Received: by 2002:ac0:a594:0:0:0:0:0 with SMTP id m20-v6csp4852727imm; Fri, 18 May 2018 11:47:41 -0700 (PDT) X-Google-Smtp-Source: AB8JxZqBFKBZ5goNTPAV7If7+YWBxv5s1RbUtCDJY1zb3MBZUcXLndXS5Gr8sLIqV4BtS/lmTl1m X-Received: by 2002:a17:902:8207:: with SMTP id x7-v6mr10707699pln.100.1526669261291; Fri, 18 May 2018 11:47:41 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1526669261; cv=none; d=google.com; s=arc-20160816; b=iLeDiClTmANy3Qz4DBxyDnWVjNybpaeYgsxb89hDEacmlntRjIM70hvWx15nrUpV8N rgCnpQpUd/zk1BJrDvTSoJZxRisnbFvtk62iczRn4KRI3eGxj7k5i9bP7sZYlP/jTfJ7 ZxVe1Wevw79cS0CVjCzW/S/alamoeL+X8kuMe4KZ6vdT8DP9Gb+dIt3MQvc9Hwy/3t/W LjU1tx1ga82cUcynPO5D0+U7t3F5y4qm/XRrip7e2dBNoIdft2Rhotujn6VzOBqiOLn1 9IoLtTxNUultBcVODbsgjGMxv+MYJTpiu6EryNlcTY/ZsnspN5X4p2T2Fa9fx66d/ktV oeJA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :references:in-reply-to:mime-version:dkim-signature :arc-authentication-results; bh=5wtq8BvjyEbvm21ouoy1mygmbnN7clTaTYcveLW6LMQ=; b=oapFSGOC9ATw67aLafux8bxe/8zWQza35M41g6YSJLmo5z2cr5OUFKxSaEpB/L8Gu5 tXEuqTyffTInkej7APrIuZ47uw5DaoBDuzgG8vr8tO5biKKEte6ufBo9yeHDpsug4cTO IgpZVnS7/zsZiuT8ydV3SWO0AG28bMowetkuJn8RdwlulWGD4OGrwxw2XwkMIzkdBH5/ yWrFNnTBWS0WeiOc1OwQ2jafc13TjdbcjOd4gCimpF8jIgoGFnnOefSiceaEOFHw2p0H GY/80WPFsNgonwZk+Ek2nmZb0p+QNW8x76WfPz3KwYR/SXWg8AmvMAmJAy+LHUSPQYN9 dEJA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=PHydZcKJ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 3-v6si8237766pla.38.2018.05.18.11.47.26; Fri, 18 May 2018 11:47:41 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=PHydZcKJ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751975AbeERSrM (ORCPT + 99 others); Fri, 18 May 2018 14:47:12 -0400 Received: from mail-vk0-f65.google.com ([209.85.213.65]:33046 "EHLO mail-vk0-f65.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751221AbeERSrJ (ORCPT ); Fri, 18 May 2018 14:47:09 -0400 Received: by mail-vk0-f65.google.com with SMTP id q189-v6so5429792vkb.0; Fri, 18 May 2018 11:47:09 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=5wtq8BvjyEbvm21ouoy1mygmbnN7clTaTYcveLW6LMQ=; b=PHydZcKJ/puhBQi4wQGxOKH+nUVhxX2wmsspMa3HCAhEDpU79taeMaovdw5Wb5sr+z xhV49HC9bSf+XWqR0izHlEpxvSoGHDFBLqf36mB0CutGksqxv6WUmEZWJtiDvy7cmdoZ OigxycLxktqRCFk4lFtiT1yW4ylnZHMe0M3UOlXJjRxX/sSzWBqhhAx2NQkjJtHskfjA HxLiJ3fOSxF4PqGQc7c6ZZ26/cjNu394H7BNiNKxO32NwvOzKb9MRgx6wINuNC02QsDh KzJ/pF9jaGbQlywQqG2Z051HoojZbCoOF9e5f3JdFiNUTwrCzoq0roVTgdKmvrvxM1IC w9Nw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=5wtq8BvjyEbvm21ouoy1mygmbnN7clTaTYcveLW6LMQ=; b=Y68QJl/CEhC4tyDDJqo0eyk2erct33m4lsDT2a7tdQfpxEdg3iiMRNJVG3n6zVhb1q go59uLU6qxLarE2D47hXOctZXE8qzDPCdXL56fl1L/keXlYiSnz0jipSxfVe9ne2ZFeK X+bjup8eO7j4XCQ83ZPvyRqifHLr9qIt/JdNXIbN2OXILfHNHXbiaOkHLepJrS3R7Dgc ObOsFT53t7QQJ9rooCPdxjXfYb7MyZKokauJbV3gERFN6zlBYGwGQdWq0EQRwfLWtfwU 7qk1oJKiMKnOyOGj4NxpaBNAikpVtdG8hKXsGRlOTUoBvaza6pCw33ZynQjJ61i3k9Em yTgA== X-Gm-Message-State: ALKqPwdGefX3VtB7S9vkX2yiCazNnO3CUtS37Pq8hE3iG/7gIUNHPHgZ io57mvsr2s5IqHNwJV1TXQRnrKWIbxWljrv/qks= X-Received: by 2002:a1f:58c:: with SMTP id 134-v6mr7657075vkf.55.1526669228511; Fri, 18 May 2018 11:47:08 -0700 (PDT) MIME-Version: 1.0 Received: by 10.103.151.90 with HTTP; Fri, 18 May 2018 11:46:27 -0700 (PDT) In-Reply-To: References: <20180518120826.GA19515@dragonet.kaist.ac.kr> <293d029c-b14c-a625-3703-97a5754e99f1@gmail.com> <20180518.114433.390752642781753429.davem@davemloft.net> From: Willem de Bruijn Date: Fri, 18 May 2018 14:46:27 -0400 Message-ID: Subject: Re: WARNING in ip_recv_error To: David Miller Cc: Eric Dumazet , DaeLyong Jeong , Alexey Kuznetsov , Hideaki YOSHIFUJI , Network Development , LKML , Byoungyoung Lee , Kyungtae Kim , bammanag@purdue.edu, Willem de Bruijn Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, May 18, 2018 at 2:44 PM, Willem de Bruijn wrote: > On Fri, May 18, 2018 at 1:09 PM, Willem de Bruijn > wrote: >> On Fri, May 18, 2018 at 11:44 AM, David Miller wrote: >>> From: Eric Dumazet >>> Date: Fri, 18 May 2018 08:30:43 -0700 >>> >>>> We probably need to revert Willem patch (7ce875e5ecb8562fd44040f69bda96c999e38bbc) >>> >>> Is it really valid to reach ip_recv_err with an ipv6 socket? >> >> I guess the issue is that setsockopt IPV6_ADDRFORM is not an >> atomic operation, so that the socket is neither fully ipv4 nor fully >> ipv6 by the time it reaches ip_recv_error. >> >> sk->sk_socket->ops = &inet_dgram_ops; >> < HERE > >> sk->sk_family = PF_INET; >> >> Even calling inet_recv_error to demux would not necessarily help. >> >> Safest would be to look up by skb->protocol, similar to what >> ipv6_recv_error does to handle v4-mapped-v6. >> >> Or to make that function safe with PF_INET and swap the order >> of the above two operations. >> >> All sound needlessly complicated for this rare socket option, but >> I don't have a better idea yet. Dropping on the floor is not nice, >> either. > > Ensuring that ip_recv_error correctly handles packets from either > socket and removing the warning should indeed be good. > > It is robust against v4-mapped packets from an AF_INET6 socket, > but see caveat on reconnect below. > > The code between ipv6_recv_error for v4-mapped addresses and > ip_recv_error is essentially the same, the main difference being > whether to return network headers as sockaddr_in with SOL_IP > or sockaddr_in6 with SOL_IPV6. > > There are very few other locations in the stack that explicitly test > sk_family in this way and thus would be vulnerable to races with > IPV6_ADDRFORM. > > I'm not sure whether it is possible for a udpv6 socket to queue a > real ipv6 packet on the error queue, disconnect, connect to an > ipv4 address, call IPV6_ADDRFORM and then call ip_recv_error > on a true ipv6 packet. That would return buggy data, e.g., in > msg_name. In do_ipv6_setsockopt IPV6_ADDRFORM we can test that the error queue is empty, and then take its lock for the duration of the operation.