From: Shigeru Yoshida <syoshida@redhat.com>
To: Guillaume Nault <gnault@redhat.com>
Cc: jchapman@katalix.com, davem@davemloft.net, edumazet@google.com,
kuba@kernel.org, pabeni@redhat.com, netdev@vger.kernel.org,
linux-kernel@vger.kernel.org
Subject: Re: [PATCH] l2tp: Avoid possible recursive deadlock in l2tp_tunnel_register()
Date: Wed, 8 Feb 2023 01:50:22 +0900 [thread overview]
Message-ID: <Y+KBTktdS8WLV/3/@kernel-devel> (raw)
In-Reply-To: <Y9voRRiiWK/V7WQD@debian>
Hi Guillaume,
On Thu, Feb 02, 2023 at 05:43:49PM +0100, Guillaume Nault wrote:
> On Thu, Feb 02, 2023 at 12:43:49AM +0900, Shigeru Yoshida wrote:
> > Hi Guillaume,
> >
> > On Mon, Jan 30, 2023 at 06:03:52PM +0100, Guillaume Nault wrote:
> > > On Tue, Jan 31, 2023 at 12:44:38AM +0900, Shigeru Yoshida wrote:
> > > > This patch fixes the issue by returning error when a pppol2tp socket
> > > > itself is passed.
> > >
> > > Fixes: 0b2c59720e65 ("l2tp: close all race conditions in l2tp_tunnel_register()")
> > >
> > > > Signed-off-by: Shigeru Yoshida <syoshida@redhat.com>
> > > > ---
> > > > net/l2tp/l2tp_ppp.c | 7 +++++--
> > > > 1 file changed, 5 insertions(+), 2 deletions(-)
> > > >
> > > > diff --git a/net/l2tp/l2tp_ppp.c b/net/l2tp/l2tp_ppp.c
> > > > index db2e584c625e..88d1a339500b 100644
> > > > --- a/net/l2tp/l2tp_ppp.c
> > > > +++ b/net/l2tp/l2tp_ppp.c
> > > > @@ -702,11 +702,14 @@ static int pppol2tp_connect(struct socket *sock, struct sockaddr *uservaddr,
> > > > struct l2tp_tunnel_cfg tcfg = {
> > > > .encap = L2TP_ENCAPTYPE_UDP,
> > > > };
> > > > + int dummy = 0;
> > >
> > > There's no need to initialise dummy here. This is just confusing.
> > > We could even do without any extra variable and reuse error in
> > > sockfd_lookup().
> > >
> > > > /* Prevent l2tp_tunnel_register() from trying to set up
> > > > - * a kernel socket.
> > > > + * a kernel socket. Also, prevent l2tp_tunnel_register()
> > > > + * from trying to use pppol2tp socket itself.
> > > > */
> > > > - if (info.fd < 0) {
> > > > + if (info.fd < 0 ||
> > > > + sock == sockfd_lookup(info.fd, &dummy)) {
> > > > error = -EBADF;
> > > > goto end;
> > > > }
> > >
> > > That should work, but the real problem is calling l2tp_tunnel_register()
> > > under lock_sock(). We should instead get/create the tunnel before
> > > locking the pppol2tp socket.
> >
> > Thank you so much for your comment, and sorry for the late response.
> >
> > Do you mean we can call l2tp_tunnel_register() without pppol2tp socket
> > lock?
>
> Yes. At this point, we're creating a new tunnel which is independant
> from the pppol2tp socket.
>
> > I've read the source code of pppol2tp_connect(), but I'm not
> > sure why pppol2tp socket is locked at the beginning of this function.
> > If we can call l2tp_tunnel_register() without pppol2tp socket lock, I
> > think we can move lock_sock() after l2tp_tunnel_register().
>
> Here are a few more details to be sure we're on the same page.
>
> Locking the pppol2tp socket remains necessary since we access and
> modify some of its protected attributes. But we can fetch or create
> the tunnel before working on the socket. For this, the only information
> we need to get from the socket is its netns. And calling sock_net(sk)
> without holding the socket lock is fine because user space sockets
> can't have their netns modified after initialisation.
>
> So the code for retrieving or creating the tunnel can be moved before
> the lock_sock(sk) call in pppol2tp_register(). Just make sure to adjust
> the error path accordingly. Also, a helper function might help to make
> the code more readable.
Thank you so much for the detailed explanation. I really appreciate.
I'll think about it further, and try to prepare v2 patch.
Thanks,
Shigeru
>
> > Thanks,
> > Shigeru
> >
> > >
> >
>
prev parent reply other threads:[~2023-02-07 16:51 UTC|newest]
Thread overview: 5+ messages / expand[flat|nested] mbox.gz Atom feed top
2023-01-30 15:44 [PATCH] l2tp: Avoid possible recursive deadlock in l2tp_tunnel_register() Shigeru Yoshida
2023-01-30 17:03 ` Guillaume Nault
2023-02-01 15:43 ` Shigeru Yoshida
2023-02-02 16:43 ` Guillaume Nault
2023-02-07 16:50 ` Shigeru Yoshida [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=Y+KBTktdS8WLV/3/@kernel-devel \
--to=syoshida@redhat.com \
--cc=davem@davemloft.net \
--cc=edumazet@google.com \
--cc=gnault@redhat.com \
--cc=jchapman@katalix.com \
--cc=kuba@kernel.org \
--cc=linux-kernel@vger.kernel.org \
--cc=netdev@vger.kernel.org \
--cc=pabeni@redhat.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox