Received: by 2002:a05:6a10:f3d0:0:0:0:0 with SMTP id a16csp3759158pxv; Mon, 28 Jun 2021 12:06:06 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyeLp7aUC0x+1iOoKFj+mA94tMaITuDwhaMZGIbTcx7deDVkCAq/AJ6PCOTDT67ct0ZLeux X-Received: by 2002:a92:c708:: with SMTP id a8mr10677989ilp.177.1624907166020; Mon, 28 Jun 2021 12:06:06 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1624907166; cv=none; d=google.com; s=arc-20160816; b=jLeYt1uQzb1on8u+WUGrnz0GMeE99ad2x1c1MLN6n21uc7+e9pnhTlgPa0Kl1HACw5 HDOHdDfcqfHUZuujnKPgpFIpdN60q6ZAi6r7Stz6lEAoh5c5fvnWy5SRP5Jl/QvfcdJ+ 7NQoOYCgEZ1E7W2v32ai16/NiBaWx8gxeh2/hbBn9eQkFb7eKkBsd6JRh3QjDK+X9MCC H1ZgvNDzAkuPB9KiZ6BnYY7SBVAhvRUkmgXpQXi0HgxhFCrYPHSogBR96O7pDnUynzpD wUMcvjVjPDaDJs3ZmL0K2ekCYirGPBKA3dBTT9bF9VmdjIp2zOwriHNf+ymrySXBon38 5xow== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=tzyOa5uYmv5ml2atudDDFV17eeQjnq4DsooRPrPx3dM=; b=rITQ9Q9/G8Y7xiEjNUwU6fWFQV9OoJCmJB59iWBOVpPCB4aHAmG8Vhicv4llh+sWXF VMhuXxDs3UiQimdF6mDB9USE+jbAFXnFom5XOCZ/wn8/1rGra1BUNP1QqpMTsOa4c30W fMyiLvywHS760UfL1CZjRTArVWODyaAM06s9YeEGSaTDXCiO51rKb5f6M33ulm1xYEOF GJI9Bpf5VgMsBslYWBKKsPjo03fcY7YfsOscLecsyML6TR72lRSHbasly3COZClx4bA+ 2sDYiRyAlIvdMn4IKF81uqf8O7V3S3JCDhvNm9Wamzvpapom6ibyM78XDsRX1EFc5500 s/KQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=jkZOQvqj; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id a4si16639815ild.162.2021.06.28.12.05.51; Mon, 28 Jun 2021 12:06:06 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=jkZOQvqj; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235136AbhF1OfE (ORCPT + 99 others); Mon, 28 Jun 2021 10:35:04 -0400 Received: from mail.kernel.org ([198.145.29.99]:36732 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234742AbhF1OaZ (ORCPT ); Mon, 28 Jun 2021 10:30:25 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 001A461CB4; Mon, 28 Jun 2021 14:26:42 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1624890403; bh=xMbFFv5Ocj+okRzMU7IVyFe9akyULqkzGAexCMXgzLc=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=jkZOQvqjhfEHI4UNFdLhxHQfTYqvWjnHFsfOvpxNTM4AWeM/NzH1z4i+AKcET8aT/ glG+9Chhjbqne/J2xm0P5mKg7gJe3c6kdhSrs7LoCIlkVCw4cSqZbtIa9RShwDLubt ywJ2KQbRawqMkXn5LLiVB/XJEgQ2DDAMD+ORzn6Kawiay8ePK/aPMFUp9J2V+60ksH ayVjZeVXPRKQiB3nd7HRyNF00oeIa3NADb83/PIzI/x8M6vBa2lioswjWkogesh2K6 DQL7J6foJsApqudj+Pi0TJyYEC5GNyN5KoBh9NWjc9h4Q7PDGdlLVD/OvEXXMyt42q 0t+C1mBK/OTow== From: Sasha Levin To: linux-kernel@vger.kernel.org, stable@vger.kernel.org Cc: Eric Dumazet , "David S . Miller" , Sasha Levin Subject: [PATCH 5.10 040/101] net/packet: annotate data race in packet_sendmsg() Date: Mon, 28 Jun 2021 10:25:06 -0400 Message-Id: <20210628142607.32218-41-sashal@kernel.org> X-Mailer: git-send-email 2.30.2 In-Reply-To: <20210628142607.32218-1-sashal@kernel.org> References: <20210628142607.32218-1-sashal@kernel.org> MIME-Version: 1.0 X-KernelTest-Patch: http://kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.10.47-rc1.gz X-KernelTest-Tree: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git X-KernelTest-Branch: linux-5.10.y X-KernelTest-Patches: git://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git X-KernelTest-Version: 5.10.47-rc1 X-KernelTest-Deadline: 2021-06-30T14:25+00:00 X-stable: review X-Patchwork-Hint: Ignore Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Eric Dumazet [ Upstream commit d1b5bee4c8be01585033be9b3a8878789285285f ] There is a known race in packet_sendmsg(), addressed in commit 32d3182cd2cd ("net/packet: fix race in tpacket_snd()") Now we have data_race(), we can use it to avoid a future KCSAN warning, as syzbot loves stressing af_packet sockets :) Signed-off-by: Eric Dumazet Signed-off-by: David S. Miller Signed-off-by: Sasha Levin --- net/packet/af_packet.c | 9 ++++++--- 1 file changed, 6 insertions(+), 3 deletions(-) diff --git a/net/packet/af_packet.c b/net/packet/af_packet.c index ddb68aa836f7..7892d7074847 100644 --- a/net/packet/af_packet.c +++ b/net/packet/af_packet.c @@ -3033,10 +3033,13 @@ static int packet_sendmsg(struct socket *sock, struct msghdr *msg, size_t len) struct sock *sk = sock->sk; struct packet_sock *po = pkt_sk(sk); - if (po->tx_ring.pg_vec) + /* Reading tx_ring.pg_vec without holding pg_vec_lock is racy. + * tpacket_snd() will redo the check safely. + */ + if (data_race(po->tx_ring.pg_vec)) return tpacket_snd(po, msg); - else - return packet_snd(sock, msg, len); + + return packet_snd(sock, msg, len); } /* -- 2.30.2