Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753245AbbKYMXt (ORCPT ); Wed, 25 Nov 2015 07:23:49 -0500 Received: from smtp-out6.electric.net ([192.162.217.193]:59270 "EHLO smtp-out6.electric.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751820AbbKYMXr convert rfc822-to-8bit (ORCPT ); Wed, 25 Nov 2015 07:23:47 -0500 From: David Laight To: "'Santosh Shilimkar'" , "netdev@vger.kernel.org" , "davem@davemloft.net" CC: "linux-kernel@vger.kernel.org" , "sasha.levin@oracle.com" , "ben@decadent.org.uk" , Quentin Casasnovas , "stable@vger.kernel.org" Subject: RE: [Resend PATCH] RDS: fix race condition when sending a message on unbound socket Thread-Topic: [Resend PATCH] RDS: fix race condition when sending a message on unbound socket Thread-Index: AQHRJuv8zMV29id660+WOzuYNpnVpJ6sp9sw Date: Wed, 25 Nov 2015 12:21:45 +0000 Message-ID: <063D6719AE5E284EB5DD2968C1650D6D1CBDC0B0@AcuExch.aculab.com> References: <1448403201-1683-1-git-send-email-santosh.shilimkar@oracle.com> In-Reply-To: <1448403201-1683-1-git-send-email-santosh.shilimkar@oracle.com> Accept-Language: en-GB, en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-originating-ip: [10.202.99.200] Content-Type: text/plain; charset="Windows-1252" Content-Transfer-Encoding: 8BIT MIME-Version: 1.0 X-Outbound-IP: 213.249.233.130 X-Env-From: David.Laight@ACULAB.COM X-PolicySMART: 3396946, 3397078 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1851 Lines: 51 From: Santosh Shilimkar > Sent: 24 November 2015 22:13 ... > Sasha's found a NULL pointer dereference in the RDS connection code when > sending a message to an apparently unbound socket. The problem is caused > by the code checking if the socket is bound in rds_sendmsg(), which checks > the rs_bound_addr field without taking a lock on the socket. This opens a > race where rs_bound_addr is temporarily set but where the transport is not > in rds_bind(), leading to a NULL pointer dereference when trying to > dereference 'trans' in __rds_conn_create(). > > Vegard wrote a reproducer for this issue, so kindly ask him to share if > you're interested. ... > diff --git a/net/rds/send.c b/net/rds/send.c > index 827155c..c9cdb35 100644 > --- a/net/rds/send.c > +++ b/net/rds/send.c > @@ -1013,11 +1013,13 @@ int rds_sendmsg(struct socket *sock, struct msghdr *msg, size_t payload_len) > release_sock(sk); This is falling though into an unconditional lock_sock(). No need to unlock and relock immediately. > } > > - /* racing with another thread binding seems ok here */ > + lock_sock(sk); > if (daddr == 0 || rs->rs_bound_addr == 0) { > + release_sock(sk); > ret = -ENOTCONN; /* XXX not a great errno */ > goto out; > } > + release_sock(sk); > On the face of it the above looks somewhat dubious. Locks usually tie together two action (eg a test and use of a value), In this case you only have a test inside the lock. That either means that the state can change after you release the lock (ie rs->rs_bound_addr = 0 is executed somewhere), or you don't really need the lock. David -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/