Received: by 2002:a05:6358:1087:b0:cb:c9d3:cd90 with SMTP id j7csp43330rwi; Tue, 25 Oct 2022 19:57:36 -0700 (PDT) X-Google-Smtp-Source: AMsMyM5QFv+RPnUhZt7T0BpWdzP2x5ja5ZarcsBxH4aGKYBnl77IcLwqbafHR9WjAeLERFiro/r8 X-Received: by 2002:a17:906:2bc7:b0:72f:dc70:a3c6 with SMTP id n7-20020a1709062bc700b0072fdc70a3c6mr35705470ejg.645.1666753045919; Tue, 25 Oct 2022 19:57:25 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1666753045; cv=none; d=google.com; s=arc-20160816; b=PAKuUuKxl6eyy3WMXWPY8xrdQbZdHzd6wUpF32zS+ffV37VQue2feBd77BVD0auW2p 9UM03sgroJeVmNf9vIo3VaK3a0l4KWdE1TOYp4/4pAJw8lRvNim/G2YN72dh2FHmOd4b Q5CiMS5Ugv536v4tVxdYNB0uVyYRI11Zt1yz/lsw0HzZJYbZpAtnJY5W5mRKwbfzzHm6 mQRN/J+mElfO7a1nhCXv9hzI+e8SIy9Q2Yl6A+I39CtIwNnKLgYvSdw8k/OTDnmF7EDn K8QFOiDoCROLf6I6kcXJz/3KCcWeBDJNRwgbjQItFpm5wBRJBwSFVgEwzo3qUh/Judna nhkg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:message-id:date:subject:cc:to:from; bh=GdE4wOOZsmDCSKZ3z9s6YruPyz+Wq88NisgHLG3fyZo=; b=Ega5u+zfiDlnN5OxHxt9DnZkZcoeFu2V6e8h1ghzPwf9NVMn8bGj723kXUDyfeJZCZ N5vjia8LnYBkgMUREab+AtLoBg68Rj5zM4cvzMW8lsnFImoGVJjVxtwpHPVatGS96lpJ QGFiJ0FXLzOPYgUG87/zHmUIzauAmRxQy2AwF/hQuKPShAFp8VGgJs0OjPIXUzNpXzmJ Ofx4k4ZJpzFv8xrnp2M6XeNDVT2xmGstFI5ahuXH1HvkAPoNTFQ695KAi9UdxFJzdw8I 6KrbuqygwZcA4wdB3qEEXrgJYjGLRweHgT7d3K7EQNth5glOaLi4Y02tBotjoWKx+tiI /tuQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id hr24-20020a1709073f9800b007815e9c5b80si4845602ejc.617.2022.10.25.19.57.05; Tue, 25 Oct 2022 19:57:25 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232553AbiJZCjg (ORCPT + 65 others); Tue, 25 Oct 2022 22:39:36 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:58520 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229544AbiJZCjf (ORCPT ); Tue, 25 Oct 2022 22:39:35 -0400 Received: from szxga01-in.huawei.com (szxga01-in.huawei.com [45.249.212.187]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 1F807182; Tue, 25 Oct 2022 19:39:29 -0700 (PDT) Received: from dggpeml500026.china.huawei.com (unknown [172.30.72.55]) by szxga01-in.huawei.com (SkyGuard) with ESMTP id 4MxtGT5qsVzpSxV; Wed, 26 Oct 2022 10:36:01 +0800 (CST) Received: from huawei.com (10.175.101.6) by dggpeml500026.china.huawei.com (7.185.36.106) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.31; Wed, 26 Oct 2022 10:39:26 +0800 From: Zhengchao Shao To: , , , , , , CC: , , , , , Subject: [PATCH net,v2] wifi: mac80211: fix general-protection-fault in ieee80211_subif_start_xmit() Date: Wed, 26 Oct 2022 10:47:03 +0800 Message-ID: <20221026024703.150668-1-shaozhengchao@huawei.com> X-Mailer: git-send-email 2.17.1 MIME-Version: 1.0 Content-Type: text/plain X-Originating-IP: [10.175.101.6] X-ClientProxiedBy: dggems701-chm.china.huawei.com (10.3.19.178) To dggpeml500026.china.huawei.com (7.185.36.106) X-CFilter-Loop: Reflected X-Spam-Status: No, score=-4.2 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_MED, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-wireless@vger.kernel.org When device is running and the interface status is changed, the gpf issue is triggered. The problem triggering process is as follows: Thread A: Thread B ieee80211_runtime_change_iftype() process_one_work() ... ... ieee80211_do_stop() ... ... ... sdata->bss = NULL ... ... ieee80211_subif_start_xmit() ieee80211_multicast_to_unicast //!sdata->bss->multicast_to_unicast cause gpf issue When the interface status is changed, the sending queue continues to send packets. After the bss is set to NULL, the bss is accessed. As a result, this causes a general-protection-fault issue. The following is the stack information: general protection fault, probably for non-canonical address 0xdffffc000000002f: 0000 [#1] PREEMPT SMP KASAN KASAN: null-ptr-deref in range [0x0000000000000178-0x000000000000017f] Workqueue: mld mld_ifc_work RIP: 0010:ieee80211_subif_start_xmit+0x25b/0x1310 Call Trace: dev_hard_start_xmit+0x1be/0x990 __dev_queue_xmit+0x2c9a/0x3b60 ip6_finish_output2+0xf92/0x1520 ip6_finish_output+0x6af/0x11e0 ip6_output+0x1ed/0x540 mld_sendpack+0xa09/0xe70 mld_ifc_work+0x71c/0xdb0 process_one_work+0x9bf/0x1710 worker_thread+0x665/0x1080 kthread+0x2e4/0x3a0 ret_from_fork+0x1f/0x30 Fixes: f856373e2f31 ("wifi: mac80211: do not wake queues on a vif that is being stopped") Reported-by: syzbot+c6e8fca81c294fd5620a@syzkaller.appspotmail.com Signed-off-by: Zhengchao Shao --- net/mac80211/tx.c | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/net/mac80211/tx.c b/net/mac80211/tx.c index a364148149f9..c38485f39d2b 100644 --- a/net/mac80211/tx.c +++ b/net/mac80211/tx.c @@ -4418,6 +4418,11 @@ netdev_tx_t ieee80211_subif_start_xmit(struct sk_buff *skb, if (likely(!is_multicast_ether_addr(eth->h_dest))) goto normal; + if (unlikely(!ieee80211_sdata_running(sdata))) { + kfree_skb(skb); + return NETDEV_TX_OK; + } + if (unlikely(ieee80211_multicast_to_unicast(skb, dev))) { struct sk_buff_head queue; -- 2.17.1