Ubuntu-focal-kernel/net/core
Jamie Bainbridge e96e502748 ethtool: check device is present when getting link settings
BugLink: https://bugs.launchpad.net/bugs/2080595

[ Upstream commit a699781c79ecf6cfe67fb00a0331b4088c7c8466 ]

A sysfs reader can race with a device reset or removal, attempting to
read device state when the device is not actually present. eg:

     [exception RIP: qed_get_current_link+17]
  #8 [ffffb9e4f2907c48] qede_get_link_ksettings at ffffffffc07a994a [qede]
  #9 [ffffb9e4f2907cd8] __rh_call_get_link_ksettings at ffffffff992b01a3
 #10 [ffffb9e4f2907d38] __ethtool_get_link_ksettings at ffffffff992b04e4
 #11 [ffffb9e4f2907d90] duplex_show at ffffffff99260300
 #12 [ffffb9e4f2907e38] dev_attr_show at ffffffff9905a01c
 #13 [ffffb9e4f2907e50] sysfs_kf_seq_show at ffffffff98e0145b
 #14 [ffffb9e4f2907e68] seq_read at ffffffff98d902e3
 #15 [ffffb9e4f2907ec8] vfs_read at ffffffff98d657d1
 #16 [ffffb9e4f2907f00] ksys_read at ffffffff98d65c3f
 #17 [ffffb9e4f2907f38] do_syscall_64 at ffffffff98a052fb

 crash> struct net_device.state ffff9a9d21336000
    state = 5,

state 5 is __LINK_STATE_START (0b1) and __LINK_STATE_NOCARRIER (0b100).
The device is not present, note lack of __LINK_STATE_PRESENT (0b10).

This is the same sort of panic as observed in commit 4224cfd7fb65
("net-sysfs: add check for netdevice being present to speed_show").

There are many other callers of __ethtool_get_link_ksettings() which
don't have a device presence check.

Move this check into ethtool to protect all callers.

Fixes: d519e17e2d ("net: export device speed and duplex via sysfs")
Fixes: 4224cfd7fb65 ("net-sysfs: add check for netdevice being present to speed_show")
Signed-off-by: Jamie Bainbridge <jamie.bainbridge@gmail.com>
Link: https://patch.msgid.link/8bae218864beaa44ed01628140475b9bf641c5b0.1724393671.git.jamie.bainbridge@gmail.com
Signed-off-by: Jakub Kicinski <kuba@kernel.org>
Signed-off-by: Sasha Levin <sashal@kernel.org>
Signed-off-by: Koichiro Den <koichiro.den@canonical.com>
Signed-off-by: Stefan Bader <stefan.bader@canonical.com>
2024-09-27 10:50:27 +02:00
..
Makefile
bpf_sk_storage.c
datagram.c net: datagram: fix data-races in datagram_poll() 2023-08-09 12:25:27 +02:00
datagram.h
dev.c packet: annotate data-races around ignore_outgoing 2024-06-07 15:01:31 +02:00
dev_addr_lists.c
dev_ioctl.c net: dev: Convert sa_data to flexible array in struct sockaddr 2024-04-26 10:54:12 +02:00
devlink.c devlink: remove reload failed checks in params get/set callbacks 2023-10-30 11:42:22 +01:00
drop_monitor.c drop_monitor: replace spin_lock by raw_spin_lock 2024-08-02 16:16:18 +02:00
dst.c ipv6: remove max_size check inline with ipv4 2024-02-23 13:48:06 +01:00
dst_cache.c
ethtool.c ethtool: check device is present when getting link settings 2024-09-27 10:50:27 +02:00
failover.c
fib_notifier.c
fib_rules.c
filter.c bpf: Fix a segment issue when downgrading gso_size 2024-09-27 10:50:16 +02:00
flow_dissector.c net/ipv6: SKB symmetric hash should incorporate transport ports 2023-10-30 11:42:17 +01:00
flow_offload.c
gen_estimator.c
gen_stats.c
gro_cells.c
hwbm.c
link_watch.c net: linkwatch: use system_unbound_wq 2024-09-27 10:50:18 +02:00
lwt_bpf.c lwt: Fix return values of BPF xmit ops 2023-10-30 11:42:08 +01:00
lwtunnel.c
neighbour.c neighbour: Don't let neigh_forced_gc() disable preemption for long 2024-02-29 15:23:32 +01:00
net-procfs.c
net-sysfs.c ethtool: check device is present when getting link settings 2024-09-27 10:50:27 +02:00
net-sysfs.h
net-traces.c
net_namespace.c netns: Make get_net_ns() handle zero refcount net 2024-08-02 16:16:19 +02:00
netclassid_cgroup.c
netevent.c
netpoll.c net: don't let netpoll invoke NAPI if in xmit context 2023-07-10 17:22:08 +02:00
netprio_cgroup.c
page_pool.c
pktgen.c net: pktgen: Fix interface flags printing 2024-01-05 14:29:57 +01:00
ptp_classifier.c
request_sock.c tcp: make sure init the accept_queue's spinlocks once 2024-04-26 10:54:11 +02:00
rtnetlink.c rtnetlink: Correct nested IFLA_VF_VLAN_LIST attribute validation 2024-07-05 10:51:53 +02:00
scm.c io_uring/unix: drop usage of io_uring socket 2024-06-07 15:01:23 +02:00
secure_seq.c tcp: Fix data-races around sysctl knobs related to SYN option. 2022-09-16 10:59:51 +02:00
skbuff.c skb_expand_head() adjust skb->truesize incorrectly 2024-08-02 16:16:08 +02:00
skmsg.c
sock.c net: mark racy access on sk->sk_rcvbuf 2024-07-05 10:51:52 +02:00
sock_destructor.h skb_expand_head() adjust skb->truesize incorrectly 2024-08-02 16:16:08 +02:00
sock_diag.c sock_diag: annotate data-races around sock_diag_handlers[family] 2024-06-07 15:01:25 +02:00
sock_map.c bpf, sockmap: Prevent lock inversion deadlock in map delete elem 2024-06-07 15:01:39 +02:00
sock_reuseport.c
stream.c net: Remove WARN_ON_ONCE(sk->sk_forward_alloc) from sk_stream_kill_queues(). 2023-05-12 17:14:57 +02:00
sysctl_net_core.c net: Fix data-races around weight_p and dev_weight_[rt]x_bias. 2022-10-17 15:02:13 +02:00
timestamping.c
tso.c
utils.c
xdp.c