Received: by 10.223.185.116 with SMTP id b49csp738690wrg; Fri, 16 Feb 2018 06:28:44 -0800 (PST) X-Google-Smtp-Source: AH8x224j33rO6fvNcTtF3fmsu2Lotrm+20teuY7NsF8ozV+FgCDiAx9N1nOdXn+78OgeMODR70XS X-Received: by 2002:a17:902:7841:: with SMTP id e1-v6mr6016605pln.130.1518791324013; Fri, 16 Feb 2018 06:28:44 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1518791323; cv=none; d=google.com; s=arc-20160816; b=cO9Or7SMpwAoaXJaiDUECIvBxs0IAUhaQs8+4323obhAuvfM2Nx1pHzsP8e+IT6bTZ wRpk9FfSpx0zDvgY6pNLaphinDOLPVWgYsu95e6ypWFy4D1r3z6uoPTlo6mzabKqZH1q qrzoVXjjGfwMKvcglPMPJuLqjaR5PXOggYNcvocV2h9iH6oysNC8hSMoGXo7UmGnB/ge aQ8Zt/FFATRPfw8/fL3pM9eE2SJEoN4GuRCLOl0TZTagnmVC5Qv9nqhw1wHIo3qqfyOV dq9Y6XN76cs9OGGi+9hVs/HY/V2/rUNH/jAKhCE1LG5O59R46aYZ76/zs9NyJwu/iSeQ 9sOQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :in-reply-to:message-id:date:subject:cc:to:from :arc-authentication-results; bh=LmPPWHCxZCrzkkvs0KUnANzUXcpqJ5toowhq9xBrcXM=; b=fvq0lYcFWtYCq1CPjwrZbWrDXJn6rSrrqrU6MBm2sk+fiSASTu6sR/fHO/akNxpsZJ VIPEm/UkOdwex4RWSmqtaxQLQqPrXaz3918pPCXaokCpcyrbBGnhl+eTTL0/3aAbEAqD 6fMcXWmcBasJJB8NSzGh5MGoxwOdLpbyZ2qAOLQVflkSwL6rFUu/hKTuFbUB7FJspNga PIAhg3OzyJUCRYQLxhZT4JW+61EV+ICAN63GbH3xQ/5da/nZstGMm23WMBCc3uNN80rh EhaEYLneKm6p2FdGu+AelGtj0DsiL5DPnYEcLBO18R0DS3QCRfR81lUesUBRX+G1NyWa 91xA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id c2si7980403pgp.310.2018.02.16.06.28.28; Fri, 16 Feb 2018 06:28:43 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1167154AbeBOTEm (ORCPT + 99 others); Thu, 15 Feb 2018 14:04:42 -0500 Received: from mail.linuxfoundation.org ([140.211.169.12]:47594 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1161045AbeBOPSp (ORCPT ); Thu, 15 Feb 2018 10:18:45 -0500 Received: from localhost (LFbn-1-12258-90.w90-92.abo.wanadoo.fr [90.92.71.90]) by mail.linuxfoundation.org (Postfix) with ESMTPSA id D2075FFF; Thu, 15 Feb 2018 15:18:44 +0000 (UTC) From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Eric Dumazet , syzbot , "David S. Miller" Subject: [PATCH 3.18 03/45] net: igmp: add a missing rcu locking section Date: Thu, 15 Feb 2018 16:16:54 +0100 Message-Id: <20180215144116.595763805@linuxfoundation.org> X-Mailer: git-send-email 2.16.1 In-Reply-To: <20180215144115.863307741@linuxfoundation.org> References: <20180215144115.863307741@linuxfoundation.org> User-Agent: quilt/0.65 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 3.18-stable review patch. If anyone has any objections, please let me know. ------------------ From: Eric Dumazet [ Upstream commit e7aadb27a5415e8125834b84a74477bfbee4eff5 ] Newly added igmpv3_get_srcaddr() needs to be called under rcu lock. Timer callbacks do not ensure this locking. ============================= WARNING: suspicious RCU usage 4.15.0+ #200 Not tainted ----------------------------- ./include/linux/inetdevice.h:216 suspicious rcu_dereference_check() usage! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 3 locks held by syzkaller616973/4074: #0: (&mm->mmap_sem){++++}, at: [<00000000bfce669e>] __do_page_fault+0x32d/0xc90 arch/x86/mm/fault.c:1355 #1: ((&im->timer)){+.-.}, at: [<00000000619d2f71>] lockdep_copy_map include/linux/lockdep.h:178 [inline] #1: ((&im->timer)){+.-.}, at: [<00000000619d2f71>] call_timer_fn+0x1c6/0x820 kernel/time/timer.c:1316 #2: (&(&im->lock)->rlock){+.-.}, at: [<000000005f833c5c>] spin_lock_bh include/linux/spinlock.h:315 [inline] #2: (&(&im->lock)->rlock){+.-.}, at: [<000000005f833c5c>] igmpv3_send_report+0x98/0x5b0 net/ipv4/igmp.c:600 stack backtrace: CPU: 0 PID: 4074 Comm: syzkaller616973 Not tainted 4.15.0+ #200 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53 lockdep_rcu_suspicious+0x123/0x170 kernel/locking/lockdep.c:4592 __in_dev_get_rcu include/linux/inetdevice.h:216 [inline] igmpv3_get_srcaddr net/ipv4/igmp.c:329 [inline] igmpv3_newpack+0xeef/0x12e0 net/ipv4/igmp.c:389 add_grhead.isra.27+0x235/0x300 net/ipv4/igmp.c:432 add_grec+0xbd3/0x1170 net/ipv4/igmp.c:565 igmpv3_send_report+0xd5/0x5b0 net/ipv4/igmp.c:605 igmp_send_report+0xc43/0x1050 net/ipv4/igmp.c:722 igmp_timer_expire+0x322/0x5c0 net/ipv4/igmp.c:831 call_timer_fn+0x228/0x820 kernel/time/timer.c:1326 expire_timers kernel/time/timer.c:1363 [inline] __run_timers+0x7ee/0xb70 kernel/time/timer.c:1666 run_timer_softirq+0x4c/0x70 kernel/time/timer.c:1692 __do_softirq+0x2d7/0xb85 kernel/softirq.c:285 invoke_softirq kernel/softirq.c:365 [inline] irq_exit+0x1cc/0x200 kernel/softirq.c:405 exiting_irq arch/x86/include/asm/apic.h:541 [inline] smp_apic_timer_interrupt+0x16b/0x700 arch/x86/kernel/apic/apic.c:1052 apic_timer_interrupt+0xa9/0xb0 arch/x86/entry/entry_64.S:938 Fixes: a46182b00290 ("net: igmp: Use correct source address on IGMPv3 reports") Signed-off-by: Eric Dumazet Reported-by: syzbot Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- net/ipv4/igmp.c | 4 ++++ 1 file changed, 4 insertions(+) --- a/net/ipv4/igmp.c +++ b/net/ipv4/igmp.c @@ -384,7 +384,11 @@ static struct sk_buff *igmpv3_newpack(st pip->frag_off = htons(IP_DF); pip->ttl = 1; pip->daddr = fl4.daddr; + + rcu_read_lock(); pip->saddr = igmpv3_get_srcaddr(dev, &fl4); + rcu_read_unlock(); + pip->protocol = IPPROTO_IGMP; pip->tot_len = 0; /* filled in later */ ip_select_ident(skb, NULL);