Java程序辅导

C C++ Java Python Processing编程在线培训 程序编写 软件开发 视频讲解

客服在线QQ:2653320439 微信:ittutor Email:itutor@qq.com
wx: cjtutor
QQ: 2653320439
Linux-Kernel Archive: [PATCH 4.4 10/76] socket, bpf: fix sk_filter use after free in sk_clone_lock [PATCH 4.4 10/76] socket, bpf: fix sk_filter use after free in sk_clone_lock From: Greg Kroah-Hartman Date: Tue Mar 28 2017 - 09:56:50 EST Next message: Greg Kroah-Hartman: "[PATCH 4.4 20/76] Input: sur40 - validate number of endpoints before using them" Previous message: Greg Kroah-Hartman: "[PATCH 4.4 11/76] tcp: initialize icsk_ack.lrcvtime at session start time" In reply to: Greg Kroah-Hartman: "[PATCH 4.4 11/76] tcp: initialize icsk_ack.lrcvtime at session start time" Next in thread: Greg Kroah-Hartman: "[PATCH 4.4 20/76] Input: sur40 - validate number of endpoints before using them" Messages sorted by: [ date ] [ thread ] [ subject ] [ author ] 4.4-stable review patch. If anyone has any objections, please let me know. ------------------ From: Daniel Borkmann [ Upstream commit a97e50cc4cb67e1e7bff56f6b41cda62ca832336 ] In sk_clone_lock(), we create a new socket and inherit most of the parent's members via sock_copy() which memcpy()'s various sections. Now, in case the parent socket had a BPF socket filter attached, then newsk->sk_filter points to the same instance as the original sk->sk_filter. sk_filter_charge() is then called on the newsk->sk_filter to take a reference and should that fail due to hitting max optmem, we bail out and release the newsk instance. The issue is that commit 278571baca2a ("net: filter: simplify socket charging") wrongly combined the dismantle path with the failure path of xfrm_sk_clone_policy(). This means, even when charging failed, we call sk_free_unlock_clone() on the newsk, which then still points to the same sk_filter as the original sk. Thus, sk_free_unlock_clone() calls into __sk_destruct() eventually where it tests for present sk_filter and calls sk_filter_uncharge() on it, which potentially lets sk_omem_alloc wrap around and releases the eBPF prog and sk_filter structure from the (still intact) parent. Fix it by making sure that when sk_filter_charge() failed, we reset newsk->sk_filter back to NULL before passing to sk_free_unlock_clone(), so that we don't mess with the parents sk_filter. Only if xfrm_sk_clone_policy() fails, we did reach the point where either the parent's filter was NULL and as a result newsk's as well or where we previously had a successful sk_filter_charge(), thus for that case, we do need sk_filter_uncharge() to release the prior taken reference on sk_filter. Fixes: 278571baca2a ("net: filter: simplify socket charging") Signed-off-by: Daniel Borkmann Acked-by: Alexei Starovoitov Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- net/core/sock.c | 6 ++++++ 1 file changed, 6 insertions(+) --- a/net/core/sock.c +++ b/net/core/sock.c @@ -1557,6 +1557,12 @@ struct sock *sk_clone_lock(const struct is_charged = sk_filter_charge(newsk, filter); if (unlikely(!is_charged || xfrm_sk_clone_policy(newsk, sk))) { + /* We need to make sure that we don't uncharge the new + * socket if we couldn't charge it in the first place + * as otherwise we uncharge the parent's filter. + */ + if (!is_charged) + RCU_INIT_POINTER(newsk->sk_filter, NULL); /* It is still raw copy of parent, so invalidate * destructor and make plain sk_free() */ newsk->sk_destruct = NULL; Next message: Greg Kroah-Hartman: "[PATCH 4.4 20/76] Input: sur40 - validate number of endpoints before using them" Previous message: Greg Kroah-Hartman: "[PATCH 4.4 11/76] tcp: initialize icsk_ack.lrcvtime at session start time" In reply to: Greg Kroah-Hartman: "[PATCH 4.4 11/76] tcp: initialize icsk_ack.lrcvtime at session start time" Next in thread: Greg Kroah-Hartman: "[PATCH 4.4 20/76] Input: sur40 - validate number of endpoints before using them" Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]