Received: by 2002:ac0:bc90:0:0:0:0:0 with SMTP id a16csp272231img; Mon, 18 Mar 2019 02:48:30 -0700 (PDT) X-Google-Smtp-Source: APXvYqzBqKpwpmENejX4Xwb2Z7Uhm6j0udBxtz4RE4RX0uKxSvVFxs8q9nVt4p3SOANN7+U6Gj/j X-Received: by 2002:a63:5541:: with SMTP id f1mr16941067pgm.38.1552902510751; Mon, 18 Mar 2019 02:48:30 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1552902510; cv=none; d=google.com; s=arc-20160816; b=XkKEEN2+pbvzivskkdqIoP9F4oEjMMNwZrGeXBu7RkhFvBm+pQ0uPmQppEfT7+nYPj g5v1ZS84J96cNZeQ4xLIbWcdnia/r0hQ4enSLPLfqULBodVguGS8esy5qHUzsm/kG3aH cq6LeE1/WJp+GHfM45jxqda/4QagxplxWIiE+PJPbG0gPpEdKonJNCkMZyoNMc0jygDd VSTslkLipU5tw2o357kcNZ1bIJBt87QBpyNIVK1WdL45iZwnpVWPzdmQaq9sehZquxVm 4DHpL3JHRUNRjyKqs+48rrzvaSFQ/XJynkc0zNmisFfAEYrIUk0IHTPF/S4MQEtn/Xbg sjCw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=Nl1P1NDL0PYHwvigoVL95ufW/dSmFkmMbsSdcZMNKUo=; b=QuWr59GtKOsTAkBwqfIiahHi9OUA0dmvELeGLqA1w3BOjVCG6XeQgB6VIAjQ9MEUmo zIJDpOPpIDi0bStWCwYyBVCYVQRnGms1bQRhWGSInKZq48JxReVp20CRl0YoVEgSrACv ghYAP+eYZBSXIaSDytA7x/+wEtSamEVh5goWERU6TXSuX+bPy7aUHBIm5vV48/66zJMX +ky0b/YBA0vBiFy9Dv66SO7zG/mIncxgl9M/bXhfPYQrqiNQS8iGdlvj829B2VZ02zwi 7tYQNs4YMTvpdIu15KGwfhR7C7ywBp0QcIkQ/KU0dxWqq+O1CnVTF9ngP5prFOQgeWSS EXfw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=1E+jD1xy; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id a89si9377412pla.362.2019.03.18.02.48.16; Mon, 18 Mar 2019 02:48:30 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=1E+jD1xy; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728204AbfCRJ3R (ORCPT + 99 others); Mon, 18 Mar 2019 05:29:17 -0400 Received: from mail.kernel.org ([198.145.29.99]:35524 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727481AbfCRJ3Q (ORCPT ); Mon, 18 Mar 2019 05:29:16 -0400 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 9636F2087C; Mon, 18 Mar 2019 09:29:14 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1552901355; bh=rDUyoVocV4E18p02YFjP2LC17tiWievnFdhZuEQ8Cbc=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=1E+jD1xya4+Uwq8qkEUMNSH4d/U9aBBx1/UxE90R0QrDDT1UXO7mpzZZmzgrVZ4R3 JClOvJuse9+Mq0u6r9XO+KlPxbv21S/AR63bXnInGOZGOQ7QX4Zu4QEKo4NdIciMHt +ToNjuaoHGlyjNFxPIm5LjPPwD8g+KnReNmRgL6Q= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Guillaume Nault , Eric Dumazet , "David S. Miller" Subject: [PATCH 4.20 20/52] tcp: handle inet_csk_reqsk_queue_add() failures Date: Mon, 18 Mar 2019 10:25:07 +0100 Message-Id: <20190318083845.841997615@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190318083843.398913295@linuxfoundation.org> References: <20190318083843.398913295@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.20-stable review patch. If anyone has any objections, please let me know. ------------------ From: Guillaume Nault [ Upstream commit 9d3e1368bb45893a75a5dfb7cd21fdebfa6b47af ] Commit 7716682cc58e ("tcp/dccp: fix another race at listener dismantle") let inet_csk_reqsk_queue_add() fail, and adjusted {tcp,dccp}_check_req() accordingly. However, TFO and syncookies weren't modified, thus leaking allocated resources on error. Contrary to tcp_check_req(), in both syncookies and TFO cases, we need to drop the request socket. Also, since the child socket is created with inet_csk_clone_lock(), we have to unlock it and drop an extra reference (->sk_refcount is initially set to 2 and inet_csk_reqsk_queue_add() drops only one ref). For TFO, we also need to revert the work done by tcp_try_fastopen() (with reqsk_fastopen_remove()). Fixes: 7716682cc58e ("tcp/dccp: fix another race at listener dismantle") Signed-off-by: Guillaume Nault Signed-off-by: Eric Dumazet Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- net/ipv4/syncookies.c | 7 ++++++- net/ipv4/tcp_input.c | 8 +++++++- 2 files changed, 13 insertions(+), 2 deletions(-) --- a/net/ipv4/syncookies.c +++ b/net/ipv4/syncookies.c @@ -216,7 +216,12 @@ struct sock *tcp_get_cookie_sock(struct refcount_set(&req->rsk_refcnt, 1); tcp_sk(child)->tsoffset = tsoff; sock_rps_save_rxhash(child, skb); - inet_csk_reqsk_queue_add(sk, req, child); + if (!inet_csk_reqsk_queue_add(sk, req, child)) { + bh_unlock_sock(child); + sock_put(child); + child = NULL; + reqsk_put(req); + } } else { reqsk_free(req); } --- a/net/ipv4/tcp_input.c +++ b/net/ipv4/tcp_input.c @@ -6511,7 +6511,13 @@ int tcp_conn_request(struct request_sock af_ops->send_synack(fastopen_sk, dst, &fl, req, &foc, TCP_SYNACK_FASTOPEN); /* Add the child socket directly into the accept queue */ - inet_csk_reqsk_queue_add(sk, req, fastopen_sk); + if (!inet_csk_reqsk_queue_add(sk, req, fastopen_sk)) { + reqsk_fastopen_remove(fastopen_sk, req, false); + bh_unlock_sock(fastopen_sk); + sock_put(fastopen_sk); + reqsk_put(req); + goto drop; + } sk->sk_data_ready(sk); bh_unlock_sock(fastopen_sk); sock_put(fastopen_sk);