Skip to content
Snippets Groups Projects
  1. Sep 07, 2022
  2. Sep 06, 2022
  3. Sep 05, 2022
    • Luo Meng's avatar
      dm-thin: Resume failed in FAIL mode · b3ed949d
      Luo Meng authored
      hulk inclusion
      category: bugfix
      bugzilla: https://gitee.com/openeuler/kernel/issues/I5P05D
      
      
      CVE: NA
      
      --------------------------------
      
      When thinpool is suspended and sets fail_io, resume will report error
      as below:
      device-mapper: resume ioctl on vg-thinpool  failed: Invalid argument
      
      Thinpool also can't be removed if bio is in deferred list.
      
      This can be easily reproduced using:
      
        echo "offline" > /sys/block/sda/device/state
        dd if=/dev/zero of=/dev/mapper/thin bs=4K count=1
        dmsetup suspend /dev/mapper/pool
        mkfs.ext4 /dev/mapper/thin
        dmsetup resume /dev/mapper/pool
      
      The root cause is maybe_resize_data_dev() will check fail_io and return
      error before called dm_resume.
      
      Fix this by adding FAIL mode check at the end of  pool_preresume().
      
      Fixes: da105ed5 (dm thin metadata: introduce dm_pool_abort_metadata)
      Signed-off-by: default avatarLuo Meng <luomeng12@huawei.com>
      Reviewed-by: default avatarHou Tao <houtao1@huawei.com>
      Signed-off-by: default avatarYongqiang Liu <liuyongqiang13@huawei.com>
    • Lino Sanfilippo's avatar
      tpm: fix reference counting for struct tpm_chip · 51cd4702
      Lino Sanfilippo authored
      stable inclusion
      from stable-v4.19.237
      commit cb64bd038beacb4331fe464a36c8b5481e8f51e2
      category: bugfix
      bugzilla: 187564,https://gitee.com/src-openeuler/kernel/issues/I5NWPR
      
      
      CVE: CVE-2022-2977
      
      --------------------------------
      
      commit 7e0438f83dc769465ee663bb5dcf8cc154940712 upstream.
      
      The following sequence of operations results in a refcount warning:
      
      1. Open device /dev/tpmrm.
      2. Remove module tpm_tis_spi.
      3. Write a TPM command to the file descriptor opened at step 1.
      
      ------------[ cut here ]------------
      WARNING: CPU: 3 PID: 1161 at lib/refcount.c:25 kobject_get+0xa0/0xa4
      refcount_t: addition on 0; use-after-free.
      Modules linked in: tpm_tis_spi tpm_tis_core tpm mdio_bcm_unimac brcmfmac
      sha256_generic libsha256 sha256_arm hci_uart btbcm bluetooth cfg80211 vc4
      brcmutil ecdh_generic ecc snd_soc_core crc32_arm_ce libaes
      raspberrypi_hwmon ac97_bus snd_pcm_dmaengine bcm2711_thermal snd_pcm
      snd_timer genet snd phy_generic soundcore [last unloaded: spi_bcm2835]
      CPU: 3 PID: 1161 Comm: hold_open Not tainted 5.10.0ls-main-dirty #2
      Hardware name: BCM2711
      [<c0410c3c>] (unwind_backtrace) from [<c040b580>] (show_stack+0x10/0x14)
      [<c040b580>] (show_stack) from [<c1092174>] (dump_stack+0xc4/0xd8)
      [<c1092174>] (dump_stack) from [<c0445a30>] (__warn+0x104/0x108)
      [<c0445a30>] (__warn) from [<c0445aa8>] (warn_slowpath_fmt+0x74/0xb8)
      [<c0445aa8>] (warn_slowpath_fmt) from [<c08435d0>] (kobject_get+0xa0/0xa4)
      [<c08435d0>] (kobject_get) from [<bf0a715c>] (tpm_try_get_ops+0x14/0x54 [tpm])
      [<bf0a715c>] (tpm_try_get_ops [tpm]) from [<bf0a7d6c>] (tpm_common_write+0x38/0x60 [tpm])
      [<bf0a7d6c>] (tpm_common_write [tpm]) from [<c05a7ac0>] (vfs_write+0xc4/0x3c0)
      [<c05a7ac0>] (vfs_write) from [<c05a7ee4>] (ksys_write+0x58/0xcc)
      [<c05a7ee4>] (ksys_write) from [<c04001a0>] (ret_fast_syscall+0x0/0x4c)
      Exception stack(0xc226bfa8 to 0xc226bff0)
      bfa0:                   00000000 000105b4 00000003 beafe664 00000014 00000000
      bfc0: 00000000 000105b4 000103f8 00000004 00000000 00000000 b6f9c000 beafe684
      bfe0: 0000006c beafe648 0001056c b6eb6944
      ---[ end trace d4b8409def9b8b1f ]---
      
      The reason for this warning is the attempt to get the chip->dev reference
      in tpm_common_write() although the reference counter is already zero.
      
      Since commit 8979b02a ("tpm: Fix reference count to main device") the
      extra reference used to prevent a premature zero counter is never taken,
      because the required TPM_CHIP_FLAG_TPM2 flag is never set.
      
      Fix this by moving the TPM 2 character device handling from
      tpm_chip_alloc() to tpm_add_char_device() which is called at a later point
      in time when the flag has been set in case of TPM2.
      
      Commit fdc915f7 ("tpm: expose spaces via a device link /dev/tpmrm<n>")
      already introduced function tpm_devs_release() to release the extra
      reference but did not implement the required put on chip->devs that results
      in the call of this function.
      
      Fix this by putting chip->devs in tpm_chip_unregister().
      
      Finally move the new implementation for the TPM 2 handling into a new
      function to avoid multiple checks for the TPM_CHIP_FLAG_TPM2 flag in the
      good case and error cases.
      
      Cc: stable@vger.kernel.org
      Fixes: fdc915f7 ("tpm: expose spaces via a device link /dev/tpmrm<n>")
      Fixes: 8979b02a ("tpm: Fix reference count to main device")
      Co-developed-by: default avatarJason Gunthorpe <jgg@ziepe.ca>
      Signed-off-by: default avatarJason Gunthorpe <jgg@ziepe.ca>
      Signed-off-by: default avatarLino Sanfilippo <LinoSanfilippo@gmx.de>
      Tested-by: default avatarStefan Berger <stefanb@linux.ibm.com>
      Reviewed-by: default avatarJason Gunthorpe <jgg@nvidia.com>
      Reviewed-by: default avatarJarkko Sakkinen <jarkko@kernel.org>
      Signed-off-by: default avatarJarkko Sakkinen <jarkko@kernel.org>
      Signed-off-by: default avatarGreg Kroah-Hartman <gregkh@linuxfoundation.org>
      Signed-off-by: default avatarHui Tang <tanghui20@huawei.com>
      Reviewed-by: default avatarZhang Qiao <zhangqiao22@huawei.com>
      Reviewed-by: default avatarXiu Jianfeng <xiujianfeng@huawei.com>
      Signed-off-by: default avatarYongqiang Liu <liuyongqiang13@huawei.com>
      51cd4702
    • Herbert Xu's avatar
      af_key: Do not call xfrm_probe_algs in parallel · b4649d7c
      Herbert Xu authored
      mainline inclusion
      from mainline-v6.0-rc3
      commit ba953a9d89a00c078b85f4b190bc1dde66fe16b5
      category: bugfix
      bugzilla: https://gitee.com/src-openeuler/kernel/issues/I5OPA4
      
      
      CVE: CVE-2022-3028
      
      --------------------------------
      
      When namespace support was added to xfrm/afkey, it caused the
      previously single-threaded call to xfrm_probe_algs to become
      multi-threaded.  This is buggy and needs to be fixed with a mutex.
      
      Reported-by: default avatarAbhishek Shah <abhishek.shah@columbia.edu>
      Fixes: 283bc9f3 ("xfrm: Namespacify xfrm state/policy locks")
      Signed-off-by: default avatarHerbert Xu <herbert@gondor.apana.org.au>
      Signed-off-by: default avatarSteffen Klassert <steffen.klassert@secunet.com>
      Signed-off-by: default avatarXu Jia <xujia39@huawei.com>
      Reviewed-by: default avatarWei Yongjun <weiyongjun1@huawei.com>
      Reviewed-by: default avatarWang Weiyang <wangweiyang2@huawei.com>
      Signed-off-by: default avatarYongqiang Liu <liuyongqiang13@huawei.com>
      b4649d7c
  4. Sep 01, 2022
    • Jose Alonso's avatar
      net: usb: ax88179_178a: Fix packet receiving · 24d2149f
      Jose Alonso authored
      stable inclusion
      from stable-v4.19.251
      commit 5fabd32fd5492675e33a7ca972ac158e7b7361ee
      category: bugfix
      bugzilla: https://gitee.com/src-openeuler/kernel/issues/I5NYS6
      
      
      CVE: CVE-2022-2964
      
      ---------------------------
      
      commit f8ebb3ac881b17712e1d5967c97ab1806b16d3d6 upstream.
      
      This patch corrects packet receiving in ax88179_rx_fixup.
      
      - problem observed:
        ifconfig shows allways a lot of 'RX Errors' while packets
        are received normally.
      
        This occurs because ax88179_rx_fixup does not recognise properly
        the usb urb received.
        The packets are normally processed and at the end, the code exits
        with 'return 0', generating RX Errors.
        (pkt_cnt==-2 and ptk_hdr over field rx_hdr trying to identify
         another packet there)
      
        This is a usb urb received by "tcpdump -i usbmon2 -X" on a
        little-endian CPU:
        0x0000:  eeee f8e3 3b19 87a0 94de 80e3 daac 0800
                 ^         packet 1 start (pkt_len = 0x05ec)
                 ^^^^      IP alignment pseudo header
                      ^    ethernet packet start
                 last byte ethernet packet   v
                 padding (8-bytes aligned)     vvvv vvvv
        0x05e0:  c92d d444 1420 8a69 83dd 272f e82b 9811
        0x05f0:  eeee f8e3 3b19 87a0 94de 80e3 daac 0800
        ...      ^ packet 2
        0x0be0:  eeee f8e3 3b19 87a0 94de 80e3 daac 0800
        ...
        0x1130:  9d41 9171 8a38 0ec5 eeee f8e3 3b19 87a0
        ...
        0x1720:  8cfc 15ff 5e4c e85c eeee f8e3 3b19 87a0
        ...
        0x1d10:  ecfa 2a3a 19ab c78c eeee f8e3 3b19 87a0
        ...
        0x2070:  eeee f8e3 3b19 87a0 94de 80e3 daac 0800
        ...      ^ packet 7
        0x2120:  7c88 4ca5 5c57 7dcc 0d34 7577 f778 7e0a
        0x2130:  f032 e093 7489 0740 3008 ec05 0000 0080
                                     ====1==== ====2====
                 hdr_off             ^
                 pkt_len = 0x05ec         ^^^^
                 AX_RXHDR_*=0x00830  ^^^^   ^
                 pkt_len = 0                        ^^^^
                 AX_RXHDR_DROP_ERR=0x80000000  ^^^^   ^
        0x2140:  3008 ec05 0000 0080 3008 5805 0000 0080
        0x2150:  3008 ec05 0000 0080 3008 ec05 0000 0080
        0x2160:  3008 5803 0000 0080 3008 c800 0000 0080
                 ===11==== ===12==== ===13==== ===14====
        0x2170:  0000 0000 0e00 3821
                           ^^^^ ^^^^ rx_hdr
                           ^^^^      pkt_cnt=14
                                ^^^^ hdr_off=0x2138
                 ^^^^ ^^^^           padding
      
        The dump shows that pkt_cnt is the number of entrys in the
        per-packet metadata. It is "2 * packet count".
        Each packet have two entrys. The first have a valid
        value (pkt_len and AX_RXHDR_*) and the second have a
        dummy-header 0x80000000 (pkt_len=0 with AX_RXHDR_DROP_ERR).
        Why exists dummy-header for each packet?!?
        My guess is that this was done probably to align the
        entry for each packet to 64-bits and maintain compatibility
        with old firmware.
        There is also a padding (0x00000000) before the rx_hdr to
        align the end of rx_hdr to 64-bit.
        Note that packets have a alignment of 64-bits (8-bytes).
      
        This patch assumes that the dummy-header and the last
        padding are optional. So it preserves semantics and
        recognises the same valid packets as the current code.
      
        This patch was made using only the dumpfile information and
        tested with only one device:
        0b95:1790 ASIX Electronics Corp. AX88179 Gigabit Ethernet
      
      Fixes: 57bc3d3ae8c1 ("net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup")
      Fixes: e2ca90c2 ("ax88179_178a: ASIX AX88179_178A USB 3.0/2.0 to gigabit ethernet adapter driver")
      Signed-off-by: default avatarJose Alonso <joalonsof@gmail.com>
      Acked-by: default avatarPaolo Abeni <pabeni@redhat.com>
      Link: https://lore.kernel.org/r/d6970bb04bf67598af4d316eaeb1792040b18cfd.camel@gmail.com
      
      
      Signed-off-by: default avatarPaolo Abeni <pabeni@redhat.com>
      Signed-off-by: default avatarGreg Kroah-Hartman <gregkh@linuxfoundation.org>
      (cherry picked from commit 5fabd32fd5492675e33a7ca972ac158e7b7361ee)
      Signed-off-by: default avatarLiu Jian <liujian56@huawei.com>
      Reviewed-by: default avatarWei Yongjun <weiyongjun1@huawei.com>
      Reviewed-by: default avatarXiu Jianfeng <xiujianfeng@huawei.com>
      Signed-off-by: default avatarYongqiang Liu <liuyongqiang13@huawei.com>
      24d2149f
    • Jann Horn's avatar
      net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup · b6ca9563
      Jann Horn authored
      stable inclusion
      from stable-v4.19.231
      commit 1668781ed24da43498799aa4f65714a7de201930
      category: bugfix
      bugzilla: https://gitee.com/src-openeuler/kernel/issues/I5NYS6
      
      
      CVE: CVE-2022-2964
      
      ---------------------------
      
      commit 57bc3d3ae8c14df3ceb4e17d26ddf9eeab304581 upstream.
      
      ax88179_rx_fixup() contains several out-of-bounds accesses that can be
      triggered by a malicious (or defective) USB device, in particular:
      
       - The metadata array (hdr_off..hdr_off+2*pkt_cnt) can be out of bounds,
         causing OOB reads and (on big-endian systems) OOB endianness flips.
       - A packet can overlap the metadata array, causing a later OOB
         endianness flip to corrupt data used by a cloned SKB that has already
         been handed off into the network stack.
       - A packet SKB can be constructed whose tail is far beyond its end,
         causing out-of-bounds heap data to be considered part of the SKB's
         data.
      
      I have tested that this can be used by a malicious USB device to send a
      bogus ICMPv6 Echo Request and receive an ICMPv6 Echo Reply in response
      that contains random kernel heap data.
      It's probably also possible to get OOB writes from this on a
      little-endian system somehow - maybe by triggering skb_cow() via IP
      options processing -, but I haven't tested that.
      
      Fixes: e2ca90c2 ("ax88179_178a: ASIX AX88179_178A USB 3.0/2.0 to gigabit ethernet adapter driver")
      Cc: stable@kernel.org
      Signed-off-by: default avatarJann Horn <jannh@google.com>
      Signed-off-by: default avatarGreg Kroah-Hartman <gregkh@linuxfoundation.org>
      (cherry picked from commit 1668781ed24da43498799aa4f65714a7de201930)
      Signed-off-by: default avatarLiu Jian <liujian56@huawei.com>
      Reviewed-by: default avatarWei Yongjun <weiyongjun1@huawei.com>
      Reviewed-by: default avatarXiu Jianfeng <xiujianfeng@huawei.com>
      Signed-off-by: default avatarYongqiang Liu <liuyongqiang13@huawei.com>
      b6ca9563