mirror of
https://github.com/torvalds/linux.git
synced 2024-11-28 15:11:31 +00:00
032be5f19a
After commit5271953cad
("rxrpc: Use the UDP encap_rcv hook"), rxrpc_input_packet() is directly called from lockless UDP receive path, under rcu_read_lock() protection. It must therefore use RCU rules : - udp_sk->sk_user_data can be cleared at any point in this function. rcu_dereference_sk_user_data() is what we need here. - Also, since sk_user_data might have been set in rxrpc_open_socket() we must observe a proper RCU grace period before kfree(local) in rxrpc_lookup_local() v4: @local can be NULL in xrpc_lookup_local() as reported by kbuild test robot <lkp@intel.com> and Julia Lawall <julia.lawall@lip6.fr>, thanks ! v3,v2 : addressed David Howells feedback, thanks ! syzbot reported : kasan: CONFIG_KASAN_INLINE enabled kasan: GPF could be caused by NULL-ptr deref or user memory access general protection fault: 0000 [#1] PREEMPT SMP KASAN CPU: 0 PID: 19236 Comm: syz-executor703 Not tainted 5.1.0-rc6 #79 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:__lock_acquire+0xbef/0x3fb0 kernel/locking/lockdep.c:3573 Code: 00 0f 85 a5 1f 00 00 48 81 c4 10 01 00 00 5b 41 5c 41 5d 41 5e 41 5f 5d c3 48 b8 00 00 00 00 00 fc ff df 4c 89 ea 48 c1 ea 03 <80> 3c 02 00 0f 85 4a 21 00 00 49 81 7d 00 20 54 9c 89 0f 84 cf f4 RSP: 0018:ffff88809d7aef58 EFLAGS: 00010002 RAX: dffffc0000000000 RBX: 0000000000000000 RCX: 0000000000000000 RDX: 0000000000000026 RSI: 0000000000000000 RDI: 0000000000000001 RBP: ffff88809d7af090 R08: 0000000000000001 R09: 0000000000000001 R10: ffffed1015d05bc7 R11: ffff888089428600 R12: 0000000000000000 R13: 0000000000000130 R14: 0000000000000001 R15: 0000000000000001 FS: 00007f059044d700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00000000004b6040 CR3: 00000000955ca000 CR4: 00000000001406f0 Call Trace: lock_acquire+0x16f/0x3f0 kernel/locking/lockdep.c:4211 __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline] _raw_spin_lock_irqsave+0x95/0xcd kernel/locking/spinlock.c:152 skb_queue_tail+0x26/0x150 net/core/skbuff.c:2972 rxrpc_reject_packet net/rxrpc/input.c:1126 [inline] rxrpc_input_packet+0x4a0/0x5536 net/rxrpc/input.c:1414 udp_queue_rcv_one_skb+0xaf2/0x1780 net/ipv4/udp.c:2011 udp_queue_rcv_skb+0x128/0x730 net/ipv4/udp.c:2085 udp_unicast_rcv_skb.isra.0+0xb9/0x360 net/ipv4/udp.c:2245 __udp4_lib_rcv+0x701/0x2ca0 net/ipv4/udp.c:2301 udp_rcv+0x22/0x30 net/ipv4/udp.c:2482 ip_protocol_deliver_rcu+0x60/0x8f0 net/ipv4/ip_input.c:208 ip_local_deliver_finish+0x23b/0x390 net/ipv4/ip_input.c:234 NF_HOOK include/linux/netfilter.h:289 [inline] NF_HOOK include/linux/netfilter.h:283 [inline] ip_local_deliver+0x1e9/0x520 net/ipv4/ip_input.c:255 dst_input include/net/dst.h:450 [inline] ip_rcv_finish+0x1e1/0x300 net/ipv4/ip_input.c:413 NF_HOOK include/linux/netfilter.h:289 [inline] NF_HOOK include/linux/netfilter.h:283 [inline] ip_rcv+0xe8/0x3f0 net/ipv4/ip_input.c:523 __netif_receive_skb_one_core+0x115/0x1a0 net/core/dev.c:4987 __netif_receive_skb+0x2c/0x1c0 net/core/dev.c:5099 netif_receive_skb_internal+0x117/0x660 net/core/dev.c:5202 napi_frags_finish net/core/dev.c:5769 [inline] napi_gro_frags+0xade/0xd10 net/core/dev.c:5843 tun_get_user+0x2f24/0x3fb0 drivers/net/tun.c:1981 tun_chr_write_iter+0xbd/0x156 drivers/net/tun.c:2027 call_write_iter include/linux/fs.h:1866 [inline] do_iter_readv_writev+0x5e1/0x8e0 fs/read_write.c:681 do_iter_write fs/read_write.c:957 [inline] do_iter_write+0x184/0x610 fs/read_write.c:938 vfs_writev+0x1b3/0x2f0 fs/read_write.c:1002 do_writev+0x15e/0x370 fs/read_write.c:1037 __do_sys_writev fs/read_write.c:1110 [inline] __se_sys_writev fs/read_write.c:1107 [inline] __x64_sys_writev+0x75/0xb0 fs/read_write.c:1107 do_syscall_64+0x103/0x610 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe Fixes:5271953cad
("rxrpc: Use the UDP encap_rcv hook") Signed-off-by: Eric Dumazet <edumazet@google.com> Reported-by: syzbot <syzkaller@googlegroups.com> Acked-by: David Howells <dhowells@redhat.com> Signed-off-by: David S. Miller <davem@davemloft.net>
500 lines
12 KiB
C
500 lines
12 KiB
C
/* Local endpoint object management
|
|
*
|
|
* Copyright (C) 2016 Red Hat, Inc. All Rights Reserved.
|
|
* Written by David Howells (dhowells@redhat.com)
|
|
*
|
|
* This program is free software; you can redistribute it and/or
|
|
* modify it under the terms of the GNU General Public Licence
|
|
* as published by the Free Software Foundation; either version
|
|
* 2 of the Licence, or (at your option) any later version.
|
|
*/
|
|
|
|
#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
|
|
|
|
#include <linux/module.h>
|
|
#include <linux/net.h>
|
|
#include <linux/skbuff.h>
|
|
#include <linux/slab.h>
|
|
#include <linux/udp.h>
|
|
#include <linux/ip.h>
|
|
#include <linux/hashtable.h>
|
|
#include <net/sock.h>
|
|
#include <net/udp.h>
|
|
#include <net/af_rxrpc.h>
|
|
#include "ar-internal.h"
|
|
|
|
static void rxrpc_local_processor(struct work_struct *);
|
|
static void rxrpc_local_rcu(struct rcu_head *);
|
|
|
|
/*
|
|
* Compare a local to an address. Return -ve, 0 or +ve to indicate less than,
|
|
* same or greater than.
|
|
*
|
|
* We explicitly don't compare the RxRPC service ID as we want to reject
|
|
* conflicting uses by differing services. Further, we don't want to share
|
|
* addresses with different options (IPv6), so we don't compare those bits
|
|
* either.
|
|
*/
|
|
static long rxrpc_local_cmp_key(const struct rxrpc_local *local,
|
|
const struct sockaddr_rxrpc *srx)
|
|
{
|
|
long diff;
|
|
|
|
diff = ((local->srx.transport_type - srx->transport_type) ?:
|
|
(local->srx.transport_len - srx->transport_len) ?:
|
|
(local->srx.transport.family - srx->transport.family));
|
|
if (diff != 0)
|
|
return diff;
|
|
|
|
switch (srx->transport.family) {
|
|
case AF_INET:
|
|
/* If the choice of UDP port is left up to the transport, then
|
|
* the endpoint record doesn't match.
|
|
*/
|
|
return ((u16 __force)local->srx.transport.sin.sin_port -
|
|
(u16 __force)srx->transport.sin.sin_port) ?:
|
|
memcmp(&local->srx.transport.sin.sin_addr,
|
|
&srx->transport.sin.sin_addr,
|
|
sizeof(struct in_addr));
|
|
#ifdef CONFIG_AF_RXRPC_IPV6
|
|
case AF_INET6:
|
|
/* If the choice of UDP6 port is left up to the transport, then
|
|
* the endpoint record doesn't match.
|
|
*/
|
|
return ((u16 __force)local->srx.transport.sin6.sin6_port -
|
|
(u16 __force)srx->transport.sin6.sin6_port) ?:
|
|
memcmp(&local->srx.transport.sin6.sin6_addr,
|
|
&srx->transport.sin6.sin6_addr,
|
|
sizeof(struct in6_addr));
|
|
#endif
|
|
default:
|
|
BUG();
|
|
}
|
|
}
|
|
|
|
/*
|
|
* Allocate a new local endpoint.
|
|
*/
|
|
static struct rxrpc_local *rxrpc_alloc_local(struct rxrpc_net *rxnet,
|
|
const struct sockaddr_rxrpc *srx)
|
|
{
|
|
struct rxrpc_local *local;
|
|
|
|
local = kzalloc(sizeof(struct rxrpc_local), GFP_KERNEL);
|
|
if (local) {
|
|
atomic_set(&local->usage, 1);
|
|
local->rxnet = rxnet;
|
|
INIT_LIST_HEAD(&local->link);
|
|
INIT_WORK(&local->processor, rxrpc_local_processor);
|
|
init_rwsem(&local->defrag_sem);
|
|
skb_queue_head_init(&local->reject_queue);
|
|
skb_queue_head_init(&local->event_queue);
|
|
local->client_conns = RB_ROOT;
|
|
spin_lock_init(&local->client_conns_lock);
|
|
spin_lock_init(&local->lock);
|
|
rwlock_init(&local->services_lock);
|
|
local->debug_id = atomic_inc_return(&rxrpc_debug_id);
|
|
memcpy(&local->srx, srx, sizeof(*srx));
|
|
local->srx.srx_service = 0;
|
|
trace_rxrpc_local(local, rxrpc_local_new, 1, NULL);
|
|
}
|
|
|
|
_leave(" = %p", local);
|
|
return local;
|
|
}
|
|
|
|
/*
|
|
* create the local socket
|
|
* - must be called with rxrpc_local_mutex locked
|
|
*/
|
|
static int rxrpc_open_socket(struct rxrpc_local *local, struct net *net)
|
|
{
|
|
struct sock *usk;
|
|
int ret, opt;
|
|
|
|
_enter("%p{%d,%d}",
|
|
local, local->srx.transport_type, local->srx.transport.family);
|
|
|
|
/* create a socket to represent the local endpoint */
|
|
ret = sock_create_kern(net, local->srx.transport.family,
|
|
local->srx.transport_type, 0, &local->socket);
|
|
if (ret < 0) {
|
|
_leave(" = %d [socket]", ret);
|
|
return ret;
|
|
}
|
|
|
|
/* set the socket up */
|
|
usk = local->socket->sk;
|
|
inet_sk(usk)->mc_loop = 0;
|
|
|
|
/* Enable CHECKSUM_UNNECESSARY to CHECKSUM_COMPLETE conversion */
|
|
inet_inc_convert_csum(usk);
|
|
|
|
rcu_assign_sk_user_data(usk, local);
|
|
|
|
udp_sk(usk)->encap_type = UDP_ENCAP_RXRPC;
|
|
udp_sk(usk)->encap_rcv = rxrpc_input_packet;
|
|
udp_sk(usk)->encap_destroy = NULL;
|
|
udp_sk(usk)->gro_receive = NULL;
|
|
udp_sk(usk)->gro_complete = NULL;
|
|
|
|
udp_encap_enable();
|
|
#if IS_ENABLED(CONFIG_AF_RXRPC_IPV6)
|
|
if (local->srx.transport.family == AF_INET6)
|
|
udpv6_encap_enable();
|
|
#endif
|
|
usk->sk_error_report = rxrpc_error_report;
|
|
|
|
/* if a local address was supplied then bind it */
|
|
if (local->srx.transport_len > sizeof(sa_family_t)) {
|
|
_debug("bind");
|
|
ret = kernel_bind(local->socket,
|
|
(struct sockaddr *)&local->srx.transport,
|
|
local->srx.transport_len);
|
|
if (ret < 0) {
|
|
_debug("bind failed %d", ret);
|
|
goto error;
|
|
}
|
|
}
|
|
|
|
switch (local->srx.transport.family) {
|
|
case AF_INET6:
|
|
/* we want to receive ICMPv6 errors */
|
|
opt = 1;
|
|
ret = kernel_setsockopt(local->socket, SOL_IPV6, IPV6_RECVERR,
|
|
(char *) &opt, sizeof(opt));
|
|
if (ret < 0) {
|
|
_debug("setsockopt failed");
|
|
goto error;
|
|
}
|
|
|
|
/* we want to set the don't fragment bit */
|
|
opt = IPV6_PMTUDISC_DO;
|
|
ret = kernel_setsockopt(local->socket, SOL_IPV6, IPV6_MTU_DISCOVER,
|
|
(char *) &opt, sizeof(opt));
|
|
if (ret < 0) {
|
|
_debug("setsockopt failed");
|
|
goto error;
|
|
}
|
|
|
|
/* Fall through and set IPv4 options too otherwise we don't get
|
|
* errors from IPv4 packets sent through the IPv6 socket.
|
|
*/
|
|
|
|
case AF_INET:
|
|
/* we want to receive ICMP errors */
|
|
opt = 1;
|
|
ret = kernel_setsockopt(local->socket, SOL_IP, IP_RECVERR,
|
|
(char *) &opt, sizeof(opt));
|
|
if (ret < 0) {
|
|
_debug("setsockopt failed");
|
|
goto error;
|
|
}
|
|
|
|
/* we want to set the don't fragment bit */
|
|
opt = IP_PMTUDISC_DO;
|
|
ret = kernel_setsockopt(local->socket, SOL_IP, IP_MTU_DISCOVER,
|
|
(char *) &opt, sizeof(opt));
|
|
if (ret < 0) {
|
|
_debug("setsockopt failed");
|
|
goto error;
|
|
}
|
|
|
|
/* We want receive timestamps. */
|
|
opt = 1;
|
|
ret = kernel_setsockopt(local->socket, SOL_SOCKET, SO_TIMESTAMPNS_OLD,
|
|
(char *)&opt, sizeof(opt));
|
|
if (ret < 0) {
|
|
_debug("setsockopt failed");
|
|
goto error;
|
|
}
|
|
break;
|
|
|
|
default:
|
|
BUG();
|
|
}
|
|
|
|
_leave(" = 0");
|
|
return 0;
|
|
|
|
error:
|
|
kernel_sock_shutdown(local->socket, SHUT_RDWR);
|
|
local->socket->sk->sk_user_data = NULL;
|
|
sock_release(local->socket);
|
|
local->socket = NULL;
|
|
|
|
_leave(" = %d", ret);
|
|
return ret;
|
|
}
|
|
|
|
/*
|
|
* Look up or create a new local endpoint using the specified local address.
|
|
*/
|
|
struct rxrpc_local *rxrpc_lookup_local(struct net *net,
|
|
const struct sockaddr_rxrpc *srx)
|
|
{
|
|
struct rxrpc_local *local;
|
|
struct rxrpc_net *rxnet = rxrpc_net(net);
|
|
struct list_head *cursor;
|
|
const char *age;
|
|
long diff;
|
|
int ret;
|
|
|
|
_enter("{%d,%d,%pISp}",
|
|
srx->transport_type, srx->transport.family, &srx->transport);
|
|
|
|
mutex_lock(&rxnet->local_mutex);
|
|
|
|
for (cursor = rxnet->local_endpoints.next;
|
|
cursor != &rxnet->local_endpoints;
|
|
cursor = cursor->next) {
|
|
local = list_entry(cursor, struct rxrpc_local, link);
|
|
|
|
diff = rxrpc_local_cmp_key(local, srx);
|
|
if (diff < 0)
|
|
continue;
|
|
if (diff > 0)
|
|
break;
|
|
|
|
/* Services aren't allowed to share transport sockets, so
|
|
* reject that here. It is possible that the object is dying -
|
|
* but it may also still have the local transport address that
|
|
* we want bound.
|
|
*/
|
|
if (srx->srx_service) {
|
|
local = NULL;
|
|
goto addr_in_use;
|
|
}
|
|
|
|
/* Found a match. We replace a dying object. Attempting to
|
|
* bind the transport socket may still fail if we're attempting
|
|
* to use a local address that the dying object is still using.
|
|
*/
|
|
if (!rxrpc_get_local_maybe(local)) {
|
|
cursor = cursor->next;
|
|
list_del_init(&local->link);
|
|
break;
|
|
}
|
|
|
|
age = "old";
|
|
goto found;
|
|
}
|
|
|
|
local = rxrpc_alloc_local(rxnet, srx);
|
|
if (!local)
|
|
goto nomem;
|
|
|
|
ret = rxrpc_open_socket(local, net);
|
|
if (ret < 0)
|
|
goto sock_error;
|
|
|
|
list_add_tail(&local->link, cursor);
|
|
age = "new";
|
|
|
|
found:
|
|
mutex_unlock(&rxnet->local_mutex);
|
|
|
|
_net("LOCAL %s %d {%pISp}",
|
|
age, local->debug_id, &local->srx.transport);
|
|
|
|
_leave(" = %p", local);
|
|
return local;
|
|
|
|
nomem:
|
|
ret = -ENOMEM;
|
|
sock_error:
|
|
mutex_unlock(&rxnet->local_mutex);
|
|
if (local)
|
|
call_rcu(&local->rcu, rxrpc_local_rcu);
|
|
_leave(" = %d", ret);
|
|
return ERR_PTR(ret);
|
|
|
|
addr_in_use:
|
|
mutex_unlock(&rxnet->local_mutex);
|
|
_leave(" = -EADDRINUSE");
|
|
return ERR_PTR(-EADDRINUSE);
|
|
}
|
|
|
|
/*
|
|
* Get a ref on a local endpoint.
|
|
*/
|
|
struct rxrpc_local *rxrpc_get_local(struct rxrpc_local *local)
|
|
{
|
|
const void *here = __builtin_return_address(0);
|
|
int n;
|
|
|
|
n = atomic_inc_return(&local->usage);
|
|
trace_rxrpc_local(local, rxrpc_local_got, n, here);
|
|
return local;
|
|
}
|
|
|
|
/*
|
|
* Get a ref on a local endpoint unless its usage has already reached 0.
|
|
*/
|
|
struct rxrpc_local *rxrpc_get_local_maybe(struct rxrpc_local *local)
|
|
{
|
|
const void *here = __builtin_return_address(0);
|
|
|
|
if (local) {
|
|
int n = atomic_fetch_add_unless(&local->usage, 1, 0);
|
|
if (n > 0)
|
|
trace_rxrpc_local(local, rxrpc_local_got, n + 1, here);
|
|
else
|
|
local = NULL;
|
|
}
|
|
return local;
|
|
}
|
|
|
|
/*
|
|
* Queue a local endpoint.
|
|
*/
|
|
void rxrpc_queue_local(struct rxrpc_local *local)
|
|
{
|
|
const void *here = __builtin_return_address(0);
|
|
|
|
if (rxrpc_queue_work(&local->processor))
|
|
trace_rxrpc_local(local, rxrpc_local_queued,
|
|
atomic_read(&local->usage), here);
|
|
}
|
|
|
|
/*
|
|
* A local endpoint reached its end of life.
|
|
*/
|
|
static void __rxrpc_put_local(struct rxrpc_local *local)
|
|
{
|
|
_enter("%d", local->debug_id);
|
|
rxrpc_queue_work(&local->processor);
|
|
}
|
|
|
|
/*
|
|
* Drop a ref on a local endpoint.
|
|
*/
|
|
void rxrpc_put_local(struct rxrpc_local *local)
|
|
{
|
|
const void *here = __builtin_return_address(0);
|
|
int n;
|
|
|
|
if (local) {
|
|
n = atomic_dec_return(&local->usage);
|
|
trace_rxrpc_local(local, rxrpc_local_put, n, here);
|
|
|
|
if (n == 0)
|
|
__rxrpc_put_local(local);
|
|
}
|
|
}
|
|
|
|
/*
|
|
* Destroy a local endpoint's socket and then hand the record to RCU to dispose
|
|
* of.
|
|
*
|
|
* Closing the socket cannot be done from bottom half context or RCU callback
|
|
* context because it might sleep.
|
|
*/
|
|
static void rxrpc_local_destroyer(struct rxrpc_local *local)
|
|
{
|
|
struct socket *socket = local->socket;
|
|
struct rxrpc_net *rxnet = local->rxnet;
|
|
|
|
_enter("%d", local->debug_id);
|
|
|
|
/* We can get a race between an incoming call packet queueing the
|
|
* processor again and the work processor starting the destruction
|
|
* process which will shut down the UDP socket.
|
|
*/
|
|
if (local->dead) {
|
|
_leave(" [already dead]");
|
|
return;
|
|
}
|
|
local->dead = true;
|
|
|
|
mutex_lock(&rxnet->local_mutex);
|
|
list_del_init(&local->link);
|
|
mutex_unlock(&rxnet->local_mutex);
|
|
|
|
ASSERT(RB_EMPTY_ROOT(&local->client_conns));
|
|
ASSERT(!local->service);
|
|
|
|
if (socket) {
|
|
local->socket = NULL;
|
|
kernel_sock_shutdown(socket, SHUT_RDWR);
|
|
socket->sk->sk_user_data = NULL;
|
|
sock_release(socket);
|
|
}
|
|
|
|
/* At this point, there should be no more packets coming in to the
|
|
* local endpoint.
|
|
*/
|
|
rxrpc_purge_queue(&local->reject_queue);
|
|
rxrpc_purge_queue(&local->event_queue);
|
|
|
|
_debug("rcu local %d", local->debug_id);
|
|
call_rcu(&local->rcu, rxrpc_local_rcu);
|
|
}
|
|
|
|
/*
|
|
* Process events on an endpoint
|
|
*/
|
|
static void rxrpc_local_processor(struct work_struct *work)
|
|
{
|
|
struct rxrpc_local *local =
|
|
container_of(work, struct rxrpc_local, processor);
|
|
bool again;
|
|
|
|
trace_rxrpc_local(local, rxrpc_local_processing,
|
|
atomic_read(&local->usage), NULL);
|
|
|
|
do {
|
|
again = false;
|
|
if (atomic_read(&local->usage) == 0)
|
|
return rxrpc_local_destroyer(local);
|
|
|
|
if (!skb_queue_empty(&local->reject_queue)) {
|
|
rxrpc_reject_packets(local);
|
|
again = true;
|
|
}
|
|
|
|
if (!skb_queue_empty(&local->event_queue)) {
|
|
rxrpc_process_local_events(local);
|
|
again = true;
|
|
}
|
|
} while (again);
|
|
}
|
|
|
|
/*
|
|
* Destroy a local endpoint after the RCU grace period expires.
|
|
*/
|
|
static void rxrpc_local_rcu(struct rcu_head *rcu)
|
|
{
|
|
struct rxrpc_local *local = container_of(rcu, struct rxrpc_local, rcu);
|
|
|
|
_enter("%d", local->debug_id);
|
|
|
|
ASSERT(!work_pending(&local->processor));
|
|
|
|
_net("DESTROY LOCAL %d", local->debug_id);
|
|
kfree(local);
|
|
_leave("");
|
|
}
|
|
|
|
/*
|
|
* Verify the local endpoint list is empty by this point.
|
|
*/
|
|
void rxrpc_destroy_all_locals(struct rxrpc_net *rxnet)
|
|
{
|
|
struct rxrpc_local *local;
|
|
|
|
_enter("");
|
|
|
|
flush_workqueue(rxrpc_workqueue);
|
|
|
|
if (!list_empty(&rxnet->local_endpoints)) {
|
|
mutex_lock(&rxnet->local_mutex);
|
|
list_for_each_entry(local, &rxnet->local_endpoints, link) {
|
|
pr_err("AF_RXRPC: Leaked local %p {%d}\n",
|
|
local, atomic_read(&local->usage));
|
|
}
|
|
mutex_unlock(&rxnet->local_mutex);
|
|
BUG();
|
|
}
|
|
}
|