mirror of
https://github.com/torvalds/linux.git
synced 2024-11-22 20:22:09 +00:00
198bc90e0e
When I run syz's reproduction C program locally, it causes the following issue: pvqspinlock: lock 0xffff9d181cd5c660 has corrupted value 0x0! WARNING: CPU: 19 PID: 21160 at __pv_queued_spin_unlock_slowpath (kernel/locking/qspinlock_paravirt.h:508) Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 RIP: 0010:__pv_queued_spin_unlock_slowpath (kernel/locking/qspinlock_paravirt.h:508) Code: 73 56 3a ff 90 c3 cc cc cc cc 8b 05 bb 1f 48 01 85 c0 74 05 c3 cc cc cc cc 8b 17 48 89 fe 48 c7 c7 30 20 ce 8f e8 ad 56 42 ff <0f> 0b c3 cc cc cc cc 0f 0b 0f 1f 40 00 90 90 90 90 90 90 90 90 90 RSP: 0018:ffffa8d200604cb8 EFLAGS: 00010282 RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffff9d1ef60e0908 RDX: 00000000ffffffd8 RSI: 0000000000000027 RDI: ffff9d1ef60e0900 RBP: ffff9d181cd5c280 R08: 0000000000000000 R09: 00000000ffff7fff R10: ffffa8d200604b68 R11: ffffffff907dcdc8 R12: 0000000000000000 R13: ffff9d181cd5c660 R14: ffff9d1813a3f330 R15: 0000000000001000 FS: 00007fa110184640(0000) GS:ffff9d1ef60c0000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000020000000 CR3: 000000011f65e000 CR4: 00000000000006f0 Call Trace: <IRQ> _raw_spin_unlock (kernel/locking/spinlock.c:186) inet_csk_reqsk_queue_add (net/ipv4/inet_connection_sock.c:1321) inet_csk_complete_hashdance (net/ipv4/inet_connection_sock.c:1358) tcp_check_req (net/ipv4/tcp_minisocks.c:868) tcp_v4_rcv (net/ipv4/tcp_ipv4.c:2260) ip_protocol_deliver_rcu (net/ipv4/ip_input.c:205) ip_local_deliver_finish (net/ipv4/ip_input.c:234) __netif_receive_skb_one_core (net/core/dev.c:5529) process_backlog (./include/linux/rcupdate.h:779) __napi_poll (net/core/dev.c:6533) net_rx_action (net/core/dev.c:6604) __do_softirq (./arch/x86/include/asm/jump_label.h:27) do_softirq (kernel/softirq.c:454 kernel/softirq.c:441) </IRQ> <TASK> __local_bh_enable_ip (kernel/softirq.c:381) __dev_queue_xmit (net/core/dev.c:4374) ip_finish_output2 (./include/net/neighbour.h:540 net/ipv4/ip_output.c:235) __ip_queue_xmit (net/ipv4/ip_output.c:535) __tcp_transmit_skb (net/ipv4/tcp_output.c:1462) tcp_rcv_synsent_state_process (net/ipv4/tcp_input.c:6469) tcp_rcv_state_process (net/ipv4/tcp_input.c:6657) tcp_v4_do_rcv (net/ipv4/tcp_ipv4.c:1929) __release_sock (./include/net/sock.h:1121 net/core/sock.c:2968) release_sock (net/core/sock.c:3536) inet_wait_for_connect (net/ipv4/af_inet.c:609) __inet_stream_connect (net/ipv4/af_inet.c:702) inet_stream_connect (net/ipv4/af_inet.c:748) __sys_connect (./include/linux/file.h:45 net/socket.c:2064) __x64_sys_connect (net/socket.c:2073 net/socket.c:2070 net/socket.c:2070) do_syscall_64 (arch/x86/entry/common.c:51 arch/x86/entry/common.c:82) entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:129) RIP: 0033:0x7fa10ff05a3d Code: 5b 41 5c c3 66 0f 1f 84 00 00 00 00 00 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d ab a3 0e 00 f7 d8 64 89 01 48 RSP: 002b:00007fa110183de8 EFLAGS: 00000202 ORIG_RAX: 000000000000002a RAX: ffffffffffffffda RBX: 0000000020000054 RCX: 00007fa10ff05a3d RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000003 RBP: 00007fa110183e20 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000202 R12: 00007fa110184640 R13: 0000000000000000 R14: 00007fa10fe8b060 R15: 00007fff73e23b20 </TASK> The issue triggering process is analyzed as follows: Thread A Thread B tcp_v4_rcv //receive ack TCP packet inet_shutdown tcp_check_req tcp_disconnect //disconnect sock ... tcp_set_state(sk, TCP_CLOSE) inet_csk_complete_hashdance ... inet_csk_reqsk_queue_add inet_listen //start listen spin_lock(&queue->rskq_lock) inet_csk_listen_start ... reqsk_queue_alloc ... spin_lock_init spin_unlock(&queue->rskq_lock) //warning When the socket receives the ACK packet during the three-way handshake, it will hold spinlock. And then the user actively shutdowns the socket and listens to the socket immediately, the spinlock will be initialized. When the socket is going to release the spinlock, a warning is generated. Also the same issue to fastopenq.lock. Move init spinlock to inet_create and inet_accept to make sure init the accept_queue's spinlocks once. Fixes:fff1f3001c
("tcp: add a spinlock to protect struct request_sock_queue") Fixes:168a8f5805
("tcp: TCP Fast Open Server - main code path") Reported-by: Ming Shu <sming56@aliyun.com> Signed-off-by: Zhengchao Shao <shaozhengchao@huawei.com> Reviewed-by: Eric Dumazet <edumazet@google.com> Link: https://lore.kernel.org/r/20240118012019.1751966-1-shaozhengchao@huawei.com Signed-off-by: Jakub Kicinski <kuba@kernel.org>
130 lines
5.0 KiB
C
130 lines
5.0 KiB
C
// SPDX-License-Identifier: GPL-2.0-or-later
|
|
/*
|
|
* NET Generic infrastructure for Network protocols.
|
|
*
|
|
* Authors: Arnaldo Carvalho de Melo <acme@conectiva.com.br>
|
|
*
|
|
* From code originally in include/net/tcp.h
|
|
*/
|
|
|
|
#include <linux/module.h>
|
|
#include <linux/random.h>
|
|
#include <linux/slab.h>
|
|
#include <linux/string.h>
|
|
#include <linux/tcp.h>
|
|
#include <linux/vmalloc.h>
|
|
|
|
#include <net/request_sock.h>
|
|
|
|
/*
|
|
* Maximum number of SYN_RECV sockets in queue per LISTEN socket.
|
|
* One SYN_RECV socket costs about 80bytes on a 32bit machine.
|
|
* It would be better to replace it with a global counter for all sockets
|
|
* but then some measure against one socket starving all other sockets
|
|
* would be needed.
|
|
*
|
|
* The minimum value of it is 128. Experiments with real servers show that
|
|
* it is absolutely not enough even at 100conn/sec. 256 cures most
|
|
* of problems.
|
|
* This value is adjusted to 128 for low memory machines,
|
|
* and it will increase in proportion to the memory of machine.
|
|
* Note : Dont forget somaxconn that may limit backlog too.
|
|
*/
|
|
|
|
void reqsk_queue_alloc(struct request_sock_queue *queue)
|
|
{
|
|
queue->fastopenq.rskq_rst_head = NULL;
|
|
queue->fastopenq.rskq_rst_tail = NULL;
|
|
queue->fastopenq.qlen = 0;
|
|
|
|
queue->rskq_accept_head = NULL;
|
|
}
|
|
|
|
/*
|
|
* This function is called to set a Fast Open socket's "fastopen_rsk" field
|
|
* to NULL when a TFO socket no longer needs to access the request_sock.
|
|
* This happens only after 3WHS has been either completed or aborted (e.g.,
|
|
* RST is received).
|
|
*
|
|
* Before TFO, a child socket is created only after 3WHS is completed,
|
|
* hence it never needs to access the request_sock. things get a lot more
|
|
* complex with TFO. A child socket, accepted or not, has to access its
|
|
* request_sock for 3WHS processing, e.g., to retransmit SYN-ACK pkts,
|
|
* until 3WHS is either completed or aborted. Afterwards the req will stay
|
|
* until either the child socket is accepted, or in the rare case when the
|
|
* listener is closed before the child is accepted.
|
|
*
|
|
* In short, a request socket is only freed after BOTH 3WHS has completed
|
|
* (or aborted) and the child socket has been accepted (or listener closed).
|
|
* When a child socket is accepted, its corresponding req->sk is set to
|
|
* NULL since it's no longer needed. More importantly, "req->sk == NULL"
|
|
* will be used by the code below to determine if a child socket has been
|
|
* accepted or not, and the check is protected by the fastopenq->lock
|
|
* described below.
|
|
*
|
|
* Note that fastopen_rsk is only accessed from the child socket's context
|
|
* with its socket lock held. But a request_sock (req) can be accessed by
|
|
* both its child socket through fastopen_rsk, and a listener socket through
|
|
* icsk_accept_queue.rskq_accept_head. To protect the access a simple spin
|
|
* lock per listener "icsk->icsk_accept_queue.fastopenq->lock" is created.
|
|
* only in the rare case when both the listener and the child locks are held,
|
|
* e.g., in inet_csk_listen_stop() do we not need to acquire the lock.
|
|
* The lock also protects other fields such as fastopenq->qlen, which is
|
|
* decremented by this function when fastopen_rsk is no longer needed.
|
|
*
|
|
* Note that another solution was to simply use the existing socket lock
|
|
* from the listener. But first socket lock is difficult to use. It is not
|
|
* a simple spin lock - one must consider sock_owned_by_user() and arrange
|
|
* to use sk_add_backlog() stuff. But what really makes it infeasible is the
|
|
* locking hierarchy violation. E.g., inet_csk_listen_stop() may try to
|
|
* acquire a child's lock while holding listener's socket lock. A corner
|
|
* case might also exist in tcp_v4_hnd_req() that will trigger this locking
|
|
* order.
|
|
*
|
|
* This function also sets "treq->tfo_listener" to false.
|
|
* treq->tfo_listener is used by the listener so it is protected by the
|
|
* fastopenq->lock in this function.
|
|
*/
|
|
void reqsk_fastopen_remove(struct sock *sk, struct request_sock *req,
|
|
bool reset)
|
|
{
|
|
struct sock *lsk = req->rsk_listener;
|
|
struct fastopen_queue *fastopenq;
|
|
|
|
fastopenq = &inet_csk(lsk)->icsk_accept_queue.fastopenq;
|
|
|
|
RCU_INIT_POINTER(tcp_sk(sk)->fastopen_rsk, NULL);
|
|
spin_lock_bh(&fastopenq->lock);
|
|
fastopenq->qlen--;
|
|
tcp_rsk(req)->tfo_listener = false;
|
|
if (req->sk) /* the child socket hasn't been accepted yet */
|
|
goto out;
|
|
|
|
if (!reset || lsk->sk_state != TCP_LISTEN) {
|
|
/* If the listener has been closed don't bother with the
|
|
* special RST handling below.
|
|
*/
|
|
spin_unlock_bh(&fastopenq->lock);
|
|
reqsk_put(req);
|
|
return;
|
|
}
|
|
/* Wait for 60secs before removing a req that has triggered RST.
|
|
* This is a simple defense against TFO spoofing attack - by
|
|
* counting the req against fastopen.max_qlen, and disabling
|
|
* TFO when the qlen exceeds max_qlen.
|
|
*
|
|
* For more details see CoNext'11 "TCP Fast Open" paper.
|
|
*/
|
|
req->rsk_timer.expires = jiffies + 60*HZ;
|
|
if (fastopenq->rskq_rst_head == NULL)
|
|
fastopenq->rskq_rst_head = req;
|
|
else
|
|
fastopenq->rskq_rst_tail->dl_next = req;
|
|
|
|
req->dl_next = NULL;
|
|
fastopenq->rskq_rst_tail = req;
|
|
fastopenq->qlen++;
|
|
out:
|
|
spin_unlock_bh(&fastopenq->lock);
|
|
}
|