ACK: [SRU][Bionic][Cosmic][PATCH 1/1] tcp: do not release socket ownership in tcp_close()
Connor Kuehl
connor.kuehl at canonical.com
Thu May 30 16:31:06 UTC 2019
On 5/28/19 5:22 PM, Ioanna Alifieraki wrote:
> From: Eric Dumazet <edumazet at google.com>
>
> BugLink: https://bugs.launchpad.net/bugs/1830813
>
> syzkaller was able to hit the WARN_ON(sock_owned_by_user(sk));
> in tcp_close()
>
> While a socket is being closed, it is very possible other
> threads find it in rtnetlink dump.
>
> tcp_get_info() will acquire the socket lock for a short amount
> of time (slow = lock_sock_fast(sk)/unlock_sock_fast(sk, slow);),
> enough to trigger the warning.
>
> Fixes: 67db3e4bfbc9 ("tcp: no longer hold ehash lock while calling tcp_get_info()")
> Signed-off-by: Eric Dumazet <edumazet at google.com>
> Reported-by: syzbot <syzkaller at googlegroups.com>
> Signed-off-by: David S. Miller <davem at davemloft.net>
> (cherry picked from commit 8873c064d1de579ea23412a6d3eee972593f142b)
> Signed-off-by: Ioanna Alifieraki <ioanna-maria.alifieraki at canonical.com>
Acked-by: Connor Kuehl <connor.kuehl at canonical.com>
> ---
> include/net/sock.h | 1 +
> net/core/sock.c | 2 +-
> net/ipv4/tcp.c | 11 +++--------
> 3 files changed, 5 insertions(+), 9 deletions(-)
>
> diff --git a/include/net/sock.h b/include/net/sock.h
> index 7a7b14e9628a..5fcdd5b7b47c 100644
> --- a/include/net/sock.h
> +++ b/include/net/sock.h
> @@ -1461,6 +1461,7 @@ static inline void lock_sock(struct sock *sk)
> lock_sock_nested(sk, 0);
> }
>
> +void __release_sock(struct sock *sk);
> void release_sock(struct sock *sk);
>
> /* BH context may only use the following locking interface. */
> diff --git a/net/core/sock.c b/net/core/sock.c
> index 1039cb1fdcff..050dba776f75 100644
> --- a/net/core/sock.c
> +++ b/net/core/sock.c
> @@ -2242,7 +2242,7 @@ static void __lock_sock(struct sock *sk)
> finish_wait(&sk->sk_lock.wq, &wait);
> }
>
> -static void __release_sock(struct sock *sk)
> +void __release_sock(struct sock *sk)
> __releases(&sk->sk_lock.slock)
> __acquires(&sk->sk_lock.slock)
> {
> diff --git a/net/ipv4/tcp.c b/net/ipv4/tcp.c
> index ba6255d934a4..8a9ea72c82fa 100644
> --- a/net/ipv4/tcp.c
> +++ b/net/ipv4/tcp.c
> @@ -2242,16 +2242,10 @@ void tcp_close(struct sock *sk, long timeout)
> sock_hold(sk);
> sock_orphan(sk);
>
> - /* It is the last release_sock in its life. It will remove backlog. */
> - release_sock(sk);
> -
> -
> - /* Now socket is owned by kernel and we acquire BH lock
> - * to finish close. No need to check for user refs.
> - */
> local_bh_disable();
> bh_lock_sock(sk);
> - WARN_ON(sock_owned_by_user(sk));
> + /* remove backlog if any, without releasing ownership. */
> + __release_sock(sk);
>
> percpu_counter_inc(sk->sk_prot->orphan_count);
>
> @@ -2320,6 +2314,7 @@ void tcp_close(struct sock *sk, long timeout)
> out:
> bh_unlock_sock(sk);
> local_bh_enable();
> + release_sock(sk);
> sock_put(sk);
> }
> EXPORT_SYMBOL(tcp_close);
>
--
Connor
-------------- next part --------------
A non-text attachment was scrubbed...
Name: pEpkey.asc
Type: application/pgp-keys
Size: 5950 bytes
Desc: not available
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20190530/8fe68365/attachment-0001.key>
More information about the kernel-team
mailing list