* [PATCH net-next 0/2] net/ipv6: couple of fixes for rcu change to from
@ 2018-04-23 18:32 David Ahern
2018-04-23 18:32 ` [PATCH net-next 1/2] net/ipv6: add rcu locking to ip6_negative_advice David Ahern
` (2 more replies)
0 siblings, 3 replies; 6+ messages in thread
From: David Ahern @ 2018-04-23 18:32 UTC (permalink / raw)
To: netdev; +Cc: David Ahern
So many details... I am thankful for all the robots running the
permutations and tools.
Two bug fixes from the rcu change to rt->from:
1. missing rcu lock in ip6_negative_advice
2. rcu dereferences in 2 sites
David Ahern (2):
net/ipv6: add rcu locking to ip6_negative_advice
net/ipv6: Fix missing rcu dereferences on from
net/ipv6/route.c | 17 ++++++++++++-----
1 file changed, 12 insertions(+), 5 deletions(-)
--
2.11.0
^ permalink raw reply [flat|nested] 6+ messages in thread* [PATCH net-next 1/2] net/ipv6: add rcu locking to ip6_negative_advice 2018-04-23 18:32 [PATCH net-next 0/2] net/ipv6: couple of fixes for rcu change to from David Ahern @ 2018-04-23 18:32 ` David Ahern 2018-04-23 18:32 ` [PATCH net-next 2/2] net/ipv6: Fix missing rcu dereferences on from David Ahern 2018-04-23 20:13 ` [PATCH net-next 0/2] net/ipv6: couple of fixes for rcu change to from David Miller 2 siblings, 0 replies; 6+ messages in thread From: David Ahern @ 2018-04-23 18:32 UTC (permalink / raw) To: netdev; +Cc: David Ahern syzbot reported a suspicious rcu_dereference_check: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1b9/0x294 lib/dump_stack.c:113 lockdep_rcu_suspicious+0x14a/0x153 kernel/locking/lockdep.c:4592 rt6_check_expired+0x38b/0x3e0 net/ipv6/route.c:410 ip6_negative_advice+0x67/0xc0 net/ipv6/route.c:2204 dst_negative_advice include/net/sock.h:1786 [inline] sock_setsockopt+0x138f/0x1fe0 net/core/sock.c:1051 __sys_setsockopt+0x2df/0x390 net/socket.c:1899 SYSC_setsockopt net/socket.c:1914 [inline] SyS_setsockopt+0x34/0x50 net/socket.c:1911 Add rcu locking around call to rt6_check_expired in ip6_negative_advice. Fixes: a68886a69180 ("net/ipv6: Make from in rt6_info rcu protected") Reported-by: syzbot+2422c9e35796659d2273@syzkaller.appspotmail.com Signed-off-by: David Ahern <dsahern@gmail.com> --- net/ipv6/route.c | 2 ++ 1 file changed, 2 insertions(+) diff --git a/net/ipv6/route.c b/net/ipv6/route.c index 0407bbc5a028..354a5b8d016f 100644 --- a/net/ipv6/route.c +++ b/net/ipv6/route.c @@ -2201,10 +2201,12 @@ static struct dst_entry *ip6_negative_advice(struct dst_entry *dst) if (rt) { if (rt->rt6i_flags & RTF_CACHE) { + rcu_read_lock(); if (rt6_check_expired(rt)) { rt6_remove_exception_rt(rt); dst = NULL; } + rcu_read_unlock(); } else { dst_release(dst); dst = NULL; -- 2.11.0 ^ permalink raw reply related [flat|nested] 6+ messages in thread
* [PATCH net-next 2/2] net/ipv6: Fix missing rcu dereferences on from 2018-04-23 18:32 [PATCH net-next 0/2] net/ipv6: couple of fixes for rcu change to from David Ahern 2018-04-23 18:32 ` [PATCH net-next 1/2] net/ipv6: add rcu locking to ip6_negative_advice David Ahern @ 2018-04-23 18:32 ` David Ahern 2018-04-24 15:54 ` Eric Dumazet 2018-04-23 20:13 ` [PATCH net-next 0/2] net/ipv6: couple of fixes for rcu change to from David Miller 2 siblings, 1 reply; 6+ messages in thread From: David Ahern @ 2018-04-23 18:32 UTC (permalink / raw) To: netdev; +Cc: David Ahern kbuild test robot reported 2 uses of rt->from not properly accessed using rcu_dereference: 1. add rcu_dereference_protected to rt6_remove_exception_rt and make sure it is always called with rcu lock held. 2. change rt6_do_redirect to take a reference on 'from' when accessed the first time so it can be used the sceond time outside of the lock Fixes: a68886a69180 ("net/ipv6: Make from in rt6_info rcu protected") Reported-by: kbuild test robot <lkp@intel.com> Signed-off-by: David Ahern <dsahern@gmail.com> --- net/ipv6/route.c | 15 ++++++++++----- 1 file changed, 10 insertions(+), 5 deletions(-) diff --git a/net/ipv6/route.c b/net/ipv6/route.c index 354a5b8d016f..ac3e51631c65 100644 --- a/net/ipv6/route.c +++ b/net/ipv6/route.c @@ -1541,11 +1541,13 @@ static struct rt6_info *rt6_find_cached_rt(struct fib6_info *rt, static int rt6_remove_exception_rt(struct rt6_info *rt) { struct rt6_exception_bucket *bucket; - struct fib6_info *from = rt->from; struct in6_addr *src_key = NULL; struct rt6_exception *rt6_ex; + struct fib6_info *from; int err; + from = rcu_dereference_protected(rt->from, + lockdep_is_held(&rt6_exception_lock)); if (!from || !(rt->rt6i_flags & RTF_CACHE)) return -EINVAL; @@ -2223,6 +2225,7 @@ static void ip6_link_failure(struct sk_buff *skb) rt = (struct rt6_info *) skb_dst(skb); if (rt) { + rcu_read_lock(); if (rt->rt6i_flags & RTF_CACHE) { if (dst_hold_safe(&rt->dst)) rt6_remove_exception_rt(rt); @@ -2230,15 +2233,14 @@ static void ip6_link_failure(struct sk_buff *skb) struct fib6_info *from; struct fib6_node *fn; - rcu_read_lock(); from = rcu_dereference(rt->from); if (from) { fn = rcu_dereference(from->fib6_node); if (fn && (rt->rt6i_flags & RTF_DEFAULT)) fn->fn_sernum = -1; } - rcu_read_unlock(); } + rcu_read_unlock(); } } @@ -3340,8 +3342,10 @@ static void rt6_do_redirect(struct dst_entry *dst, struct sock *sk, struct sk_bu rcu_read_lock(); from = rcu_dereference(rt->from); - nrt = ip6_rt_cache_alloc(from, &msg->dest, NULL); + fib6_info_hold(from); rcu_read_unlock(); + + nrt = ip6_rt_cache_alloc(from, &msg->dest, NULL); if (!nrt) goto out; @@ -3355,7 +3359,7 @@ static void rt6_do_redirect(struct dst_entry *dst, struct sock *sk, struct sk_bu * a cached route because rt6_insert_exception() will * takes care of it */ - if (rt6_insert_exception(nrt, rt->from)) { + if (rt6_insert_exception(nrt, from)) { dst_release_immediate(&nrt->dst); goto out; } @@ -3367,6 +3371,7 @@ static void rt6_do_redirect(struct dst_entry *dst, struct sock *sk, struct sk_bu call_netevent_notifiers(NETEVENT_REDIRECT, &netevent); out: + fib6_info_release(from); neigh_release(neigh); } -- 2.11.0 ^ permalink raw reply related [flat|nested] 6+ messages in thread
* Re: [PATCH net-next 2/2] net/ipv6: Fix missing rcu dereferences on from 2018-04-23 18:32 ` [PATCH net-next 2/2] net/ipv6: Fix missing rcu dereferences on from David Ahern @ 2018-04-24 15:54 ` Eric Dumazet 2018-04-24 15:56 ` Eric Dumazet 0 siblings, 1 reply; 6+ messages in thread From: Eric Dumazet @ 2018-04-24 15:54 UTC (permalink / raw) To: David Ahern, netdev On 04/23/2018 11:32 AM, David Ahern wrote: > kbuild test robot reported 2 uses of rt->from not properly accessed > using rcu_dereference: > 1. add rcu_dereference_protected to rt6_remove_exception_rt and make > sure it is always called with rcu lock held. > > 2. change rt6_do_redirect to take a reference on 'from' when accessed > the first time so it can be used the sceond time outside of the lock > > Fixes: a68886a69180 ("net/ipv6: Make from in rt6_info rcu protected") > Reported-by: kbuild test robot <lkp@intel.com> > Signed-off-by: David Ahern <dsahern@gmail.com> > --- > net/ipv6/route.c | 15 ++++++++++----- > 1 file changed, 10 insertions(+), 5 deletions(-) > > diff --git a/net/ipv6/route.c b/net/ipv6/route.c > index 354a5b8d016f..ac3e51631c65 100644 > --- a/net/ipv6/route.c > +++ b/net/ipv6/route.c > @@ -1541,11 +1541,13 @@ static struct rt6_info *rt6_find_cached_rt(struct fib6_info *rt, > static int rt6_remove_exception_rt(struct rt6_info *rt) > { > struct rt6_exception_bucket *bucket; > - struct fib6_info *from = rt->from; > struct in6_addr *src_key = NULL; > struct rt6_exception *rt6_ex; > + struct fib6_info *from; > int err; > > + from = rcu_dereference_protected(rt->from, > + lockdep_is_held(&rt6_exception_lock)); This does not make any sense. We lock rt6_exception_lock a bit later in this function (line 1558) If we really were holding rt6_exception_lock here we would dead lock. > if (!from || > !(rt->rt6i_flags & RTF_CACHE)) > return -EINVAL; > @@ -2223,6 +2225,7 @@ static void ip6_link_failure(struct sk_buff *skb) ^ permalink raw reply [flat|nested] 6+ messages in thread
* Re: [PATCH net-next 2/2] net/ipv6: Fix missing rcu dereferences on from 2018-04-24 15:54 ` Eric Dumazet @ 2018-04-24 15:56 ` Eric Dumazet 0 siblings, 0 replies; 6+ messages in thread From: Eric Dumazet @ 2018-04-24 15:56 UTC (permalink / raw) To: David Ahern, netdev On 04/24/2018 08:54 AM, Eric Dumazet wrote: > > > On 04/23/2018 11:32 AM, David Ahern wrote: >> kbuild test robot reported 2 uses of rt->from not properly accessed >> using rcu_dereference: >> 1. add rcu_dereference_protected to rt6_remove_exception_rt and make >> sure it is always called with rcu lock held. >> >> 2. change rt6_do_redirect to take a reference on 'from' when accessed >> the first time so it can be used the sceond time outside of the lock >> >> Fixes: a68886a69180 ("net/ipv6: Make from in rt6_info rcu protected") >> Reported-by: kbuild test robot <lkp@intel.com> >> Signed-off-by: David Ahern <dsahern@gmail.com> >> --- >> net/ipv6/route.c | 15 ++++++++++----- >> 1 file changed, 10 insertions(+), 5 deletions(-) >> >> diff --git a/net/ipv6/route.c b/net/ipv6/route.c >> index 354a5b8d016f..ac3e51631c65 100644 >> --- a/net/ipv6/route.c >> +++ b/net/ipv6/route.c >> @@ -1541,11 +1541,13 @@ static struct rt6_info *rt6_find_cached_rt(struct fib6_info *rt, >> static int rt6_remove_exception_rt(struct rt6_info *rt) >> { >> struct rt6_exception_bucket *bucket; >> - struct fib6_info *from = rt->from; >> struct in6_addr *src_key = NULL; >> struct rt6_exception *rt6_ex; >> + struct fib6_info *from; >> int err; >> >> + from = rcu_dereference_protected(rt->from, >> + lockdep_is_held(&rt6_exception_lock)); > > This does not make any sense. > > We lock rt6_exception_lock a bit later in this function (line 1558) > > If we really were holding rt6_exception_lock here we would dead lock. I will send this fix : diff --git a/net/ipv6/route.c b/net/ipv6/route.c index ac3e51631c659b5c5c8a93c17011cb7f3ad266e2..432c4bcc1111085671f32987e4673e47898085a3 100644 --- a/net/ipv6/route.c +++ b/net/ipv6/route.c @@ -1546,8 +1546,7 @@ static int rt6_remove_exception_rt(struct rt6_info *rt) struct fib6_info *from; int err; - from = rcu_dereference_protected(rt->from, - lockdep_is_held(&rt6_exception_lock)); + from = rcu_dereference(rt->from); if (!from || !(rt->rt6i_flags & RTF_CACHE)) return -EINVAL; ^ permalink raw reply related [flat|nested] 6+ messages in thread
* Re: [PATCH net-next 0/2] net/ipv6: couple of fixes for rcu change to from 2018-04-23 18:32 [PATCH net-next 0/2] net/ipv6: couple of fixes for rcu change to from David Ahern 2018-04-23 18:32 ` [PATCH net-next 1/2] net/ipv6: add rcu locking to ip6_negative_advice David Ahern 2018-04-23 18:32 ` [PATCH net-next 2/2] net/ipv6: Fix missing rcu dereferences on from David Ahern @ 2018-04-23 20:13 ` David Miller 2 siblings, 0 replies; 6+ messages in thread From: David Miller @ 2018-04-23 20:13 UTC (permalink / raw) To: dsahern; +Cc: netdev From: David Ahern <dsahern@gmail.com> Date: Mon, 23 Apr 2018 11:32:05 -0700 > So many details... I am thankful for all the robots running the > permutations and tools. This is why I am not afraid of the robots taking over. :-) > Two bug fixes from the rcu change to rt->from: > 1. missing rcu lock in ip6_negative_advice > 2. rcu dereferences in 2 sites Series applied, thanks David. ^ permalink raw reply [flat|nested] 6+ messages in thread
end of thread, other threads:[~2018-04-24 15:56 UTC | newest] Thread overview: 6+ messages (download: mbox.gz follow: Atom feed -- links below jump to the message on this page -- 2018-04-23 18:32 [PATCH net-next 0/2] net/ipv6: couple of fixes for rcu change to from David Ahern 2018-04-23 18:32 ` [PATCH net-next 1/2] net/ipv6: add rcu locking to ip6_negative_advice David Ahern 2018-04-23 18:32 ` [PATCH net-next 2/2] net/ipv6: Fix missing rcu dereferences on from David Ahern 2018-04-24 15:54 ` Eric Dumazet 2018-04-24 15:56 ` Eric Dumazet 2018-04-23 20:13 ` [PATCH net-next 0/2] net/ipv6: couple of fixes for rcu change to from David Miller
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox; as well as URLs for NNTP newsgroup(s).