Received: by 2002:a05:6a10:9848:0:0:0:0 with SMTP id x8csp232443pxf; Wed, 24 Mar 2021 03:56:58 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyojiiqiWgp95rBoucGKw4z8i4QXnBhUTe7rYVsqR8Y/rTy4GRCIh4HaxuL+mrQHw0lKVnv X-Received: by 2002:a05:6402:4405:: with SMTP id y5mr2844282eda.32.1616583418743; Wed, 24 Mar 2021 03:56:58 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1616583418; cv=none; d=google.com; s=arc-20160816; b=euK5FiBH+t0SGUtICwIvSLGrAmhoemv6rLEMkRGAFmwqmEF5LVG3WnZ02Oc/C/NM1r f4yAMwa76m3fkzfC9gLQE8X3XxErNz75ZsoDJgvgXv5cD/0tafjhKirGQjVTwYzxkhOA uOSqz7YVR7gE8d4iHXBTl8HJ6fGuRVASYa1Qm8Jc2oKn/N9AKM9F63KzRzGupGbDHNDw MbqCd2TLIMEYKnXt5g+SsJI10fcWw3ogkLNUiKKqgEpFfmLymxBGYyOV6scaRay/z/kX 4wIq03KaCJLGLNylWcClxia9Bz+HEXGWGmms5Q5JFO1tiujqjsLoMXLWbdRqqa3/rXbw C/Dw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:user-agent:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date; bh=+r3QeB1ZUPFq/HO/YQqzrtPxdVF79pHPopwYJJB3GSo=; b=0mkiKF0OHPYarCA2Q0D0XNT4ew8XJ3JGe7ycmxmg0gfcqrzSRQ00AoyaFDMvfUuNKO PXPUaH5WSo7KqQGNiv61OSv7cskKuIcxSBDseDuNLczWau3ixieDEqm4IfPDzETdDFFt MAimM9usgGYvDlWzfNvN9cTwsGBbjHqHzh/xAdrS5JWHxhI8VqaBPXO7uRo5kPdM9p1U ibPUqVefqxLY5t5eC9Ks5BwzAjIJ6+3qyQSlIAzhGyeNbVlWBS4q1FH/lP0NFzuXFeO+ oT598OlgLq9CuBfsSBkp1INqmfUHJ2BPGjlHJONApyKuRMoN3+drZqXcsYq5gfU/4BJh WQuw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id h7si1376111edt.553.2021.03.24.03.56.36; Wed, 24 Mar 2021 03:56:58 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234098AbhCXJEz (ORCPT + 99 others); Wed, 24 Mar 2021 05:04:55 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:35606 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231882AbhCXJEX (ORCPT ); Wed, 24 Mar 2021 05:04:23 -0400 Received: from Chamillionaire.breakpoint.cc (Chamillionaire.breakpoint.cc [IPv6:2a0a:51c0:0:12e:520::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 576B9C061763; Wed, 24 Mar 2021 02:04:23 -0700 (PDT) Received: from fw by Chamillionaire.breakpoint.cc with local (Exim 4.92) (envelope-from ) id 1lOzQy-0002RB-O8; Wed, 24 Mar 2021 10:04:12 +0100 Date: Wed, 24 Mar 2021 10:04:12 +0100 From: Florian Westphal To: Naresh Kamboju Cc: Greg Kroah-Hartman , Florian Westphal , "David S. Miller" , open list , linux-stable , Mat Martineau , Sasha Levin , Anders Roxell , lkft-triage@lists.linaro.org, Netdev , Arnd Bergmann Subject: Re: [PATCH 5.10 104/157] mptcp: put subflow sock on connect error Message-ID: <20210324090412.GB27244@breakpoint.cc> References: <20210322121933.746237845@linuxfoundation.org> <20210322121937.071435221@linuxfoundation.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.10.1 (2018-07-13) Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Naresh Kamboju wrote: > On Mon, 22 Mar 2021 at 18:15, Greg Kroah-Hartman > wrote: > > > > From: Florian Westphal > > > > [ Upstream commit f07157792c633b528de5fc1dbe2e4ea54f8e09d4 ] > > > > mptcp_add_pending_subflow() performs a sock_hold() on the subflow, > > then adds the subflow to the join list. > > > > Without a sock_put the subflow sk won't be freed in case connect() fails. > > > > unreferenced object 0xffff88810c03b100 (size 3000): > > [..] > > sk_prot_alloc.isra.0+0x2f/0x110 > > sk_alloc+0x5d/0xc20 > > inet6_create+0x2b7/0xd30 > > __sock_create+0x17f/0x410 > > mptcp_subflow_create_socket+0xff/0x9c0 > > __mptcp_subflow_connect+0x1da/0xaf0 > > mptcp_pm_nl_work+0x6e0/0x1120 > > mptcp_worker+0x508/0x9a0 > > > > Fixes: 5b950ff4331ddda ("mptcp: link MPC subflow into msk only after accept") I don't see this change in 5.10, so why is this fix queued up? > I have reported the following warnings and kernel crash on 5.10.26-rc2 [1] > The bisect reported that issue pointing out to this commit. > > commit 460916534896e6d4f80a37152e0948db33376873 > mptcp: put subflow sock on connect error > > This problem is specific to 5.10.26-rc2. > > Warning: > -------- > [ 1040.114695] refcount_t: addition on 0; use-after-free. > [ 1040.119857] WARNING: CPU: 3 PID: 31925 at > /usr/src/kernel/lib/refcount.c:25 refcount_warn_saturate+0xd7/0x100 > [ 1040.129769] Modules linked in: act_mirred cls_u32 sch_netem sch_etf > ip6table_nat xt_nat iptable_nat nf_nat ip6table_filter xt_conntrack > nf_conntrack nf_defrag_ipv4 libcrc32c ip6_tables nf_defrag_ipv6 sch_fq > iptable_filter xt_mark ip_tables cls_bpf sch_ingress algif_hash > x86_pkg_temp_thermal fuse [last unloaded: test_blackhole_dev] > [ 1040.159030] CPU: 3 PID: 31925 Comm: mptcp_connect Tainted: G > W K 5.10.26-rc2 #1 > [ 1040.167459] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS > 2.2 05/23/2018 > [ 1040.174851] RIP: 0010:refcount_warn_saturate+0xd7/0x100 > > And > > Kernel Panic: > ------------- > [ 1069.557485] BUG: kernel NULL pointer dereference, address: 0000000000000010 > [ 1069.564446] #PF: supervisor read access in kernel mode > [ 1069.569583] #PF: error_code(0x0000) - not-present page > [ 1069.574714] PGD 0 P4D 0 > [ 1069.577246] Oops: 0000 [#1] SMP PTI > > index 16adba172fb9..591546d0953f 100644 > > --- a/net/mptcp/subflow.c > > +++ b/net/mptcp/subflow.c > > @@ -1133,6 +1133,7 @@ int __mptcp_subflow_connect(struct sock *sk, const struct mptcp_addr_info *loc, > > spin_lock_bh(&msk->join_list_lock); > > list_add_tail(&subflow->node, &msk->join_list); > > spin_unlock_bh(&msk->join_list_lock); > > + sock_put(mptcp_subflow_tcp_sock(subflow)); > > > > return err; Crash is not surprising, the backport puts the socket in the 'success' path (list_add_tail). I don't see why this is in -stable, the faulty commit is not there? The upstream patch is: list_del(&subflow->node); spin_unlock_bh(&msk->join_list_lock); + sock_put(mptcp_subflow_tcp_sock(subflow)); [ Note the 'list_del', this is in the error unwind path ]