloc_areq(sk, sizeof(struct af_alg_async_req) + - crypto_skcipher_reqsize(tfm)); + aqlen = sizeof(struct af_alg_async_req) + crypto_skcipher_reqsize(tfm); + if (alg->co.base.cra_type != &crypto_skcipher_type) + aqlen += alg->co.statesize; + printk("%u, %s\n", alg->co.statesize, __func__); + areq = af_alg_alloc_areq(sk, aqlen); if (IS_ERR(areq)) return PTR_ERR(areq); diff --git a/crypto/skcipher.c b/crypto/skcipher.c index bc70e159d27d..0ae4a05a5aa7 100644 --- a/crypto/skcipher.c +++ b/crypto/skcipher.c @@ -44,7 +44,6 @@ struct skcipher_walk_buffer { u8 buffer[]; }; -static const struct crypto_type crypto_skcipher_type; static int skcipher_walk_next(struct skcipher_walk *walk); diff --git a/include/crypto/internal/skcipher.h b/include/crypto/internal/skcipher.h index 7ae42afdcf3e..3c05872652f2 100644 --- a/include/crypto/internal/skcipher.h +++ b/include/crypto/internal/skcipher.h @@ -24,6 +24,7 @@ struct aead_request; struct rtattr; +static const struct crypto_type crypto_skcipher_type; struct skcipher_instance { void (*free)(struct skcipher_instance *inst);