Received: by 2002:a25:6193:0:0:0:0:0 with SMTP id v141csp278011ybb; Thu, 9 Apr 2020 23:11:11 -0700 (PDT) X-Google-Smtp-Source: APiQypLeqE/AWR9LRRNtXdUepZ74g8A/8QiDRvM/7HuMnhcJ/pUnqrLL4zf3wQS51FcOo/iQ9C93 X-Received: by 2002:a37:9b56:: with SMTP id d83mr2446171qke.461.1586499071278; Thu, 09 Apr 2020 23:11:11 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1586499071; cv=none; d=google.com; s=arc-20160816; b=kV2aPdck4n58+Pj2vjkcHi6i2eQPfacBcemng7t33pPiHgn3F5w6xhks7Y3dLqdaTU hus2PS0A9NerOOH0BxrL66T6b+1E7HxVL1V0jdJZbY0FUHtdaOAa/hG+1mX5azgqUnG0 VkLqoyisnz9sC2ReMd8H5LFFInwzKHdNQNROt/em1lh0dcZ8JcCYmNFJkaJULz0/bgfq Oeczu4ALetjrvMMwCOQeIJ6u7izgSNfl1iqAcQdEHzm92LqC+AVUBzjq0/GhHxBwnb9R 5bKjl88ANEmjpEWVuMiLgfUh6H4uIDb2dXkkEht2kHvXAuaZq9Fe0vexs66+4+Xdl5Sr ln8A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=vAZe/zala35icGAXqslyzqGi24FskIlhmne9I7UW4aw=; b=yjHL0Z3rbjcnRtLD1e3YHat9TcKlme1sGaZUOSDO/6qf9ghonOwhporpdE5bOtLAzb JfGFt1OlNrlcsGSaMdebi2nbLjuaQ6/TGV4eQJFtb4v8y5wqMudMW/VFnHr/tlPEgWAp JXsLQQ5C6Aw+Po8lzjqXNk034uQUT1KtDUbC1EsYM2ixCAA05h1q/3xGATAhEAfPI/OI wMddLOp9io79wdGIGjTgiC1OJwv3hTJTld7ES/PigN2jpgLVKEDA7eyxJ2naqRSwtc8H Y3UDacPSeAvksABH/WEDSV9b6au8xRqpEH+0k+XqvdsUmuAz8+rNUjnB5jiZmvpJu2sH jkqg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e10si594698qti.168.2020.04.09.23.10.42; Thu, 09 Apr 2020 23:11:11 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1725926AbgDJGKf (ORCPT + 99 others); Fri, 10 Apr 2020 02:10:35 -0400 Received: from helcar.hmeau.com ([216.24.177.18]:46778 "EHLO fornost.hmeau.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725776AbgDJGKf (ORCPT ); Fri, 10 Apr 2020 02:10:35 -0400 Received: from gwarestrin.me.apana.org.au ([192.168.0.7] helo=gwarestrin.arnor.me.apana.org.au) by fornost.hmeau.com with smtp (Exim 4.89 #2 (Debian)) id 1jMmrG-0004BP-PQ; Fri, 10 Apr 2020 16:09:43 +1000 Received: by gwarestrin.arnor.me.apana.org.au (sSMTP sendmail emulation); Fri, 10 Apr 2020 16:09:42 +1000 Date: Fri, 10 Apr 2020 16:09:42 +1000 From: Herbert Xu To: syzbot Cc: davem@davemloft.net, linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org, netdev@vger.kernel.org, syzkaller-bugs@googlegroups.com Subject: crypto: api - Fix use-after-free and race in crypto_spawn_alg Message-ID: <20200410060942.GA4048@gondor.apana.org.au> References: <0000000000002656a605a2a34356@google.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <0000000000002656a605a2a34356@google.com> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org There are two problems in crypto_spawn_alg. First of all it may return spawn->alg even if spawn->dead is set. This results in a double-free as detected by syzbot. Secondly the setting of the DYING flag is racy because we hold the read-lock instead of the write-lock. We should instead call crypto_shoot_alg in a safe manner by gaining a refcount, dropping the lock, and then releasing the refcount. This patch fixes both problems. Reported-by: syzbot+fc0674cde00b66844470@syzkaller.appspotmail.com Fixes: 4f87ee118d16 ("crypto: api - Do not zap spawn->alg") Fixes: 73669cc55646 ("crypto: api - Fix race condition in...") Cc: Signed-off-by: Herbert Xu diff --git a/crypto/algapi.c b/crypto/algapi.c index 69605e21af92..f8b4dc161c02 100644 --- a/crypto/algapi.c +++ b/crypto/algapi.c @@ -716,17 +716,27 @@ EXPORT_SYMBOL_GPL(crypto_drop_spawn); static struct crypto_alg *crypto_spawn_alg(struct crypto_spawn *spawn) { - struct crypto_alg *alg; + struct crypto_alg *alg = ERR_PTR(-EAGAIN); + struct crypto_alg *target; + bool shoot = false; down_read(&crypto_alg_sem); - alg = spawn->alg; - if (!spawn->dead && !crypto_mod_get(alg)) { - alg->cra_flags |= CRYPTO_ALG_DYING; - alg = NULL; + if (!spawn->dead) { + alg = spawn->alg; + if (!crypto_mod_get(alg)) { + target = crypto_alg_get(alg); + shoot = true; + alg = ERR_PTR(-EAGAIN); + } } up_read(&crypto_alg_sem); - return alg ?: ERR_PTR(-EAGAIN); + if (shoot) { + crypto_shoot_alg(target); + crypto_alg_put(target); + } + + return alg; } struct crypto_tfm *crypto_spawn_tfm(struct crypto_spawn *spawn, u32 type, diff --git a/crypto/api.c b/crypto/api.c index 7d71a9b10e5f..edcf690800d4 100644 --- a/crypto/api.c +++ b/crypto/api.c @@ -333,12 +333,13 @@ static unsigned int crypto_ctxsize(struct crypto_alg *alg, u32 type, u32 mask) return len; } -static void crypto_shoot_alg(struct crypto_alg *alg) +void crypto_shoot_alg(struct crypto_alg *alg) { down_write(&crypto_alg_sem); alg->cra_flags |= CRYPTO_ALG_DYING; up_write(&crypto_alg_sem); } +EXPORT_SYMBOL_GPL(crypto_shoot_alg); struct crypto_tfm *__crypto_alloc_tfm(struct crypto_alg *alg, u32 type, u32 mask) diff --git a/crypto/internal.h b/crypto/internal.h index d5ebc60c5143..ff06a3bd1ca1 100644 --- a/crypto/internal.h +++ b/crypto/internal.h @@ -65,6 +65,7 @@ void crypto_alg_tested(const char *name, int err); void crypto_remove_spawns(struct crypto_alg *alg, struct list_head *list, struct crypto_alg *nalg); void crypto_remove_final(struct list_head *list); +void crypto_shoot_alg(struct crypto_alg *alg); struct crypto_tfm *__crypto_alloc_tfm(struct crypto_alg *alg, u32 type, u32 mask); void *crypto_create_tfm(struct crypto_alg *alg, -- Email: Herbert Xu Home Page: http://gondor.apana.org.au/~herbert/ PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt