Received: by 2002:a05:6358:111d:b0:dc:6189:e246 with SMTP id f29csp486726rwi; Mon, 31 Oct 2022 04:12:08 -0700 (PDT) X-Google-Smtp-Source: AMsMyM5RzprRNhej8/GmqtHz1ujBtoU4T0i5iWTyLfTFFWXvypGNcpHSLmd05OM+CVBDJQwEQO0f X-Received: by 2002:a17:907:2dab:b0:78d:fc4b:7e31 with SMTP id gt43-20020a1709072dab00b0078dfc4b7e31mr11767567ejc.531.1667214728351; Mon, 31 Oct 2022 04:12:08 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1667214728; cv=none; d=google.com; s=arc-20160816; b=GSB+2lr3Mohn4jcZbg6D5DVtndU5CSjVrRZvov5DIqIULWic06Jg3paUJEbsGHhsA+ 0X5Kqtz0UkDb/LZviXOJjZHLWOLr7pYUFPgqNvE/6Q6sPxd87jtjWcSLBkqIh7uDkxNz 1pChnis7ekHIrSB81SxCv9Pq2sR3jd6881YnQtMnK5RuLyJV8//cov0jEHAp3DYK8Het jzMW0eEDqeqs286VJiqXbKC4ffotAqlE9kLdeHo7J00VZgwdWxgY/KvFC68Tu8xewK2x yE0fVczHvMAQSQn8PvzycgfjH9JVu+Hg8yj6e7PuVFnMSRSasAJ+R7D9HYYVEaE4ivZE K+Vg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:user-agent:message-id:in-reply-to :date:references:subject:cc:to:from:dkim-signature; bh=NIJ5T4b+/++wnm7mItixdmXp1GrHa6nEJdWrcXfAFVo=; b=qlvhG1pGWfPbcaEQor03g3Ji5XcwPn/VrYtdoTmrI8MRdD1pvrNwGauCc82TI5eKeL jBvtwCuGSC/Wmhuj9NjePeDgT0eaYDDpuoz0RHqLhAQ9L8jsGMf5oVZOxCKoslI1Yyvd p6vZRE1D8s6SxGk1HkrHHEdtswdBNy+x/SyuXehxGFxPv/6ELIr+euRTa1GW4dskbCLC 6ky8lVYYMiI6HdgsMwn86Tp0Ccw68TeQtIWxD54uJFN8IZCihUBeyYhPLTQoTBm0zhPJ 0zGHD4vBQECsmHge3EADLjseqIGw9dbqHDQ+yx4CxUWATXJ1eSLMOP9mrme13cm041GL Nu7g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=hQutyHQQ; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id hc35-20020a17090716a300b007836227b96fsi7725233ejc.888.2022.10.31.04.11.52; Mon, 31 Oct 2022 04:12:08 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=hQutyHQQ; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229743AbiJaLHi (ORCPT + 65 others); Mon, 31 Oct 2022 07:07:38 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:52166 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230046AbiJaLHa (ORCPT ); Mon, 31 Oct 2022 07:07:30 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [IPv6:2604:1380:4641:c500::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 16216CD5 for ; Mon, 31 Oct 2022 04:07:30 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id A5F6E611AC for ; Mon, 31 Oct 2022 11:07:29 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 03776C433D6; Mon, 31 Oct 2022 11:07:27 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1667214449; bh=Xk4JNt8NWFfRfcusaFYgOom4s/thiHMhMLtI8/cJzp4=; h=From:To:Cc:Subject:References:Date:In-Reply-To:From; b=hQutyHQQ1fEV0/X//+MTg0m4mAlzoz6/md6+TAC+dnfpwa8ceFESi0lz7Vs99Q5Bv xVylEHbyeVjv0p8jP69R+o72AX986EZMWkS+Yv+9CzQXyO5wzigUxQLYjCxkHRF/Hj IeXGnKZaSmFUQ5jBP89cgd8lLC/OinfaFtyZj071RW/Bclt1xo//ubmnWxc9ZOZuEV r80bGvRXjcUJPI+/KUanRBMpENHz30y3YQHfrBBLh1t0Q8JCgiV0KkSuoNgIcGh2Yh 2a4bnlG3iJKfb4EP0tFSNMe6y1sH43l3RQYEQASmcomiRRM0Npy/L79mgo054F5dRE dP5To9j6Tl3zQ== From: Kalle Valo To: JYeoWoo Cc: aspriel@gmail.com, linux-wireless@vger.kernel.org, Dokyung Song , Minsuk Kang Subject: Re: [PATCH] wifi: brcmfmac: Fix potential NULL pointer dereference in 'brcmf_c_preinit_dcmds()' References: <20221031030005.4190207-1-jisoo.jang@yonsei.ac.kr> Date: Mon, 31 Oct 2022 13:07:22 +0200 In-Reply-To: <20221031030005.4190207-1-jisoo.jang@yonsei.ac.kr> (JYeoWoo's message of "Mon, 31 Oct 2022 12:00:05 +0900") Message-ID: <87v8o0uu8l.fsf@kernel.org> User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/26.1 (gnu/linux) MIME-Version: 1.0 Content-Type: text/plain X-Spam-Status: No, score=-8.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-wireless@vger.kernel.org JYeoWoo writes: > From: Jisoo Jang > > This patch fixes a NULL pointer dereference bug in brcmfmac that occurs > when ptr which is NULL pointer passed as an argument of strlcpy() in > brcmf_c_preinit_dcmds(). This happens when the driver passes a firmware > version string that does not contain a space " ", making strrchr() return > a null pointer. This patch adds a null pointer check. > > Found by a modified version of syzkaller. > > KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007] > CPU: 0 PID: 1983 Comm: kworker/0:2 Not tainted 5.14.0+ #79 > Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS > rel-1.12.1-0-ga5cab58e9a3f-prebuilt.qemu.org 04/01/2014 > Workqueue: usb_hub_wq hub_event > RIP: 0010:strlen+0x1a/0x90 > Code: 23 ff ff ff 66 66 2e 0f 1f 84 00 00 00 00 00 90 48 b8 00 00 00 00 > 00 fc ff df 48 89 fa 55 48 89 fd 48 c1 ea 03 53 48 83 ec 08 <0f> b6 04 > 02 48 89 fa 83 e2 07 38 d0 7f 04 84 c0 75 48 80 7d 00 00 > RSP: 0018:ffffc90002bfedd8 EFLAGS: 00010296 > RAX: dffffc0000000000 RBX: 1ffff9200057fdc1 RCX: 0000000000000000 > RDX: 0000000000000000 RSI: 0000000000000020 RDI: 0000000000000001 > RBP: 0000000000000001 R08: 0000000000000039 R09: ffffed1023549801 > R10: ffff88811aa4c007 R11: ffffed1023549800 R12: ffff88800bc68d6c > R13: ffffc90002bfef08 R14: ffff88800bc6bc7c R15: 0000000000000001 > FS: 0000000000000000(0000) GS:ffff88811aa00000(0000) > knlGS:0000000000000000 > CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 > CR2: 0000000020546180 CR3: 0000000117ff1000 CR4: 0000000000750ef0 > PKRU: 55555554 > Call Trace: > brcmf_c_preinit_dcmds+0x9f2/0xc40 > ? brcmf_c_set_joinpref_default+0x100/0x100 > ? rcu_read_lock_sched_held+0xa1/0xd0 > ? rcu_read_lock_bh_held+0xb0/0xb0 > ? lock_acquire+0x19d/0x4e0 > ? find_held_lock+0x2d/0x110 > ? brcmf_usb_deq+0x1a7/0x260 > ? brcmf_usb_rx_fill_all+0x5a/0xf0 > brcmf_attach+0x246/0xd40 > ? wiphy_new_nm+0x1703/0x1dd0 > ? kmemdup+0x43/0x50 > brcmf_usb_probe+0x12de/0x1690 > ? brcmf_usbdev_qinit.constprop.0+0x470/0x470 > usb_probe_interface+0x2aa/0x760 > ? usb_probe_device+0x250/0x250 > really_probe+0x205/0xb70 > ? driver_allows_async_probing+0x130/0x130 > __driver_probe_device+0x311/0x4b0 > ? driver_allows_async_probing+0x130/0x130 > driver_probe_device+0x4e/0x150 > __device_attach_driver+0x1cc/0x2a0 > bus_for_each_drv+0x156/0x1d0 > ? bus_rescan_devices+0x30/0x30 > ? lockdep_hardirqs_on_prepare+0x273/0x3e0 > ? trace_hardirqs_on+0x46/0x160 > __device_attach+0x23f/0x3a0 > ? device_bind_driver+0xd0/0xd0 > ? kobject_uevent_env+0x287/0x14b0 > bus_probe_device+0x1da/0x290 > device_add+0xb7b/0x1eb0 > ? wait_for_completion+0x290/0x290 > ? __fw_devlink_link_to_suppliers+0x5a0/0x5a0 > usb_set_configuration+0xf59/0x16f0 > usb_generic_driver_probe+0x82/0xa0 > usb_probe_device+0xbb/0x250 > ? usb_suspend+0x590/0x590 > really_probe+0x205/0xb70 > ? driver_allows_async_probing+0x130/0x130 > __driver_probe_device+0x311/0x4b0 > ? usb_generic_driver_match+0x75/0x90 > ? driver_allows_async_probing+0x130/0x130 > driver_probe_device+0x4e/0x150 > __device_attach_driver+0x1cc/0x2a0 > bus_for_each_drv+0x156/0x1d0 > ? bus_rescan_devices+0x30/0x30 > ? _raw_spin_unlock_irqrestore+0x47/0x50 > __device_attach+0x23f/0x3a0 > ? device_bind_driver+0xd0/0xd0 > ? kobject_uevent_env+0x287/0x14b0 > bus_probe_device+0x1da/0x290 > device_add+0xb7b/0x1eb0 > ? __fw_devlink_link_to_suppliers+0x5a0/0x5a0 > ? kfree+0x14a/0x6b0 > ? __usb_get_extra_descriptor+0x116/0x160 > usb_new_device.cold+0x49c/0x1029 > ? hub_disconnect+0x450/0x450 > ? rwlock_bug.part.0+0x90/0x90 > ? _raw_spin_unlock_irq+0x24/0x30 > ? lockdep_hardirqs_on_prepare+0x273/0x3e0 > hub_event+0x248b/0x31c9 > ? usb_port_suspend.cold+0x139/0x139 > ? check_irq_usage+0x861/0xf20 > ? drain_workqueue+0x280/0x360 > ? lock_release+0x640/0x640 > ? rcu_read_lock_sched_held+0xa1/0xd0 > ? rcu_read_lock_bh_held+0xb0/0xb0 > ? lockdep_hardirqs_on_prepare+0x273/0x3e0 > process_one_work+0x92b/0x1460 > ? pwq_dec_nr_in_flight+0x330/0x330 > ? rwlock_bug.part.0+0x90/0x90 > worker_thread+0x95/0xe00 > ? __kthread_parkme+0x115/0x1e0 > ? process_one_work+0x1460/0x1460 > kthread+0x3a1/0x480 > ? set_kthread_struct+0x120/0x120 > ret_from_fork+0x1f/0x30 > Modulesdd linked in: > ---[ end trace c112c68924ddd800 ]--- > RIP: 0010:strlen+0x1a/0x90 > Code: 23 ff ff ff 66 66 2e 0f 1f 84 00 00 00 00 00 90 48 b8 00 00 00 00 > 00 fc ff df 48 89 fa 55 48 89 fd 48 c1 ea 03 53 48 83 ec 08 <0f> b6 04 > 02 48 89 fa 83 e2 07 38 d0 7f 04 84 c0 75 48 80 7d 00 00 > RSP: 0018:ffffc90002bfedd8 EFLAGS: 00010296 > RAX: dffffc0000000000 RBX: 1ffff9200057fdc1 RCX: 0000000000000000 > RDX: 0000000000000000 RSI: 0000000000000020 RDI: 0000000000000001 > RBP: 0000000000000001 R08: 0000000000000039 R09: ffffed1023549801 > R10: ffff88811aa4c007 R11: ffffed1023549800 R12: ffff88800bc68d6c > R13: ffffc90002bfef08 R14: ffff88800bc6bc7c R15: 0000000000000001 > FS: 0000000000000000(0000) GS:ffff88811aa00000(0000) > knlGS:0000000000000000 > CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 > CR2: 0000000020546180 CR3: 0000000117ff1000 CR4: 0000000000750ef0 > PKRU: 55555554 > Kernel panic - not syncing: Fatal exception > Kernel Offset: disabled > > Reported-by: Dokyung Song > Reported-by: Jisoo Jang > Reported-by: Minsuk Kang > Signed-off-by: Jisoo Jang > --- > drivers/net/wireless/broadcom/brcm80211/brcmfmac/common.c | 8 ++++++-- > 1 file changed, 6 insertions(+), 2 deletions(-) > > diff --git a/drivers/net/wireless/broadcom/brcm80211/brcmfmac/common.c b/drivers/net/wireless/broadcom/brcm80211/brcmfmac/common.c > index e3758bd86acf..59c41b2bca96 100644 > --- a/drivers/net/wireless/broadcom/brcm80211/brcmfmac/common.c > +++ b/drivers/net/wireless/broadcom/brcm80211/brcmfmac/common.c > @@ -271,8 +271,12 @@ int brcmf_c_preinit_dcmds(struct brcmf_if *ifp) > brcmf_info("Firmware: %s %s\n", ri->chipname, buf); > > /* locate firmware version number for ethtool */ > - ptr = strrchr(buf, ' ') + 1; > - strlcpy(ifp->drvr->fwver, ptr, sizeof(ifp->drvr->fwver)); > + ptr = strrchr(buf, ' '); > + if (!ptr) { > + bphy_err(drvr, "Retrieving version number failed"); > + goto done; > + } > + strlcpy(ifp->drvr->fwver, ptr + 1, sizeof(ifp->drvr->fwver)); Please rebase the patch to latest wireless-next, this code uses strscpy() now. -- https://patchwork.kernel.org/project/linux-wireless/list/ https://wireless.wiki.kernel.org/en/developers/documentation/submittingpatches