aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorMarcelo Ricardo Leitner <marcelo.leitner@gmail.com>2017-02-23 07:31:18 -0500
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>2017-04-21 03:31:24 -0400
commit35b9d61ea910c1ebd4652b32cc7d713f6689b4f4 (patch)
treeee0a252fc4d70a51959abeee983485b94e26a424
parentc67c2be735b143422db69ba2012b2c93edb92baa (diff)
sctp: deny peeloff operation on asocs with threads sleeping on it
commit dfcb9f4f99f1e9a49e43398a7bfbf56927544af1 upstream. commit 2dcab5984841 ("sctp: avoid BUG_ON on sctp_wait_for_sndbuf") attempted to avoid a BUG_ON call when the association being used for a sendmsg() is blocked waiting for more sndbuf and another thread did a peeloff operation on such asoc, moving it to another socket. As Ben Hutchings noticed, then in such case it would return without locking back the socket and would cause two unlocks in a row. Further analysis also revealed that it could allow a double free if the application managed to peeloff the asoc that is created during the sendmsg call, because then sctp_sendmsg() would try to free the asoc that was created only for that call. This patch takes another approach. It will deny the peeloff operation if there is a thread sleeping on the asoc, so this situation doesn't exist anymore. This avoids the issues described above and also honors the syscalls that are already being handled (it can be multiple sendmsg calls). Joint work with Xin Long. Fixes: 2dcab5984841 ("sctp: avoid BUG_ON on sctp_wait_for_sndbuf") Cc: Alexander Popov <alex.popov@linux.com> Cc: Ben Hutchings <ben@decadent.org.uk> Signed-off-by: Marcelo Ricardo Leitner <marcelo.leitner@gmail.com> Signed-off-by: Xin Long <lucien.xin@gmail.com> Signed-off-by: David S. Miller <davem@davemloft.net> Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
-rw-r--r--net/sctp/socket.c8
1 files changed, 6 insertions, 2 deletions
diff --git a/net/sctp/socket.c b/net/sctp/socket.c
index 6cbe5bdf2b15..673442025bfd 100644
--- a/net/sctp/socket.c
+++ b/net/sctp/socket.c
@@ -4735,6 +4735,12 @@ int sctp_do_peeloff(struct sock *sk, sctp_assoc_t id, struct socket **sockp)
4735 if (!asoc) 4735 if (!asoc)
4736 return -EINVAL; 4736 return -EINVAL;
4737 4737
4738 /* If there is a thread waiting on more sndbuf space for
4739 * sending on this asoc, it cannot be peeled.
4740 */
4741 if (waitqueue_active(&asoc->wait))
4742 return -EBUSY;
4743
4738 /* An association cannot be branched off from an already peeled-off 4744 /* An association cannot be branched off from an already peeled-off
4739 * socket, nor is this supported for tcp style sockets. 4745 * socket, nor is this supported for tcp style sockets.
4740 */ 4746 */
@@ -7427,8 +7433,6 @@ static int sctp_wait_for_sndbuf(struct sctp_association *asoc, long *timeo_p,
7427 */ 7433 */
7428 release_sock(sk); 7434 release_sock(sk);
7429 current_timeo = schedule_timeout(current_timeo); 7435 current_timeo = schedule_timeout(current_timeo);
7430 if (sk != asoc->base.sk)
7431 goto do_error;
7432 lock_sock(sk); 7436 lock_sock(sk);
7433 7437
7434 *timeo_p = current_timeo; 7438 *timeo_p = current_timeo;