lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Sat, 26 Sep 2015 14:09:03 -0400 From: Tejun Heo <tj@...nel.org> To: Herbert Xu <herbert@...dor.apana.org.au> Cc: David Miller <davem@...emloft.net>, cwang@...pensource.com, tom@...bertland.com, kafai@...com, kernel-team@...com, linux-kernel@...r.kernel.org, netdev@...r.kernel.org, torvalds@...ux-foundation.org, jiri@...nulli.us, nicolas.dichtel@...nd.com, tgraf@...g.ch, sfeldma@...il.com Subject: Re: netlink: Add netlink_bound helper and use it in netlink_getname Hello, Herbert. On Sat, Sep 26, 2015 at 09:16:21PM +0800, Herbert Xu wrote: > You misunderstood what I wrote. I was not basing this on whether > user-space transitions contained a barrier, but on the fact that > the next syscall must recheck nlk->bound before using nlk->portid. But that isn't what you wrote in the comment. /* No need for barriers here as we return to user-space without * using any of the bound attributes. */ > In fact thanks to your email I now realise that my fix to the > getsockname problem is wrong. Instead of adding a barrier to > netlink_connect I should be adding a nlk->bound check to getname. I don't know, man. This thread almost feels surreal at this point. > @@ -1628,7 +1632,7 @@ static int netlink_getname(struct socket *sock, struct sockaddr *addr, > nladdr->nl_pid = nlk->dst_portid; > nladdr->nl_groups = netlink_group_mask(nlk->dst_group); > } else { > - nladdr->nl_pid = nlk->portid; > + nladdr->nl_pid = netlink_bound(nlk) ? nlk->portid : 0; > nladdr->nl_groups = nlk->groups ? nlk->groups[0] : 0; > } > return 0; So, this is really weird because netlink_getname() doens't participate in the autobind race and thus it's perfectly fine for it to not worry about whether ->bound is set or the memory barrier - whoever its caller may be, the caller is of course responsible for ensuring that the port is bound and visible if it expects to read back the number - ie. if the caller doesn't know (in memory ordering sense) that bind/connect/sendmsg succeeded, it of course can't expect to reliably read back the port number. getname never needed the barrier. The above is shifting synchronization from the source to its users. This is a bad thing to do. Thanks. -- tejun -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists