diff options
author | Eric Dumazet <edumazet@google.com> | 2017-08-30 12:29:31 -0400 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2017-08-30 18:55:10 -0400 |
commit | 351050ecd6523374b370341cc29fe61e2201556b (patch) | |
tree | 5b6c0a72dcf7b3d172c2be867e5bf2fd10030099 /net | |
parent | f5c3dd4b5363af997d418174d578a795081aab51 (diff) |
kcm: do not attach PF_KCM sockets to avoid deadlock
syzkaller had no problem to trigger a deadlock, attaching a KCM socket
to another one (or itself). (original syzkaller report was a very
confusing lockdep splat during a sendmsg())
It seems KCM claims to only support TCP, but no enforcement is done,
so we might need to add additional checks.
Fixes: ab7ac4eb9832 ("kcm: Kernel Connection Multiplexor module")
Signed-off-by: Eric Dumazet <edumazet@google.com>
Reported-by: Dmitry Vyukov <dvyukov@google.com>
Acked-by: Tom Herbert <tom@quantonium.net>
Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'net')
-rw-r--r-- | net/kcm/kcmsock.c | 4 |
1 files changed, 4 insertions, 0 deletions
diff --git a/net/kcm/kcmsock.c b/net/kcm/kcmsock.c index da49191f7ad0..4abf6287d7e1 100644 --- a/net/kcm/kcmsock.c +++ b/net/kcm/kcmsock.c | |||
@@ -1383,6 +1383,10 @@ static int kcm_attach(struct socket *sock, struct socket *csock, | |||
1383 | if (!csk) | 1383 | if (!csk) |
1384 | return -EINVAL; | 1384 | return -EINVAL; |
1385 | 1385 | ||
1386 | /* We must prevent loops or risk deadlock ! */ | ||
1387 | if (csk->sk_family == PF_KCM) | ||
1388 | return -EOPNOTSUPP; | ||
1389 | |||
1386 | psock = kmem_cache_zalloc(kcm_psockp, GFP_KERNEL); | 1390 | psock = kmem_cache_zalloc(kcm_psockp, GFP_KERNEL); |
1387 | if (!psock) | 1391 | if (!psock) |
1388 | return -ENOMEM; | 1392 | return -ENOMEM; |