Received: by 2002:a05:6a10:9848:0:0:0:0 with SMTP id x8csp398176pxf; Wed, 24 Mar 2021 07:30:31 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzF9ks+wstXVIIWEcJmgTuxQdO5F9qsfcMgLFBe1OBNpsfdVw5tVOLYqi1P0uxLNsLoepMt X-Received: by 2002:a17:906:1956:: with SMTP id b22mr4189493eje.114.1616596231316; Wed, 24 Mar 2021 07:30:31 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1616596231; cv=none; d=google.com; s=arc-20160816; b=g2QNkA+mZejgDzC1WyHDbhHlZ88SGsPfzH/B+5c2fIlQccgbkXghwSsn0I1GutnGCx RFTm6qPEFnlyrO9I22Km7j1MXk1PNxKqGKE1aE+cpMmnS+9CmKt7k6kCgJHj5PkBQoqq 1rJE7KJCr77E6/L6LDp9raa1GHimLQGyH2UlNKJ94zw3BJhW4pgMeEyYrEW0Dm6wuUCr WEoNrdtfA/7AfE8UGxt8byAyR+H0pUYFcMHv0fLQUKsyaBG49linweC634G3joV4fw1E /hAcKcdC9jBkyfxwJ4KBF5QP8HquC+IQKQHtybSMpjGy8G6r0R8BHQdrhvmr61J+E36N KfKQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=M8WQ0NMv29xWHt4+xzGXq0E7fFCFFqZV8N2m2N/5e3k=; b=j6oxmeluxQfPXBBa+MsHDsaim0qDpB0tpOA1ne03UVoc/hZrzVaXZQ+wzHe0XdkKxX c0G0OMd9ZqN3/jdBnB0Y3+/wvWGPO5HMbM3oYUG8R+00H+rbozhskGv65AiK88ygG85y pEFCksK/0jGZ9DC2KX5UWcYIdvZnA9gxo/wBsQI4NMIsxxAFUkrVLyUHtdIzPLxMKrbQ wlw0sgU+iu0Y9i6mDPg6J9o8wX6lhgZFsf2u+A8HOo5Dn7myn9o17HvTmbZJzkBZXLh8 ROX2uufkuR0vUG8q0AMMQPX4pAkTTGYc34SJAU1v4aToAkT4EBmNEYyRMM0hZsd3Prra W8fQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=cplZGGi1; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id l12si2025209edi.290.2021.03.24.07.30.06; Wed, 24 Mar 2021 07:30:31 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=cplZGGi1; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236139AbhCXO3G (ORCPT + 99 others); Wed, 24 Mar 2021 10:29:06 -0400 Received: from mail.kernel.org ([198.145.29.99]:35728 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S236115AbhCXO2r (ORCPT ); Wed, 24 Mar 2021 10:28:47 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 7755361963; Wed, 24 Mar 2021 14:28:46 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1616596126; bh=qFllmIRbdCUQn/B4kQjIVSKhp52Kl0isMHDaEUkABLY=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=cplZGGi1ra2GAKUoROJa/SNuLgZ5comITDHOXLsNYHLiYokO9V4V6aPv7WjAdCpGf XI2SVZg9Zf7/4JoUzW/VruCV+o8Upd5EASOmGeby4z2ve8l8ju6gnI3CBZzZXyg3cv pSjbI6Uye73ZMqXSCxXGrbMqMZPCUoQavaYTGvHaQtkn6VG/7hWhVTOQNAlwAYdTha ytEEEDMEeZNdZv6G1WCADx5hRICTuDu1fiknCXIVZ8TDUNpKEIMmp/cmCBCsrAIZSh crrVgSTd5fSYprMPTSQaM4YgFdvbcYjM9MXFHsQgciWGR9GlRTOYuuKwcLCI5Efi9c YT2SwMTnNw57g== Date: Wed, 24 Mar 2021 10:28:45 -0400 From: Sasha Levin To: Greg Kroah-Hartman Cc: Florian Westphal , Naresh Kamboju , "David S. Miller" , open list , linux-stable , Mat Martineau , Anders Roxell , lkft-triage@lists.linaro.org, Netdev , Arnd Bergmann Subject: Re: [PATCH 5.10 104/157] mptcp: put subflow sock on connect error Message-ID: References: <20210322121933.746237845@linuxfoundation.org> <20210322121937.071435221@linuxfoundation.org> <20210324090412.GB27244@breakpoint.cc> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii; format=flowed Content-Disposition: inline In-Reply-To: Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Mar 24, 2021 at 10:22:29AM +0100, Greg Kroah-Hartman wrote: >On Wed, Mar 24, 2021 at 10:04:12AM +0100, Florian Westphal wrote: >> Naresh Kamboju wrote: >> > On Mon, 22 Mar 2021 at 18:15, Greg Kroah-Hartman >> > wrote: >> > > >> > > From: Florian Westphal >> > > >> > > [ Upstream commit f07157792c633b528de5fc1dbe2e4ea54f8e09d4 ] >> > > >> > > mptcp_add_pending_subflow() performs a sock_hold() on the subflow, >> > > then adds the subflow to the join list. >> > > >> > > Without a sock_put the subflow sk won't be freed in case connect() fails. >> > > >> > > unreferenced object 0xffff88810c03b100 (size 3000): >> > > [..] >> > > sk_prot_alloc.isra.0+0x2f/0x110 >> > > sk_alloc+0x5d/0xc20 >> > > inet6_create+0x2b7/0xd30 >> > > __sock_create+0x17f/0x410 >> > > mptcp_subflow_create_socket+0xff/0x9c0 >> > > __mptcp_subflow_connect+0x1da/0xaf0 >> > > mptcp_pm_nl_work+0x6e0/0x1120 >> > > mptcp_worker+0x508/0x9a0 >> > > >> > > Fixes: 5b950ff4331ddda ("mptcp: link MPC subflow into msk only after accept") >> >> I don't see this change in 5.10, so why is this fix queued up? >> >> > I have reported the following warnings and kernel crash on 5.10.26-rc2 [1] >> > The bisect reported that issue pointing out to this commit. >> > >> > commit 460916534896e6d4f80a37152e0948db33376873 >> > mptcp: put subflow sock on connect error >> > >> > This problem is specific to 5.10.26-rc2. >> > >> > Warning: >> > -------- >> > [ 1040.114695] refcount_t: addition on 0; use-after-free. >> > [ 1040.119857] WARNING: CPU: 3 PID: 31925 at >> > /usr/src/kernel/lib/refcount.c:25 refcount_warn_saturate+0xd7/0x100 >> > [ 1040.129769] Modules linked in: act_mirred cls_u32 sch_netem sch_etf >> > ip6table_nat xt_nat iptable_nat nf_nat ip6table_filter xt_conntrack >> > nf_conntrack nf_defrag_ipv4 libcrc32c ip6_tables nf_defrag_ipv6 sch_fq >> > iptable_filter xt_mark ip_tables cls_bpf sch_ingress algif_hash >> > x86_pkg_temp_thermal fuse [last unloaded: test_blackhole_dev] >> > [ 1040.159030] CPU: 3 PID: 31925 Comm: mptcp_connect Tainted: G >> > W K 5.10.26-rc2 #1 >> > [ 1040.167459] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS >> > 2.2 05/23/2018 >> > [ 1040.174851] RIP: 0010:refcount_warn_saturate+0xd7/0x100 >> > >> > And >> > >> > Kernel Panic: >> > ------------- >> > [ 1069.557485] BUG: kernel NULL pointer dereference, address: 0000000000000010 >> > [ 1069.564446] #PF: supervisor read access in kernel mode >> > [ 1069.569583] #PF: error_code(0x0000) - not-present page >> > [ 1069.574714] PGD 0 P4D 0 >> > [ 1069.577246] Oops: 0000 [#1] SMP PTI >> > > index 16adba172fb9..591546d0953f 100644 >> > > --- a/net/mptcp/subflow.c >> > > +++ b/net/mptcp/subflow.c >> > > @@ -1133,6 +1133,7 @@ int __mptcp_subflow_connect(struct sock *sk, const struct mptcp_addr_info *loc, >> > > spin_lock_bh(&msk->join_list_lock); >> > > list_add_tail(&subflow->node, &msk->join_list); >> > > spin_unlock_bh(&msk->join_list_lock); >> > > + sock_put(mptcp_subflow_tcp_sock(subflow)); >> > > >> > > return err; >> >> Crash is not surprising, the backport puts the socket in the 'success' path >> (list_add_tail). >> >> I don't see why this is in -stable, the faulty commit is not there? >> >> The upstream patch is: >> list_del(&subflow->node); >> spin_unlock_bh(&msk->join_list_lock); >> + sock_put(mptcp_subflow_tcp_sock(subflow)); >> >> [ Note the 'list_del', this is in the error unwind path ] > >Odd, I think something went wrong with Sasha's scripts. I brought in the commit it depends on as a dependency for something else, but ended up throwing it away, forgetting about this commit. Sorry :( -- Thanks, Sasha