linux-stable/net/rxrpc
David Howells 38fe0988bd rxrpc: Fix race between conn bundle lookup and bundle removal [ZDI-CAN-15975]
[ Upstream commit 3bcd6c7eaa ]

After rxrpc_unbundle_conn() has removed a connection from a bundle, it
checks to see if there are any conns with available channels and, if not,
removes and attempts to destroy the bundle.

Whilst it does check after grabbing client_bundles_lock that there are no
connections attached, this races with rxrpc_look_up_bundle() retrieving the
bundle, but not attaching a connection for the connection to be attached
later.

There is therefore a window in which the bundle can get destroyed before we
manage to attach a new connection to it.

Fix this by adding an "active" counter to struct rxrpc_bundle:

 (1) rxrpc_connect_call() obtains an active count by prepping/looking up a
     bundle and ditches it before returning.

 (2) If, during rxrpc_connect_call(), a connection is added to the bundle,
     this obtains an active count, which is held until the connection is
     discarded.

 (3) rxrpc_deactivate_bundle() is created to drop an active count on a
     bundle and destroy it when the active count reaches 0.  The active
     count is checked inside client_bundles_lock() to prevent a race with
     rxrpc_look_up_bundle().

 (4) rxrpc_unbundle_conn() then calls rxrpc_deactivate_bundle().

Fixes: 245500d853 ("rxrpc: Rewrite the client connection manager")
Reported-by: zdi-disclosures@trendmicro.com # ZDI-CAN-15975
Signed-off-by: David Howells <dhowells@redhat.com>
Tested-by: zdi-disclosures@trendmicro.com
cc: Marc Dionne <marc.dionne@auristor.com>
cc: linux-afs@lists.infradead.org
Signed-off-by: David S. Miller <davem@davemloft.net>
Signed-off-by: Sasha Levin <sashal@kernel.org>
2022-12-02 17:41:04 +01:00
..
af_rxrpc.c rxrpc: Use refcount_t rather than atomic_t 2022-12-02 17:41:04 +01:00
ar-internal.h rxrpc: Fix race between conn bundle lookup and bundle removal [ZDI-CAN-15975] 2022-12-02 17:41:04 +01:00
call_accept.c rxrpc: Use refcount_t rather than atomic_t 2022-12-02 17:41:04 +01:00
call_event.c rxrpc: Fix calc of resend age 2022-09-23 14:15:50 +02:00
call_object.c rxrpc: Use refcount_t rather than atomic_t 2022-12-02 17:41:04 +01:00
conn_client.c rxrpc: Fix race between conn bundle lookup and bundle removal [ZDI-CAN-15975] 2022-12-02 17:41:04 +01:00
conn_event.c
conn_object.c rxrpc: Use refcount_t rather than atomic_t 2022-12-02 17:41:04 +01:00
conn_service.c rxrpc: Use refcount_t rather than atomic_t 2022-12-02 17:41:04 +01:00
input.c rxrpc: Use refcount_t rather than atomic_t 2022-12-02 17:41:04 +01:00
insecure.c
Kconfig net: RxRPC: make dependent Kconfig symbols be shown indented 2021-08-18 10:12:11 +01:00
key.c
local_event.c rxrpc: Fix a typo 2021-06-02 14:01:55 -07:00
local_object.c rxrpc: Use refcount_t rather than atomic_t 2022-12-02 17:41:04 +01:00
Makefile
misc.c
net_ns.c rxrpc: Allow list of in-use local UDP endpoints to be viewed in /proc 2022-12-02 17:41:04 +01:00
output.c rxrpc: Fix decision on when to generate an IDLE ACK 2022-06-09 10:23:02 +02:00
peer_event.c rxrpc: Fix ICMP/ICMP6 error handling 2022-09-15 11:30:05 +02:00
peer_object.c rxrpc: Use refcount_t rather than atomic_t 2022-12-02 17:41:04 +01:00
proc.c rxrpc: Use refcount_t rather than atomic_t 2022-12-02 17:41:04 +01:00
protocol.h
recvmsg.c rxrpc: Fix decision on when to generate an IDLE ACK 2022-06-09 10:23:02 +02:00
rtt.c rxrpc: Fix _usecs_to_jiffies() by using usecs_to_jiffies() 2021-11-18 19:16:25 +01:00
rxkad.c rxrpc: Fix an insufficiently large sglist in rxkad_verify_packet_2() 2022-09-15 11:30:05 +02:00
security.c
sendmsg.c rxrpc: Fix locking in rxrpc's sendmsg 2022-08-31 17:16:45 +02:00
server_key.c rxrpc: fix some null-ptr-deref bugs in server_key.c 2022-04-08 14:24:10 +02:00
skbuff.c rxrpc: Use refcount_t rather than atomic_t 2022-12-02 17:41:04 +01:00
sysctl.c rxrpc: Fix listen() setting the bar too high for the prealloc rings 2022-06-09 10:23:02 +02:00
utils.c