Received: by 10.223.176.46 with SMTP id f43csp3441237wra; Mon, 22 Jan 2018 14:26:47 -0800 (PST) X-Google-Smtp-Source: AH8x224+IT46i+7a0pkBKJEwIxhc0KLSzi8PirMglq8Pcjf5MXlYEe2HIm6OWSXwyu5gr/DX3rdy X-Received: by 10.107.104.8 with SMTP id d8mr672688ioc.119.1516660007121; Mon, 22 Jan 2018 14:26:47 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1516660007; cv=none; d=google.com; s=arc-20160816; b=can+tUXBaNb4WNyA+ZOG+lsFl0rFbY6vu8FzqCGQiEUqyiHO+ZD1OjbaLoQmSa+v0x g6awCFIa7QrWBuhtasEDuOd0J0xan3Rtdfpw8K3TPDfCGtCvmCWHbkX8H77+ZVoB1ysy 5Mq564lOfxyZzSP2T1DB10yHCSDX/a9rLH9IoIFui9i0kVJibhsZfvjdkemAHQR532t2 aNwpxctEPG7PgU1vuH06V441ggLvWkASuvshALITuk09MUuCc9q0kDcYIsSxybTwAhop xPg3/S5qajkkLIlq4TTgExUobCbVFT6sdgudyE2EpTskuTu92FLH01wPrV+GTlT1pELS xJSA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:organization:from:references:cc:to:subject :dkim-signature:arc-authentication-results; bh=JUZH2Zhs8ujojKdkYs4KONang1PMPcgmSu7s+TTvo6g=; b=SVrjRAppIde9POyhZKOMB8G4dYOeZ3qyXhD99M6IoR2rDc9WFNlJ0K7Ig4Q4CTty5/ QKcfcBfh8iKBR//mqKYHPQgd0HcKLr7JPEvQ4qLEksqPFY8sOesN1egzm8jvOkNah9SX pF61CmTMrLUiOV53zqeWd+Z7AfNGh5VRyKmNF7LGygVBgc8SeDtbsZeOhwgN9uAFtz9M +rHfTK9BXAlWKD0WbPdK0M1j8Jn/Wc9TfKatg/RL3WoRIvoAe89xSo94xjiF3gUlrgGi qmqEX6RUhhI9jIrLumdy46o8bC/0o4EJCPyrADxYnuo7E/gQy3NZClS9truSqD4awKC6 vgYA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@oracle.com header.s=corp-2017-10-26 header.b=myQUsqYV; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=oracle.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id r185si6734320itc.160.2018.01.22.14.26.34; Mon, 22 Jan 2018 14:26:47 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@oracle.com header.s=corp-2017-10-26 header.b=myQUsqYV; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=oracle.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751224AbeAVW0C (ORCPT + 99 others); Mon, 22 Jan 2018 17:26:02 -0500 Received: from userp2120.oracle.com ([156.151.31.85]:38206 "EHLO userp2120.oracle.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750977AbeAVW0A (ORCPT ); Mon, 22 Jan 2018 17:26:00 -0500 Received: from pps.filterd (userp2120.oracle.com [127.0.0.1]) by userp2120.oracle.com (8.16.0.22/8.16.0.22) with SMTP id w0MMMY4u050335; Mon, 22 Jan 2018 22:25:51 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=subject : to : cc : references : from : message-id : date : mime-version : in-reply-to : content-type : content-transfer-encoding; s=corp-2017-10-26; bh=JUZH2Zhs8ujojKdkYs4KONang1PMPcgmSu7s+TTvo6g=; b=myQUsqYVy+cJt3ozfU2WUO3aoeysX4brFX9W+TQdUdItu6XXawyzvvrdfmEjWb+4V7Zh CajcTboKsgkcWGOXzck9busi9WcJnexl7/JO6DN/cuVaIb34VT2xmh7BXzVHV9AAPJnE /5FqbiegxkoMIUijlSclDr9rt7M5Bs/R48cjklkSddP+wp2m6f1UH8psN6N++OlO6KTX 6RZq8rrLS/9QhOPLFkr1l5ZYbGiHRAbjcQLKfS6ZHdnnUhr4nsPMAC8WZQ89KlQV/kfA /CRH3hGEq713xIGJNxBjpilEekVzGkcpt6DUUyw4sqSgivHkoOV1AkiSLrxz4aB/Znfy aQ== Received: from aserv0021.oracle.com (aserv0021.oracle.com [141.146.126.233]) by userp2120.oracle.com with ESMTP id 2fnrmu81dm-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Mon, 22 Jan 2018 22:25:51 +0000 Received: from aserv0121.oracle.com (aserv0121.oracle.com [141.146.126.235]) by aserv0021.oracle.com (8.14.4/8.14.4) with ESMTP id w0MMPob0007919 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=FAIL); Mon, 22 Jan 2018 22:25:50 GMT Received: from abhmp0005.oracle.com (abhmp0005.oracle.com [141.146.116.11]) by aserv0121.oracle.com (8.14.4/8.13.8) with ESMTP id w0MMPonM006409; Mon, 22 Jan 2018 22:25:50 GMT Received: from [10.209.243.219] (/10.209.243.219) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Mon, 22 Jan 2018 14:25:49 -0800 Subject: Re: [PATCH] RDS: Fix rds-ping inducing kernel panic To: Kees Cook Cc: Honggang Li , LKML , Sowmini Varadhan , Steve Beattie , Andy Whitcroft , "David S. Miller" , Jay Fenlason , Network Development , linux-rdma , rds-devel@oss.oracle.com References: <20180122112415.GA41074@beast> <2768ae2b-b7de-cf00-c599-4c164a6228be@oracle.com> From: Santosh Shilimkar Organization: Oracle Corporation Message-ID: <8cec0803-701a-be79-802d-bac2e84acbbd@oracle.com> Date: Mon, 22 Jan 2018 14:25:47 -0800 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:52.0) Gecko/20100101 Thunderbird/52.5.2 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit X-Proofpoint-Virus-Version: vendor=nai engine=5900 definitions=8782 signatures=668655 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 suspectscore=0 malwarescore=0 phishscore=0 bulkscore=0 spamscore=0 mlxscore=0 mlxlogscore=898 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1711220000 definitions=main-1801220301 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 1/22/2018 2:17 PM, Kees Cook wrote: > On Tue, Jan 23, 2018 at 4:01 AM, Santosh Shilimkar > wrote: >> On 1/22/2018 3:24 AM, Kees Cook wrote: >>> >>> As described in: https://bugzilla.redhat.com/show_bug.cgi?id=822754 >>> >>> Attempting an RDS connection from the IP address of an IPoIB interface >>> to itself causes a kernel panic due to a BUG_ON() being triggered. >>> Making the test less strict allows rds-ping to work without crashing >>> the machine. >>> >>> A local unprivileged user could use this flaw to crash the sytem. >>> >> Are you able to reproduce this issue on mainline kernel ? >> IIRC, this sjouldn't happen anymore but if you see it, please >> let me know. Will try it as well. rds-ping on self >> loopback device is often tested and used as well for >> monitoring services in production. > > I don't have an RDS test setup, no. But it sounds like kernels without > this patch aren't seeing the problem. > Yep. Thats what I thought and hence asked. >> Am not sure if its applicable anymore. Infact the issue with >> loopback device was due to congestion update and thats been >> already addressed with commit '18fc25c94: {rds: prevent BUG_ON >> triggered on congestion update to loopback}' > > That looks very much like it was fixed there. Thanks! > Yeah. Thanks Kees !! Regards, Santosh