Received: by 10.223.176.5 with SMTP id f5csp725541wra; Fri, 9 Feb 2018 06:16:51 -0800 (PST) X-Google-Smtp-Source: AH8x2253e1whQTvp+22y+lQ2LiCyUyKiplXEOUsOZeqv5NJdamjij3BxBvwhp3ekxtDnxBRsHLrt X-Received: by 10.101.65.9 with SMTP id w9mr2529903pgp.214.1518185811854; Fri, 09 Feb 2018 06:16:51 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1518185811; cv=none; d=google.com; s=arc-20160816; b=Y6fPAY4+DrRLulJFTIRp6u6Ql8NmzowQrauILrb6PveDanOrTGM2rM3PvyP3zetJ31 MKd9w/wqldoKwKaZbrf5itCexU7Wdt67MOlyHDWySgZnKHzsQaZo6hJpCNNDidAszKDU q6qOsfbqiHOPsqbq/1hL6LcSpDDQDQ8pPLEHnhhCTOraugl/gdnnrrY6bZSkf9FO7pft wjshh0htpuxSVXIyT2uVYjD67oznGMErBx+z1iYb0sePq+WcsGX2I9ZDZzItfURxJC21 yhhXE8C0acJFoVO9KfFOutSUR5zEmRSIp6KDpPR66Dnzt+TGAXuY4lu4GRd2577LYyrO umGg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :in-reply-to:message-id:date:subject:cc:to:from :arc-authentication-results; bh=G25RoJgQ4eBEf4E9l23qdacMYYDnsKCt1GGCqrKYaVM=; b=sa71yTc/6MOmmz/aV+48rIViegyqlMAF3IC3c2C7nk+0ZZwXLxNMuc07AcTPUWwe8x 77UrW7vjEGfgrHilgzUZ90MzyGY/cr2Q4807+74GfDWoN2e3D0vYbkua7ayNqt4l15+t AnomKmTbxa7FOaX3Hq6luO3xNsqqNRmqsAKSa+owDU6l4gsAEFAmLaNO8ggTF0CedGSz EUWkYTcZszKW/pXIPf67Nfak8Y8ITwLV08BPRludM7/NCNO9Unpjq9TnjFohy1nrQEHu 1cUsgvB4gGPXHnv9HE/vKZfaRDILCIcYASjaJws57+jwKwXhI1Si5GuJbO47w9FeuJkd W3SA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w12si974186pgp.407.2018.02.09.06.16.37; Fri, 09 Feb 2018 06:16:51 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752675AbeBIOPl (ORCPT + 99 others); Fri, 9 Feb 2018 09:15:41 -0500 Received: from mail.linuxfoundation.org ([140.211.169.12]:48366 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752396AbeBINlF (ORCPT ); Fri, 9 Feb 2018 08:41:05 -0500 Received: from localhost (LFbn-1-12258-90.w90-92.abo.wanadoo.fr [90.92.71.90]) by mail.linuxfoundation.org (Postfix) with ESMTPSA id EB3C11060; Fri, 9 Feb 2018 13:41:04 +0000 (UTC) From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Eric Dumazet , syzbot , "David S. Miller" Subject: [PATCH 4.9 20/92] net: igmp: add a missing rcu locking section Date: Fri, 9 Feb 2018 14:38:49 +0100 Message-Id: <20180209133932.748694457@linuxfoundation.org> X-Mailer: git-send-email 2.16.1 In-Reply-To: <20180209133931.211869118@linuxfoundation.org> References: <20180209133931.211869118@linuxfoundation.org> User-Agent: quilt/0.65 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.9-stable review patch. If anyone has any objections, please let me know. ------------------ From: Eric Dumazet [ Upstream commit e7aadb27a5415e8125834b84a74477bfbee4eff5 ] Newly added igmpv3_get_srcaddr() needs to be called under rcu lock. Timer callbacks do not ensure this locking. ============================= WARNING: suspicious RCU usage 4.15.0+ #200 Not tainted ----------------------------- ./include/linux/inetdevice.h:216 suspicious rcu_dereference_check() usage! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 3 locks held by syzkaller616973/4074: #0: (&mm->mmap_sem){++++}, at: [<00000000bfce669e>] __do_page_fault+0x32d/0xc90 arch/x86/mm/fault.c:1355 #1: ((&im->timer)){+.-.}, at: [<00000000619d2f71>] lockdep_copy_map include/linux/lockdep.h:178 [inline] #1: ((&im->timer)){+.-.}, at: [<00000000619d2f71>] call_timer_fn+0x1c6/0x820 kernel/time/timer.c:1316 #2: (&(&im->lock)->rlock){+.-.}, at: [<000000005f833c5c>] spin_lock_bh include/linux/spinlock.h:315 [inline] #2: (&(&im->lock)->rlock){+.-.}, at: [<000000005f833c5c>] igmpv3_send_report+0x98/0x5b0 net/ipv4/igmp.c:600 stack backtrace: CPU: 0 PID: 4074 Comm: syzkaller616973 Not tainted 4.15.0+ #200 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53 lockdep_rcu_suspicious+0x123/0x170 kernel/locking/lockdep.c:4592 __in_dev_get_rcu include/linux/inetdevice.h:216 [inline] igmpv3_get_srcaddr net/ipv4/igmp.c:329 [inline] igmpv3_newpack+0xeef/0x12e0 net/ipv4/igmp.c:389 add_grhead.isra.27+0x235/0x300 net/ipv4/igmp.c:432 add_grec+0xbd3/0x1170 net/ipv4/igmp.c:565 igmpv3_send_report+0xd5/0x5b0 net/ipv4/igmp.c:605 igmp_send_report+0xc43/0x1050 net/ipv4/igmp.c:722 igmp_timer_expire+0x322/0x5c0 net/ipv4/igmp.c:831 call_timer_fn+0x228/0x820 kernel/time/timer.c:1326 expire_timers kernel/time/timer.c:1363 [inline] __run_timers+0x7ee/0xb70 kernel/time/timer.c:1666 run_timer_softirq+0x4c/0x70 kernel/time/timer.c:1692 __do_softirq+0x2d7/0xb85 kernel/softirq.c:285 invoke_softirq kernel/softirq.c:365 [inline] irq_exit+0x1cc/0x200 kernel/softirq.c:405 exiting_irq arch/x86/include/asm/apic.h:541 [inline] smp_apic_timer_interrupt+0x16b/0x700 arch/x86/kernel/apic/apic.c:1052 apic_timer_interrupt+0xa9/0xb0 arch/x86/entry/entry_64.S:938 Fixes: a46182b00290 ("net: igmp: Use correct source address on IGMPv3 reports") Signed-off-by: Eric Dumazet Reported-by: syzbot Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- net/ipv4/igmp.c | 4 ++++ 1 file changed, 4 insertions(+) --- a/net/ipv4/igmp.c +++ b/net/ipv4/igmp.c @@ -386,7 +386,11 @@ static struct sk_buff *igmpv3_newpack(st pip->frag_off = htons(IP_DF); pip->ttl = 1; pip->daddr = fl4.daddr; + + rcu_read_lock(); pip->saddr = igmpv3_get_srcaddr(dev, &fl4); + rcu_read_unlock(); + pip->protocol = IPPROTO_IGMP; pip->tot_len = 0; /* filled in later */ ip_select_ident(net, skb, NULL);