ACK / APPLIED[artful]: [PATCH][Unstable][Artful][SRU Zesty] net: hns: Fix a skb used after free bug
Seth Forshee
seth.forshee at canonical.com
Tue Jul 18 12:35:29 UTC 2017
On Mon, Jul 17, 2017 at 07:11:31PM -0600, dann frazier wrote:
> From: Yunsheng Lin <linyunsheng at huawei.com>
>
> BugLink: https://bugs.launchpad.net/bugs/1704885
>
> skb maybe freed in hns_nic_net_xmit_hw() and return NETDEV_TX_OK,
> which cause hns_nic_net_xmit to use a freed skb.
>
> BUG: KASAN: use-after-free in hns_nic_net_xmit_hw+0x62c/0x940...
> [17659.112635] alloc_debug_processing+0x18c/0x1a0
> [17659.117208] __slab_alloc+0x52c/0x560
> [17659.120909] kmem_cache_alloc_node+0xac/0x2c0
> [17659.125309] __alloc_skb+0x6c/0x260
> [17659.128837] tcp_send_ack+0x8c/0x280
> [17659.132449] __tcp_ack_snd_check+0x9c/0xf0
> [17659.136587] tcp_rcv_established+0x5a4/0xa70
> [17659.140899] tcp_v4_do_rcv+0x27c/0x620
> [17659.144687] tcp_prequeue_process+0x108/0x170
> [17659.149085] tcp_recvmsg+0x940/0x1020
> [17659.152787] inet_recvmsg+0x124/0x180
> [17659.156488] sock_recvmsg+0x64/0x80
> [17659.160012] SyS_recvfrom+0xd8/0x180
> [17659.163626] __sys_trace_return+0x0/0x4
> [17659.167506] INFO: Freed in kfree_skbmem+0xa0/0xb0 age=23 cpu=1 pid=13
> [17659.174000] free_debug_processing+0x1d4/0x2c0
> [17659.178486] __slab_free+0x240/0x390
> [17659.182100] kmem_cache_free+0x24c/0x270
> [17659.186062] kfree_skbmem+0xa0/0xb0
> [17659.189587] __kfree_skb+0x28/0x40
> [17659.193025] napi_gro_receive+0x168/0x1c0
> [17659.197074] hns_nic_rx_up_pro+0x58/0x90
> [17659.201038] hns_nic_rx_poll_one+0x518/0xbc0
> [17659.205352] hns_nic_common_poll+0x94/0x140
> [17659.209576] net_rx_action+0x458/0x5e0
> [17659.213363] __do_softirq+0x1b8/0x480
> [17659.217062] run_ksoftirqd+0x64/0x80
> [17659.220679] smpboot_thread_fn+0x224/0x310
> [17659.224821] kthread+0x150/0x170
> [17659.228084] ret_from_fork+0x10/0x40
>
> BUG: KASAN: use-after-free in hns_nic_net_xmit+0x8c/0xc0...
> [17751.080490] __slab_alloc+0x52c/0x560
> [17751.084188] kmem_cache_alloc+0x244/0x280
> [17751.088238] __build_skb+0x40/0x150
> [17751.091764] build_skb+0x28/0x100
> [17751.095115] __alloc_rx_skb+0x94/0x150
> [17751.098900] __napi_alloc_skb+0x34/0x90
> [17751.102776] hns_nic_rx_poll_one+0x180/0xbc0
> [17751.107097] hns_nic_common_poll+0x94/0x140
> [17751.111333] net_rx_action+0x458/0x5e0
> [17751.115123] __do_softirq+0x1b8/0x480
> [17751.118823] run_ksoftirqd+0x64/0x80
> [17751.122437] smpboot_thread_fn+0x224/0x310
> [17751.126575] kthread+0x150/0x170
> [17751.129838] ret_from_fork+0x10/0x40
> [17751.133454] INFO: Freed in kfree_skbmem+0xa0/0xb0 age=19 cpu=7 pid=43
> [17751.139951] free_debug_processing+0x1d4/0x2c0
> [17751.144436] __slab_free+0x240/0x390
> [17751.148051] kmem_cache_free+0x24c/0x270
> [17751.152014] kfree_skbmem+0xa0/0xb0
> [17751.155543] __kfree_skb+0x28/0x40
> [17751.159022] napi_gro_receive+0x168/0x1c0
> [17751.163074] hns_nic_rx_up_pro+0x58/0x90
> [17751.167041] hns_nic_rx_poll_one+0x518/0xbc0
> [17751.171358] hns_nic_common_poll+0x94/0x140
> [17751.175585] net_rx_action+0x458/0x5e0
> [17751.179373] __do_softirq+0x1b8/0x480
> [17751.183076] run_ksoftirqd+0x64/0x80
> [17751.186691] smpboot_thread_fn+0x224/0x310
> [17751.190826] kthread+0x150/0x170
> [17751.194093] ret_from_fork+0x10/0x40
>
> Fixes: 13ac695e7ea1 ("net:hns: Add support of Hip06 SoC to the Hislicon Network Subsystem")
> Signed-off-by: Yunsheng Lin <linyunsheng at huawei.com>
> Signed-off-by: lipeng <lipeng321 at huawei.com>
> Reported-by: Jun He <hjat2005 at huawei.com>
> Signed-off-by: David S. Miller <davem at davemloft.net>
> (cherry picked from commit 27463ad99f738ed93c7c8b3e2e5bc8c4853a2ff2)
> Signed-off-by: dann frazier <dann.frazier at canonical.com>
Clean cherry pick, regression potential limited to a single
platform-specific driver.
Acked-by: Seth Forshee <seth.forshee at canonical.com>
Applied to artful/master-next and unstable/master, thanks.
More information about the kernel-team
mailing list