Received: by 2002:a05:6a10:2726:0:0:0:0 with SMTP id ib38csp1014581pxb; Wed, 6 Apr 2022 06:45:38 -0700 (PDT) X-Google-Smtp-Source: ABdhPJy2uPduKjQ/05TUWULxAm9XoWiUvGTqdH37pL+a1WRg+gLMDLLQNN8eX8YW9/+eNkqewtjQ X-Received: by 2002:a17:90a:380f:b0:1bd:4aa6:651 with SMTP id w15-20020a17090a380f00b001bd4aa60651mr9984877pjb.83.1649252738268; Wed, 06 Apr 2022 06:45:38 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1649252738; cv=none; d=google.com; s=arc-20160816; b=WiHHaGoW8k/umHzivjk/nJASL0jW67WV6jb8BrbdjpYsz3OfoGNWEPDMWbtBztv/oo b/TzcuSMDoOwZhIbmSZTUP/YT3LVyE6moZaTYI3s7TY0XaWM9eYE8XTAb0CFVnDrT8Kn DolSyXWMwoFUsNOMFhEZMw3c4Xfwz44fJK5H94t/eC3dz7UTwt/eLGrs1LCeUfXUOhDI H+vTfAQmQDUYg04gaLh1TvFm7Az/I4QNUYWrueT6KO/QzCUVijyIWLnhmlTDt6yYXBNi vm+G+xdrhuL3QBmyM1dKP3E/4oxKyh/uugeAcLRUrD5XXdpcmzfMS1qIOeyLUA9ZV9s3 4lkg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=sof14yQKMw9OybOQ2KFHJUWaaAAx0+4UG7iWBbdPruk=; b=xgAzmn4r4at3cAv1ubI7/YaQ3vTHi41zwwYB/gaFm5/YqIUPJDdrSx6MYHiPcFW6vZ KZaDNYRtVpGnRXpXgJOIHZSY/CNTPVh23K3NYn9Kp2JXwKY5xVcRl60Feq7i5AfJ64SL Cvbo9JEhleaX35z3zKaZ7GDantqEHQcUvcLoAueZv5alOdv3AvIhKGOzDFvjqkHKNOwW ngYlKSH9Reew/gH0I/4gN9eE/FXEzM5wVZ6JeNo0jkkjTEs/U6vLxOF7Kv1PtnNyALbz ZpZKDosWG4/0s/DEDV4F+pQEVdLcxQeGTSHNHLoY3VL77XAsYLy0kfJRWPlBY4apR7tQ w5Rw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=BqvKWSt+; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [23.128.96.19]) by mx.google.com with ESMTPS id s4-20020a639244000000b003986de50ca0si15554263pgn.635.2022.04.06.06.45.37 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 06 Apr 2022 06:45:38 -0700 (PDT) Received-SPF: softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) client-ip=23.128.96.19; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=BqvKWSt+; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 30BD86DFA11; Wed, 6 Apr 2022 04:34:49 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1578038AbiDEXSI (ORCPT + 99 others); Tue, 5 Apr 2022 19:18:08 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:55804 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1345054AbiDEKki (ORCPT ); Tue, 5 Apr 2022 06:40:38 -0400 Received: from sin.source.kernel.org (sin.source.kernel.org [IPv6:2604:1380:40e1:4800::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id DE0B72D1DC; Tue, 5 Apr 2022 03:25:41 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sin.source.kernel.org (Postfix) with ESMTPS id 5C37ACE0B18; Tue, 5 Apr 2022 10:25:40 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 763AFC385A1; Tue, 5 Apr 2022 10:25:38 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1649154338; bh=f19IgujV/yw7D/q+fpx39ycuktKtJQPW23eKnN0ZCdQ=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=BqvKWSt+K/z4IrOS3uJQ7X6mDBMGj9Fg5ouyHnhqyW5/7aoNLkm3UlPv/avAiPmFq qDojLH2fWqNEp0RezxqxoeWEbFhER8Lbo8v3yb6wzCT4VWHRhU9EL51xRXkZVfp+yq EJRZjsv94VW724qXC5UBUHEj7Wscm07vSLUJAToE= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, PaX Team , "Jason A. Donenfeld" , Jakub Kicinski Subject: [PATCH 5.10 545/599] wireguard: queueing: use CFI-safe ptr_ring cleanup function Date: Tue, 5 Apr 2022 09:33:59 +0200 Message-Id: <20220405070315.060365757@linuxfoundation.org> X-Mailer: git-send-email 2.35.1 In-Reply-To: <20220405070258.802373272@linuxfoundation.org> References: <20220405070258.802373272@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-2.0 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,RDNS_NONE,SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Jason A. Donenfeld commit ec59f128a9bd4255798abb1e06ac3b442f46ef68 upstream. We make too nuanced use of ptr_ring to entirely move to the skb_array wrappers, but we at least should avoid the naughty function pointer cast when cleaning up skbs. Otherwise RAP/CFI will honk at us. This patch uses the __skb_array_destroy_skb wrapper for the cleanup, rather than directly providing kfree_skb, which is what other drivers in the same situation do too. Reported-by: PaX Team Fixes: 886fcee939ad ("wireguard: receive: use ring buffer for incoming handshakes") Signed-off-by: Jason A. Donenfeld Signed-off-by: Jakub Kicinski Signed-off-by: Greg Kroah-Hartman --- drivers/net/wireguard/queueing.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) --- a/drivers/net/wireguard/queueing.c +++ b/drivers/net/wireguard/queueing.c @@ -4,6 +4,7 @@ */ #include "queueing.h" +#include struct multicore_worker __percpu * wg_packet_percpu_multicore_worker_alloc(work_func_t function, void *ptr) @@ -42,7 +43,7 @@ void wg_packet_queue_free(struct crypt_q { free_percpu(queue->worker); WARN_ON(!purge && !__ptr_ring_empty(&queue->ring)); - ptr_ring_cleanup(&queue->ring, purge ? (void(*)(void*))kfree_skb : NULL); + ptr_ring_cleanup(&queue->ring, purge ? __skb_array_destroy_skb : NULL); } #define NEXT(skb) ((skb)->prev)