Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp2027051imu; Fri, 14 Dec 2018 04:44:03 -0800 (PST) X-Google-Smtp-Source: AFSGD/V0yMXKseWHWiVi3Zjr0WHUtd4yLxWIEju19X2CZdAtHUkLSaW/YqkAm10+ua5YSmzgzRqg X-Received: by 2002:a62:99dd:: with SMTP id t90mr2676837pfk.179.1544791443567; Fri, 14 Dec 2018 04:44:03 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1544791443; cv=none; d=google.com; s=arc-20160816; b=a+qZz08IunBanlUe7JopiP0MGu70YA0YAyN4Ve5MIeKcE8usexOzPiHvrvwmXdV2j2 /9MaVWBtv1+hoqvw/qLtvKcRMyLlaREAqvUrCD42eKX7yspLOXRv5v3m6cvS/0m/psWq KN9HbJd8tZDYu08RGczhpUKHlEKyDvlupde38bv6UpATICWyxU4v0e4SFvdTrdP6RihS eLmobvLQmZNuee5Q2AeqIOY0vDu/JdJTDnTPunH8VQ14XNfHiQFHe/jmH30TESMr4+lM 1DsJLOzSbIGQaOfHmCbRkjJ5wN+CTQo6WcsQ3sb8WIBwCXTshOxR00J1aWHya8q0zXvd 0GEQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=u+nxaU/vObQKZ2JYZjDTZFYTew1WXg17h24gpdADAvM=; b=rGko9TMhtj00V5ligM5BMhXfuSk8MjckzTV8wOiyJu9bncnnC8vlNeYr3IFZtI2LTh nLWRJTzilXyDJm7VDQUawoDl5QQ5UpnIz6yZZd3uu2+V/B1/ol+5oR5I1NtZ5/nOVSeA LIsI3+wDb6HBArduD18e6TUpQUGi9wxClTSwRUPOMw8XNl3EeehNAKBS6hQQMAb83Plr 526VJRBQrpixXZGS4QlIFK4BfngTbbxDFSEdpjRTaPg7ss8aeoQ1qidOR37jsNBWMLjO /rVpkmg0v38o32y4+X7a3Qk6l47pg75zQSkDn8BpdAKgiX4fk5nvKFpjo9eWzX/Xc4ah KDow== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=MWHHpHpy; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id n12si4194919pgb.563.2018.12.14.04.43.48; Fri, 14 Dec 2018 04:44:03 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=MWHHpHpy; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730076AbeLNMCe (ORCPT + 99 others); Fri, 14 Dec 2018 07:02:34 -0500 Received: from mail.kernel.org ([198.145.29.99]:45482 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730065AbeLNMCb (ORCPT ); Fri, 14 Dec 2018 07:02:31 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 663402146F; Fri, 14 Dec 2018 12:02:30 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1544788950; bh=NfFg36CY4k29j8xsgFfx0T6bJ+Oq/UU7Dm3dAYUgrRs=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=MWHHpHpyqBAwJJDOJd7naozMsmU1TM79pPRnulGKPwfFWDz3Ol0pMJ/pvqDTyhEhq GG9OymRLrB8sNWcDjcnXzf4Gt9NgSzuLeUoPtKbPf1vgnHCOOvNNkVEv442rOA2uEG WaHrJwUKP5T7P3iu2FZAHT3hQD1f18tSqKQDLgLc= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Taehee Yoo , Pablo Neira Ayuso , Sasha Levin Subject: [PATCH 4.19 036/142] netfilter: nf_conncount: use spin_lock_bh instead of spin_lock Date: Fri, 14 Dec 2018 12:58:41 +0100 Message-Id: <20181214115748.492248333@linuxfoundation.org> X-Mailer: git-send-email 2.20.0 In-Reply-To: <20181214115747.053633987@linuxfoundation.org> References: <20181214115747.053633987@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.19-stable review patch. If anyone has any objections, please let me know. ------------------ [ Upstream commit fd3e71a9f71e232181a225301a75936373636ccc ] conn_free() holds lock with spin_lock() and it is called by both nf_conncount_lookup() and nf_conncount_gc_list(). nf_conncount_lookup() is called from bottom-half context and nf_conncount_gc_list() from process context. So that spin_lock() call is not safe. Hence conn_free() should use spin_lock_bh() instead of spin_lock(). test commands: %nft add table ip filter %nft add chain ip filter input { type filter hook input priority 0\; } %nft add rule filter input meter test { ip saddr ct count over 2 } \ counter splat looks like: [ 461.996507] ================================ [ 461.998999] WARNING: inconsistent lock state [ 461.998999] 4.19.0-rc6+ #22 Not tainted [ 461.998999] -------------------------------- [ 461.998999] inconsistent {IN-SOFTIRQ-W} -> {SOFTIRQ-ON-W} usage. [ 461.998999] kworker/0:2/134 [HC0[0]:SC0[0]:HE1:SE1] takes: [ 461.998999] 00000000a71a559a (&(&list->list_lock)->rlock){+.?.}, at: conn_free+0x69/0x2b0 [nf_conncount] [ 461.998999] {IN-SOFTIRQ-W} state was registered at: [ 461.998999] _raw_spin_lock+0x30/0x70 [ 461.998999] nf_conncount_add+0x28a/0x520 [nf_conncount] [ 461.998999] nft_connlimit_eval+0x401/0x580 [nft_connlimit] [ 461.998999] nft_dynset_eval+0x32b/0x590 [nf_tables] [ 461.998999] nft_do_chain+0x497/0x1430 [nf_tables] [ 461.998999] nft_do_chain_ipv4+0x255/0x330 [nf_tables] [ 461.998999] nf_hook_slow+0xb1/0x160 [ ... ] [ 461.998999] other info that might help us debug this: [ 461.998999] Possible unsafe locking scenario: [ 461.998999] [ 461.998999] CPU0 [ 461.998999] ---- [ 461.998999] lock(&(&list->list_lock)->rlock); [ 461.998999] [ 461.998999] lock(&(&list->list_lock)->rlock); [ 461.998999] [ 461.998999] *** DEADLOCK *** [ 461.998999] [ ... ] Fixes: 5c789e131cbb ("netfilter: nf_conncount: Add list lock and gc worker, and RCU for init tree search") Signed-off-by: Taehee Yoo Signed-off-by: Pablo Neira Ayuso Signed-off-by: Sasha Levin --- net/netfilter/nf_conncount.c | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/net/netfilter/nf_conncount.c b/net/netfilter/nf_conncount.c index 02ca7df793f5..71b1f4f99580 100644 --- a/net/netfilter/nf_conncount.c +++ b/net/netfilter/nf_conncount.c @@ -106,15 +106,15 @@ nf_conncount_add(struct nf_conncount_list *list, conn->zone = *zone; conn->cpu = raw_smp_processor_id(); conn->jiffies32 = (u32)jiffies; - spin_lock(&list->list_lock); + spin_lock_bh(&list->list_lock); if (list->dead == true) { kmem_cache_free(conncount_conn_cachep, conn); - spin_unlock(&list->list_lock); + spin_unlock_bh(&list->list_lock); return NF_CONNCOUNT_SKIP; } list_add_tail(&conn->node, &list->head); list->count++; - spin_unlock(&list->list_lock); + spin_unlock_bh(&list->list_lock); return NF_CONNCOUNT_ADDED; } EXPORT_SYMBOL_GPL(nf_conncount_add); @@ -132,10 +132,10 @@ static bool conn_free(struct nf_conncount_list *list, { bool free_entry = false; - spin_lock(&list->list_lock); + spin_lock_bh(&list->list_lock); if (list->count == 0) { - spin_unlock(&list->list_lock); + spin_unlock_bh(&list->list_lock); return free_entry; } @@ -144,7 +144,7 @@ static bool conn_free(struct nf_conncount_list *list, if (list->count == 0) free_entry = true; - spin_unlock(&list->list_lock); + spin_unlock_bh(&list->list_lock); call_rcu(&conn->rcu_head, __conn_free); return free_entry; } -- 2.19.1