Received: by 2002:a05:6358:3188:b0:123:57c1:9b43 with SMTP id q8csp2648447rwd; Fri, 26 May 2023 09:13:05 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ5cN6aIgCKwwVU/x7GrJFSuWO82XMmYTxo096jdtjRDrkBGdmz/ZltNh+DRATyl5VisU/lk X-Received: by 2002:a17:903:32c8:b0:1af:aa36:14 with SMTP id i8-20020a17090332c800b001afaa360014mr3613667plr.11.1685117584242; Fri, 26 May 2023 09:13:04 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1685117584; cv=none; d=google.com; s=arc-20160816; b=WSDkCvQ7bjUllrj7scb/0Z+yHDZwryTwt/1t/N+RFNxtngtNaS7PsQTMA7R3gKOZe/ NorWNXUluWix+f7Y0+dmx9QKEBAsH/vFr2TaOGRri5/QcQKLjoYydLj7BQl6pkVNnZcA 0ErDyBUF8tD9Vaor95aVF4+boSPhX0fOb7fzfvLvzaDyb8jPVx3nWEe1jXK+I9RXirq9 G5ArZN+13SXx+pR+PoYecy9POUD5fp9flsOClhuiasxM0UAuIC3+4TKGjx8wfvwu0s1X Llrpo03UZQb6/hZVIIqYZkhh7b34rQOwiutbg8Ev/QuoF8OPPEetfwsDe6RMg7sWL4SP sdbw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:content-language:subject:user-agent:mime-version :date:message-id:dkim-signature:dkim-filter; bh=sc/e4YbfJ8QW8+zY9SQfw6Qah/OograOaVZz9GmWE6c=; b=rC/Lo+CDUMUzvlId8LaQ5HE+rb4j0gbrgAHw2pk8VXzo4VfN0k8Ewmjpik66DXjWTj ky1juMa6FKV7iWmCjbQSVEmYV2Y8UPGo55gH884D7s+JlUwv5wH4HFl0exc8rR98vMSn 6x5702NSNATMbomepYFR0aZcxzxUuU6A+Kz1SEo5Pzh4vf+sSsYV+ITmnVVWqoGRQECj Jdh4BIDeCGOtaX7QQ98IcM+61v5uZX/nhAmthI0N6I9GDOb3zVOG4LZbkIXI1B1oOlJ/ 4L0QsGmGnk468ObSXRK1FxDCdpq/MjiyCdz2ufjPR5qYMjVozJ1SNfIej+e4GzLejVt8 aPsw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@ispras.ru header.s=default header.b=iPZxKhTG; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=ispras.ru Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id l13-20020a170903120d00b001ab0727a2c0si3255348plh.424.2023.05.26.09.12.47; Fri, 26 May 2023 09:13:04 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@ispras.ru header.s=default header.b=iPZxKhTG; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=ispras.ru Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230193AbjEZQJv (ORCPT + 99 others); Fri, 26 May 2023 12:09:51 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:55678 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230309AbjEZQJp (ORCPT ); Fri, 26 May 2023 12:09:45 -0400 Received: from mail.ispras.ru (mail.ispras.ru [83.149.199.84]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 45392119; Fri, 26 May 2023 09:09:43 -0700 (PDT) Received: from [10.10.2.69] (unknown [10.10.2.69]) by mail.ispras.ru (Postfix) with ESMTPSA id 80F0544C100F; Fri, 26 May 2023 16:09:41 +0000 (UTC) DKIM-Filter: OpenDKIM Filter v2.11.0 mail.ispras.ru 80F0544C100F DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ispras.ru; s=default; t=1685117381; bh=sc/e4YbfJ8QW8+zY9SQfw6Qah/OograOaVZz9GmWE6c=; h=Date:Subject:To:Cc:References:From:In-Reply-To:From; b=iPZxKhTGz4uB7XNm8VErRhtWXm5gnlzFnp6XjJQFIigsvrE5I4Ai25bZKIc/7xIG+ qzaMwQzB2aBoQtPYqDVg/GmjOpo9Udyu3HNxR4UguqJI9m8e0zfXTObdfjG+ZtdVui OIrH+yu4xDiucnHcTJ1Vnc9JHP5IXN6ik/YWrQrc= Message-ID: Date: Fri, 26 May 2023 19:09:41 +0300 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Thunderbird/102.10.0 Subject: Re: [PATCH] udp6: Fix race condition in udp6_sendmsg & connect Content-Language: ru To: Eric Dumazet Cc: Willem de Bruijn , "David S. Miller" , David Ahern , Jakub Kicinski , Paolo Abeni , netdev@vger.kernel.org, linux-kernel@vger.kernel.org, lvc-project@linuxtesting.org References: <20230526150806.1457828-1-VEfanov@ispras.ru> From: Vlad Efanov In-Reply-To: Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-2.2 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,NICE_REPLY_A,SPF_HELO_NONE, SPF_PASS,T_SCC_BODY_TEXT_LINE,URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Eric, udp6_sendmsg() currently still locks the socket (on line 1595). Best regards, Vlad. On 26.05.2023 18:29, Eric Dumazet wrote: > On Fri, May 26, 2023 at 5:08 PM Vladislav Efanov wrote: >> Syzkaller got the following report: >> BUG: KASAN: use-after-free in sk_setup_caps+0x621/0x690 net/core/sock.c:2018 >> Read of size 8 at addr ffff888027f82780 by task syz-executor276/3255 > Please include a full report. > >> The function sk_setup_caps (called by ip6_sk_dst_store_flow-> >> ip6_dst_store) referenced already freed memory as this memory was >> freed by parallel task in udpv6_sendmsg->ip6_sk_dst_lookup_flow-> >> sk_dst_check. >> >> task1 (connect) task2 (udp6_sendmsg) >> sk_setup_caps->sk_dst_set | >> | sk_dst_check-> >> | sk_dst_set >> | dst_release >> sk_setup_caps references | >> to already freed dst_entry| > >> The reason for this race condition is: udp6_sendmsg() calls >> ip6_sk_dst_lookup() without lock for sock structure and tries to >> allocate/add dst_entry structure to sock structure in parallel with >> "connect" task. >> >> Found by Linux Verification Center (linuxtesting.org) with syzkaller. >> >> Fixes: 1da177e4c3f4 ("Linux-2.6.12-rc2") > This is a bogus Fixes: tag > > In old times, UDP sendmsg() was using the socket lock. > > Then, in linux-4.0 Vlad Yasevich made UDP v6 sendmsg() lockless (and > racy in many points) > > >> Signed-off-by: Vladislav Efanov >> --- >> net/ipv6/udp.c | 3 +++ >> 1 file changed, 3 insertions(+) >> >> diff --git a/net/ipv6/udp.c b/net/ipv6/udp.c >> index e5a337e6b970..a5ecd5d93b0a 100644 >> --- a/net/ipv6/udp.c >> +++ b/net/ipv6/udp.c >> @@ -1563,12 +1563,15 @@ int udpv6_sendmsg(struct sock *sk, struct msghdr *msg, size_t len) >> >> fl6->flowlabel = ip6_make_flowinfo(ipc6.tclass, fl6->flowlabel); >> >> + lock_sock(sk); >> dst = ip6_sk_dst_lookup_flow(sk, fl6, final_p, connected); >> if (IS_ERR(dst)) { >> err = PTR_ERR(dst); >> dst = NULL; >> + release_sock(sk); >> goto out; >> } >> + release_sock(sk); >> >> if (ipc6.hlimit < 0) >> ipc6.hlimit = ip6_sk_dst_hoplimit(np, fl6, dst); >> -- >> 2.34.1 >> > There must be another way really. > You just killed UDP performance.