On Tue, Feb 7, 2017 at 7:09 PM, Marcelo Ricardo Leitner <marcelo.leitner@xxxxxxxxx> wrote: > On Tue, Feb 07, 2017 at 10:42:38AM +0100, Dmitry Vyukov wrote: >> Hello, >> >> The following program triggers GPF in sctp_addr_id2transport: >> >> // autogenerated by syzkaller (http://github.com/google/syzkaller) >> #include <string.h> >> #include <stdint.h> >> #include <sys/types.h> >> #include <sys/socket.h> >> #include <linux/in.h> >> #include <linux/sctp.h> >> >> int main() >> { >> int sock = socket(AF_INET6, SOCK_SEQPACKET, IPPROTO_SCTP); >> struct sctp_paddrinfo info; >> memset(&info, 0, sizeof(info)); >> int sz = sizeof(info); >> getsockopt(sock, IPPROTO_SCTP, SCTP_GET_PEER_ADDR_INFO, &info, &sz); >> return 0; >> } >> > ... >> RIP: 0010:sctp_addr_id2transport+0xb7/0x350 net/sctp/socket.c:242 > ... >> sctp_getsockopt_peer_addr_info+0x211/0x620 net/sctp/socket.c:4628 >> sctp_getsockopt+0x2813/0x66a0 net/sctp/socket.c:6503 >> sock_common_getsockopt+0x95/0xd0 net/core/sock.c:2685 >> SYSC_getsockopt net/socket.c:1819 [inline] >> SyS_getsockopt+0x240/0x380 net/socket.c:1801 >> entry_SYSCALL_64_fastpath+0x1f/0xc2 > > Xin, I believe 6f29a1306131 ("sctp: sctp_addr_id2transport should verify > the addr before looking up assoc") introduced this issue. > > As info is all 0'ed in this test, > + struct sctp_af *af = sctp_get_af_specific(addr->ss_family); > will return NULL, and then boom at: > + if (sctp_verify_addr(sk, laddr, af->sockaddr_len)) > ^^^^ > The issue is caused by users passed a address with family = 0, and af is NULL there. I already have a patch for this, will post it soon. Thanks. > Marcelo > -- To unsubscribe from this list: send the line "unsubscribe linux-sctp" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html