Eric Dumazet
c31a732fac
net: better track kernel sockets lifetime
[ Upstream commit 5c70eb5c59 ]
While kernel sockets are dismantled during pernet_operations->exit(),
their freeing can be delayed by any tx packets still held in qdisc
or device queues, due to skb_set_owner_w() prior calls.
This then trigger the following warning from ref_tracker_dir_exit() [1]
To fix this, make sure that kernel sockets own a reference on net->passive.
Add sk_net_refcnt_upgrade() helper, used whenever a kernel socket
is converted to a refcounted one.
[1]
[ 136.263918][ T35] ref_tracker: net notrefcnt@ffff8880638f01e0 has 1/2 users at
[ 136.263918][ T35] sk_alloc+0x2b3/0x370
[ 136.263918][ T35] inet6_create+0x6ce/0x10f0
[ 136.263918][ T35] __sock_create+0x4c0/0xa30
[ 136.263918][ T35] inet_ctl_sock_create+0xc2/0x250
[ 136.263918][ T35] igmp6_net_init+0x39/0x390
[ 136.263918][ T35] ops_init+0x31e/0x590
[ 136.263918][ T35] setup_net+0x287/0x9e0
[ 136.263918][ T35] copy_net_ns+0x33f/0x570
[ 136.263918][ T35] create_new_namespaces+0x425/0x7b0
[ 136.263918][ T35] unshare_nsproxy_namespaces+0x124/0x180
[ 136.263918][ T35] ksys_unshare+0x57d/0xa70
[ 136.263918][ T35] __x64_sys_unshare+0x38/0x40
[ 136.263918][ T35] do_syscall_64+0xf3/0x230
[ 136.263918][ T35] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 136.263918][ T35]
[ 136.343488][ T35] ref_tracker: net notrefcnt@ffff8880638f01e0 has 1/2 users at
[ 136.343488][ T35] sk_alloc+0x2b3/0x370
[ 136.343488][ T35] inet6_create+0x6ce/0x10f0
[ 136.343488][ T35] __sock_create+0x4c0/0xa30
[ 136.343488][ T35] inet_ctl_sock_create+0xc2/0x250
[ 136.343488][ T35] ndisc_net_init+0xa7/0x2b0
[ 136.343488][ T35] ops_init+0x31e/0x590
[ 136.343488][ T35] setup_net+0x287/0x9e0
[ 136.343488][ T35] copy_net_ns+0x33f/0x570
[ 136.343488][ T35] create_new_namespaces+0x425/0x7b0
[ 136.343488][ T35] unshare_nsproxy_namespaces+0x124/0x180
[ 136.343488][ T35] ksys_unshare+0x57d/0xa70
[ 136.343488][ T35] __x64_sys_unshare+0x38/0x40
[ 136.343488][ T35] do_syscall_64+0xf3/0x230
[ 136.343488][ T35] entry_SYSCALL_64_after_hwframe+0x77/0x7f
Fixes: 0cafd77dcd ("net: add a refcount tracker for kernel sockets")
Reported-by: syzbot+30a19e01a97420719891@syzkaller.appspotmail.com
Closes: https://lore.kernel.org/netdev/67b72aeb.050a0220.14d86d.0283.GAE@google.com/T/#u
Signed-off-by: Eric Dumazet <edumazet@google.com>
Reviewed-by: Kuniyuki Iwashima <kuniyu@amazon.com>
Link: https://patch.msgid.link/20250220131854.4048077-1-edumazet@google.com
Signed-off-by: Jakub Kicinski <kuba@kernel.org>
Signed-off-by: Sasha Levin <sashal@kernel.org>
2025-03-07 18:26:57 +01:00
..
2024-01-22 11:24:00 +00:00
2022-10-11 17:42:58 -06:00
2020-09-18 14:12:43 -07:00
2024-01-30 17:08:19 -08:00
2021-04-12 19:51:48 -03:00
2021-08-18 15:35:50 -07:00
2020-06-02 20:32:53 -03:00
2024-10-03 16:42:52 -07:00
2023-01-27 11:19:46 +00:00
2021-05-31 22:45:05 -07:00
2021-04-27 14:14:33 -07:00
2019-09-15 20:56:19 +02:00
2024-05-03 13:29:42 +01:00
2022-04-06 15:02:13 -03:00
2024-08-01 09:03:28 -07:00
2020-05-20 14:08:06 -07:00
2024-08-09 13:18:46 +01:00
2024-08-09 13:18:46 +01:00
2023-02-13 09:33:39 +00:00
2023-09-20 08:49:03 +01:00
2023-08-13 12:25:42 +01:00
2024-03-29 12:04:09 -07:00
2023-08-13 12:25:42 +01:00
2024-02-13 10:25:30 +01:00
2024-03-19 12:15:35 +01:00
2019-08-15 12:04:24 -07:00
2024-05-03 13:29:42 +01:00
2023-10-01 19:31:29 +01:00
2024-05-13 18:19:09 -06:00
2024-06-19 10:47:40 +01:00
2023-06-24 15:50:12 -07:00
2025-03-07 18:26:57 +01:00
2023-08-13 12:25:42 +01:00
2021-05-17 20:00:27 -05:00
2020-06-25 16:26:25 -07:00