linux-stable/net/rds
Mahmoud Adam bcd46782e2 net/rds: fix possible cp null dereference
commit 62fc3357e0 upstream.

cp might be null, calling cp->cp_conn would produce null dereference

[Simon Horman adds:]

Analysis:

* cp is a parameter of __rds_rdma_map and is not reassigned.

* The following call-sites pass a NULL cp argument to __rds_rdma_map()

  - rds_get_mr()
  - rds_get_mr_for_dest

* Prior to the code above, the following assumes that cp may be NULL
  (which is indicative, but could itself be unnecessary)

	trans_private = rs->rs_transport->get_mr(
		sg, nents, rs, &mr->r_key, cp ? cp->cp_conn : NULL,
		args->vec.addr, args->vec.bytes,
		need_odp ? ODP_ZEROBASED : ODP_NOT_NEEDED);

* The code modified by this patch is guarded by IS_ERR(trans_private),
  where trans_private is assigned as per the previous point in this analysis.

  The only implementation of get_mr that I could locate is rds_ib_get_mr()
  which can return an ERR_PTR if the conn (4th) argument is NULL.

* ret is set to PTR_ERR(trans_private).
  rds_ib_get_mr can return ERR_PTR(-ENODEV) if the conn (4th) argument is NULL.
  Thus ret may be -ENODEV in which case the code in question will execute.

Conclusion:
* cp may be NULL at the point where this patch adds a check;
  this patch does seem to address a possible bug

Fixes: c055fc00c0 ("net/rds: fix WARNING in rds_conn_connect_if_down")
Cc: stable@vger.kernel.org # v4.19+
Signed-off-by: Mahmoud Adam <mngyadam@amazon.com>
Reviewed-by: Simon Horman <horms@kernel.org>
Link: https://lore.kernel.org/r/20240326153132.55580-1-mngyadam@amazon.com
Signed-off-by: Jakub Kicinski <kuba@kernel.org>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2024-04-13 12:51:33 +02:00
..
Kconfig
Makefile
af_rds.c net/rds: Fix UBSAN: array-index-out-of-bounds in rds_cmsg_recv 2024-02-23 08:24:50 +01:00
bind.c
cong.c
connection.c rds: memory leak in __rds_conn_create() 2021-12-22 09:29:37 +01:00
ib.c
ib.h
ib_cm.c
ib_fmr.c
ib_frmr.c net/rds: dma_map_sg is entitled to merge entries 2021-09-03 10:08:15 +02:00
ib_mr.h
ib_rdma.c
ib_recv.c rds: add missing barrier to release_refill 2022-08-25 11:18:18 +02:00
ib_ring.c
ib_send.c
ib_stats.c
ib_sysctl.c
info.c
info.h
loop.c
loop.h
message.c rds: rds_rm_zerocopy_callback() correct order for list_add_tail() 2023-03-11 16:43:41 +01:00
page.c
rdma.c net/rds: fix possible cp null dereference 2024-04-13 12:51:33 +02:00
rdma_transport.c net: rds: Fix possible NULL-pointer dereference 2023-10-10 21:46:38 +02:00
rdma_transport.h
rds.h
rds_single_path.h
recv.c net: rds: fix memory leak in rds_recvmsg 2021-06-23 14:41:24 +02:00
send.c rds: introduce acquire/release ordering in acquire/release_in_xmit() 2024-03-26 18:22:25 -04:00
stats.c
sysctl.c
tcp.c net: rds: don't hold sock lock when cancelling work from rds_tcp_reset_callbacks() 2022-10-26 13:22:26 +02:00
tcp.h RDS tcp loopback connection can hang 2021-06-16 11:59:35 +02:00
tcp_connect.c net: prevent address rewrite in kernel_bind() 2023-10-25 11:53:18 +02:00
tcp_listen.c net: prevent address rewrite in kernel_bind() 2023-10-25 11:53:18 +02:00
tcp_recv.c
tcp_send.c
tcp_stats.c
threads.c
transport.c