Received: by 10.223.185.116 with SMTP id b49csp4139731wrg; Mon, 19 Feb 2018 11:53:49 -0800 (PST) X-Google-Smtp-Source: AH8x225omBmPqgopnu0RhUtchsH3n/tv2b1OZQ7/q000Qw+kKHap56INMnInhITaTMLrnoU/zvdY X-Received: by 10.99.184.1 with SMTP id p1mr13012669pge.96.1519070029210; Mon, 19 Feb 2018 11:53:49 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1519070029; cv=none; d=google.com; s=arc-20160816; b=zfmWw3WKFqo7WCvOH4Smstg5zX3ojKe2o8zocsBO7s+gELTJjDvqYzt2+F79snOciz ntPTsw/cdS704DvIJPqCKoopLqrnpZpyqYuTjqFKQAOkDyG2q64mM0/eS49ajAqucd2t CX6CRgTEVTDy8GUbbzG/J7I8OwwndABMwhvSplkn/a3P454ZIsLZuQfjGL9KiWDhd+IH Qhz0R7Ruymcw+0j82wsA1SpByCUQcs0IjUZEpuVhNcs2WQp+/mCnUy6YGi3RC1Lny1Rs 2FkvN+Mva0jing6UDcWKZ73spq8iJR3E0kwaMI985WP8mlHSOXPb9KPxXuId8QErV9YV QcOQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :organization:references:in-reply-to:date:cc:to:from:subject :message-id:arc-authentication-results; bh=O6Jkx/u7CtPrbYlwcJuQK4KEH1ubVC9I7nw4mY5NSUQ=; b=WVYH9IxuKDqo3wgg/cg7IbDsQzWlyB8LywXVU6dRbgDwLuJokdkmFqdpdo7+Peojhx N+TowtMKHeA5BFz4HF+E28Szk0gK5sxxdVRecbk96U7sHmxthyIbJcGDU4B4ORnNGc6y +gxQliEbeS1DPQ+7M6oT7pKM9fD4CwRbIyIDesc+F+MruR6uqRF87+kJkcivK5gbUCSd 31/bkkyL318k+zypOLnP842c3RooVX4TQXfh3ySxTP5XJiwqrMAeA3znUczR2bLvJqm7 rCub0y6QY20BmktOAykgC0vCytXq0JFUunzh8gDSo8RdYCge3jEBqFFPAYwHF/j7eYda 7Qwg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=codethink.co.uk Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id u123si183144pgb.16.2018.02.19.11.53.35; Mon, 19 Feb 2018 11:53:49 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=codethink.co.uk Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753988AbeBSTwb (ORCPT + 99 others); Mon, 19 Feb 2018 14:52:31 -0500 Received: from imap1.codethink.co.uk ([176.9.8.82]:50375 "EHLO imap1.codethink.co.uk" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932076AbeBSTw0 (ORCPT ); Mon, 19 Feb 2018 14:52:26 -0500 Received: from host39-52-dynamic.55-79-r.retail.telecomitalia.it ([79.55.52.39] helo=xylophone) by imap1.codethink.co.uk with esmtpsa (Exim 4.84_2 #1 (Debian)) id 1enrUA-00078p-Tw; Mon, 19 Feb 2018 19:52:27 +0000 Message-ID: <1519069941.3422.65.camel@codethink.co.uk> Subject: Re: [PATCH 4.4 60/74] ipv6: fix udpv6 sendmsg crash caused by too small MTU From: Ben Hutchings To: Mike Maloney , Eric Dumazet Cc: stable@vger.kernel.org, syzbot , "David S. Miller" , Greg Kroah-Hartman , LKML Date: Mon, 19 Feb 2018 20:52:21 +0100 In-Reply-To: <1519069573.3422.63.camel@codethink.co.uk> References: <20180129123847.507563674@linuxfoundation.org> <20180129123850.261403857@linuxfoundation.org> <1519069573.3422.63.camel@codethink.co.uk> Organization: Codethink Ltd. Content-Type: text/plain; charset="UTF-8" X-Mailer: Evolution 3.22.6-1+deb9u1 Mime-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, 2018-02-19 at 20:46 +0100, Ben Hutchings wrote: > On Mon, 2018-01-29 at 13:57 +0100, Greg Kroah-Hartman wrote: > > 4.4-stable review patch.  If anyone has any objections, please let me know. > > > > ------------------ > > > > From: Mike Maloney > > > > > > [ Upstream commit 749439bfac6e1a2932c582e2699f91d329658196 ] > > [...] > > --- a/net/ipv6/ip6_output.c > > +++ b/net/ipv6/ip6_output.c > > @@ -1246,14 +1246,16 @@ static int ip6_setup_cork(struct sock *s > >   v6_cork->tclass = tclass; > >   if (rt->dst.flags & DST_XFRM_TUNNEL) > >   mtu = np->pmtudisc >= IPV6_PMTUDISC_PROBE ? > > -       rt->dst.dev->mtu : dst_mtu(&rt->dst); > > +       READ_ONCE(rt->dst.dev->mtu) : dst_mtu(&rt->dst); > >   else > >   mtu = np->pmtudisc >= IPV6_PMTUDISC_PROBE ? > > -       rt->dst.dev->mtu : dst_mtu(rt->dst.path); > > +       READ_ONCE(rt->dst.dev->mtu) : dst_mtu(rt->dst.path); > >   if (np->frag_size < mtu) { > >   if (np->frag_size) > >   mtu = np->frag_size; > >   } > > + if (mtu < IPV6_MIN_MTU) > > + return -EINVAL; > > This error path appears to leak a reference to rt->dst. Never mind, I see that the callers release it. Ben. > Ben. > > > > >   cork->base.fragsize = mtu; > > > >   if (dst_allfrag(rt->dst.path)) > > > >   cork->base.flags |= IPCORK_ALLFRAG; > > > > > > -- Ben Hutchings Software Developer, Codethink Ltd.