/openbmc/linux/net/core/ |
H A D | request_sock.c | diff d983ea6f16b835dcde2ee9a58a1e764ce68bfccc Thu Oct 10 22:17:38 CDT 2019 Eric Dumazet <edumazet@google.com> tcp: add rcu protection around tp->fastopen_rsk
Both tcp_v4_err() and tcp_v6_err() do the following operations while they do not own the socket lock :
fastopen = tp->fastopen_rsk; snd_una = fastopen ? tcp_rsk(fastopen)->snt_isn : tp->snd_una;
The problem is that without appropriate barrier, the compiler might reload tp->fastopen_rsk and trigger a NULL deref.
request sockets are protected by RCU, we can simply add the missing annotations and barriers to solve the issue.
Fixes: 168a8f58059a ("tcp: TCP Fast Open Server - main code path") Signed-off-by: Eric Dumazet <edumazet@google.com> Signed-off-by: David S. Miller <davem@davemloft.net>
|
/openbmc/linux/net/ipv4/ |
H A D | tcp_fastopen.c | diff d983ea6f16b835dcde2ee9a58a1e764ce68bfccc Thu Oct 10 22:17:38 CDT 2019 Eric Dumazet <edumazet@google.com> tcp: add rcu protection around tp->fastopen_rsk
Both tcp_v4_err() and tcp_v6_err() do the following operations while they do not own the socket lock :
fastopen = tp->fastopen_rsk; snd_una = fastopen ? tcp_rsk(fastopen)->snt_isn : tp->snd_una;
The problem is that without appropriate barrier, the compiler might reload tp->fastopen_rsk and trigger a NULL deref.
request sockets are protected by RCU, we can simply add the missing annotations and barriers to solve the issue.
Fixes: 168a8f58059a ("tcp: TCP Fast Open Server - main code path") Signed-off-by: Eric Dumazet <edumazet@google.com> Signed-off-by: David S. Miller <davem@davemloft.net>
|
H A D | tcp_timer.c | diff d983ea6f16b835dcde2ee9a58a1e764ce68bfccc Thu Oct 10 22:17:38 CDT 2019 Eric Dumazet <edumazet@google.com> tcp: add rcu protection around tp->fastopen_rsk
Both tcp_v4_err() and tcp_v6_err() do the following operations while they do not own the socket lock :
fastopen = tp->fastopen_rsk; snd_una = fastopen ? tcp_rsk(fastopen)->snt_isn : tp->snd_una;
The problem is that without appropriate barrier, the compiler might reload tp->fastopen_rsk and trigger a NULL deref.
request sockets are protected by RCU, we can simply add the missing annotations and barriers to solve the issue.
Fixes: 168a8f58059a ("tcp: TCP Fast Open Server - main code path") Signed-off-by: Eric Dumazet <edumazet@google.com> Signed-off-by: David S. Miller <davem@davemloft.net>
|
H A D | tcp_minisocks.c | diff d983ea6f16b835dcde2ee9a58a1e764ce68bfccc Thu Oct 10 22:17:38 CDT 2019 Eric Dumazet <edumazet@google.com> tcp: add rcu protection around tp->fastopen_rsk
Both tcp_v4_err() and tcp_v6_err() do the following operations while they do not own the socket lock :
fastopen = tp->fastopen_rsk; snd_una = fastopen ? tcp_rsk(fastopen)->snt_isn : tp->snd_una;
The problem is that without appropriate barrier, the compiler might reload tp->fastopen_rsk and trigger a NULL deref.
request sockets are protected by RCU, we can simply add the missing annotations and barriers to solve the issue.
Fixes: 168a8f58059a ("tcp: TCP Fast Open Server - main code path") Signed-off-by: Eric Dumazet <edumazet@google.com> Signed-off-by: David S. Miller <davem@davemloft.net>
|
H A D | inet_connection_sock.c | diff d983ea6f16b835dcde2ee9a58a1e764ce68bfccc Thu Oct 10 22:17:38 CDT 2019 Eric Dumazet <edumazet@google.com> tcp: add rcu protection around tp->fastopen_rsk
Both tcp_v4_err() and tcp_v6_err() do the following operations while they do not own the socket lock :
fastopen = tp->fastopen_rsk; snd_una = fastopen ? tcp_rsk(fastopen)->snt_isn : tp->snd_una;
The problem is that without appropriate barrier, the compiler might reload tp->fastopen_rsk and trigger a NULL deref.
request sockets are protected by RCU, we can simply add the missing annotations and barriers to solve the issue.
Fixes: 168a8f58059a ("tcp: TCP Fast Open Server - main code path") Signed-off-by: Eric Dumazet <edumazet@google.com> Signed-off-by: David S. Miller <davem@davemloft.net>
|
H A D | tcp_output.c | diff d983ea6f16b835dcde2ee9a58a1e764ce68bfccc Thu Oct 10 22:17:38 CDT 2019 Eric Dumazet <edumazet@google.com> tcp: add rcu protection around tp->fastopen_rsk
Both tcp_v4_err() and tcp_v6_err() do the following operations while they do not own the socket lock :
fastopen = tp->fastopen_rsk; snd_una = fastopen ? tcp_rsk(fastopen)->snt_isn : tp->snd_una;
The problem is that without appropriate barrier, the compiler might reload tp->fastopen_rsk and trigger a NULL deref.
request sockets are protected by RCU, we can simply add the missing annotations and barriers to solve the issue.
Fixes: 168a8f58059a ("tcp: TCP Fast Open Server - main code path") Signed-off-by: Eric Dumazet <edumazet@google.com> Signed-off-by: David S. Miller <davem@davemloft.net>
|
H A D | tcp_ipv4.c | diff d983ea6f16b835dcde2ee9a58a1e764ce68bfccc Thu Oct 10 22:17:38 CDT 2019 Eric Dumazet <edumazet@google.com> tcp: add rcu protection around tp->fastopen_rsk
Both tcp_v4_err() and tcp_v6_err() do the following operations while they do not own the socket lock :
fastopen = tp->fastopen_rsk; snd_una = fastopen ? tcp_rsk(fastopen)->snt_isn : tp->snd_una;
The problem is that without appropriate barrier, the compiler might reload tp->fastopen_rsk and trigger a NULL deref.
request sockets are protected by RCU, we can simply add the missing annotations and barriers to solve the issue.
Fixes: 168a8f58059a ("tcp: TCP Fast Open Server - main code path") Signed-off-by: Eric Dumazet <edumazet@google.com> Signed-off-by: David S. Miller <davem@davemloft.net>
|
H A D | tcp_input.c | diff d983ea6f16b835dcde2ee9a58a1e764ce68bfccc Thu Oct 10 22:17:38 CDT 2019 Eric Dumazet <edumazet@google.com> tcp: add rcu protection around tp->fastopen_rsk
Both tcp_v4_err() and tcp_v6_err() do the following operations while they do not own the socket lock :
fastopen = tp->fastopen_rsk; snd_una = fastopen ? tcp_rsk(fastopen)->snt_isn : tp->snd_una;
The problem is that without appropriate barrier, the compiler might reload tp->fastopen_rsk and trigger a NULL deref.
request sockets are protected by RCU, we can simply add the missing annotations and barriers to solve the issue.
Fixes: 168a8f58059a ("tcp: TCP Fast Open Server - main code path") Signed-off-by: Eric Dumazet <edumazet@google.com> Signed-off-by: David S. Miller <davem@davemloft.net>
|
H A D | tcp.c | diff d983ea6f16b835dcde2ee9a58a1e764ce68bfccc Thu Oct 10 22:17:38 CDT 2019 Eric Dumazet <edumazet@google.com> tcp: add rcu protection around tp->fastopen_rsk
Both tcp_v4_err() and tcp_v6_err() do the following operations while they do not own the socket lock :
fastopen = tp->fastopen_rsk; snd_una = fastopen ? tcp_rsk(fastopen)->snt_isn : tp->snd_una;
The problem is that without appropriate barrier, the compiler might reload tp->fastopen_rsk and trigger a NULL deref.
request sockets are protected by RCU, we can simply add the missing annotations and barriers to solve the issue.
Fixes: 168a8f58059a ("tcp: TCP Fast Open Server - main code path") Signed-off-by: Eric Dumazet <edumazet@google.com> Signed-off-by: David S. Miller <davem@davemloft.net>
|
/openbmc/linux/include/linux/ |
H A D | tcp.h | diff d983ea6f16b835dcde2ee9a58a1e764ce68bfccc Thu Oct 10 22:17:38 CDT 2019 Eric Dumazet <edumazet@google.com> tcp: add rcu protection around tp->fastopen_rsk
Both tcp_v4_err() and tcp_v6_err() do the following operations while they do not own the socket lock :
fastopen = tp->fastopen_rsk; snd_una = fastopen ? tcp_rsk(fastopen)->snt_isn : tp->snd_una;
The problem is that without appropriate barrier, the compiler might reload tp->fastopen_rsk and trigger a NULL deref.
request sockets are protected by RCU, we can simply add the missing annotations and barriers to solve the issue.
Fixes: 168a8f58059a ("tcp: TCP Fast Open Server - main code path") Signed-off-by: Eric Dumazet <edumazet@google.com> Signed-off-by: David S. Miller <davem@davemloft.net>
|
/openbmc/linux/net/ipv6/ |
H A D | tcp_ipv6.c | diff d983ea6f16b835dcde2ee9a58a1e764ce68bfccc Thu Oct 10 22:17:38 CDT 2019 Eric Dumazet <edumazet@google.com> tcp: add rcu protection around tp->fastopen_rsk
Both tcp_v4_err() and tcp_v6_err() do the following operations while they do not own the socket lock :
fastopen = tp->fastopen_rsk; snd_una = fastopen ? tcp_rsk(fastopen)->snt_isn : tp->snd_una;
The problem is that without appropriate barrier, the compiler might reload tp->fastopen_rsk and trigger a NULL deref.
request sockets are protected by RCU, we can simply add the missing annotations and barriers to solve the issue.
Fixes: 168a8f58059a ("tcp: TCP Fast Open Server - main code path") Signed-off-by: Eric Dumazet <edumazet@google.com> Signed-off-by: David S. Miller <davem@davemloft.net>
|