linux-can-fixes-for-6.8-20240214
-----BEGIN PGP SIGNATURE----- iQFHBAABCgAxFiEEUEC6huC2BN0pvD5fKDiiPnotvG8FAmXMwlUTHG1rbEBwZW5n dXRyb25peC5kZQAKCRAoOKI+ei28bwDmCACBeVNV2d9mL8AwNoaIiUmOHF8LsclP NsRSl4rz/TMDFgO2tX9oUQGLsZG0YTSqJ5dF3qI7zjskBlTBJX0y4fByvQAQ6mU9 ZhwZMBz3JSS+tuZFIMWqHW1yq2TXoTnx1IzIM5f+D83LWqtP5Jto15lw1Ratrtat taZwGwR10cEWO0IFNUx+4c5SGa+gGbEBdr7UBlJU1MdZ9fzo+ByV/H6JrfY1qqEj DvraQm/oNCVrSP5dVr1s+0Kqnh1X1ff+6JWs5q2CJDN7E+Ai2cOxrEd2/JP7GANG S0UIqH744z3kJDSE+GuQjxF4vbXqX3qfKIP4Q+EYlNvs0oskIQ5ebCsW =So6Y -----END PGP SIGNATURE----- Merge tag 'linux-can-fixes-for-6.8-20240214' of git://git.kernel.org/pub/scm/linux/kernel/git/mkl/linux-can Marc Kleine-Budde says: ==================== pull-request: can 2024-02-14 this is a pull request of 3 patches for net/master. the first patch is by Ziqi Zhao and targets the CAN J1939 protocol, it fixes a potential deadlock by replacing the spinlock by an rwlock. Oleksij Rempel's patch adds a missing spin_lock_bh() to prevent a potential Use-After-Free in the CAN J1939's setsockopt(SO_J1939_FILTER). Maxime Jayat contributes a patch to fix the transceiver delay compensation (TDCO) calculation, which is needed for higher CAN-FD bit rates (usually 2Mbit/s). * tag 'linux-can-fixes-for-6.8-20240214' of git://git.kernel.org/pub/scm/linux/kernel/git/mkl/linux-can: can: netlink: Fix TDCO calculation using the old data bittiming can: j1939: Fix UAF in j1939_sk_match_filter during setsockopt(SO_J1939_FILTER) can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock ==================== Link: https://lore.kernel.org/r/20240214140348.2412776-1-mkl@pengutronix.de Signed-off-by: Paolo Abeni <pabeni@redhat.com>
This commit is contained in:
commit
f3ac28e1f8
@ -346,7 +346,7 @@ static int can_changelink(struct net_device *dev, struct nlattr *tb[],
|
||||
/* Neither of TDC parameters nor TDC flags are
|
||||
* provided: do calculation
|
||||
*/
|
||||
can_calc_tdco(&priv->tdc, priv->tdc_const, &priv->data_bittiming,
|
||||
can_calc_tdco(&priv->tdc, priv->tdc_const, &dbt,
|
||||
&priv->ctrlmode, priv->ctrlmode_supported);
|
||||
} /* else: both CAN_CTRLMODE_TDC_{AUTO,MANUAL} are explicitly
|
||||
* turned off. TDC is disabled: do nothing
|
||||
|
@ -86,7 +86,7 @@ struct j1939_priv {
|
||||
unsigned int tp_max_packet_size;
|
||||
|
||||
/* lock for j1939_socks list */
|
||||
spinlock_t j1939_socks_lock;
|
||||
rwlock_t j1939_socks_lock;
|
||||
struct list_head j1939_socks;
|
||||
|
||||
struct kref rx_kref;
|
||||
@ -301,6 +301,7 @@ struct j1939_sock {
|
||||
|
||||
int ifindex;
|
||||
struct j1939_addr addr;
|
||||
spinlock_t filters_lock;
|
||||
struct j1939_filter *filters;
|
||||
int nfilters;
|
||||
pgn_t pgn_rx_filter;
|
||||
|
@ -274,7 +274,7 @@ struct j1939_priv *j1939_netdev_start(struct net_device *ndev)
|
||||
return ERR_PTR(-ENOMEM);
|
||||
|
||||
j1939_tp_init(priv);
|
||||
spin_lock_init(&priv->j1939_socks_lock);
|
||||
rwlock_init(&priv->j1939_socks_lock);
|
||||
INIT_LIST_HEAD(&priv->j1939_socks);
|
||||
|
||||
mutex_lock(&j1939_netdev_lock);
|
||||
|
@ -80,16 +80,16 @@ static void j1939_jsk_add(struct j1939_priv *priv, struct j1939_sock *jsk)
|
||||
jsk->state |= J1939_SOCK_BOUND;
|
||||
j1939_priv_get(priv);
|
||||
|
||||
spin_lock_bh(&priv->j1939_socks_lock);
|
||||
write_lock_bh(&priv->j1939_socks_lock);
|
||||
list_add_tail(&jsk->list, &priv->j1939_socks);
|
||||
spin_unlock_bh(&priv->j1939_socks_lock);
|
||||
write_unlock_bh(&priv->j1939_socks_lock);
|
||||
}
|
||||
|
||||
static void j1939_jsk_del(struct j1939_priv *priv, struct j1939_sock *jsk)
|
||||
{
|
||||
spin_lock_bh(&priv->j1939_socks_lock);
|
||||
write_lock_bh(&priv->j1939_socks_lock);
|
||||
list_del_init(&jsk->list);
|
||||
spin_unlock_bh(&priv->j1939_socks_lock);
|
||||
write_unlock_bh(&priv->j1939_socks_lock);
|
||||
|
||||
j1939_priv_put(priv);
|
||||
jsk->state &= ~J1939_SOCK_BOUND;
|
||||
@ -262,12 +262,17 @@ static bool j1939_sk_match_dst(struct j1939_sock *jsk,
|
||||
static bool j1939_sk_match_filter(struct j1939_sock *jsk,
|
||||
const struct j1939_sk_buff_cb *skcb)
|
||||
{
|
||||
const struct j1939_filter *f = jsk->filters;
|
||||
int nfilter = jsk->nfilters;
|
||||
const struct j1939_filter *f;
|
||||
int nfilter;
|
||||
|
||||
spin_lock_bh(&jsk->filters_lock);
|
||||
|
||||
f = jsk->filters;
|
||||
nfilter = jsk->nfilters;
|
||||
|
||||
if (!nfilter)
|
||||
/* receive all when no filters are assigned */
|
||||
return true;
|
||||
goto filter_match_found;
|
||||
|
||||
for (; nfilter; ++f, --nfilter) {
|
||||
if ((skcb->addr.pgn & f->pgn_mask) != f->pgn)
|
||||
@ -276,9 +281,15 @@ static bool j1939_sk_match_filter(struct j1939_sock *jsk,
|
||||
continue;
|
||||
if ((skcb->addr.src_name & f->name_mask) != f->name)
|
||||
continue;
|
||||
return true;
|
||||
goto filter_match_found;
|
||||
}
|
||||
|
||||
spin_unlock_bh(&jsk->filters_lock);
|
||||
return false;
|
||||
|
||||
filter_match_found:
|
||||
spin_unlock_bh(&jsk->filters_lock);
|
||||
return true;
|
||||
}
|
||||
|
||||
static bool j1939_sk_recv_match_one(struct j1939_sock *jsk,
|
||||
@ -329,13 +340,13 @@ bool j1939_sk_recv_match(struct j1939_priv *priv, struct j1939_sk_buff_cb *skcb)
|
||||
struct j1939_sock *jsk;
|
||||
bool match = false;
|
||||
|
||||
spin_lock_bh(&priv->j1939_socks_lock);
|
||||
read_lock_bh(&priv->j1939_socks_lock);
|
||||
list_for_each_entry(jsk, &priv->j1939_socks, list) {
|
||||
match = j1939_sk_recv_match_one(jsk, skcb);
|
||||
if (match)
|
||||
break;
|
||||
}
|
||||
spin_unlock_bh(&priv->j1939_socks_lock);
|
||||
read_unlock_bh(&priv->j1939_socks_lock);
|
||||
|
||||
return match;
|
||||
}
|
||||
@ -344,11 +355,11 @@ void j1939_sk_recv(struct j1939_priv *priv, struct sk_buff *skb)
|
||||
{
|
||||
struct j1939_sock *jsk;
|
||||
|
||||
spin_lock_bh(&priv->j1939_socks_lock);
|
||||
read_lock_bh(&priv->j1939_socks_lock);
|
||||
list_for_each_entry(jsk, &priv->j1939_socks, list) {
|
||||
j1939_sk_recv_one(jsk, skb);
|
||||
}
|
||||
spin_unlock_bh(&priv->j1939_socks_lock);
|
||||
read_unlock_bh(&priv->j1939_socks_lock);
|
||||
}
|
||||
|
||||
static void j1939_sk_sock_destruct(struct sock *sk)
|
||||
@ -401,6 +412,7 @@ static int j1939_sk_init(struct sock *sk)
|
||||
atomic_set(&jsk->skb_pending, 0);
|
||||
spin_lock_init(&jsk->sk_session_queue_lock);
|
||||
INIT_LIST_HEAD(&jsk->sk_session_queue);
|
||||
spin_lock_init(&jsk->filters_lock);
|
||||
|
||||
/* j1939_sk_sock_destruct() depends on SOCK_RCU_FREE flag */
|
||||
sock_set_flag(sk, SOCK_RCU_FREE);
|
||||
@ -703,9 +715,11 @@ static int j1939_sk_setsockopt(struct socket *sock, int level, int optname,
|
||||
}
|
||||
|
||||
lock_sock(&jsk->sk);
|
||||
spin_lock_bh(&jsk->filters_lock);
|
||||
ofilters = jsk->filters;
|
||||
jsk->filters = filters;
|
||||
jsk->nfilters = count;
|
||||
spin_unlock_bh(&jsk->filters_lock);
|
||||
release_sock(&jsk->sk);
|
||||
kfree(ofilters);
|
||||
return 0;
|
||||
@ -1080,12 +1094,12 @@ void j1939_sk_errqueue(struct j1939_session *session,
|
||||
}
|
||||
|
||||
/* spread RX notifications to all sockets subscribed to this session */
|
||||
spin_lock_bh(&priv->j1939_socks_lock);
|
||||
read_lock_bh(&priv->j1939_socks_lock);
|
||||
list_for_each_entry(jsk, &priv->j1939_socks, list) {
|
||||
if (j1939_sk_recv_match_one(jsk, &session->skcb))
|
||||
__j1939_sk_errqueue(session, &jsk->sk, type);
|
||||
}
|
||||
spin_unlock_bh(&priv->j1939_socks_lock);
|
||||
read_unlock_bh(&priv->j1939_socks_lock);
|
||||
};
|
||||
|
||||
void j1939_sk_send_loop_abort(struct sock *sk, int err)
|
||||
@ -1273,7 +1287,7 @@ void j1939_sk_netdev_event_netdown(struct j1939_priv *priv)
|
||||
struct j1939_sock *jsk;
|
||||
int error_code = ENETDOWN;
|
||||
|
||||
spin_lock_bh(&priv->j1939_socks_lock);
|
||||
read_lock_bh(&priv->j1939_socks_lock);
|
||||
list_for_each_entry(jsk, &priv->j1939_socks, list) {
|
||||
jsk->sk.sk_err = error_code;
|
||||
if (!sock_flag(&jsk->sk, SOCK_DEAD))
|
||||
@ -1281,7 +1295,7 @@ void j1939_sk_netdev_event_netdown(struct j1939_priv *priv)
|
||||
|
||||
j1939_sk_queue_drop_all(priv, jsk, error_code);
|
||||
}
|
||||
spin_unlock_bh(&priv->j1939_socks_lock);
|
||||
read_unlock_bh(&priv->j1939_socks_lock);
|
||||
}
|
||||
|
||||
static int j1939_sk_no_ioctlcmd(struct socket *sock, unsigned int cmd,
|
||||
|
Loading…
x
Reference in New Issue
Block a user