Received: by 2002:a25:8b12:0:0:0:0:0 with SMTP id i18csp4210441ybl; Tue, 20 Aug 2019 08:31:29 -0700 (PDT) X-Google-Smtp-Source: APXvYqw8ZOaH4IIURweVQWHZSalTBZsPapQFeKd7cCc6pTnEc6JB6ff6YF/R4exjKAO6REUfpSmp X-Received: by 2002:a17:90a:9ea:: with SMTP id 97mr593566pjo.68.1566315088954; Tue, 20 Aug 2019 08:31:28 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1566315088; cv=none; d=google.com; s=arc-20160816; b=udapBBr5/WANh8HsQGfF+dD2Sa6m+xls+muQgbOBwYTWeJuXF3MR+leGu63cVZZ7Yn MGD81rFJQZ3JPThskb7rQzKb/dfqH+kgdWOtuGKEvss1tjDfuoGV8+BRBAFt/Xe8vGJR xDTowxh+Z3WPiTitMYunKz4HQl1LQ9Qe+rcevum9LUlf6mvzJP09dLGVbyKCz724mLys YH7jyHEfMKvL1vp/pabM2K4z/TUB4r5S8N0KcJE2bbFDLFmjsnWeogj6W5NfLnva+UxB 6VOAvuuMEXBJ7E63Chu3ybimVDUMsFt2XD7UMSFMW6RtdR0ds78uU8uzGg5bSWF7oeZP FHcg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:cc:to:subject :message-id:date:from:in-reply-to:references:mime-version :dkim-signature; bh=bFnaNlCJbS1STtybbkD8D5UctrEgyv/6R1gbjeYsEmo=; b=ksSKHXbxWCSIaOgB/aaDhqc7H6KA5WK89pEz5kpIgIzNkAYjRceabGj+rdzHYpKtss 3dPXxzZhnMu+dHDjVAjB+ZngZo6RLcNDUG2PWffqPqAyC3aY7mqlQ5HmRT58Z/ZvOtL1 b7eZuOdh42nItTy1e+4StJ3T2tjPrRv9AbPX1hQDYHXlXkB5MyM79EvsW/xaXbDkkaYX kkbznOoYAawX42HJxaRFP9OZVwgfXXPvKsfMkakgHeTwbAUCYOlFNG8NHTn7iCYvlJk+ on/lf19jcs3ZiAqmBNyaK964IQmDG1aOOJXX/PChwNpm+uS2oOAvfCaYmkZUFGT7gKlY GOJQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=lKyaeD4z; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id c9si13587783pfj.128.2019.08.20.08.31.13; Tue, 20 Aug 2019 08:31:28 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=lKyaeD4z; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730541AbfHTP3Y (ORCPT + 99 others); Tue, 20 Aug 2019 11:29:24 -0400 Received: from mail-qt1-f195.google.com ([209.85.160.195]:37607 "EHLO mail-qt1-f195.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730374AbfHTP3Y (ORCPT ); Tue, 20 Aug 2019 11:29:24 -0400 Received: by mail-qt1-f195.google.com with SMTP id y26so6487731qto.4; Tue, 20 Aug 2019 08:29:23 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc:content-transfer-encoding; bh=bFnaNlCJbS1STtybbkD8D5UctrEgyv/6R1gbjeYsEmo=; b=lKyaeD4zifwkuNBxNy7hIW9nSPtSHvRp8MUFQzkK9+wDVoa+fxQQQblsdikFfPkyNh aQSoHPnBLad4G4XcrQkYOvyUIENefvTGwBbXVUrCkrRvBs+LxeARqGdeaTYLxVJq/RNp 9SjgLSql46RzPzDbEIYaMDPUvGxnXIjFbph4QT7kya4iiWHpyvPkJYNNBWx8fRsg/t3J +Yy7oddRYLAdzAU0i3/oSfrL/TH7awJaK41Y5lMPVPDZBABBGyGt4QEZQVMuZqBvQiMa uBaxD9j9rkr7yXRs05fhwLcAiP7HY/weBu+JcCgvHeIC6AXOQoWkIMyeHWR7kY5aDyVQ pLLA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc:content-transfer-encoding; bh=bFnaNlCJbS1STtybbkD8D5UctrEgyv/6R1gbjeYsEmo=; b=FZs1fLybnEr2YMB4hkVEeS7qnsxhjpUsg+kHGvikh6tqbiTT3oSWYWA8aD04j+fxJ4 7Mye3gfPN76MRsZ5k2RX/S/bk2DtBshEGAdSPzlkK+Jpo8RsCzFrMSlkQQRLSnABb3xr 568wmubQB3318kaT3Gxs6EsmgGXO7AMkaNX9AU8+fCIUe9X4f8d5glHjC/CqEv4QfEae 2+1AX2ezPAdBXs2P8CT/WVFXDXffiSuBUifu8YMZTSXsIhOBRhNSCKNAPe3GxP9lBy64 YjroF8z+zKf6iU24wHGx2RQafJEbM+jgPQVaEzanjw7OrQG9ulnnwzgTcXjnVC0SNqKY iBSQ== X-Gm-Message-State: APjAAAXuzTKg9d+y9Xt8vUiYaLGsvfWBRpN2aUnlWc72SGgdVR0ubcuQ yNDWPFojH3Z2wa7NJCttHdGeMxNbXg+xGZ/QyDE= X-Received: by 2002:ac8:5247:: with SMTP id y7mr27553986qtn.107.1566314963078; Tue, 20 Aug 2019 08:29:23 -0700 (PDT) MIME-Version: 1.0 References: <0000000000009167320590823a8c@google.com> <20190820100405.25564-1-bjorn.topel@gmail.com> In-Reply-To: From: =?UTF-8?B?QmrDtnJuIFTDtnBlbA==?= Date: Tue, 20 Aug 2019 17:29:11 +0200 Message-ID: Subject: Re: [PATCH bpf-next] xsk: proper socket state check in xsk_poll To: Daniel Borkmann Cc: syzbot+c82697e3043781e08802@syzkaller.appspotmail.com, Alexei Starovoitov , Netdev , =?UTF-8?B?QmrDtnJuIFTDtnBlbA==?= , bpf , David Miller , Jesper Dangaard Brouer , Jakub Kicinski , John Fastabend , Jonathan Lemon , Martin KaFai Lau , LKML , "Karlsson, Magnus" , Song Liu , syzkaller-bugs@googlegroups.com, Xdp , Yonghong Song , hdanton@sina.com Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, 20 Aug 2019 at 16:30, Daniel Borkmann wrote: > > On 8/20/19 12:04 PM, Bj=C3=B6rn T=C3=B6pel wrote: > > From: Bj=C3=B6rn T=C3=B6pel > > > > The poll() implementation for AF_XDP sockets did not perform the > > proper state checks, prior accessing the socket umem. This patch fixes > > that by performing a xsk_is_bound() check. > > > > Suggested-by: Hillf Danton > > Reported-by: syzbot+c82697e3043781e08802@syzkaller.appspotmail.com > > Fixes: 77cd0d7b3f25 ("xsk: add support for need_wakeup flag in AF_XDP r= ings") > > Signed-off-by: Bj=C3=B6rn T=C3=B6pel > > --- > > net/xdp/xsk.c | 14 ++++++++++++-- > > 1 file changed, 12 insertions(+), 2 deletions(-) > > > > diff --git a/net/xdp/xsk.c b/net/xdp/xsk.c > > index ee4428a892fa..08bed5e92af4 100644 > > --- a/net/xdp/xsk.c > > +++ b/net/xdp/xsk.c > > @@ -356,13 +356,20 @@ static int xsk_generic_xmit(struct sock *sk, stru= ct msghdr *m, > > return err; > > } > > > > +static bool xsk_is_bound(struct xdp_sock *xs) > > +{ > > + struct net_device *dev =3D READ_ONCE(xs->dev); > > + > > + return dev && xs->state =3D=3D XSK_BOUND; > > +} > > + > > static int xsk_sendmsg(struct socket *sock, struct msghdr *m, size_t = total_len) > > { > > bool need_wait =3D !(m->msg_flags & MSG_DONTWAIT); > > struct sock *sk =3D sock->sk; > > struct xdp_sock *xs =3D xdp_sk(sk); > > > > - if (unlikely(!xs->dev)) > > + if (unlikely(!xsk_is_bound(xs))) > > return -ENXIO; > > if (unlikely(!(xs->dev->flags & IFF_UP))) > > return -ENETDOWN; > > @@ -383,6 +390,9 @@ static unsigned int xsk_poll(struct file *file, str= uct socket *sock, > > struct net_device *dev =3D xs->dev; > > struct xdp_umem *umem =3D xs->umem; > > > > + if (unlikely(!xsk_is_bound(xs))) > > + return mask; > > + > > if (umem->need_wakeup) > > dev->netdev_ops->ndo_xsk_wakeup(dev, xs->queue_id, > > umem->need_wakeup); > > @@ -417,7 +427,7 @@ static void xsk_unbind_dev(struct xdp_sock *xs) > > { > > struct net_device *dev =3D xs->dev; > > > > - if (!dev || xs->state !=3D XSK_BOUND) > > + if (!xsk_is_bound(xs)) > > return; > > I think I'm a bit confused by your READ_ONCE() usage. ;-/ I can see why y= ou're > using it in xsk_is_bound() above, but then at the same time all the other= callbacks > like xsk_poll() or xsk_unbind_dev() above have a struct net_device *dev = =3D xs->dev > right before the test. Could you elaborate? > Yes, now I'm confused as well! Digging deeper... I believe there are a couple of places in xsk.c that do not have READ_ONCE/WRITE_ONCE-correctness. Various xdp_sock members are read lock-less outside the control plane mutex (mutex member of struct xdp_sock). This needs some re-work. I'll look into using the newly introduced state member (with corresponding read/write barriers) for this. I'll cook some patch(es) that address this, but first it sounds like I need to reread [1] two, or three times. At least. ;-) Thanks, Bj=C3=B6rn [1] https://lwn.net/Articles/793253/ > Thanks, > Daniel