Skip to content

Commit 22204d4

Browse files
Paolo Abenibwhacks
authored andcommitted
netfilter: on sockopt() acquire sock lock only in the required scope
commit 3f34cfa upstream. Syzbot reported several deadlocks in the netfilter area caused by rtnl lock and socket lock being acquired with a different order on different code paths, leading to backtraces like the following one: ====================================================== WARNING: possible circular locking dependency detected 4.15.0-rc9+ torvalds#212 Not tainted ------------------------------------------------------ syzkaller041579/3682 is trying to acquire lock: (sk_lock-AF_INET6){+.+.}, at: [<000000008775e4dd>] lock_sock include/net/sock.h:1463 [inline] (sk_lock-AF_INET6){+.+.}, at: [<000000008775e4dd>] do_ipv6_setsockopt.isra.8+0x3c5/0x39d0 net/ipv6/ipv6_sockglue.c:167 but task is already holding lock: (rtnl_mutex){+.+.}, at: [<000000004342eaa9>] rtnl_lock+0x17/0x20 net/core/rtnetlink.c:74 which lock already depends on the new lock. the existing dependency chain (in reverse order) is: -> #1 (rtnl_mutex){+.+.}: __mutex_lock_common kernel/locking/mutex.c:756 [inline] __mutex_lock+0x16f/0x1a80 kernel/locking/mutex.c:893 mutex_lock_nested+0x16/0x20 kernel/locking/mutex.c:908 rtnl_lock+0x17/0x20 net/core/rtnetlink.c:74 register_netdevice_notifier+0xad/0x860 net/core/dev.c:1607 tee_tg_check+0x1a0/0x280 net/netfilter/xt_TEE.c:106 xt_check_target+0x22c/0x7d0 net/netfilter/x_tables.c:845 check_target net/ipv6/netfilter/ip6_tables.c:538 [inline] find_check_entry.isra.7+0x935/0xcf0 net/ipv6/netfilter/ip6_tables.c:580 translate_table+0xf52/0x1690 net/ipv6/netfilter/ip6_tables.c:749 do_replace net/ipv6/netfilter/ip6_tables.c:1165 [inline] do_ip6t_set_ctl+0x370/0x5f0 net/ipv6/netfilter/ip6_tables.c:1691 nf_sockopt net/netfilter/nf_sockopt.c:106 [inline] nf_setsockopt+0x67/0xc0 net/netfilter/nf_sockopt.c:115 ipv6_setsockopt+0x115/0x150 net/ipv6/ipv6_sockglue.c:928 udpv6_setsockopt+0x45/0x80 net/ipv6/udp.c:1422 sock_common_setsockopt+0x95/0xd0 net/core/sock.c:2978 SYSC_setsockopt net/socket.c:1849 [inline] SyS_setsockopt+0x189/0x360 net/socket.c:1828 entry_SYSCALL_64_fastpath+0x29/0xa0 -> #0 (sk_lock-AF_INET6){+.+.}: lock_acquire+0x1d5/0x580 kernel/locking/lockdep.c:3914 lock_sock_nested+0xc2/0x110 net/core/sock.c:2780 lock_sock include/net/sock.h:1463 [inline] do_ipv6_setsockopt.isra.8+0x3c5/0x39d0 net/ipv6/ipv6_sockglue.c:167 ipv6_setsockopt+0xd7/0x150 net/ipv6/ipv6_sockglue.c:922 udpv6_setsockopt+0x45/0x80 net/ipv6/udp.c:1422 sock_common_setsockopt+0x95/0xd0 net/core/sock.c:2978 SYSC_setsockopt net/socket.c:1849 [inline] SyS_setsockopt+0x189/0x360 net/socket.c:1828 entry_SYSCALL_64_fastpath+0x29/0xa0 other info that might help us debug this: Possible unsafe locking scenario: CPU0 CPU1 ---- ---- lock(rtnl_mutex); lock(sk_lock-AF_INET6); lock(rtnl_mutex); lock(sk_lock-AF_INET6); *** DEADLOCK *** 1 lock held by syzkaller041579/3682: #0: (rtnl_mutex){+.+.}, at: [<000000004342eaa9>] rtnl_lock+0x17/0x20 net/core/rtnetlink.c:74 The problem, as Florian noted, is that nf_setsockopt() is always called with the socket held, even if the lock itself is required only for very tight scopes and only for some operation. This patch addresses the issues moving the lock_sock() call only where really needed, namely in ipv*_getorigdst(), so that nf_setsockopt() does not need anymore to acquire both locks. Fixes: 22265a5 ("netfilter: xt_TEE: resolve oif using netdevice notifiers") Reported-by: [email protected] Suggested-by: Florian Westphal <[email protected]> Signed-off-by: Paolo Abeni <[email protected]> Signed-off-by: Pablo Neira Ayuso <[email protected]> [bwh: Backported to 3.2: Drop changes to ipv6_getorigdst()] Signed-off-by: Ben Hutchings <[email protected]>
1 parent 3f58460 commit 22204d4

File tree

3 files changed

+14
-23
lines changed

3 files changed

+14
-23
lines changed

net/ipv4/ip_sockglue.c

Lines changed: 4 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1030,11 +1030,8 @@ int ip_setsockopt(struct sock *sk, int level,
10301030
if (err == -ENOPROTOOPT && optname != IP_HDRINCL &&
10311031
optname != IP_IPSEC_POLICY &&
10321032
optname != IP_XFRM_POLICY &&
1033-
!ip_mroute_opt(optname)) {
1034-
lock_sock(sk);
1033+
!ip_mroute_opt(optname))
10351034
err = nf_setsockopt(sk, PF_INET, optname, optval, optlen);
1036-
release_sock(sk);
1037-
}
10381035
#endif
10391036
return err;
10401037
}
@@ -1059,12 +1056,9 @@ int compat_ip_setsockopt(struct sock *sk, int level, int optname,
10591056
if (err == -ENOPROTOOPT && optname != IP_HDRINCL &&
10601057
optname != IP_IPSEC_POLICY &&
10611058
optname != IP_XFRM_POLICY &&
1062-
!ip_mroute_opt(optname)) {
1063-
lock_sock(sk);
1064-
err = compat_nf_setsockopt(sk, PF_INET, optname,
1065-
optval, optlen);
1066-
release_sock(sk);
1067-
}
1059+
!ip_mroute_opt(optname))
1060+
err = compat_nf_setsockopt(sk, PF_INET, optname, optval,
1061+
optlen);
10681062
#endif
10691063
return err;
10701064
}

net/ipv4/netfilter/nf_conntrack_l3proto_ipv4.c

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -258,15 +258,19 @@ getorigdst(struct sock *sk, int optval, void __user *user, int *len)
258258
struct nf_conntrack_tuple tuple;
259259

260260
memset(&tuple, 0, sizeof(tuple));
261+
262+
lock_sock(sk);
261263
tuple.src.u3.ip = inet->inet_rcv_saddr;
262264
tuple.src.u.tcp.port = inet->inet_sport;
263265
tuple.dst.u3.ip = inet->inet_daddr;
264266
tuple.dst.u.tcp.port = inet->inet_dport;
265267
tuple.src.l3num = PF_INET;
266268
tuple.dst.protonum = sk->sk_protocol;
269+
release_sock(sk);
267270

268271
/* We only do TCP and SCTP at the moment: is there a better way? */
269-
if (sk->sk_protocol != IPPROTO_TCP && sk->sk_protocol != IPPROTO_SCTP) {
272+
if (tuple.dst.protonum != IPPROTO_TCP &&
273+
tuple.dst.protonum != IPPROTO_SCTP) {
270274
pr_debug("SO_ORIGINAL_DST: Not a TCP/SCTP socket\n");
271275
return -ENOPROTOOPT;
272276
}

net/ipv6/ipv6_sockglue.c

Lines changed: 5 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -841,12 +841,8 @@ int ipv6_setsockopt(struct sock *sk, int level, int optname,
841841
#ifdef CONFIG_NETFILTER
842842
/* we need to exclude all possible ENOPROTOOPTs except default case */
843843
if (err == -ENOPROTOOPT && optname != IPV6_IPSEC_POLICY &&
844-
optname != IPV6_XFRM_POLICY) {
845-
lock_sock(sk);
846-
err = nf_setsockopt(sk, PF_INET6, optname, optval,
847-
optlen);
848-
release_sock(sk);
849-
}
844+
optname != IPV6_XFRM_POLICY)
845+
err = nf_setsockopt(sk, PF_INET6, optname, optval, optlen);
850846
#endif
851847
return err;
852848
}
@@ -877,12 +873,9 @@ int compat_ipv6_setsockopt(struct sock *sk, int level, int optname,
877873
#ifdef CONFIG_NETFILTER
878874
/* we need to exclude all possible ENOPROTOOPTs except default case */
879875
if (err == -ENOPROTOOPT && optname != IPV6_IPSEC_POLICY &&
880-
optname != IPV6_XFRM_POLICY) {
881-
lock_sock(sk);
882-
err = compat_nf_setsockopt(sk, PF_INET6, optname,
883-
optval, optlen);
884-
release_sock(sk);
885-
}
876+
optname != IPV6_XFRM_POLICY)
877+
err = compat_nf_setsockopt(sk, PF_INET6, optname, optval,
878+
optlen);
886879
#endif
887880
return err;
888881
}

0 commit comments

Comments
 (0)