Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp2448024yba; Mon, 15 Apr 2019 11:51:00 -0700 (PDT) X-Google-Smtp-Source: APXvYqyiWER48Lre/Wm/tWXeaYPW9RdnnPNdPQWpYktOdQeIescs8hvprlfVnGtrSeJSphBVcHO7 X-Received: by 2002:a17:902:2a2b:: with SMTP id i40mr61408999plb.80.1555354260329; Mon, 15 Apr 2019 11:51:00 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1555354260; cv=none; d=google.com; s=arc-20160816; b=ZEBduLE8fjtizUltgKldXzW9+/XEEaWZ2sp3rWOtyRee2DnWqZpY2EVrSX/Wp2zkAb VWBtIaD8jIkweNx1p4AGb7Xy1f+5KfMB8BHjGLaZtImpyG3iW34NHSXUUwz93Hdsvbko 5n7jkZKTRvoJGeMpAMshwscrMPeQXx3OyeaiKpEH/Dggx6LuJyrDxeYqnbm9StzoDqQp W/8Hfec2BG7DYXCkZfSDMdOpDzkshLoRH3XIfImh+es7Rac/QfCTNp5zvvbsNMoAd0Uz XGp/E9x7Czequr1aCMCXZcbIi6LBpT0CYTkL13uz02JtUYC02ykqJmSEgmHBFtvaDV/v XBFQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=pOBef+LweUW7UPJRxtAx6vrTHBqpTPWPL+GMJsmxx7s=; b=Sfd43goEpAs3/j+TuREFkPZa4lu8Nlq9an8TWAsyldzXuG32Yn5ieFt4KkXA+GjME3 mh/v3mrF4FqtC5/hf+4jc7vuSecvG1HXxFKZ911dk8yPVO1xZAjL7WVVtmffOhvL/Ex0 ZxQJ3OAaktp4Z4YDtL42SvGf7FaSUh4xgZQEWulCT2XSBrACQPepsvzruugJlvTukESl 4Ql3b0zZOBNJbXRHKEqEirL1yt2TvRuLjbZiI+FafMaglnSccnHEkpwmMNQsrAU9ow0j tL2TIPXA4Es4FmL8EkDRPfebFK973TTyVFNHfH1Nrcg19baJf7exwircywmC/e7mfQbr +S/A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=2Vfkimnp; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e5si35743061pgb.262.2019.04.15.11.50.44; Mon, 15 Apr 2019 11:51:00 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=2Vfkimnp; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728930AbfDOStd (ORCPT + 99 others); Mon, 15 Apr 2019 14:49:33 -0400 Received: from mail.kernel.org ([198.145.29.99]:50546 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728885AbfDOSrV (ORCPT ); Mon, 15 Apr 2019 14:47:21 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id DD8D9218FC; Mon, 15 Apr 2019 18:47:19 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1555354040; bh=8AEBU1CjDY2SBoGAPDUzU2MOqm4XV/76mHK2t11SBSU=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=2VfkimnpDq8yB7O3+UrCyX4do1gkQN7InQ2fYeGssmMcr6ODJn3zlSvEScluYZbZq KOqx91Z3w5rfA1Ruystb+bVW4KeAvm6D+kfgWcpZypXFawKG80yj8/fZSWV63zGIz+ sxMskfCSpzgd+UgVwODO7HiMAtJfmqP8q5pBBS2Q= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Michal Kubecek , Jiri Slaby , "David S. Miller" Subject: [PATCH 4.9 50/76] kcm: switch order of device registration to fix a crash Date: Mon, 15 Apr 2019 20:44:14 +0200 Message-Id: <20190415183721.574700413@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190415183707.712011689@linuxfoundation.org> References: <20190415183707.712011689@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Jiri Slaby [ Upstream commit 3c446e6f96997f2a95bf0037ef463802162d2323 ] When kcm is loaded while many processes try to create a KCM socket, a crash occurs: BUG: unable to handle kernel NULL pointer dereference at 000000000000000e IP: mutex_lock+0x27/0x40 kernel/locking/mutex.c:240 PGD 8000000016ef2067 P4D 8000000016ef2067 PUD 3d6e9067 PMD 0 Oops: 0002 [#1] SMP KASAN PTI CPU: 0 PID: 7005 Comm: syz-executor.5 Not tainted 4.12.14-396-default #1 SLE15-SP1 (unreleased) RIP: 0010:mutex_lock+0x27/0x40 kernel/locking/mutex.c:240 RSP: 0018:ffff88000d487a00 EFLAGS: 00010246 RAX: 0000000000000000 RBX: 000000000000000e RCX: 1ffff100082b0719 ... CR2: 000000000000000e CR3: 000000004b1bc003 CR4: 0000000000060ef0 Call Trace: kcm_create+0x600/0xbf0 [kcm] __sock_create+0x324/0x750 net/socket.c:1272 ... This is due to race between sock_create and unfinished register_pernet_device. kcm_create tries to do "net_generic(net, kcm_net_id)". but kcm_net_id is not initialized yet. So switch the order of the two to close the race. This can be reproduced with mutiple processes doing socket(PF_KCM, ...) and one process doing module removal. Fixes: ab7ac4eb9832 ("kcm: Kernel Connection Multiplexor module") Reviewed-by: Michal Kubecek Signed-off-by: Jiri Slaby Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- net/kcm/kcmsock.c | 16 ++++++++-------- 1 file changed, 8 insertions(+), 8 deletions(-) --- a/net/kcm/kcmsock.c +++ b/net/kcm/kcmsock.c @@ -2058,14 +2058,14 @@ static int __init kcm_init(void) if (err) goto fail; - err = sock_register(&kcm_family_ops); - if (err) - goto sock_register_fail; - err = register_pernet_device(&kcm_net_ops); if (err) goto net_ops_fail; + err = sock_register(&kcm_family_ops); + if (err) + goto sock_register_fail; + err = kcm_proc_init(); if (err) goto proc_init_fail; @@ -2073,12 +2073,12 @@ static int __init kcm_init(void) return 0; proc_init_fail: - unregister_pernet_device(&kcm_net_ops); - -net_ops_fail: sock_unregister(PF_KCM); sock_register_fail: + unregister_pernet_device(&kcm_net_ops); + +net_ops_fail: proto_unregister(&kcm_proto); fail: @@ -2094,8 +2094,8 @@ fail: static void __exit kcm_exit(void) { kcm_proc_exit(); - unregister_pernet_device(&kcm_net_ops); sock_unregister(PF_KCM); + unregister_pernet_device(&kcm_net_ops); proto_unregister(&kcm_proto); destroy_workqueue(kcm_wq);