mirror of
https://github.com/raspberrypi/linux.git
synced 2025-12-06 10:00:17 +00:00
sock_map: fix a NULL pointer dereference in sock_map_link_update_prog()
[ Upstream commit740be3b9a6] The following race condition could trigger a NULL pointer dereference: sock_map_link_detach(): sock_map_link_update_prog(): mutex_lock(&sockmap_mutex); ... sockmap_link->map = NULL; mutex_unlock(&sockmap_mutex); mutex_lock(&sockmap_mutex); ... sock_map_prog_link_lookup(sockmap_link->map); mutex_unlock(&sockmap_mutex); <continue> Fix it by adding a NULL pointer check. In this specific case, it makes no sense to update a link which is being released. Reported-by: Ruan Bonan <bonan.ruan@u.nus.edu> Fixes:699c23f02c("bpf: Add bpf_link support for sk_msg and sk_skb progs") Cc: Yonghong Song <yonghong.song@linux.dev> Cc: John Fastabend <john.fastabend@gmail.com> Cc: Jakub Sitnicki <jakub@cloudflare.com> Signed-off-by: Cong Wang <cong.wang@bytedance.com> Link: https://lore.kernel.org/r/20241026185522.338562-1-xiyou.wangcong@gmail.com Signed-off-by: Martin KaFai Lau <martin.lau@kernel.org> Signed-off-by: Sasha Levin <sashal@kernel.org>
This commit is contained in:
committed by
Greg Kroah-Hartman
parent
c549cb66e8
commit
9afe35fdda
@@ -1771,6 +1771,10 @@ static int sock_map_link_update_prog(struct bpf_link *link,
|
|||||||
ret = -EINVAL;
|
ret = -EINVAL;
|
||||||
goto out;
|
goto out;
|
||||||
}
|
}
|
||||||
|
if (!sockmap_link->map) {
|
||||||
|
ret = -ENOLINK;
|
||||||
|
goto out;
|
||||||
|
}
|
||||||
|
|
||||||
ret = sock_map_prog_link_lookup(sockmap_link->map, &pprog, &plink,
|
ret = sock_map_prog_link_lookup(sockmap_link->map, &pprog, &plink,
|
||||||
sockmap_link->attach_type);
|
sockmap_link->attach_type);
|
||||||
|
|||||||
Reference in New Issue
Block a user