]> git.ipfire.org Git - thirdparty/kernel/stable-queue.git/commitdiff
5.19-stable patches
authorGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Fri, 2 Sep 2022 08:38:56 +0000 (10:38 +0200)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Fri, 2 Sep 2022 08:38:56 +0000 (10:38 +0200)
added patches:
net-neigh-don-t-call-kfree_skb-under-spin_lock_irqsave.patch

queue-5.19/net-neigh-don-t-call-kfree_skb-under-spin_lock_irqsave.patch [new file with mode: 0644]
queue-5.19/series

diff --git a/queue-5.19/net-neigh-don-t-call-kfree_skb-under-spin_lock_irqsave.patch b/queue-5.19/net-neigh-don-t-call-kfree_skb-under-spin_lock_irqsave.patch
new file mode 100644 (file)
index 0000000..86c3d8c
--- /dev/null
@@ -0,0 +1,56 @@
+From d5485d9dd24e1d04e5509916515260186eb1455c Mon Sep 17 00:00:00 2001
+From: Yang Yingliang <yangyingliang@huawei.com>
+Date: Mon, 22 Aug 2022 10:53:46 +0800
+Subject: net: neigh: don't call kfree_skb() under spin_lock_irqsave()
+
+From: Yang Yingliang <yangyingliang@huawei.com>
+
+commit d5485d9dd24e1d04e5509916515260186eb1455c upstream.
+
+It is not allowed to call kfree_skb() from hardware interrupt
+context or with interrupts being disabled. So add all skb to
+a tmp list, then free them after spin_unlock_irqrestore() at
+once.
+
+Fixes: 66ba215cb513 ("neigh: fix possible DoS due to net iface start/stop loop")
+Suggested-by: Denis V. Lunev <den@openvz.org>
+Signed-off-by: Yang Yingliang <yangyingliang@huawei.com>
+Reviewed-by: Nikolay Aleksandrov <razor@blackwall.org>
+Signed-off-by: David S. Miller <davem@davemloft.net>
+Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
+---
+ net/core/neighbour.c |   10 ++++++++--
+ 1 file changed, 8 insertions(+), 2 deletions(-)
+
+--- a/net/core/neighbour.c
++++ b/net/core/neighbour.c
+@@ -309,21 +309,27 @@ static int neigh_del_timer(struct neighb
+ static void pneigh_queue_purge(struct sk_buff_head *list, struct net *net)
+ {
++      struct sk_buff_head tmp;
+       unsigned long flags;
+       struct sk_buff *skb;
++      skb_queue_head_init(&tmp);
+       spin_lock_irqsave(&list->lock, flags);
+       skb = skb_peek(list);
+       while (skb != NULL) {
+               struct sk_buff *skb_next = skb_peek_next(skb, list);
+               if (net == NULL || net_eq(dev_net(skb->dev), net)) {
+                       __skb_unlink(skb, list);
+-                      dev_put(skb->dev);
+-                      kfree_skb(skb);
++                      __skb_queue_tail(&tmp, skb);
+               }
+               skb = skb_next;
+       }
+       spin_unlock_irqrestore(&list->lock, flags);
++
++      while ((skb = __skb_dequeue(&tmp))) {
++              dev_put(skb->dev);
++              kfree_skb(skb);
++      }
+ }
+ static void neigh_flush_dev(struct neigh_table *tbl, struct net_device *dev,
index cc0af7ad4ce95d3c1b5a4f5ff32d03197d225730..c6c7b61ba57e29c15a3665c33b8c36e0e005b98a 100644 (file)
@@ -68,3 +68,4 @@ btrfs-fix-lockdep-splat-with-reloc-root-extent-buffe.patch
 btrfs-tree-checker-check-for-overlapping-extent-item.patch
 android-binder-fix-lockdep-check-on-clearing-vma.patch
 net-af_packet-check-len-when-min_header_len-equals-to-0.patch
+net-neigh-don-t-call-kfree_skb-under-spin_lock_irqsave.patch