diff mbox series

net/rds: Avoid potential use after free in rds_send_remove_from_sock

Message ID 20210407000913.2207831-1-pakki001@umn.edu
State New
Headers show
Series net/rds: Avoid potential use after free in rds_send_remove_from_sock | expand

Commit Message

Aditya Pakki April 7, 2021, 12:09 a.m. UTC
In case of rs failure in rds_send_remove_from_sock(), the 'rm' resource
is freed and later under spinlock, causing potential use-after-free.
Set the free pointer to NULL to avoid undefined behavior.

Signed-off-by: Aditya Pakki <pakki001@umn.edu>
---
 net/rds/message.c | 1 +
 net/rds/send.c    | 2 +-
 2 files changed, 2 insertions(+), 1 deletion(-)

Comments

patchwork-bot+netdevbpf@kernel.org April 7, 2021, 9:10 p.m. UTC | #1
Hello:

This patch was applied to netdev/net.git (refs/heads/master):

On Tue,  6 Apr 2021 19:09:12 -0500 you wrote:
> In case of rs failure in rds_send_remove_from_sock(), the 'rm' resource
> is freed and later under spinlock, causing potential use-after-free.
> Set the free pointer to NULL to avoid undefined behavior.
> 
> Signed-off-by: Aditya Pakki <pakki001@umn.edu>
> ---
>  net/rds/message.c | 1 +
>  net/rds/send.c    | 2 +-
>  2 files changed, 2 insertions(+), 1 deletion(-)

Here is the summary with links:
  - net/rds: Avoid potential use after free in rds_send_remove_from_sock
    https://git.kernel.org/netdev/net/c/0c85a7e87465

You are awesome, thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/patchwork/pwbot.html
Eric Dumazet April 9, 2021, 10:26 a.m. UTC | #2
On 4/7/21 2:09 AM, Aditya Pakki wrote:
> In case of rs failure in rds_send_remove_from_sock(), the 'rm' resource

> is freed and later under spinlock, causing potential use-after-free.

> Set the free pointer to NULL to avoid undefined behavior.

> 

> Signed-off-by: Aditya Pakki <pakki001@umn.edu>

> ---

>  net/rds/message.c | 1 +

>  net/rds/send.c    | 2 +-

>  2 files changed, 2 insertions(+), 1 deletion(-)

> 

> diff --git a/net/rds/message.c b/net/rds/message.c

> index 071a261fdaab..90ebcfe5fe3b 100644

> --- a/net/rds/message.c

> +++ b/net/rds/message.c

> @@ -180,6 +180,7 @@ void rds_message_put(struct rds_message *rm)

>  		rds_message_purge(rm);

>  

>  		kfree(rm);

> +		rm = NULL;


This is a nop really.

This does not clear @rm variable in the caller.



>  	}

>  }

>  EXPORT_SYMBOL_GPL(rds_message_put);

> diff --git a/net/rds/send.c b/net/rds/send.c

> index 985d0b7713ac..fe5264b9d4b3 100644

> --- a/net/rds/send.c

> +++ b/net/rds/send.c

> @@ -665,7 +665,7 @@ static void rds_send_remove_from_sock(struct list_head *messages, int status)

>  unlock_and_drop:

>  		spin_unlock_irqrestore(&rm->m_rs_lock, flags);

>  		rds_message_put(rm);

> -		if (was_on_sock)

> +		if (was_on_sock && rm)

>  			rds_message_put(rm);


Maybe the bug is that the refcount has not be elevated when was_on_sock
has been set.

>  	}

>  

>
Al Viro April 19, 2021, 10:12 p.m. UTC | #3
On Tue, Apr 06, 2021 at 07:09:12PM -0500, Aditya Pakki wrote:

> --- a/net/rds/send.c

> +++ b/net/rds/send.c

> @@ -665,7 +665,7 @@ static void rds_send_remove_from_sock(struct list_head *messages, int status)

>  unlock_and_drop:

>  		spin_unlock_irqrestore(&rm->m_rs_lock, flags);

>  		rds_message_put(rm);

> -		if (was_on_sock)

> +		if (was_on_sock && rm)

>  			rds_message_put(rm);


	Look at the code immediately prior to the site of your "fix".
Think for a second what will happen if we *could* get there with rm
equal to NULL (with your patch applied, that is).  Now, try to construct
the sequence of events that would lead to that situation.  Either you
will arrive at a real bug (in which case your fix does not actually
fix anything) *OR* you will get closer to realization that "defensive
programming" tends to be worthless garbage.  In both case the result
would be useful...

	Incidentally, locate the place where that variable is
last modified and find the precondition required for rm == NULL
downstream of that.

	Plainly put, the patch demonstrates either complete lack of
understanding or somebody not acting in good faith.  If it's the latter[1],
may I suggest the esteemed sociologists to fuck off and stop
testing the reviewers with deliberately spewed excrements?

[1] https://github.com/QiushiWu/QiushiWu.github.io/blob/main/papers/OpenSourceInsecurity.pdf
Leon Romanovsky April 20, 2021, 9:09 a.m. UTC | #4
On Tue, Apr 06, 2021 at 07:09:12PM -0500, Aditya Pakki wrote:
> In case of rs failure in rds_send_remove_from_sock(), the 'rm' resource

> is freed and later under spinlock, causing potential use-after-free.

> Set the free pointer to NULL to avoid undefined behavior.

> 

> Signed-off-by: Aditya Pakki <pakki001@umn.edu>

> ---

>  net/rds/message.c | 1 +

>  net/rds/send.c    | 2 +-

>  2 files changed, 2 insertions(+), 1 deletion(-)


Dave, Jakub

Please revert this patch, given responses from Eric and Al together
with this response from Greg here https://lore.kernel.org/lkml/YH5/i7OvsjSmqADv@kroah.com

BTW, I looked on the rds code too and agree with Eric, this patch
is a total garbage.

Thanks
Leon Romanovsky April 20, 2021, 9:11 a.m. UTC | #5
On Tue, Apr 20, 2021 at 12:09:06PM +0300, Leon Romanovsky wrote:
> On Tue, Apr 06, 2021 at 07:09:12PM -0500, Aditya Pakki wrote:

> > In case of rs failure in rds_send_remove_from_sock(), the 'rm' resource

> > is freed and later under spinlock, causing potential use-after-free.

> > Set the free pointer to NULL to avoid undefined behavior.

> > 

> > Signed-off-by: Aditya Pakki <pakki001@umn.edu>

> > ---

> >  net/rds/message.c | 1 +

> >  net/rds/send.c    | 2 +-

> >  2 files changed, 2 insertions(+), 1 deletion(-)

> 

> Dave, Jakub

> 

> Please revert this patch, given responses from Eric and Al together

> with this response from Greg here https://lore.kernel.org/lkml/YH5/i7OvsjSmqADv@kroah.com


https://lore.kernel.org/lkml/YH5%2Fi7OvsjSmqADv@kroah.com/

> 

> BTW, I looked on the rds code too and agree with Eric, this patch

> is a total garbage.

> 

> Thanks
Krzysztof Kozlowski April 21, 2021, 2:19 p.m. UTC | #6
On Tue, 20 Apr 2021 at 11:13, Leon Romanovsky <leon@kernel.org> wrote:
>

> On Tue, Apr 20, 2021 at 12:09:06PM +0300, Leon Romanovsky wrote:

> > On Tue, Apr 06, 2021 at 07:09:12PM -0500, Aditya Pakki wrote:

> > > In case of rs failure in rds_send_remove_from_sock(), the 'rm' resource

> > > is freed and later under spinlock, causing potential use-after-free.

> > > Set the free pointer to NULL to avoid undefined behavior.

> > >

> > > Signed-off-by: Aditya Pakki <pakki001@umn.edu>

> > > ---

> > >  net/rds/message.c | 1 +

> > >  net/rds/send.c    | 2 +-

> > >  2 files changed, 2 insertions(+), 1 deletion(-)

> >

> > Dave, Jakub

> >

> > Please revert this patch, given responses from Eric and Al together

> > with this response from Greg here https://lore.kernel.org/lkml/YH5/i7OvsjSmqADv@kroah.com

>

> https://lore.kernel.org/lkml/YH5%2Fi7OvsjSmqADv@kroah.com/

>

> >

> > BTW, I looked on the rds code too and agree with Eric, this patch

> > is a total garbage.


When reverting, consider giving credits to Kees/Coverity as he pointed
out after testing linux-next that this is bogus:
https://lore.kernel.org/linux-next/202104081640.1A09A99900@keescook/


Best regards,
Krzysztof
Leon Romanovsky April 21, 2021, 3:36 p.m. UTC | #7
On Wed, Apr 21, 2021 at 04:19:03PM +0200, Krzysztof Kozlowski wrote:
> On Tue, 20 Apr 2021 at 11:13, Leon Romanovsky <leon@kernel.org> wrote:

> >

> > On Tue, Apr 20, 2021 at 12:09:06PM +0300, Leon Romanovsky wrote:

> > > On Tue, Apr 06, 2021 at 07:09:12PM -0500, Aditya Pakki wrote:

> > > > In case of rs failure in rds_send_remove_from_sock(), the 'rm' resource

> > > > is freed and later under spinlock, causing potential use-after-free.

> > > > Set the free pointer to NULL to avoid undefined behavior.

> > > >

> > > > Signed-off-by: Aditya Pakki <pakki001@umn.edu>

> > > > ---

> > > >  net/rds/message.c | 1 +

> > > >  net/rds/send.c    | 2 +-

> > > >  2 files changed, 2 insertions(+), 1 deletion(-)

> > >

> > > Dave, Jakub

> > >

> > > Please revert this patch, given responses from Eric and Al together

> > > with this response from Greg here https://lore.kernel.org/lkml/YH5/i7OvsjSmqADv@kroah.com

> >

> > https://lore.kernel.org/lkml/YH5%2Fi7OvsjSmqADv@kroah.com/

> >

> > >

> > > BTW, I looked on the rds code too and agree with Eric, this patch

> > > is a total garbage.

> 

> When reverting, consider giving credits to Kees/Coverity as he pointed

> out after testing linux-next that this is bogus:

> https://lore.kernel.org/linux-next/202104081640.1A09A99900@keescook/


The revert is already done for almost all @umn.edu patches.
https://lore.kernel.org/lkml/20210421130105.1226686-1-gregkh@linuxfoundation.org/

Thanks

> 

> 

> Best regards,

> Krzysztof
diff mbox series

Patch

diff --git a/net/rds/message.c b/net/rds/message.c
index 071a261fdaab..90ebcfe5fe3b 100644
--- a/net/rds/message.c
+++ b/net/rds/message.c
@@ -180,6 +180,7 @@  void rds_message_put(struct rds_message *rm)
 		rds_message_purge(rm);
 
 		kfree(rm);
+		rm = NULL;
 	}
 }
 EXPORT_SYMBOL_GPL(rds_message_put);
diff --git a/net/rds/send.c b/net/rds/send.c
index 985d0b7713ac..fe5264b9d4b3 100644
--- a/net/rds/send.c
+++ b/net/rds/send.c
@@ -665,7 +665,7 @@  static void rds_send_remove_from_sock(struct list_head *messages, int status)
 unlock_and_drop:
 		spin_unlock_irqrestore(&rm->m_rs_lock, flags);
 		rds_message_put(rm);
-		if (was_on_sock)
+		if (was_on_sock && rm)
 			rds_message_put(rm);
 	}