Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp3539922imu; Mon, 7 Jan 2019 05:19:13 -0800 (PST) X-Google-Smtp-Source: AFSGD/Xuuo5Gp4Vwxk1cmvn+IT/PLYL8OsY6lyL6Ww9u8VtFcsczia+jY/NEik3kia8NaKGk+87N X-Received: by 2002:a62:f5da:: with SMTP id b87mr64011304pfm.253.1546867153404; Mon, 07 Jan 2019 05:19:13 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1546867153; cv=none; d=google.com; s=arc-20160816; b=WTmJhey+UfxQ40kKNZneIOao/6wRlD3cILr1XAQUe5D+2HwQ7XXbcXc2IsUI7OTiWs MhiGYh0iupXIM5yGY2ZRiDtlqFkUx1yfDPN6WOdeRIgjaufVYllgoBFpw2B+WgApkFSU MU+YFaCmQF+T96j6FgysaLZaYJqFv3v9jaLkjW9pHTVdfG0+VeXBfYvUYJkrYnQ/2Bki ERDD/2hJUPIc3vX3ILHLN1pwwhvibdoHsYxqsOEIw/6RV5SDtkZpHp+BbuBG6L281dGE OwVc+JpzxAncuhKbmsaTMVlnSfgk+BeEni3R9qlTbSxCZlchI7Hml+DY9oX+XZy1sLlx G4eA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=mtx21iecMzi4H/vnOfKemQI8Mb81y17JzEBW8oVRFCA=; b=ayHWGvhULRRRPAwIEj883kxjXF1sF0eNtQESqCuPRRk7NpDzkoaQJWsb8oT69r4gJV unk12W3v9S6avdabgZFty4QHngFy+eFhBcqkqD3EcwqsszHxiD1b7e3AlErxiANJhgul YzamQKedDStwrTb13azf0vvkt61D/ZxD0eKhtbJWkfpP6CzCURM7/8F+UpFK/Qa5yt+2 LYgrbkrIjIadVNu6DkPxEvjCqxYyscyqyh1dix7+j+m8LVQjInkZBgO5L9OJ3X2GFKNQ 6B3vLXjQMOxM91QeKhSpcAjs7Jw49TqYn82rgx75pP/iMa8oOVqaIRCZlFa2t89WIGDY 40Gw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="gu4b/qLA"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id y20si59778513plr.106.2019.01.07.05.18.58; Mon, 07 Jan 2019 05:19:13 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="gu4b/qLA"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730394AbfAGNAJ (ORCPT + 99 others); Mon, 7 Jan 2019 08:00:09 -0500 Received: from mail.kernel.org ([198.145.29.99]:47640 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730381AbfAGNAG (ORCPT ); Mon, 7 Jan 2019 08:00:06 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id E45C92089F; Mon, 7 Jan 2019 13:00:04 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1546866005; bh=uSYfW703c3sQN2xmDUcPVygSABpKh9p9erUmQVJ0V/4=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=gu4b/qLAl0ZxzA1SYOk6qONC6vnwZX4bFG2yW1NKWSXmplPrkHae2P5pN3C7zpZCp k+B4uGEwHlqTHUjNgqLG+Vb+MDcqkcvpHanj7QOklXf/n+wMLaBP9tPqHzE2bGMF2H ZaNER3jpNV74zhAVDj/6UV9S8KNzwK9dMQfTQSug= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Cong Wang , "David S. Miller" , syzbot+f621cda8b7e598908efa@syzkaller.appspotmail.com Subject: [PATCH 4.14 015/101] netrom: fix locking in nr_find_socket() Date: Mon, 7 Jan 2019 13:32:03 +0100 Message-Id: <20190107105332.606110847@linuxfoundation.org> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20190107105330.372621917@linuxfoundation.org> References: <20190107105330.372621917@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.14-stable review patch. If anyone has any objections, please let me know. ------------------ From: Cong Wang [ Upstream commit 7314f5480f3e37e570104dc5e0f28823ef849e72 ] nr_find_socket(), nr_find_peer() and nr_find_listener() lock the sock after finding it in the global list. However, the call path requires BH disabled for the sock lock consistently. Actually the locking is unnecessary at this point, we can just hold the sock refcnt to make sure it is not gone after we unlock the global list, and lock it later only when needed. Reported-and-tested-by: syzbot+f621cda8b7e598908efa@syzkaller.appspotmail.com Signed-off-by: Cong Wang Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- net/netrom/af_netrom.c | 15 ++++++++++----- 1 file changed, 10 insertions(+), 5 deletions(-) --- a/net/netrom/af_netrom.c +++ b/net/netrom/af_netrom.c @@ -153,7 +153,7 @@ static struct sock *nr_find_listener(ax2 sk_for_each(s, &nr_list) if (!ax25cmp(&nr_sk(s)->source_addr, addr) && s->sk_state == TCP_LISTEN) { - bh_lock_sock(s); + sock_hold(s); goto found; } s = NULL; @@ -174,7 +174,7 @@ static struct sock *nr_find_socket(unsig struct nr_sock *nr = nr_sk(s); if (nr->my_index == index && nr->my_id == id) { - bh_lock_sock(s); + sock_hold(s); goto found; } } @@ -198,7 +198,7 @@ static struct sock *nr_find_peer(unsigne if (nr->your_index == index && nr->your_id == id && !ax25cmp(&nr->dest_addr, dest)) { - bh_lock_sock(s); + sock_hold(s); goto found; } } @@ -224,7 +224,7 @@ static unsigned short nr_find_next_circu if (i != 0 && j != 0) { if ((sk=nr_find_socket(i, j)) == NULL) break; - bh_unlock_sock(sk); + sock_put(sk); } id++; @@ -919,6 +919,7 @@ int nr_rx_frame(struct sk_buff *skb, str } if (sk != NULL) { + bh_lock_sock(sk); skb_reset_transport_header(skb); if (frametype == NR_CONNACK && skb->len == 22) @@ -928,6 +929,7 @@ int nr_rx_frame(struct sk_buff *skb, str ret = nr_process_rx_frame(sk, skb); bh_unlock_sock(sk); + sock_put(sk); return ret; } @@ -959,10 +961,12 @@ int nr_rx_frame(struct sk_buff *skb, str (make = nr_make_new(sk)) == NULL) { nr_transmit_refusal(skb, 0); if (sk) - bh_unlock_sock(sk); + sock_put(sk); return 0; } + bh_lock_sock(sk); + window = skb->data[20]; skb->sk = make; @@ -1015,6 +1019,7 @@ int nr_rx_frame(struct sk_buff *skb, str sk->sk_data_ready(sk); bh_unlock_sock(sk); + sock_put(sk); nr_insert_socket(make);