[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CANn89iJmpFStU6vBN6iXKSwzOHZ2S24QHgTTpuBW+SYu9hCP5g@mail.gmail.com>
Date: Thu, 18 Jan 2024 11:40:15 +0100
From: Eric Dumazet <edumazet@...gle.com>
To: Zhengchao Shao <shaozhengchao@...wei.com>
Cc: netdev@...r.kernel.org, davem@...emloft.net, kuba@...nel.org,
pabeni@...hat.com, dsahern@...nel.org, sming56@...yun.com, hkchu@...gle.com,
weiyongjun1@...wei.com, yuehaibing@...wei.com
Subject: Re: [PATCH net,v4] tcp: make sure init the accept_queue's spinlocks once
On Thu, Jan 18, 2024 at 2:10 AM Zhengchao Shao <shaozhengchao@...wei.com> wrote:
>
> When I run syz's reproduction C program locally, it causes the following
> issue:
> pvqspinlock: lock 0xffff9d181cd5c660 has corrupted value 0x0!
> WARNING: CPU: 19 PID: 21160 at __pv_queued_spin_unlock_slowpath (kernel/locking/qspinlock_paravirt.h:508)
>
...
> The issue triggering process is analyzed as follows:
> Thread A Thread B
> tcp_v4_rcv //receive ack TCP packet inet_shutdown
> tcp_check_req tcp_disconnect //disconnect sock
> ... tcp_set_state(sk, TCP_CLOSE)
> inet_csk_complete_hashdance ...
> inet_csk_reqsk_queue_add inet_listen //start listen
> spin_lock(&queue->rskq_lock) inet_csk_listen_start
> ... reqsk_queue_alloc
> ... spin_lock_init
> spin_unlock(&queue->rskq_lock) //warning
>
> When the socket receives the ACK packet during the three-way handshake,
> it will hold spinlock. And then the user actively shutdowns the socket
> and listens to the socket immediately, the spinlock will be initialized.
> When the socket is going to release the spinlock, a warning is generated.
> Also the same issue to fastopenq.lock.
>
> Move init spinlock to inet_create and inet_accept to make sure init the
> accept_queue's spinlocks once.
>
> Fixes: fff1f3001cc5 ("tcp: add a spinlock to protect struct request_sock_queue")
> Fixes: 168a8f58059a ("tcp: TCP Fast Open Server - main code path")
> Reported-by: Ming Shu <sming56@...yun.com>
> Signed-off-by: Zhengchao Shao <shaozhengchao@...wei.com>
Reviewed-by: Eric Dumazet <edumazet@...gle.com>
Thanks.
Powered by blists - more mailing lists