Re: [PATCH rdma-rc] RDMA/ucma: Don't copy data for unknown AF family

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Wed, Mar 28, 2018 at 11:02:03AM -0600, Jason Gunthorpe wrote:
> On Wed, Mar 28, 2018 at 07:43:06AM +0300, Leon Romanovsky wrote:
> > On Tue, Mar 27, 2018 at 10:32:23PM -0600, Jason Gunthorpe wrote:
> > > On Wed, Mar 28, 2018 at 06:33:30AM +0300, Leon Romanovsky wrote:
> > > > On Tue, Mar 27, 2018 at 01:45:40PM -0600, Jason Gunthorpe wrote:
> > > > > On Sun, Mar 25, 2018 at 11:10:27AM +0300, Leon Romanovsky wrote:
> > > > > > From: Leon Romanovsky <leonro@xxxxxxxxxxxx>
> > > > > >
> > > > > > Ensure that user provides valid AF family prior to query device address.
> > > > > >
> > > > > > Reported-by: <syzbot+2a2c48fc189ed5125b9c@xxxxxxxxxxxxxxxxxxxxxxxxx>
> > > > > > Fixes: ee7aed4528fb ("RDMA/ucma: Support querying for AF_IB addresses")
> > > > > > Signed-off-by: Leon Romanovsky <leonro@xxxxxxxxxxxx>
> > > > > >  drivers/infiniband/core/ucma.c | 7 +++++--
> > > > > >  1 file changed, 5 insertions(+), 2 deletions(-)
> > > > > >
> > > > > > diff --git a/drivers/infiniband/core/ucma.c b/drivers/infiniband/core/ucma.c
> > > > > > index 5db68d86070f..2178022badcc 100644
> > > > > > +++ b/drivers/infiniband/core/ucma.c
> > > > > > @@ -879,10 +879,13 @@ static ssize_t ucma_query_addr(struct ucma_context *ctx,
> > > > > >
> > > > > >  	addr = (struct sockaddr *) &ctx->cm_id->route.addr.src_addr;
> > > > > >  	resp.src_size = rdma_addr_size(addr);
> > > > > > -	memcpy(&resp.src_addr, addr, resp.src_size);
> > > > > > -
> > > > > >  	addr = (struct sockaddr *) &ctx->cm_id->route.addr.dst_addr;
> > > > > >  	resp.dst_size = rdma_addr_size(addr);
> > > > > > +
> > > > > > +	if (!resp.src_size || !resp.dst_size)
> > > > > > +		return -EINVAL;
> > > > > > +
> > > > > > +	memcpy(&resp.src_addr, addr, resp.src_size);
> > > > > >  	memcpy(&resp.dst_addr, addr, resp.dst_size);
> > > > >
> > > > > Woah, no, NAK! Moving the memcpy without revising addr breaks it.
> > > >
> > > > Ahh, right
> > > >
> > > > >
> > > > > .. and I don't understand this at all, how does 0 src_size cause a
> > > > > null pointer deref?
> > > > >
> > > > > memcpy(a,b,0) is OK right?
> > > >
> > > > In C it is ok, but KASAN complains about it.
> > >
> > > That makes no sense.
> > >
> > > The code in the syzkaller oops disassembles the faulting instruction
> > > to
> > >
> > >    movzbl (%rdx,%rax,1),%edx
> > >     rdx = 0000000000000018
> > >     rax = ffffffffffffffda
> > >
> > > Which to me looks rather a lot like an err_ptr.. And nothing like a memcpy..
> > >
> > > Since syzkaller says it is reproducing that without e8980d67d60 which
> > > prevents err_ptr in cm_id, I wonder if this is just a dup?
> >
> > It can, however it is less important, at least for me.
> >
> > I don't see any reason why we would want to skip check of user-input and
> > rely on the current code which doesn't use those fields. It  seems too
> > fragile to me.
>
> ???
>
> rdma_addr_size(&ctx->cm_id->route.addr.dst_addr) is not user
> input, it is part of the kernel state at this point. Right?
>
> Can rdma_addr_size even return 0 at this point?
>
> If yes, then we should return EINVAL, but that is to make the API sane
> for the user not to protect the kernel.

I'm not near code now, but from what I remember, the user can call to
rdma_create_id(), it will create new ctx->cm_id but with addr zeroed,
because ucma_alloc_ctx() uses kzalloc.

After that this user will call it ucma_query() and will hit this flow.

>
> Jason

Attachment: signature.asc
Description: PGP signature


[Index of Archives]     [Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Photo]     [Yosemite News]     [Yosemite Photos]     [Linux Kernel]     [Linux SCSI]     [XFree86]

  Powered by Linux