From owner-svn-src-head@freebsd.org Mon Aug 8 22:53:50 2016 Return-Path: Delivered-To: svn-src-head@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id B21A2BB3173 for ; Mon, 8 Aug 2016 22:53:50 +0000 (UTC) (envelope-from oliver.pinter@hardenedbsd.org) Received: from mail-wm0-x234.google.com (mail-wm0-x234.google.com [IPv6:2a00:1450:400c:c09::234]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority G2" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4142418E2 for ; Mon, 8 Aug 2016 22:53:50 +0000 (UTC) (envelope-from oliver.pinter@hardenedbsd.org) Received: by mail-wm0-x234.google.com with SMTP id o80so169443419wme.1 for ; Mon, 08 Aug 2016 15:53:50 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=hardenedbsd-org.20150623.gappssmtp.com; s=20150623; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=0RV2NvziXDZiFxu/HHuifNjn5Pp1sM5NfYO9xQ8wYoM=; b=YnZRVujk5L6vJx81jRi3bh6BZvdWFxoWJLraa4GzGPx6icwnyynbC/fRVbvYtTARsb 8aHMiXSC8oI+rBe/c5k4niL1l6nOxUPYlOHRCheJQy8i3qKDARx4ZipwfkxCMrjwTBKE Gkml1v2L1CCr6xNW7WGFA1c2UcN0qxUA3thtN8DA4oKDm3lVqTSta3osPGbr4ytLRpzT djJrXn4w4iVYJRFzOyqqmnqSB94SUIIsstljCF1QfgRxPkBBrYDjj38BJtC7glGb0F3w ok/HYdvn76H+pbsdY45YPqZV6T/eVhQmo2um0eYBI3tHCtVtaUq4KdnuQN3Kxe4TQ40h WfZw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=0RV2NvziXDZiFxu/HHuifNjn5Pp1sM5NfYO9xQ8wYoM=; b=HJ00/7+fPMGmVKFkeO6hosNRtFfG3MoEvJHjvAkiIIaQyElOkR6WPOqMPCGJeohAIP /0s9Pv/uQPqPIi3gzyqRk50Rr0rTsXqFNUdlBEmp7gcMlBlB6nvnszLN+9dXtovP3Mpj QhCnlRhvfP4Tiy8XrbZxVM+/GetsOf5U6yEQwPM8pU5l67jaGR+JgRiecgetvsKI1YfL f9cXVO0v/v8HBIT5jb2BoGh6YAxC46LyuWzH1j/FTqFhOsN6FnUXKqUe0+tlNmaQCXXY HFYIoaANSJB2+ErsiPV3FiVC3+0cSoCbwQOG4JdkSLu/BsMgHFZ0lvlYXtipZyvJUcH1 R/4A== X-Gm-Message-State: AEkoout+FRY3efaRyQS2Ut5tb3T4Mr2XCuCMGM6Qn8Jxp4YfE5JPJed3Pa0AJcm+u4hcyz8brk+0WnOcsbrXj4jw X-Received: by 10.194.185.202 with SMTP id fe10mr82435832wjc.93.1470696828554; Mon, 08 Aug 2016 15:53:48 -0700 (PDT) MIME-Version: 1.0 Received: by 10.194.73.99 with HTTP; Mon, 8 Aug 2016 15:53:47 -0700 (PDT) In-Reply-To: <201608082025.u78KP4aE048791@repo.freebsd.org> References: <201608082025.u78KP4aE048791@repo.freebsd.org> From: Oliver Pinter Date: Tue, 9 Aug 2016 00:53:47 +0200 Message-ID: Subject: Re: svn commit: r303855 - in head/sys: kern sys To: Mark Johnston Cc: "src-committers@freebsd.org" , "svn-src-all@freebsd.org" , "svn-src-head@freebsd.org" Content-Type: text/plain; charset=UTF-8 X-BeenThere: svn-src-head@freebsd.org X-Mailman-Version: 2.1.22 Precedence: list List-Id: SVN commit messages for the src tree for head/-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 08 Aug 2016 22:53:50 -0000 Hi! Can you please MFC back this change 10-STABLE together with the following: https://github.com/HardenedBSD/hardenedBSD/commit/576619e564618bca3675db57580d8e1f76bd2ac7 This issue is still exists on 10-STABLE, as you can test with the linked program from phabricator: https://people.freebsd.org/~mjg/reproducers/unp-gc-panic.c On Mon, Aug 8, 2016 at 10:25 PM, Mark Johnston wrote: > Author: markj > Date: Mon Aug 8 20:25:04 2016 > New Revision: 303855 > URL: https://svnweb.freebsd.org/changeset/base/303855 > > Log: > Handle races with listening socket close when connecting a unix socket. > > If the listening socket is closed while sonewconn() is executing, the > nascent child socket is aborted, which results in recursion on the > unp_link lock when the child's pru_detach method is invoked. Fix this > by using a flag to mark such sockets, and skip a part of the socket's > teardown during detach. > > Reported by: Raviprakash Darbha > Tested by: pho > MFC after: 2 weeks > Differential Revision: https://reviews.freebsd.org/D7398 > > Modified: > head/sys/kern/uipc_usrreq.c > head/sys/sys/unpcb.h > > Modified: head/sys/kern/uipc_usrreq.c > ============================================================================== > --- head/sys/kern/uipc_usrreq.c Mon Aug 8 20:23:11 2016 (r303854) > +++ head/sys/kern/uipc_usrreq.c Mon Aug 8 20:25:04 2016 (r303855) > @@ -430,6 +430,8 @@ uipc_attach(struct socket *so, int proto > unp->unp_socket = so; > so->so_pcb = unp; > unp->unp_refcount = 1; > + if (so->so_head != NULL) > + unp->unp_flags |= UNP_NASCENT; > > UNP_LIST_LOCK(); > unp->unp_gencnt = ++unp_gencnt; > @@ -652,14 +654,22 @@ uipc_detach(struct socket *so) > unp = sotounpcb(so); > KASSERT(unp != NULL, ("uipc_detach: unp == NULL")); > > - UNP_LINK_WLOCK(); > + vp = NULL; > + local_unp_rights = 0; > + > UNP_LIST_LOCK(); > - UNP_PCB_LOCK(unp); > LIST_REMOVE(unp, unp_link); > unp->unp_gencnt = ++unp_gencnt; > --unp_count; > UNP_LIST_UNLOCK(); > > + if ((unp->unp_flags & UNP_NASCENT) != 0) { > + UNP_PCB_LOCK(unp); > + goto teardown; > + } > + UNP_LINK_WLOCK(); > + UNP_PCB_LOCK(unp); > + > /* > * XXXRW: Should assert vp->v_socket == so. > */ > @@ -687,6 +697,7 @@ uipc_detach(struct socket *so) > } > local_unp_rights = unp_rights; > UNP_LINK_WUNLOCK(); > +teardown: > unp->unp_socket->so_pcb = NULL; > saved_unp_addr = unp->unp_addr; > unp->unp_addr = NULL; > @@ -1473,6 +1484,7 @@ unp_connect2(struct socket *so, struct s > > if (so2->so_type != so->so_type) > return (EPROTOTYPE); > + unp2->unp_flags &= ~UNP_NASCENT; > unp->unp_conn = unp2; > > switch (so->so_type) { > > Modified: head/sys/sys/unpcb.h > ============================================================================== > --- head/sys/sys/unpcb.h Mon Aug 8 20:23:11 2016 (r303854) > +++ head/sys/sys/unpcb.h Mon Aug 8 20:25:04 2016 (r303855) > @@ -103,11 +103,6 @@ struct unpcb { > #define UNP_WANTCRED 0x004 /* credentials wanted */ > #define UNP_CONNWAIT 0x008 /* connect blocks until accepted */ > > -#define UNPGC_REF 0x1 /* unpcb has external ref. */ > -#define UNPGC_DEAD 0x2 /* unpcb might be dead. */ > -#define UNPGC_SCANNED 0x4 /* Has been scanned. */ > -#define UNPGC_IGNORE_RIGHTS 0x8 /* Attached rights are freed */ > - > /* > * These flags are used to handle non-atomicity in connect() and bind() > * operations on a socket: in particular, to avoid races between multiple > @@ -115,6 +110,15 @@ struct unpcb { > */ > #define UNP_CONNECTING 0x010 /* Currently connecting. */ > #define UNP_BINDING 0x020 /* Currently binding. */ > +#define UNP_NASCENT 0x040 /* Newborn child socket. */ > + > +/* > + * Flags in unp_gcflag. > + */ > +#define UNPGC_REF 0x1 /* unpcb has external ref. */ > +#define UNPGC_DEAD 0x2 /* unpcb might be dead. */ > +#define UNPGC_SCANNED 0x4 /* Has been scanned. */ > +#define UNPGC_IGNORE_RIGHTS 0x8 /* Attached rights are freed */ > > #define sotounpcb(so) ((struct unpcb *)((so)->so_pcb)) > > _______________________________________________ > svn-src-head@freebsd.org mailing list > https://lists.freebsd.org/mailman/listinfo/svn-src-head > To unsubscribe, send any mail to "svn-src-head-unsubscribe@freebsd.org"