Received: by 2002:a5b:505:0:0:0:0:0 with SMTP id o5csp3376192ybp; Sun, 6 Oct 2019 10:34:12 -0700 (PDT) X-Google-Smtp-Source: APXvYqyoGTUcek1T9Hi0MK5kT6ITY3CseSjr90hNUoT6VXABBIQtBa1F7yOt+U4M5mo83hku5lBJ X-Received: by 2002:a17:906:2f10:: with SMTP id v16mr20272118eji.247.1570383252834; Sun, 06 Oct 2019 10:34:12 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1570383252; cv=none; d=google.com; s=arc-20160816; b=CbpTpsFF7EPCofTLTDrqtL3kSYNdpR24mHwMkGAuyKufU1mL2DOX3S3k9oYgSHmTZy 59g7k/Y7tV+DaJZlAufzVyVQC8kTkXo9rDqTGIJ6RdaZf4pB+wp7a1LaMkXur767Xe8L 02PXoiLmINYoBIA277q5zWErPcaluDwiay9bLq4gjE4alnC5g8FtdUzlJSULb43o5vyJ IJPIiGvUcGExuQxhwJ8UEpyijbQdCKdERKAuor76fGtlaD2NbNYtZaLiHsr0IkKq9VZ2 A7M5s0gPkfgChmyqdZTF76Z70yscZe7M3ktqJvpHYU52+pJp4GXViomIx9HPNr8H5hbN 48EQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=WcMfVo8P6LnaG9o5uZRLWsN/4MTHUcM8cRJJfnXEi2U=; b=JB72bymL7TPBUvzT6XtnnTPqn1FjXFgl4Y4cG+nVKNUqj+fAdmDQ12pp7ZWxPKvaCz FGfEsLBOwX/t53Iu4U/1Ldm11re0giHzeAVbZJBM/g8TXxVXGichjpwwxpNn6HJOMRGS ezw3d/UekHiFi2pWNE4CToJQETBdiYsjfgNNOEnhWS2vqRvlyzeXsoyw4WLBpmb4dPE/ jDCOTt7pHAu/5F07PNlxL2dSULwCQlWduXuyxi2ALb4GEeSsRouxp5Dq7eg/zhWEl7Ss DXRXs+3l8GAr/cCbizNXTAJH8/Ti5v7SeWyPUQJ3B481+cRx6tCW/uML7Fyp1x9tuXA0 xkrw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=sqSf6fRG; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id y54si8079336edb.217.2019.10.06.10.33.48; Sun, 06 Oct 2019 10:34:12 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=sqSf6fRG; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728301AbfJFRcK (ORCPT + 99 others); Sun, 6 Oct 2019 13:32:10 -0400 Received: from mail.kernel.org ([198.145.29.99]:58542 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727913AbfJFRcI (ORCPT ); Sun, 6 Oct 2019 13:32:08 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id D3EC52080F; Sun, 6 Oct 2019 17:32:06 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1570383127; bh=Bm1UclkOx45qtVBZclt5j1TdU8SQShCvKyKPr67th30=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=sqSf6fRGQ4yOwtw/3zNuoZKfj8YDYdbXi/o0hSoKkIyDSjStqElIAZLyjiK6+QyAL NbfQbkE/DLgSY3hukveoXHU8zmF8SwFZZOOU3xrERJ4k1zYAuqvwqKuLn3OmgRcoc5 kCo/k6ANfFyvCdkmn+7Ra++MOuWf5yx3jy7MecBY= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Dongli Zhang , Juergen Gross , "David S. Miller" Subject: [PATCH 4.19 097/106] xen-netfront: do not use ~0U as error return value for xennet_fill_frags() Date: Sun, 6 Oct 2019 19:21:43 +0200 Message-Id: <20191006171202.125594832@linuxfoundation.org> X-Mailer: git-send-email 2.23.0 In-Reply-To: <20191006171124.641144086@linuxfoundation.org> References: <20191006171124.641144086@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Dongli Zhang [ Upstream commit a761129e3625688310aecf26e1be9e98e85f8eb5 ] xennet_fill_frags() uses ~0U as return value when the sk_buff is not able to cache extra fragments. This is incorrect because the return type of xennet_fill_frags() is RING_IDX and 0xffffffff is an expected value for ring buffer index. In the situation when the rsp_cons is approaching 0xffffffff, the return value of xennet_fill_frags() may become 0xffffffff which xennet_poll() (the caller) would regard as error. As a result, queue->rx.rsp_cons is set incorrectly because it is updated only when there is error. If there is no error, xennet_poll() would be responsible to update queue->rx.rsp_cons. Finally, queue->rx.rsp_cons would point to the rx ring buffer entries whose queue->rx_skbs[i] and queue->grant_rx_ref[i] are already cleared to NULL. This leads to NULL pointer access in the next iteration to process rx ring buffer entries. The symptom is similar to the one fixed in commit 00b368502d18 ("xen-netfront: do not assume sk_buff_head list is empty in error handling"). This patch changes the return type of xennet_fill_frags() to indicate whether it is successful or failed. The queue->rx.rsp_cons will be always updated inside this function. Fixes: ad4f15dc2c70 ("xen/netfront: don't bug in case of too many frags") Signed-off-by: Dongli Zhang Reviewed-by: Juergen Gross Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- drivers/net/xen-netfront.c | 17 +++++++++-------- 1 file changed, 9 insertions(+), 8 deletions(-) --- a/drivers/net/xen-netfront.c +++ b/drivers/net/xen-netfront.c @@ -890,9 +890,9 @@ static int xennet_set_skb_gso(struct sk_ return 0; } -static RING_IDX xennet_fill_frags(struct netfront_queue *queue, - struct sk_buff *skb, - struct sk_buff_head *list) +static int xennet_fill_frags(struct netfront_queue *queue, + struct sk_buff *skb, + struct sk_buff_head *list) { RING_IDX cons = queue->rx.rsp_cons; struct sk_buff *nskb; @@ -911,7 +911,7 @@ static RING_IDX xennet_fill_frags(struct if (unlikely(skb_shinfo(skb)->nr_frags >= MAX_SKB_FRAGS)) { queue->rx.rsp_cons = ++cons + skb_queue_len(list); kfree_skb(nskb); - return ~0U; + return -ENOENT; } skb_add_rx_frag(skb, skb_shinfo(skb)->nr_frags, @@ -922,7 +922,9 @@ static RING_IDX xennet_fill_frags(struct kfree_skb(nskb); } - return cons; + queue->rx.rsp_cons = cons; + + return 0; } static int checksum_setup(struct net_device *dev, struct sk_buff *skb) @@ -1048,8 +1050,7 @@ err: skb->data_len = rx->status; skb->len += rx->status; - i = xennet_fill_frags(queue, skb, &tmpq); - if (unlikely(i == ~0U)) + if (unlikely(xennet_fill_frags(queue, skb, &tmpq))) goto err; if (rx->flags & XEN_NETRXF_csum_blank) @@ -1059,7 +1060,7 @@ err: __skb_queue_tail(&rxq, skb); - queue->rx.rsp_cons = ++i; + i = ++queue->rx.rsp_cons; work_done++; }