Received: by 2002:a25:31c3:0:0:0:0:0 with SMTP id x186csp6559164ybx; Mon, 11 Nov 2019 10:57:17 -0800 (PST) X-Google-Smtp-Source: APXvYqzBow2sd6tl+LBlGb3p/eOxltZDSTpouYkcc3ODoER7XCutTX4tv6BOF9MFUlgCyvuJoE1s X-Received: by 2002:a17:906:52c4:: with SMTP id w4mr22855287ejn.99.1573498636934; Mon, 11 Nov 2019 10:57:16 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1573498636; cv=none; d=google.com; s=arc-20160816; b=MJ50JGztXGOT2FhbBZP628gyT29UV8pgk+nRpCd94Cb87M9CMCDJs6X67JKMfzpY/z kTT25u22goQPVNmJIgY815TD4Eimpm4bcRMAzCBrAMYbQSkWYmBB4C9iaRc8R1IQcz73 0jyUPgC9YbdDDNdm9Za2Rh4ZSs3xsAzw1++rcm/59hVn9a6CS3nm1kOseyoDefVI6mU0 3WexjZv7BH6tyw4kQQ26poB8pWm9JwjFp7EdnXyOzOr/qcrtKY30HGNDEC2sN2zaV7HQ yG1s4yLtE51qrg6j+r5oL1k2C812GQL3BpkstQiT0P1Q3PHJa/KRpRZdrwSFMeIKOuC2 q3fA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=P0aJnWimkBV4b/U3qQ3JOCIm7Vv9XgbYXBWPUryAwBg=; b=Z4hwndBvm94jgExRL76uywKVXg5JX434mMe9kgcyhbz0jwYnhiEgy/Vx8LvBdESejD 3RRBlwKx08p7nzhOS111izoUah53ln7+f1tVWe+StGEbAQycZL918GDhQYWHatKeVX/w MAtejc3mkPKKoUprm5jpQ7chKjESp1QACg5K2/xfGkMNpyvkOlgaRC5khOBWtGLqpa9v a8hynrfsCMYrt3OwCMV/WzUYpF8xnv/WbmUyzv31lpJhm/XRHWfBuwiVOujHfvnH5OsN eWLXZpNcI9dIbKbVBxXai9RS//uWFcfMoBgNQ7GOuMzjs1QSbY2if4sEBn2sHaFHaAYM 2w2w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=SBfmlGEm; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id jp14si6725578ejb.313.2019.11.11.10.56.53; Mon, 11 Nov 2019 10:57:16 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=SBfmlGEm; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730563AbfKKSyT (ORCPT + 99 others); Mon, 11 Nov 2019 13:54:19 -0500 Received: from mail.kernel.org ([198.145.29.99]:50054 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730557AbfKKSyS (ORCPT ); Mon, 11 Nov 2019 13:54:18 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 5ACC421655; Mon, 11 Nov 2019 18:54:16 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1573498457; bh=R+el7rO3eiIues16qfwZj/4Kx0WIpg6QO+zltnqFJL4=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=SBfmlGEmFUR/9UY+lssaeHQ0gcr7Ne4AbgH5DLBgw1+h720VAxgVxgNuY9mCdWf0P mi4fL6JE6PnBLCN3MsSR0buiN83n8hBIMZJWVByCSZN87fxVmdfYomP4GqqMzzLqEO dDSMrbT0bKQAxyuWd/g5c6sgFCS7w9rH2VjmjIcM= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Kal Cutter Conley , Magnus Karlsson , Alexei Starovoitov , Jonathan Lemon , Sasha Levin Subject: [PATCH 5.3 126/193] xsk: Fix registration of Rx-only sockets Date: Mon, 11 Nov 2019 19:28:28 +0100 Message-Id: <20191111181510.477881145@linuxfoundation.org> X-Mailer: git-send-email 2.24.0 In-Reply-To: <20191111181459.850623879@linuxfoundation.org> References: <20191111181459.850623879@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Magnus Karlsson [ Upstream commit 2afd23f78f39da84937006ecd24aa664a4ab052b ] Having Rx-only AF_XDP sockets can potentially lead to a crash in the system by a NULL pointer dereference in xsk_umem_consume_tx(). This function iterates through a list of all sockets tied to a umem and checks if there are any packets to send on the Tx ring. Rx-only sockets do not have a Tx ring, so this will cause a NULL pointer dereference. This will happen if you have registered one or more Rx-only sockets to a umem and the driver is checking the Tx ring even on Rx, or if the XDP_SHARED_UMEM mode is used and there is a mix of Rx-only and other sockets tied to the same umem. Fixed by only putting sockets with a Tx component on the list that xsk_umem_consume_tx() iterates over. Fixes: ac98d8aab61b ("xsk: wire upp Tx zero-copy functions") Reported-by: Kal Cutter Conley Signed-off-by: Magnus Karlsson Signed-off-by: Alexei Starovoitov Acked-by: Jonathan Lemon Link: https://lore.kernel.org/bpf/1571645818-16244-1-git-send-email-magnus.karlsson@intel.com Signed-off-by: Sasha Levin --- net/xdp/xdp_umem.c | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/net/xdp/xdp_umem.c b/net/xdp/xdp_umem.c index 688aac7a6943a..182f9eb48dde9 100644 --- a/net/xdp/xdp_umem.c +++ b/net/xdp/xdp_umem.c @@ -26,6 +26,9 @@ void xdp_add_sk_umem(struct xdp_umem *umem, struct xdp_sock *xs) { unsigned long flags; + if (!xs->tx) + return; + spin_lock_irqsave(&umem->xsk_list_lock, flags); list_add_rcu(&xs->list, &umem->xsk_list); spin_unlock_irqrestore(&umem->xsk_list_lock, flags); @@ -35,6 +38,9 @@ void xdp_del_sk_umem(struct xdp_umem *umem, struct xdp_sock *xs) { unsigned long flags; + if (!xs->tx) + return; + spin_lock_irqsave(&umem->xsk_list_lock, flags); list_del_rcu(&xs->list); spin_unlock_irqrestore(&umem->xsk_list_lock, flags); -- 2.20.1