Received: by 2002:a05:6358:11c7:b0:104:8066:f915 with SMTP id i7csp680386rwl; Fri, 31 Mar 2023 00:22:32 -0700 (PDT) X-Google-Smtp-Source: AKy350ZAbknf8uCWm6/fRmZ+7ScV8/142Y5+IbpK6vaVMDuRJD73W4gVDshGMhVREsbz7DwuuRn+ X-Received: by 2002:a17:906:18d:b0:92f:39d9:1e50 with SMTP id 13-20020a170906018d00b0092f39d91e50mr3355784ejb.3.1680247351984; Fri, 31 Mar 2023 00:22:31 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1680247351; cv=none; d=google.com; s=arc-20160816; b=Ksyx5z8A8rRag46TlsvcjIzfhgfvMZdmbJuXtEDpZvEOucLNz1ziTviW1cN/Z6m7nm UANWq8bX2KLDDHleCX231DtoIIsfMJcd6Xd7v/jtDwwJKz4Q8riwSQ6Dvvr+6EwSbsKs 1LYpo7mbQ+SDIMDSsks0x9k+ZvN9qiUjJ40+8sJELKT9Cnr7gWimjGXC/3RIR8lXUBHR qZMywLpy/AJ9DMQF6ttb7sqBZRfoawTZugczFrJlGOCOVVbiEMtfzf8gemPNgqfdOsxP V2W2SxTovtDEhsYD60/lvKL7Zf39DG7v/KR/25ZDlN/y71Ux+vA/FER1/1hTxJr4hlzT QkqQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=JAtFOpsO/vEk5oySdHeBDtWd8PXf2Ha2sgTmMDDRL3E=; b=QvZ8Ut4tbH1Aq5+9Y490iIcOHS/t4ENS5XCQhtl4I/1XpHo7LTg35j+a02YIhBKoVj R05Nh7o+A/npWCqeLB3rjPWuQIIUNAhYBG+3Cldd/2q1c2ajCWzulrjyK66sZm9g0xlc aJqlCwvA631n1MXQRbeBN65TPCt0I5jpgjKUCVCe4lgiDBYGZrY7JGT1fCb+1wJtLyn5 y4+nvoV3hx0gnWcRD/gfcZTzt6768SW84h0oW2LYpE+0nC65x092jZ3ev5IYmMpBdsi9 kfAK2KquWR9yPag6ZB0JVlX1DbXDMFBpia/mZZOA7aaSKptOrWz3LFB+N91qhPZYS/TA gdzA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@amazon.com header.s=amazon201209 header.b=RYkpXlT9; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=amazon.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id lb5-20020a170907784500b0093e0b659bc3si1371746ejc.493.2023.03.31.00.22.06; Fri, 31 Mar 2023 00:22:31 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@amazon.com header.s=amazon201209 header.b=RYkpXlT9; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=amazon.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229832AbjCaHRu (ORCPT + 99 others); Fri, 31 Mar 2023 03:17:50 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:42968 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230229AbjCaHRs (ORCPT ); Fri, 31 Mar 2023 03:17:48 -0400 Received: from smtp-fw-9103.amazon.com (smtp-fw-9103.amazon.com [207.171.188.200]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 48E94191CF; Fri, 31 Mar 2023 00:17:47 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amazon.com; i=@amazon.com; q=dns/txt; s=amazon201209; t=1680247067; x=1711783067; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=JAtFOpsO/vEk5oySdHeBDtWd8PXf2Ha2sgTmMDDRL3E=; b=RYkpXlT9eUa3gTXdVCqMNmsIuws6omjxZZo/JO9QE3SzFlmbfEJZR0ay EV9SGpyTJFDCUDMf2BJXS6fudN1jyBaTfZHLMSt3lMvXyzXWrwkSz5xfB 8zGbwT9Im8UtobgRhAwHYaQiXSX5e4tC+OI9OxuhrIvvQEK3wH503C07R 4=; X-IronPort-AV: E=Sophos;i="5.98,307,1673913600"; d="scan'208";a="1118188166" Received: from pdx4-co-svc-p1-lb2-vlan3.amazon.com (HELO email-inbound-relay-iad-1e-m6i4x-a65ebc6e.us-east-1.amazon.com) ([10.25.36.214]) by smtp-border-fw-9103.sea19.amazon.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 31 Mar 2023 07:17:40 +0000 Received: from EX19MTAUWA002.ant.amazon.com (iad12-ws-svc-p26-lb9-vlan3.iad.amazon.com [10.40.163.38]) by email-inbound-relay-iad-1e-m6i4x-a65ebc6e.us-east-1.amazon.com (Postfix) with ESMTPS id C5C7660FCC; Fri, 31 Mar 2023 07:17:37 +0000 (UTC) Received: from EX19D004ANA001.ant.amazon.com (10.37.240.138) by EX19MTAUWA002.ant.amazon.com (10.250.64.202) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1118.22; Fri, 31 Mar 2023 07:17:36 +0000 Received: from 88665a182662.ant.amazon.com (10.106.100.11) by EX19D004ANA001.ant.amazon.com (10.37.240.138) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1118.26; Fri, 31 Mar 2023 07:17:33 +0000 From: Kuniyuki Iwashima To: CC: , , , , , , , Subject: Re: general protection fault in raw_seq_start Date: Fri, 31 Mar 2023 00:17:25 -0700 Message-ID: <20230331071725.66950-1-kuniyu@amazon.com> X-Mailer: git-send-email 2.30.2 In-Reply-To: References: MIME-Version: 1.0 Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: 8bit X-Originating-IP: [10.106.100.11] X-ClientProxiedBy: EX19D039UWA004.ant.amazon.com (10.13.139.68) To EX19D004ANA001.ant.amazon.com (10.37.240.138) X-Spam-Status: No, score=-2.2 required=5.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, RCVD_IN_DNSWL_MED,RCVD_IN_MSPIKE_H2,SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Eric Dumazet Date: Fri, 31 Mar 2023 09:04:47 +0200 > On Thu, Mar 30, 2023 at 11:55 PM Kuniyuki Iwashima wrote: > > > Thanks for reporting the issue. > > > > It seems we need to use RCU variant in raw_get_first(). > > I'll post a patch. > > > > --- > > diff --git a/net/ipv4/raw.c b/net/ipv4/raw.c > > index 3cf68695b40d..fe0d1ad20b35 100644 > > --- a/net/ipv4/raw.c > > +++ b/net/ipv4/raw.c > > @@ -957,7 +957,7 @@ static struct sock *raw_get_first(struct seq_file *seq, int bucket) > > for (state->bucket = bucket; state->bucket < RAW_HTABLE_SIZE; > > ++state->bucket) { > > hlist = &h->ht[state->bucket]; > > - sk_nulls_for_each(sk, hnode, hlist) { > > + sk_nulls_for_each_rcu(sk, hnode, hlist) { > > if (sock_net(sk) == seq_file_net(seq)) > > return sk; > > > > No, we do not want this. > You missed that sk_nulls_for_each_rcu() needs a specific protocol > (see Documentation/RCU/rculist_nulls.rst for details) Ah, exactly SOCK_RAW does not have SLAB_TYPESAFE_BY_RCU. Thank you for pointing this out! And I found this seems wrong. c25b7a7a565e ("inet: ping: use hlist_nulls rcu iterator during lookup") > > RCU is needed in the data path, not for this control path. > > My patch went too far in the RCU conversion. I did not think about > syzbot harassing /proc files :) > > We need raw_seq_start and friends to go back to use the lock. Ok, then I'll change /proc/net/{raw, icmp} to use spinlock :)