From: Greg Kroah-Hartman Date: Mon, 11 Jan 2021 11:47:07 +0000 (+0100) Subject: 5.4-stable patches X-Git-Tag: v4.4.251~11 X-Git-Url: http://git.ipfire.org/gitweb.cgi?a=commitdiff_plain;h=a87f339fbe21569469c84a2ee04d18f0f9381ad8;p=thirdparty%2Fkernel%2Fstable-queue.git 5.4-stable patches added patches: kvm-x86-fix-shift-out-of-bounds-reported-by-ubsan.patch netfilter-ipset-fix-shift-out-of-bounds-in-htable_bits.patch netfilter-nft_dynset-report-eopnotsupp-on-missing-set-feature.patch netfilter-x_tables-update-remaining-dereference-to-rcu.patch netfilter-xt_rateest-reject-non-null-terminated-string-from-userspace.patch x86-mtrr-correct-the-range-check-before-performing-mtrr-type-lookups.patch --- diff --git a/queue-5.4/kvm-x86-fix-shift-out-of-bounds-reported-by-ubsan.patch b/queue-5.4/kvm-x86-fix-shift-out-of-bounds-reported-by-ubsan.patch new file mode 100644 index 00000000000..7230ac8eb17 --- /dev/null +++ b/queue-5.4/kvm-x86-fix-shift-out-of-bounds-reported-by-ubsan.patch @@ -0,0 +1,32 @@ +From 2f80d502d627f30257ba7e3655e71c373b7d1a5a Mon Sep 17 00:00:00 2001 +From: Paolo Bonzini +Date: Tue, 22 Dec 2020 05:20:43 -0500 +Subject: KVM: x86: fix shift out of bounds reported by UBSAN + +From: Paolo Bonzini + +commit 2f80d502d627f30257ba7e3655e71c373b7d1a5a upstream. + +Since we know that e >= s, we can reassociate the left shift, +changing the shifted number from 1 to 2 in exchange for +decreasing the right hand side by 1. + +Reported-by: syzbot+e87846c48bf72bc85311@syzkaller.appspotmail.com +Signed-off-by: Paolo Bonzini +Signed-off-by: Greg Kroah-Hartman + +--- + arch/x86/kvm/mmu.h | 2 +- + 1 file changed, 1 insertion(+), 1 deletion(-) + +--- a/arch/x86/kvm/mmu.h ++++ b/arch/x86/kvm/mmu.h +@@ -48,7 +48,7 @@ static inline u64 rsvd_bits(int s, int e + if (e < s) + return 0; + +- return ((1ULL << (e - s + 1)) - 1) << s; ++ return ((2ULL << (e - s)) - 1) << s; + } + + void kvm_mmu_set_mmio_spte_mask(u64 mmio_mask, u64 mmio_value, u64 access_mask); diff --git a/queue-5.4/netfilter-ipset-fix-shift-out-of-bounds-in-htable_bits.patch b/queue-5.4/netfilter-ipset-fix-shift-out-of-bounds-in-htable_bits.patch new file mode 100644 index 00000000000..4365856cf97 --- /dev/null +++ b/queue-5.4/netfilter-ipset-fix-shift-out-of-bounds-in-htable_bits.patch @@ -0,0 +1,89 @@ +From 5c8193f568ae16f3242abad6518dc2ca6c8eef86 Mon Sep 17 00:00:00 2001 +From: Vasily Averin +Date: Thu, 17 Dec 2020 17:53:18 +0300 +Subject: netfilter: ipset: fix shift-out-of-bounds in htable_bits() + +From: Vasily Averin + +commit 5c8193f568ae16f3242abad6518dc2ca6c8eef86 upstream. + +htable_bits() can call jhash_size(32) and trigger shift-out-of-bounds + +UBSAN: shift-out-of-bounds in net/netfilter/ipset/ip_set_hash_gen.h:151:6 +shift exponent 32 is too large for 32-bit type 'unsigned int' +CPU: 0 PID: 8498 Comm: syz-executor519 + Not tainted 5.10.0-rc7-next-20201208-syzkaller #0 +Call Trace: + __dump_stack lib/dump_stack.c:79 [inline] + dump_stack+0x107/0x163 lib/dump_stack.c:120 + ubsan_epilogue+0xb/0x5a lib/ubsan.c:148 + __ubsan_handle_shift_out_of_bounds.cold+0xb1/0x181 lib/ubsan.c:395 + htable_bits net/netfilter/ipset/ip_set_hash_gen.h:151 [inline] + hash_mac_create.cold+0x58/0x9b net/netfilter/ipset/ip_set_hash_gen.h:1524 + ip_set_create+0x610/0x1380 net/netfilter/ipset/ip_set_core.c:1115 + nfnetlink_rcv_msg+0xecc/0x1180 net/netfilter/nfnetlink.c:252 + netlink_rcv_skb+0x153/0x420 net/netlink/af_netlink.c:2494 + nfnetlink_rcv+0x1ac/0x420 net/netfilter/nfnetlink.c:600 + netlink_unicast_kernel net/netlink/af_netlink.c:1304 [inline] + netlink_unicast+0x533/0x7d0 net/netlink/af_netlink.c:1330 + netlink_sendmsg+0x907/0xe40 net/netlink/af_netlink.c:1919 + sock_sendmsg_nosec net/socket.c:652 [inline] + sock_sendmsg+0xcf/0x120 net/socket.c:672 + ____sys_sendmsg+0x6e8/0x810 net/socket.c:2345 + ___sys_sendmsg+0xf3/0x170 net/socket.c:2399 + __sys_sendmsg+0xe5/0x1b0 net/socket.c:2432 + do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 + entry_SYSCALL_64_after_hwframe+0x44/0xa9 + +This patch replaces htable_bits() by simple fls(hashsize - 1) call: +it alone returns valid nbits both for round and non-round hashsizes. +It is normal to set any nbits here because it is validated inside +following htable_size() call which returns 0 for nbits>31. + +Fixes: 1feab10d7e6d("netfilter: ipset: Unified hash type generation") +Reported-by: syzbot+d66bfadebca46cf61a2b@syzkaller.appspotmail.com +Signed-off-by: Vasily Averin +Acked-by: Jozsef Kadlecsik +Signed-off-by: Pablo Neira Ayuso +Signed-off-by: Greg Kroah-Hartman + +--- + net/netfilter/ipset/ip_set_hash_gen.h | 20 +++++--------------- + 1 file changed, 5 insertions(+), 15 deletions(-) + +--- a/net/netfilter/ipset/ip_set_hash_gen.h ++++ b/net/netfilter/ipset/ip_set_hash_gen.h +@@ -143,20 +143,6 @@ htable_size(u8 hbits) + return hsize * sizeof(struct hbucket *) + sizeof(struct htable); + } + +-/* Compute htable_bits from the user input parameter hashsize */ +-static u8 +-htable_bits(u32 hashsize) +-{ +- /* Assume that hashsize == 2^htable_bits */ +- u8 bits = fls(hashsize - 1); +- +- if (jhash_size(bits) != hashsize) +- /* Round up to the first 2^n value */ +- bits = fls(hashsize); +- +- return bits; +-} +- + #ifdef IP_SET_HASH_WITH_NETS + #if IPSET_NET_COUNT > 1 + #define __CIDR(cidr, i) (cidr[i]) +@@ -1520,7 +1506,11 @@ IPSET_TOKEN(HTYPE, _create)(struct net * + if (!h) + return -ENOMEM; + +- hbits = htable_bits(hashsize); ++ /* Compute htable_bits from the user input parameter hashsize. ++ * Assume that hashsize == 2^htable_bits, ++ * otherwise round up to the first 2^n value. ++ */ ++ hbits = fls(hashsize - 1); + hsize = htable_size(hbits); + if (hsize == 0) { + kfree(h); diff --git a/queue-5.4/netfilter-nft_dynset-report-eopnotsupp-on-missing-set-feature.patch b/queue-5.4/netfilter-nft_dynset-report-eopnotsupp-on-missing-set-feature.patch new file mode 100644 index 00000000000..a24480e3981 --- /dev/null +++ b/queue-5.4/netfilter-nft_dynset-report-eopnotsupp-on-missing-set-feature.patch @@ -0,0 +1,52 @@ +From 95cd4bca7b1f4a25810f3ddfc5e767fb46931789 Mon Sep 17 00:00:00 2001 +From: Pablo Neira Ayuso +Date: Sun, 27 Dec 2020 12:33:44 +0100 +Subject: netfilter: nft_dynset: report EOPNOTSUPP on missing set feature + +From: Pablo Neira Ayuso + +commit 95cd4bca7b1f4a25810f3ddfc5e767fb46931789 upstream. + +If userspace requests a feature which is not available the original set +definition, then bail out with EOPNOTSUPP. If userspace sends +unsupported dynset flags (new feature not supported by this kernel), +then report EOPNOTSUPP to userspace. EINVAL should be only used to +report malformed netlink messages from userspace. + +Fixes: 22fe54d5fefc ("netfilter: nf_tables: add support for dynamic set updates") +Signed-off-by: Pablo Neira Ayuso +Signed-off-by: Greg Kroah-Hartman + +--- + net/netfilter/nft_dynset.c | 6 +++--- + 1 file changed, 3 insertions(+), 3 deletions(-) + +--- a/net/netfilter/nft_dynset.c ++++ b/net/netfilter/nft_dynset.c +@@ -146,7 +146,7 @@ static int nft_dynset_init(const struct + u32 flags = ntohl(nla_get_be32(tb[NFTA_DYNSET_FLAGS])); + + if (flags & ~NFT_DYNSET_F_INV) +- return -EINVAL; ++ return -EOPNOTSUPP; + if (flags & NFT_DYNSET_F_INV) + priv->invert = true; + } +@@ -179,7 +179,7 @@ static int nft_dynset_init(const struct + timeout = 0; + if (tb[NFTA_DYNSET_TIMEOUT] != NULL) { + if (!(set->flags & NFT_SET_TIMEOUT)) +- return -EINVAL; ++ return -EOPNOTSUPP; + + err = nf_msecs_to_jiffies64(tb[NFTA_DYNSET_TIMEOUT], &timeout); + if (err) +@@ -193,7 +193,7 @@ static int nft_dynset_init(const struct + + if (tb[NFTA_DYNSET_SREG_DATA] != NULL) { + if (!(set->flags & NFT_SET_MAP)) +- return -EINVAL; ++ return -EOPNOTSUPP; + if (set->dtype == NFT_DATA_VERDICT) + return -EOPNOTSUPP; + diff --git a/queue-5.4/netfilter-x_tables-update-remaining-dereference-to-rcu.patch b/queue-5.4/netfilter-x_tables-update-remaining-dereference-to-rcu.patch new file mode 100644 index 00000000000..3dfdd20b609 --- /dev/null +++ b/queue-5.4/netfilter-x_tables-update-remaining-dereference-to-rcu.patch @@ -0,0 +1,58 @@ +From 443d6e86f821a165fae3fc3fc13086d27ac140b1 Mon Sep 17 00:00:00 2001 +From: Subash Abhinov Kasiviswanathan +Date: Wed, 16 Dec 2020 21:38:02 -0700 +Subject: netfilter: x_tables: Update remaining dereference to RCU + +From: Subash Abhinov Kasiviswanathan + +commit 443d6e86f821a165fae3fc3fc13086d27ac140b1 upstream. + +This fixes the dereference to fetch the RCU pointer when holding +the appropriate xtables lock. + +Reported-by: kernel test robot +Fixes: cc00bcaa5899 ("netfilter: x_tables: Switch synchronization to RCU") +Signed-off-by: Subash Abhinov Kasiviswanathan +Reviewed-by: Florian Westphal +Signed-off-by: Pablo Neira Ayuso +Signed-off-by: Greg Kroah-Hartman + +--- + net/ipv4/netfilter/arp_tables.c | 2 +- + net/ipv4/netfilter/ip_tables.c | 2 +- + net/ipv6/netfilter/ip6_tables.c | 2 +- + 3 files changed, 3 insertions(+), 3 deletions(-) + +--- a/net/ipv4/netfilter/arp_tables.c ++++ b/net/ipv4/netfilter/arp_tables.c +@@ -1406,7 +1406,7 @@ static int compat_get_entries(struct net + xt_compat_lock(NFPROTO_ARP); + t = xt_find_table_lock(net, NFPROTO_ARP, get.name); + if (!IS_ERR(t)) { +- const struct xt_table_info *private = t->private; ++ const struct xt_table_info *private = xt_table_get_private_protected(t); + struct xt_table_info info; + + ret = compat_table_info(private, &info); +--- a/net/ipv4/netfilter/ip_tables.c ++++ b/net/ipv4/netfilter/ip_tables.c +@@ -1616,7 +1616,7 @@ compat_get_entries(struct net *net, stru + xt_compat_lock(AF_INET); + t = xt_find_table_lock(net, AF_INET, get.name); + if (!IS_ERR(t)) { +- const struct xt_table_info *private = t->private; ++ const struct xt_table_info *private = xt_table_get_private_protected(t); + struct xt_table_info info; + ret = compat_table_info(private, &info); + if (!ret && get.size == info.size) +--- a/net/ipv6/netfilter/ip6_tables.c ++++ b/net/ipv6/netfilter/ip6_tables.c +@@ -1625,7 +1625,7 @@ compat_get_entries(struct net *net, stru + xt_compat_lock(AF_INET6); + t = xt_find_table_lock(net, AF_INET6, get.name); + if (!IS_ERR(t)) { +- const struct xt_table_info *private = t->private; ++ const struct xt_table_info *private = xt_table_get_private_protected(t); + struct xt_table_info info; + ret = compat_table_info(private, &info); + if (!ret && get.size == info.size) diff --git a/queue-5.4/netfilter-xt_rateest-reject-non-null-terminated-string-from-userspace.patch b/queue-5.4/netfilter-xt_rateest-reject-non-null-terminated-string-from-userspace.patch new file mode 100644 index 00000000000..6fcbe88b798 --- /dev/null +++ b/queue-5.4/netfilter-xt_rateest-reject-non-null-terminated-string-from-userspace.patch @@ -0,0 +1,41 @@ +From 6cb56218ad9e580e519dcd23bfb3db08d8692e5a Mon Sep 17 00:00:00 2001 +From: Florian Westphal +Date: Tue, 22 Dec 2020 23:23:56 +0100 +Subject: netfilter: xt_RATEEST: reject non-null terminated string from userspace + +From: Florian Westphal + +commit 6cb56218ad9e580e519dcd23bfb3db08d8692e5a upstream. + +syzbot reports: +detected buffer overflow in strlen +[..] +Call Trace: + strlen include/linux/string.h:325 [inline] + strlcpy include/linux/string.h:348 [inline] + xt_rateest_tg_checkentry+0x2a5/0x6b0 net/netfilter/xt_RATEEST.c:143 + +strlcpy assumes src is a c-string. Check info->name before its used. + +Reported-by: syzbot+e86f7c428c8c50db65b4@syzkaller.appspotmail.com +Fixes: 5859034d7eb8793 ("[NETFILTER]: x_tables: add RATEEST target") +Signed-off-by: Florian Westphal +Signed-off-by: Pablo Neira Ayuso +Signed-off-by: Greg Kroah-Hartman + +--- + net/netfilter/xt_RATEEST.c | 3 +++ + 1 file changed, 3 insertions(+) + +--- a/net/netfilter/xt_RATEEST.c ++++ b/net/netfilter/xt_RATEEST.c +@@ -115,6 +115,9 @@ static int xt_rateest_tg_checkentry(cons + } cfg; + int ret; + ++ if (strnlen(info->name, sizeof(est->name)) >= sizeof(est->name)) ++ return -ENAMETOOLONG; ++ + net_get_random_once(&jhash_rnd, sizeof(jhash_rnd)); + + mutex_lock(&xn->hash_lock); diff --git a/queue-5.4/series b/queue-5.4/series index b90ed3ae9e9..3393290a918 100644 --- a/queue-5.4/series +++ b/queue-5.4/series @@ -84,3 +84,9 @@ btrfs-send-fix-wrong-file-path-when-there-is-an-inode-with-a-pending-rmdir.patch revert-device-property-keep-secondary-firmware-node-secondary-by-type.patch dmabuf-fix-use-after-free-of-dmabuf-s-file-f_inode.patch drm-i915-clear-the-gpu-reloc-batch.patch +netfilter-x_tables-update-remaining-dereference-to-rcu.patch +netfilter-ipset-fix-shift-out-of-bounds-in-htable_bits.patch +netfilter-xt_rateest-reject-non-null-terminated-string-from-userspace.patch +netfilter-nft_dynset-report-eopnotsupp-on-missing-set-feature.patch +x86-mtrr-correct-the-range-check-before-performing-mtrr-type-lookups.patch +kvm-x86-fix-shift-out-of-bounds-reported-by-ubsan.patch diff --git a/queue-5.4/x86-mtrr-correct-the-range-check-before-performing-mtrr-type-lookups.patch b/queue-5.4/x86-mtrr-correct-the-range-check-before-performing-mtrr-type-lookups.patch new file mode 100644 index 00000000000..7ea7a060edc --- /dev/null +++ b/queue-5.4/x86-mtrr-correct-the-range-check-before-performing-mtrr-type-lookups.patch @@ -0,0 +1,62 @@ +From cb7f4a8b1fb426a175d1708f05581939c61329d4 Mon Sep 17 00:00:00 2001 +From: Ying-Tsun Huang +Date: Tue, 15 Dec 2020 15:07:20 +0800 +Subject: x86/mtrr: Correct the range check before performing MTRR type lookups + +From: Ying-Tsun Huang + +commit cb7f4a8b1fb426a175d1708f05581939c61329d4 upstream. + +In mtrr_type_lookup(), if the input memory address region is not in the +MTRR, over 4GB, and not over the top of memory, a write-back attribute +is returned. These condition checks are for ensuring the input memory +address region is actually mapped to the physical memory. + +However, if the end address is just aligned with the top of memory, +the condition check treats the address is over the top of memory, and +write-back attribute is not returned. + +And this hits in a real use case with NVDIMM: the nd_pmem module tries +to map NVDIMMs as cacheable memories when NVDIMMs are connected. If a +NVDIMM is the last of the DIMMs, the performance of this NVDIMM becomes +very low since it is aligned with the top of memory and its memory type +is uncached-minus. + +Move the input end address change to inclusive up into +mtrr_type_lookup(), before checking for the top of memory in either +mtrr_type_lookup_{variable,fixed}() helpers. + + [ bp: Massage commit message. ] + +Fixes: 0cc705f56e40 ("x86/mm/mtrr: Clean up mtrr_type_lookup()") +Signed-off-by: Ying-Tsun Huang +Signed-off-by: Borislav Petkov +Link: https://lkml.kernel.org/r/20201215070721.4349-1-ying-tsun.huang@amd.com +Signed-off-by: Greg Kroah-Hartman + +--- + arch/x86/kernel/cpu/mtrr/generic.c | 6 +++--- + 1 file changed, 3 insertions(+), 3 deletions(-) + +--- a/arch/x86/kernel/cpu/mtrr/generic.c ++++ b/arch/x86/kernel/cpu/mtrr/generic.c +@@ -167,9 +167,6 @@ static u8 mtrr_type_lookup_variable(u64 + *repeat = 0; + *uniform = 1; + +- /* Make end inclusive instead of exclusive */ +- end--; +- + prev_match = MTRR_TYPE_INVALID; + for (i = 0; i < num_var_ranges; ++i) { + unsigned short start_state, end_state, inclusive; +@@ -261,6 +258,9 @@ u8 mtrr_type_lookup(u64 start, u64 end, + int repeat; + u64 partial_end; + ++ /* Make end inclusive instead of exclusive */ ++ end--; ++ + if (!mtrr_state_set) + return MTRR_TYPE_INVALID; +