Received: by 2002:a05:6358:3188:b0:123:57c1:9b43 with SMTP id q8csp2145128rwd; Fri, 2 Jun 2023 05:38:45 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ4hQSFbdDr8rSWbZDPJQ/BRSq5aZE4miAajm1t0mqNeqCSFccDNA0R0rJVQyOImAFEcZJ++ X-Received: by 2002:a05:6358:3397:b0:121:4c8b:9005 with SMTP id i23-20020a056358339700b001214c8b9005mr4432750rwd.32.1685709524971; Fri, 02 Jun 2023 05:38:44 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1685709524; cv=none; d=google.com; s=arc-20160816; b=n8J9q7oG2wemvw1N7o7cpqiC81Oa+a7bdvJwM21/76+ViqkchKeMryW3rw9n5hboE2 rgUEd3AoyypqgN+FiZe7O9myZgkP9HsiF4/Xy5zvTk7RtY/y65gcGDHlZOBAwOmxZQ7o DaGuu+agCNrnuVsCTOPIX0QXgSbMdUihuGf26So0uZEnXBz4Rw2vJ9in5exAI23jVgFG pqamkd80q0Mi0RmPQWOGGTLSen2j5HRBlD6RKNw2cXevD0rHhJHnmxnQuLOImDaOK7hX +87xejSBPEzpw/TBNCv3Ho2Leb0JhrKnIGKw1BWLJA17rJALXPQWOyKPTwyuHDmdAf1Y nl8Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:user-agent:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date; bh=RFrJt2lcaN22DNZdFKLIjEc3aCG+L4Xe9PSFoQjAZHs=; b=kCYF5+bTMoRBqhhx9THPtI1qGEA+bxF3jljupxU1ojc82EKeR43RpcuI0P23DUJ++G gVLI0qmUqrRZz5Nlq2uR35NS/hSeZ9FE9ZJdtZVtejlXN1YHLYr8yBOp7nz2A2Tt5SoK e+kBbYsmBdm/mbCkEKnOBydT6FFpy2x3sRNsPDVwQD6HbsRovXjsBF0377U3TnbY6MUd rkF/nN1atrdwcr2oNR6L2DfRk9RqZBUsVYbksQS+SdwIurPT1MPRtletIueIscxUw6qX 3pDTGmK+yFve0z2VpDcMtSCndh3GtnSBD6fNcUU0MEL5CcRXQzXql169SHNWiQnoXAFB 8LOw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id y62-20020a638a41000000b00524ecf898a2si914653pgd.359.2023.06.02.05.38.30; Fri, 02 Jun 2023 05:38:44 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234951AbjFBMei (ORCPT + 99 others); Fri, 2 Jun 2023 08:34:38 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:38978 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234808AbjFBMeg (ORCPT ); Fri, 2 Jun 2023 08:34:36 -0400 Received: from metis.ext.pengutronix.de (metis.ext.pengutronix.de [IPv6:2001:67c:670:201:290:27ff:fe1d:cc33]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 6790313E for ; Fri, 2 Jun 2023 05:34:35 -0700 (PDT) Received: from ptx.hi.pengutronix.de ([2001:67c:670:100:1d::c0]) by metis.ext.pengutronix.de with esmtps (TLS1.3:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.92) (envelope-from ) id 1q53yT-0001Kq-Ip; Fri, 02 Jun 2023 14:33:45 +0200 Received: from ore by ptx.hi.pengutronix.de with local (Exim 4.92) (envelope-from ) id 1q53yP-0000yE-Po; Fri, 02 Jun 2023 14:33:41 +0200 Date: Fri, 2 Jun 2023 14:33:41 +0200 From: Oleksij Rempel To: Fedor Pchelkin Cc: Oleksij Rempel , Kurt Van Dijck , lvc-project@linuxtesting.org, Robin van der Gracht , linux-can@vger.kernel.org, Eric Dumazet , netdev@vger.kernel.org, Marc Kleine-Budde , Alexey Khoroshilov , kernel@pengutronix.de, Oliver Hartkopp , Jakub Kicinski , Paolo Abeni , "David S. Miller" , linux-kernel@vger.kernel.org Subject: Re: [PATCH 1/2] can: j1939: change j1939_netdev_lock type to mutex Message-ID: <20230602123341.GG17237@pengutronix.de> References: <20230526171910.227615-1-pchelkin@ispras.ru> <20230526171910.227615-2-pchelkin@ispras.ru> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: <20230526171910.227615-2-pchelkin@ispras.ru> X-Sent-From: Pengutronix Hildesheim X-URL: http://www.pengutronix.de/ X-Accept-Language: de,en X-Accept-Content-Type: text/plain User-Agent: Mutt/1.10.1 (2018-07-13) X-SA-Exim-Connect-IP: 2001:67c:670:100:1d::c0 X-SA-Exim-Mail-From: ore@pengutronix.de X-SA-Exim-Scanned: No (on metis.ext.pengutronix.de); SAEximRunCond expanded to false X-PTX-Original-Recipient: linux-kernel@vger.kernel.org X-Spam-Status: No, score=-4.2 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_MED, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE,URIBL_BLOCKED autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, May 26, 2023 at 08:19:09PM +0300, Fedor Pchelkin wrote: > It turns out access to j1939_can_rx_register() needs to be serialized, > otherwise j1939_priv can be corrupted when parallel threads call > j1939_netdev_start() and j1939_can_rx_register() fails. This issue is > thoroughly covered in other commit which serializes access to > j1939_can_rx_register(). > > Change j1939_netdev_lock type to mutex so that we do not need to remove > GFP_KERNEL from can_rx_register(). > > j1939_netdev_lock seems to be used in normal contexts where mutex usage > is not prohibited. > > Found by Linux Verification Center (linuxtesting.org) with Syzkaller. > > Fixes: 9d71dd0c7009 ("can: add support of SAE J1939 protocol") > Suggested-by: Alexey Khoroshilov > Signed-off-by: Fedor Pchelkin Tested-by: Oleksij Rempel Acked-by: Oleksij Rempel Thank you! > --- > Note that it has been only tested via Syzkaller and not with real > hardware. > > net/can/j1939/main.c | 22 +++++++++++----------- > 1 file changed, 11 insertions(+), 11 deletions(-) > > diff --git a/net/can/j1939/main.c b/net/can/j1939/main.c > index 821d4ff303b3..6ed79afe19a5 100644 > --- a/net/can/j1939/main.c > +++ b/net/can/j1939/main.c > @@ -126,7 +126,7 @@ static void j1939_can_recv(struct sk_buff *iskb, void *data) > #define J1939_CAN_ID CAN_EFF_FLAG > #define J1939_CAN_MASK (CAN_EFF_FLAG | CAN_RTR_FLAG) > > -static DEFINE_SPINLOCK(j1939_netdev_lock); > +static DEFINE_MUTEX(j1939_netdev_lock); > > static struct j1939_priv *j1939_priv_create(struct net_device *ndev) > { > @@ -220,7 +220,7 @@ static void __j1939_rx_release(struct kref *kref) > j1939_can_rx_unregister(priv); > j1939_ecu_unmap_all(priv); > j1939_priv_set(priv->ndev, NULL); > - spin_unlock(&j1939_netdev_lock); > + mutex_unlock(&j1939_netdev_lock); > } > > /* get pointer to priv without increasing ref counter */ > @@ -248,9 +248,9 @@ static struct j1939_priv *j1939_priv_get_by_ndev(struct net_device *ndev) > { > struct j1939_priv *priv; > > - spin_lock(&j1939_netdev_lock); > + mutex_lock(&j1939_netdev_lock); > priv = j1939_priv_get_by_ndev_locked(ndev); > - spin_unlock(&j1939_netdev_lock); > + mutex_unlock(&j1939_netdev_lock); > > return priv; > } > @@ -260,14 +260,14 @@ struct j1939_priv *j1939_netdev_start(struct net_device *ndev) > struct j1939_priv *priv, *priv_new; > int ret; > > - spin_lock(&j1939_netdev_lock); > + mutex_lock(&j1939_netdev_lock); > priv = j1939_priv_get_by_ndev_locked(ndev); > if (priv) { > kref_get(&priv->rx_kref); > - spin_unlock(&j1939_netdev_lock); > + mutex_unlock(&j1939_netdev_lock); > return priv; > } > - spin_unlock(&j1939_netdev_lock); > + mutex_unlock(&j1939_netdev_lock); > > priv = j1939_priv_create(ndev); > if (!priv) > @@ -277,20 +277,20 @@ struct j1939_priv *j1939_netdev_start(struct net_device *ndev) > spin_lock_init(&priv->j1939_socks_lock); > INIT_LIST_HEAD(&priv->j1939_socks); > > - spin_lock(&j1939_netdev_lock); > + mutex_lock(&j1939_netdev_lock); > priv_new = j1939_priv_get_by_ndev_locked(ndev); > if (priv_new) { > /* Someone was faster than us, use their priv and roll > * back our's. > */ > kref_get(&priv_new->rx_kref); > - spin_unlock(&j1939_netdev_lock); > + mutex_unlock(&j1939_netdev_lock); > dev_put(ndev); > kfree(priv); > return priv_new; > } > j1939_priv_set(ndev, priv); > - spin_unlock(&j1939_netdev_lock); > + mutex_unlock(&j1939_netdev_lock); > > ret = j1939_can_rx_register(priv); > if (ret < 0) > @@ -308,7 +308,7 @@ struct j1939_priv *j1939_netdev_start(struct net_device *ndev) > > void j1939_netdev_stop(struct j1939_priv *priv) > { > - kref_put_lock(&priv->rx_kref, __j1939_rx_release, &j1939_netdev_lock); > + kref_put_mutex(&priv->rx_kref, __j1939_rx_release, &j1939_netdev_lock); > j1939_priv_put(priv); > } > > -- > 2.34.1 > > > -- Pengutronix e.K. | | Steuerwalder Str. 21 | http://www.pengutronix.de/ | 31137 Hildesheim, Germany | Phone: +49-5121-206917-0 | Amtsgericht Hildesheim, HRA 2686 | Fax: +49-5121-206917-5555 |