* uninterruptible sleep in unix_dgram_recvmsg
@ 2010-03-04 17:41 Michal Schmidt
2010-03-08 20:48 ` David Miller
0 siblings, 1 reply; 2+ messages in thread
From: Michal Schmidt @ 2010-03-04 17:41 UTC (permalink / raw)
To: David Miller; +Cc: netdev
Hello David.
When multiple tasks call recv() on a AF_UNIX/SOCK_DGRAM socket where
noone sends anything, only the first one will sleep interruptibly. The
others are in uninterruptible sleep, causing artificial increase of
loadavg. After two minutes, the hung task watchdog triggers and prints
ugly warnings.
The bug is reported here (with a reproducer attached):
https://bugzilla.redhat.com/show_bug.cgi?id=529202
While the first task awaits the arrival of a packet in
skb_recv_datagram(), it holds the u->readlock mutex, on which the
other tasks will be waiting.
My first idea was to simply replace mutex_lock with
mutex_lock_interruptible. This solves the problem, but one
issue still remains - the receiving timeout (SO_RCVTIMEO) would start
ticking only after the process got the mutex and entered into
skb_recv_datagram().
So instead of that I started to think about why u->readlock is held
across skb_recv_datagram() anyway. I found that it was added in 2.6.10
by your patch "[AF_UNIX]: Serialize dgram read using semaphore just
like stream" which apparently fixed an exploitable race condition
(CAN-2004-1068).
I don't know what exactly u->readlock protects here.
IOW, what race would this patch cause?:
diff --git a/net/unix/af_unix.c b/net/unix/af_unix.c
index f255119..01387da 100644
--- a/net/unix/af_unix.c
+++ b/net/unix/af_unix.c
@@ -1660,9 +1660,9 @@ static int unix_dgram_recvmsg(struct kiocb *iocb, struct socket *sock,
msg->msg_namelen = 0;
+ skb = skb_recv_datagram(sk, flags, noblock, &err);
mutex_lock(&u->readlock);
- skb = skb_recv_datagram(sk, flags, noblock, &err);
if (!skb) {
unix_state_lock(sk);
/* Signal EOF on disconnected non-blocking SEQPACKET socket. */
^ permalink raw reply related [flat|nested] 2+ messages in thread
* Re: uninterruptible sleep in unix_dgram_recvmsg
2010-03-04 17:41 uninterruptible sleep in unix_dgram_recvmsg Michal Schmidt
@ 2010-03-08 20:48 ` David Miller
0 siblings, 0 replies; 2+ messages in thread
From: David Miller @ 2010-03-08 20:48 UTC (permalink / raw)
To: mschmidt; +Cc: netdev
From: Michal Schmidt <mschmidt@redhat.com>
Date: Thu, 4 Mar 2010 18:41:14 +0100
> So instead of that I started to think about why u->readlock is held
> across skb_recv_datagram() anyway. I found that it was added in 2.6.10
> by your patch "[AF_UNIX]: Serialize dgram read using semaphore just
> like stream" which apparently fixed an exploitable race condition
> (CAN-2004-1068).
>
> I don't know what exactly u->readlock protects here.
> IOW, what race would this patch cause?:
Unfortunately I can't find any discussions about that change
and I can't find my own personal email archives from that far
back.
This is what irks me about handling security issues off-list
and in private.
In any event, I'm pretty sure we need to protect the dequeue
of SKBs from the datagram recv_queue with that mutex. So
I'm weary to apply your patch.
Can you find a way to fix this without moving the SKB
dequeue outside of the lock?
Thanks.
^ permalink raw reply [flat|nested] 2+ messages in thread
end of thread, other threads:[~2010-03-08 20:48 UTC | newest]
Thread overview: 2+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2010-03-04 17:41 uninterruptible sleep in unix_dgram_recvmsg Michal Schmidt
2010-03-08 20:48 ` David Miller
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).