Received: by 2002:a05:6359:c8b:b0:c7:702f:21d4 with SMTP id go11csp1322273rwb; Tue, 27 Sep 2022 11:18:29 -0700 (PDT) X-Google-Smtp-Source: AMsMyM5Jhi/RmCVJkNcN3xbsXDgGSpMQGSSqmMIrsATdmOnSgiNG+9InmhuUOOg1YoiKR1RyN1+w X-Received: by 2002:a17:90b:4c46:b0:202:b9c5:2f24 with SMTP id np6-20020a17090b4c4600b00202b9c52f24mr5637037pjb.180.1664302709112; Tue, 27 Sep 2022 11:18:29 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1664302709; cv=none; d=google.com; s=arc-20160816; b=lw3WjCxk9EWa3bglWN2jsUGy/LNCaCO2Ca3voRg8a/ildu15DDCiyxN6HuOGiZ5Q8a xVkJZpaltaZu/YfoNT4cUeAsxDXerPriUwVXooGaBBxmTYUj7mEZ7KxA2AHEfGksr2Pj XmzrzCEeG/88nS0hczhlj2GbuZJEG2anFg3jgi6AMWwtEqDtityaPc3iEJtlOxnL+f8B ZDIMZzzy4XWzLgYt3dn62ZnOJwQXnUR7h22l6N+m5sxljmQJl2o4DRf1IaycWxtp7Pvn gQNVFFNl7xSZ2r2OYMB2oFi8IGRx5vGfqRe1qFfuIh5hBYwbiPYZeHgNYFigWxJKcJbZ u/5w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=RPREyKVXMFwCt1bTh0W9wA+KknXBhzmp1n3kVnvwXc0=; b=N62krwvJpp5rVK7x1xMg1O/RP+XwelWhXNpb7DnV07NdMSsCH7E9M1IKFFufNGKbO6 C7eK1tkNb1Yighrymua4jIwl7c4gah++nBLbsx2vH4pFl5Hz/y3EWjvtn4tu57AZk71e 27DomYRh301QHUASHKaGPp8IKNpjvkRWcRrypBI2zqD97FwBqCWyCFk14bBx8wArvrwa 3XOBTMZ6XIcq9N96ooQMn7VRlbPeMd8FOr2JQba95Ezd+7hnpmKMzgMxgqzKm+bvRUy5 5lvXjS+fnS4DdejTTRnseu7f+kZd/kMlvF4lijsZZ/FRXx5yLg7MrzZJGjFUdJ30FR60 C1rg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@amazon.com header.s=amazon201209 header.b=PiqSEKYs; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=amazon.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id t9-20020a6549c9000000b00439494dfd20si2616577pgs.202.2022.09.27.11.18.15; Tue, 27 Sep 2022 11:18:29 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@amazon.com header.s=amazon201209 header.b=PiqSEKYs; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=amazon.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233265AbiI0Ruf (ORCPT + 99 others); Tue, 27 Sep 2022 13:50:35 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:51750 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233281AbiI0RuG (ORCPT ); Tue, 27 Sep 2022 13:50:06 -0400 Received: from smtp-fw-9102.amazon.com (smtp-fw-9102.amazon.com [207.171.184.29]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 463D5D8265; Tue, 27 Sep 2022 10:49:15 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amazon.com; i=@amazon.com; q=dns/txt; s=amazon201209; t=1664300955; x=1695836955; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=RPREyKVXMFwCt1bTh0W9wA+KknXBhzmp1n3kVnvwXc0=; b=PiqSEKYsbrqJhiLx5uUdQChSJ3e/VCSnqx3joZybSm4vEK35P+CvZnMx DE2xysdjLzAaNb1U9vhvpisLb23+AwKMEPtKSudoZaOFvrwIGfhrDBtoa J7ZP+hWo0rD8TkaPdxs6dIKq83JvEct9qsn7mDnErOo67dQfWLKMje58b w=; X-IronPort-AV: E=Sophos;i="5.93,350,1654560000"; d="scan'208";a="263752039" Received: from pdx4-co-svc-p1-lb2-vlan2.amazon.com (HELO email-inbound-relay-pdx-2a-7d84505d.us-west-2.amazon.com) ([10.25.36.210]) by smtp-border-fw-9102.sea19.amazon.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 27 Sep 2022 16:53:51 +0000 Received: from EX13MTAUWB001.ant.amazon.com (pdx1-ws-svc-p6-lb9-vlan2.pdx.amazon.com [10.236.137.194]) by email-inbound-relay-pdx-2a-7d84505d.us-west-2.amazon.com (Postfix) with ESMTPS id 331E294917; Tue, 27 Sep 2022 16:53:51 +0000 (UTC) Received: from EX19D004ANA001.ant.amazon.com (10.37.240.138) by EX13MTAUWB001.ant.amazon.com (10.43.161.249) with Microsoft SMTP Server (TLS) id 15.0.1497.38; Tue, 27 Sep 2022 16:53:50 +0000 Received: from 88665a182662.ant.amazon.com (10.43.160.124) by EX19D004ANA001.ant.amazon.com (10.37.240.138) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA) id 15.2.1118.12; Tue, 27 Sep 2022 16:53:48 +0000 From: Kuniyuki Iwashima To: CC: , , , , , , , , Subject: Re: [PATCH v1 net 5/5] tcp: Fix data races around icsk->icsk_af_ops. Date: Tue, 27 Sep 2022 09:53:40 -0700 Message-ID: <20220927165340.36239-1-kuniyu@amazon.com> X-Mailer: git-send-email 2.30.2 In-Reply-To: <20220927164824.36027-1-kuniyu@amazon.com> References: <20220927164824.36027-1-kuniyu@amazon.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Content-Type: text/plain X-Originating-IP: [10.43.160.124] X-ClientProxiedBy: EX13D23UWA002.ant.amazon.com (10.43.160.40) To EX19D004ANA001.ant.amazon.com (10.37.240.138) X-Spam-Status: No, score=-6.8 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, RCVD_IN_DNSWL_HI,RCVD_IN_MSPIKE_H2,SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Kuniyuki Iwashima Date: Tue, 27 Sep 2022 09:48:24 -0700 > From: Eric Dumazet > Date: Tue, 27 Sep 2022 09:39:37 -0700 > > On Tue, Sep 27, 2022 at 9:33 AM Kuniyuki Iwashima wrote: > > > > > > IPV6_ADDRFORM changes icsk->icsk_af_ops under lock_sock(), but > > > tcp_(get|set)sockopt() read it locklessly. To avoid load/store > > > tearing, we need to add READ_ONCE() and WRITE_ONCE() for the reads > > > and write. > > > > I am pretty sure I have released a syzkaller bug recently with this issue. > > Have you seen this? > > If yes, please include the appropriate syzbot tag. Are you mentioning this commit ? 086d49058cd8 ("ipv6: annotate some data-races around sk->sk_prot") Then, yes, I'll add syzbot tags to patch 4 and 5. > > No, I haven't. > Could you provide the URL? > I'm happy to include the syzbot tag and KCSAN report in the changelog. > > > > > Fixes: 1da177e4c3f4 ("Linux-2.6.12-rc2") > > > Signed-off-by: Kuniyuki Iwashima > > > --- > > > net/ipv4/tcp.c | 10 ++++++---- > > > net/ipv6/ipv6_sockglue.c | 3 ++- > > > 2 files changed, 8 insertions(+), 5 deletions(-) > > > > > > diff --git a/net/ipv4/tcp.c b/net/ipv4/tcp.c > > > index e373dde1f46f..c86dd0ccef5b 100644 > > > --- a/net/ipv4/tcp.c > > > +++ b/net/ipv4/tcp.c > > > @@ -3795,8 +3795,9 @@ int tcp_setsockopt(struct sock *sk, int level, int optname, sockptr_t optval, > > > const struct inet_connection_sock *icsk = inet_csk(sk); > > > > > > if (level != SOL_TCP) > > > - return icsk->icsk_af_ops->setsockopt(sk, level, optname, > > > - optval, optlen); > > > + /* IPV6_ADDRFORM can change icsk->icsk_af_ops under us. */ > > > + return READ_ONCE(icsk->icsk_af_ops)->setsockopt(sk, level, optname, > > > + optval, optlen); > > > return do_tcp_setsockopt(sk, level, optname, optval, optlen); > > > } > > > EXPORT_SYMBOL(tcp_setsockopt); > > > @@ -4394,8 +4395,9 @@ int tcp_getsockopt(struct sock *sk, int level, int optname, char __user *optval, > > > struct inet_connection_sock *icsk = inet_csk(sk); > > > > > > if (level != SOL_TCP) > > > - return icsk->icsk_af_ops->getsockopt(sk, level, optname, > > > - optval, optlen); > > > + /* IPV6_ADDRFORM can change icsk->icsk_af_ops under us. */ > > > + return READ_ONCE(icsk->icsk_af_ops)->getsockopt(sk, level, optname, > > > + optval, optlen); > > > return do_tcp_getsockopt(sk, level, optname, optval, optlen); > > > } > > > EXPORT_SYMBOL(tcp_getsockopt); > > > diff --git a/net/ipv6/ipv6_sockglue.c b/net/ipv6/ipv6_sockglue.c > > > index a89db5872dc3..726d95859898 100644 > > > --- a/net/ipv6/ipv6_sockglue.c > > > +++ b/net/ipv6/ipv6_sockglue.c > > > @@ -479,7 +479,8 @@ static int do_ipv6_setsockopt(struct sock *sk, int level, int optname, > > > > > > /* Paired with READ_ONCE(sk->sk_prot) in inet6_stream_ops */ > > > WRITE_ONCE(sk->sk_prot, &tcp_prot); > > > - icsk->icsk_af_ops = &ipv4_specific; > > > + /* Paired with READ_ONCE() in tcp_(get|set)sockopt() */ > > > + WRITE_ONCE(icsk->icsk_af_ops, &ipv4_specific); > > > sk->sk_socket->ops = &inet_stream_ops; > > > sk->sk_family = PF_INET; > > > tcp_sync_mss(sk, icsk->icsk_pmtu_cookie); > > > -- > > > 2.30.2 > > >