* NULL pointer dereference in veth_stats_one @ 2013-01-04 10:59 Tom Parkin 2013-01-04 15:45 ` Eric Dumazet 0 siblings, 1 reply; 8+ messages in thread From: Tom Parkin @ 2013-01-04 10:59 UTC (permalink / raw) To: netdev [-- Attachment #1.1: Type: text/plain, Size: 670 bytes --] Hi list, I recently tripped over a NULL pointer dereference in the veth driver. I'm running a 3.8.0_rc1 (updated from net-next git tree this morning) on an Athlon 64 X2 machine running a 32 bit kernel. To trigger the oops I simply created a veth interface as follows: ip link add name ve0 type veth peer name ve1 I did a little digging in the git history and I note that veth statistics changed a little with commit 2681128f0ced8aa4. I tried reverting that commit in my tree, which made the oops go away again. Thanks, Tom -- Tom Parkin Katalix Systems Ltd http://www.katalix.com Catalysts for your Embedded Linux software development [-- Attachment #1.2: veth-koops.txt --] [-- Type: text/plain, Size: 4219 bytes --] [ 266.169346] BUG: unable to handle kernel NULL pointer dereference at 000002c0 [ 266.172053] IP: [<f8177388>] veth_stats_one.isra.5+0x38/0xd0 [veth] [ 266.172053] *pde = 00000000 [ 266.172053] Oops: 0000 [#1] SMP [ 266.172053] Modules linked in: veth bridge stp llc l2tp_ip6 l2tp_ip l2tp_ppp pppox l2tp_eth l2tp_netlink l2tp_core radeon k9 [ 266.193196] Pid: 1544, comm: ip Not tainted 3.8.0-rc1-tpdev-23-lockdep+ #29 Gigabyte Technology Co., Ltd. GA-MA69VM-S2/GA-M2 [ 266.193196] EIP: 0060:[<f8177388>] EFLAGS: 00010297 CPU: 1 [ 266.193196] EIP is at veth_stats_one.isra.5+0x38/0xd0 [veth] [ 266.193196] EAX: 00000000 EBX: f47cd86c ECX: 00000000 EDX: 00000000 [ 266.193196] ESI: f47cd874 EDI: 00000000 EBP: f47cd864 ESP: f47cd840 [ 266.193196] DS: 007b ES: 007b FS: 00d8 GS: 00e0 SS: 0068 [ 266.193196] CR0: 8005003b CR2: 000002c0 CR3: 34456000 CR4: 000007d0 [ 266.193196] DR0: 00000000 DR1: 00000000 DR2: 00000000 DR3: 00000000 [ 266.193196] DR6: ffff0ff0 DR7: 00000400 [ 266.193196] Process ip (pid: 1544, ti=f47cc000 task=f732bf00 task.ti=f47cc000) [ 266.193196] Stack: [ 266.193196] f47cd86c 00000003 00000000 00000000 00000000 00000000 f47cd8d4 f345e000 [ 266.193196] f47cd98c f47cd888 f817746d 00000000 00000000 00000000 00000000 c13083d2 [ 266.193196] f47cd8d4 f345e000 f47cd8a0 c14fa6ab f8178040 f345f800 ffffffa6 f345f8bc [ 266.193196] Call Trace: [ 266.193196] [<f817746d>] veth_get_stats64+0x4d/0x80 [veth] [ 266.193196] [<c13083d2>] ? __nla_reserve+0x42/0x60 [ 266.193196] [<c14fa6ab>] dev_get_stats+0x5b/0x100 [ 266.193196] [<c15111e9>] rtnl_fill_ifinfo+0x4d9/0xc30 [ 266.193196] [<c109e2e6>] ? mark_held_locks+0x66/0xf0 [ 266.193196] [<c1155572>] ? __kmalloc_track_caller+0xc2/0x1e0 [ 266.193196] [<c14f201e>] ? __alloc_skb+0x5e/0x260 [ 266.193196] [<c14f1f39>] ? __kmalloc_reserve.isra.58+0x29/0x70 [ 266.193196] [<c14f202d>] ? __alloc_skb+0x6d/0x260 [ 266.193196] [<c15128ed>] rtmsg_ifinfo+0x7d/0x100 [ 266.193196] [<c1512a28>] rtnl_configure_link+0x78/0xa0 [ 266.193196] [<f8177633>] veth_newlink+0x143/0x30c [veth] [ 266.193196] [<c109e2e6>] ? mark_held_locks+0x66/0xf0 [ 266.193196] [<f81774f0>] ? veth_open+0x50/0x50 [veth] [ 266.193196] [<c1512edc>] rtnl_newlink+0x48c/0x540 [ 266.193196] [<c1512b5f>] ? rtnl_newlink+0x10f/0x540 [ 266.193196] [<c1512a50>] ? rtnl_configure_link+0xa0/0xa0 [ 266.193196] [<c1512693>] rtnetlink_rcv_msg+0x153/0x2a0 [ 266.193196] [<c160cbea>] ? mutex_lock_nested+0x21a/0x2e0 [ 266.193196] [<c150f534>] ? rtnl_lock+0x14/0x20 [ 266.193196] [<c1512540>] ? __rtnl_unlock+0x20/0x20 [ 266.193196] [<c15294be>] netlink_rcv_skb+0x8e/0xb0 [ 266.193196] [<c150f55c>] rtnetlink_rcv+0x1c/0x30 [ 266.193196] [<c1528e7d>] netlink_unicast+0x17d/0x1f0 [ 266.193196] [<c1529114>] netlink_sendmsg+0x224/0x390 [ 266.193196] [<c14e86c1>] sock_sendmsg+0xd1/0xf0 [ 266.193196] [<c1135b89>] ? might_fault+0x89/0x90 [ 266.193196] [<c12fa932>] ? _copy_from_user+0x42/0x60 [ 266.193196] [<c14f5c14>] ? verify_iovec+0x44/0xb0 [ 266.193196] [<c14e95d2>] __sys_sendmsg+0x262/0x270 [ 266.193196] [<c1073e4f>] ? sched_clock_cpu+0xcf/0x150 [ 266.193196] [<c109c02b>] ? trace_hardirqs_off+0xb/0x10 [ 266.193196] [<c1073f35>] ? local_clock+0x65/0x70 [ 266.193196] [<c109c69c>] ? lock_release_holdtime.part.23+0xbc/0xf0 [ 266.193196] [<c10a15ed>] ? lock_release_non_nested+0x29d/0x2e0 [ 266.193196] [<c1073f35>] ? local_clock+0x65/0x70 [ 266.193196] [<c1178ab1>] ? fget_light+0x371/0x450 [ 266.193196] [<c14eaccb>] sys_sendmsg+0x3b/0x60 [ 266.193196] [<c14eb373>] sys_socketcall+0x283/0x2e0 [ 266.193196] [<c16103e0>] ? restore_all+0xf/0xf [ 266.193196] [<c1613c90>] ? __do_page_fault+0x4e0/0x4e0 [ 266.193196] [<c12fa548>] ? trace_hardirqs_on_thunk+0xc/0x10 [ 266.193196] [<c1617b8d>] sysenter_do_call+0x12/0x38 [ 266.193196] Code: 00 c7 00 00 00 00 00 89 cf 89 c3 c7 40 04 00 00 00 00 89 d6 b9 ff ff ff ff c7 02 00 00 00 00 c7 42 04 00 b [ 266.193196] EIP: [<f8177388>] veth_stats_one.isra.5+0x38/0xd0 [veth] SS:ESP 0068:f47cd840 [ 266.193196] CR2: 00000000000002c0 [ 266.553774] ---[ end trace fff0ac235458be49 ]--- [-- Attachment #2: Digital signature --] [-- Type: application/pgp-signature, Size: 490 bytes --] ^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: NULL pointer dereference in veth_stats_one 2013-01-04 10:59 NULL pointer dereference in veth_stats_one Tom Parkin @ 2013-01-04 15:45 ` Eric Dumazet 2013-01-04 16:17 ` Eric Dumazet 0 siblings, 1 reply; 8+ messages in thread From: Eric Dumazet @ 2013-01-04 15:45 UTC (permalink / raw) To: Tom Parkin; +Cc: netdev On Fri, 2013-01-04 at 10:59 +0000, Tom Parkin wrote: > Hi list, > > I recently tripped over a NULL pointer dereference in the veth driver. > I'm running a 3.8.0_rc1 (updated from net-next git tree this morning) > on an Athlon 64 X2 machine running a 32 bit kernel. To trigger the > oops I simply created a veth interface as follows: > > ip link add name ve0 type veth peer name ve1 > > I did a little digging in the git history and I note that veth > statistics changed a little with commit 2681128f0ced8aa4. I tried > reverting that commit in my tree, which made the oops go away again. > > Thanks, > Tom Thanks Tom, I'll fix this. ^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: NULL pointer dereference in veth_stats_one 2013-01-04 15:45 ` Eric Dumazet @ 2013-01-04 16:17 ` Eric Dumazet 2013-01-04 18:17 ` Ben Hutchings 0 siblings, 1 reply; 8+ messages in thread From: Eric Dumazet @ 2013-01-04 16:17 UTC (permalink / raw) To: Tom Parkin, David Miller; +Cc: netdev From: Eric Dumazet <edumazet@google.com> On Fri, 2013-01-04 at 07:45 -0800, Eric Dumazet wrote: > On Fri, 2013-01-04 at 10:59 +0000, Tom Parkin wrote: > > Hi list, > > > > I recently tripped over a NULL pointer dereference in the veth driver. > > I'm running a 3.8.0_rc1 (updated from net-next git tree this morning) > > on an Athlon 64 X2 machine running a 32 bit kernel. To trigger the > > oops I simply created a veth interface as follows: > > > > ip link add name ve0 type veth peer name ve1 > > > > I did a little digging in the git history and I note that veth > > statistics changed a little with commit 2681128f0ced8aa4. I tried > > reverting that commit in my tree, which made the oops go away again. > > > > Thanks, > > Tom > > Thanks Tom, I'll fix this. > Oh well, a last minute change again... I was fooled by veth_get_ethtool_stats() doing the priv->peer->ifindex deref without checking. Here is the fix, thanks ! [PATCH net-next] veth: avoid a NULL deref in veth_stats_one commit 2681128f0ced8a (veth: extend device features) added a NULL deref in veth_stats_one(), as veth_get_stats64() was not testing if the peer device was setup or not. At init time, we call dev_get_stats() before veth pair is fully setup. [ 178.854758] [<ffffffffa00f5677>] veth_get_stats64+0x47/0x70 [veth] [ 178.861013] [<ffffffff814f0a2d>] dev_get_stats+0x6d/0x130 [ 178.866486] [<ffffffff81504efc>] rtnl_fill_ifinfo+0x47c/0x930 [ 178.872299] [<ffffffff81505b93>] rtmsg_ifinfo+0x83/0x100 [ 178.877678] [<ffffffff81505cc6>] rtnl_configure_link+0x76/0xa0 [ 178.883580] [<ffffffffa00f52fa>] veth_newlink+0x16a/0x350 [veth] [ 178.889654] [<ffffffff815061cc>] rtnl_newlink+0x4dc/0x5e0 [ 178.895128] [<ffffffff81505e1e>] ? rtnl_newlink+0x12e/0x5e0 [ 178.900769] [<ffffffff8150587d>] rtnetlink_rcv_msg+0x11d/0x310 [ 178.906669] [<ffffffff81505760>] ? __rtnl_unlock+0x20/0x20 [ 178.912225] [<ffffffff81521f89>] netlink_rcv_skb+0xa9/0xd0 [ 178.917779] [<ffffffff81502d55>] rtnetlink_rcv+0x25/0x40 [ 178.923159] [<ffffffff815218d1>] netlink_unicast+0x1b1/0x230 [ 178.928887] [<ffffffff81521c4e>] netlink_sendmsg+0x2fe/0x3b0 [ 178.934615] [<ffffffff814dbe22>] sock_sendmsg+0xd2/0xf0 So we must check if peer was setup in veth_get_stats64() Reported-by: Tom Parkin <tparkin@katalix.com> Signed-off-by: Eric Dumazet <edumazet@google.com> --- drivers/net/veth.c | 9 ++++++--- 1 file changed, 6 insertions(+), 3 deletions(-) diff --git a/drivers/net/veth.c b/drivers/net/veth.c index 8b2e112..bd57213 100644 --- a/drivers/net/veth.c +++ b/drivers/net/veth.c @@ -162,15 +162,18 @@ static struct rtnl_link_stats64 *veth_get_stats64(struct net_device *dev, struct rtnl_link_stats64 *tot) { struct veth_priv *priv = netdev_priv(dev); + struct net_device *peer = priv->peer; struct pcpu_vstats one; tot->tx_dropped = veth_stats_one(&one, dev); tot->tx_bytes = one.bytes; tot->tx_packets = one.packets; - tot->rx_dropped = veth_stats_one(&one, priv->peer); - tot->rx_bytes = one.bytes; - tot->rx_packets = one.packets; + if (peer) { + tot->rx_dropped = veth_stats_one(&one, peer); + tot->rx_bytes = one.bytes; + tot->rx_packets = one.packets; + } return tot; } ^ permalink raw reply related [flat|nested] 8+ messages in thread
* Re: NULL pointer dereference in veth_stats_one 2013-01-04 16:17 ` Eric Dumazet @ 2013-01-04 18:17 ` Ben Hutchings 2013-01-04 19:23 ` Eric Dumazet 0 siblings, 1 reply; 8+ messages in thread From: Ben Hutchings @ 2013-01-04 18:17 UTC (permalink / raw) To: Eric Dumazet; +Cc: Tom Parkin, David Miller, netdev On Fri, 2013-01-04 at 08:17 -0800, Eric Dumazet wrote: > From: Eric Dumazet <edumazet@google.com> > > On Fri, 2013-01-04 at 07:45 -0800, Eric Dumazet wrote: > > On Fri, 2013-01-04 at 10:59 +0000, Tom Parkin wrote: > > > Hi list, > > > > > > I recently tripped over a NULL pointer dereference in the veth driver. > > > I'm running a 3.8.0_rc1 (updated from net-next git tree this morning) > > > on an Athlon 64 X2 machine running a 32 bit kernel. To trigger the > > > oops I simply created a veth interface as follows: > > > > > > ip link add name ve0 type veth peer name ve1 > > > > > > I did a little digging in the git history and I note that veth > > > statistics changed a little with commit 2681128f0ced8aa4. I tried > > > reverting that commit in my tree, which made the oops go away again. > > > > > > Thanks, > > > Tom > > > > Thanks Tom, I'll fix this. > > > > Oh well, a last minute change again... > > I was fooled by veth_get_ethtool_stats() doing the priv->peer->ifindex > deref without checking. [...] > --- a/drivers/net/veth.c > +++ b/drivers/net/veth.c > @@ -162,15 +162,18 @@ static struct rtnl_link_stats64 *veth_get_stats64(struct net_device *dev, > struct rtnl_link_stats64 *tot) > { > struct veth_priv *priv = netdev_priv(dev); > + struct net_device *peer = priv->peer; > struct pcpu_vstats one; > > tot->tx_dropped = veth_stats_one(&one, dev); > tot->tx_bytes = one.bytes; > tot->tx_packets = one.packets; > > - tot->rx_dropped = veth_stats_one(&one, priv->peer); > - tot->rx_bytes = one.bytes; > - tot->rx_packets = one.packets; > + if (peer) { This possibly needs some memory barriers to properly synchronise with veth_newlink(). But can you not move initialisation of the peer pointers before registration of the devices in veth_newlink(), so that veth_get_stats64() cannot be called before they are initialised? Ben. > + tot->rx_dropped = veth_stats_one(&one, peer); > + tot->rx_bytes = one.bytes; > + tot->rx_packets = one.packets; > + } > > return tot; > } -- Ben Hutchings, Staff Engineer, Solarflare Not speaking for my employer; that's the marketing department's job. They asked us to note that Solarflare product names are trademarked. ^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: NULL pointer dereference in veth_stats_one 2013-01-04 18:17 ` Ben Hutchings @ 2013-01-04 19:23 ` Eric Dumazet 2013-01-04 20:25 ` Ben Hutchings 0 siblings, 1 reply; 8+ messages in thread From: Eric Dumazet @ 2013-01-04 19:23 UTC (permalink / raw) To: Ben Hutchings; +Cc: Tom Parkin, David Miller, netdev On Fri, 2013-01-04 at 18:17 +0000, Ben Hutchings wrote: > This possibly needs some memory barriers to properly synchronise with > veth_newlink(). But can you not move initialisation of the peer > pointers before registration of the devices in veth_newlink(), so that > veth_get_stats64() cannot be called before they are initialised? The ->peer pointer cannot change once set. ( its never cleared ) So the problem would not be in veth_newlink(), but might be in veth_dellink() It seems we would have a problem in veth_get_ethtool_stats() already... More generally, what prevents a get_stats() being called while a dellink() (-> veth_dev_free() -> free_percpu()) is done ? (Same thing is done for tunnel/dummy stats percpu data) ^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: NULL pointer dereference in veth_stats_one 2013-01-04 19:23 ` Eric Dumazet @ 2013-01-04 20:25 ` Ben Hutchings 2013-01-05 1:42 ` Eric Dumazet 0 siblings, 1 reply; 8+ messages in thread From: Ben Hutchings @ 2013-01-04 20:25 UTC (permalink / raw) To: Eric Dumazet; +Cc: Tom Parkin, David Miller, netdev On Fri, 2013-01-04 at 11:23 -0800, Eric Dumazet wrote: > On Fri, 2013-01-04 at 18:17 +0000, Ben Hutchings wrote: > > > This possibly needs some memory barriers to properly synchronise with > > veth_newlink(). But can you not move initialisation of the peer > > pointers before registration of the devices in veth_newlink(), so that > > veth_get_stats64() cannot be called before they are initialised? > > The ->peer pointer cannot change once set. ( its never cleared ) We may still need an explicit barrier for data-dependency. > So the problem would not be in veth_newlink(), but might be in > veth_dellink() A lot of things are done in between the unregister_netdevice_queue() and the actual deletion which are probably sufficient to flush out any calls to dev_get_stats(). But to make sure, I think we would need some small amount of shared state that isn't freed until both devices are. > It seems we would have a problem in veth_get_ethtool_stats() already... That should be OK because both ethtool operations and the whole process of interface deletion are serialised by the RTNL lock. > More generally, what prevents a get_stats() being called while a > dellink() (-> veth_dev_free() -> free_percpu()) is done ? Anything calling dev_get_stats() must have a counted or RCU reference to the device, and netdev_run_todo() waits for those to go away. For mutually referencing devices we want a kind of weak reference and we have no good way to implement those. Ben. > (Same thing is done for tunnel/dummy stats percpu data) -- Ben Hutchings, Staff Engineer, Solarflare Not speaking for my employer; that's the marketing department's job. They asked us to note that Solarflare product names are trademarked. ^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: NULL pointer dereference in veth_stats_one 2013-01-04 20:25 ` Ben Hutchings @ 2013-01-05 1:42 ` Eric Dumazet 2013-01-08 3:43 ` David Miller 0 siblings, 1 reply; 8+ messages in thread From: Eric Dumazet @ 2013-01-05 1:42 UTC (permalink / raw) To: Ben Hutchings; +Cc: Tom Parkin, David Miller, netdev From: Eric Dumazet <edumazet@google.com> On Fri, 2013-01-04 at 20:25 +0000, Ben Hutchings wrote: > Anything calling dev_get_stats() must have a counted or RCU reference to > the device, and netdev_run_todo() waits for those to go away. For > mutually referencing devices we want a kind of weak reference and we > have no good way to implement those. OK, so to be on the safe side I added RCU barriers/synchro everywhere. Thanks ! [PATCH v2 net-next] veth: avoid a NULL deref in veth_stats_one commit 2681128f0ced8a (veth: extend device features) added a NULL deref in veth_stats_one(), as veth_get_stats64() was not testing if the peer device was setup or not. At init time, we call dev_get_stats() before veth pair is fully setup. [ 178.854758] [<ffffffffa00f5677>] veth_get_stats64+0x47/0x70 [veth] [ 178.861013] [<ffffffff814f0a2d>] dev_get_stats+0x6d/0x130 [ 178.866486] [<ffffffff81504efc>] rtnl_fill_ifinfo+0x47c/0x930 [ 178.872299] [<ffffffff81505b93>] rtmsg_ifinfo+0x83/0x100 [ 178.877678] [<ffffffff81505cc6>] rtnl_configure_link+0x76/0xa0 [ 178.883580] [<ffffffffa00f52fa>] veth_newlink+0x16a/0x350 [veth] [ 178.889654] [<ffffffff815061cc>] rtnl_newlink+0x4dc/0x5e0 [ 178.895128] [<ffffffff81505e1e>] ? rtnl_newlink+0x12e/0x5e0 [ 178.900769] [<ffffffff8150587d>] rtnetlink_rcv_msg+0x11d/0x310 [ 178.906669] [<ffffffff81505760>] ? __rtnl_unlock+0x20/0x20 [ 178.912225] [<ffffffff81521f89>] netlink_rcv_skb+0xa9/0xd0 [ 178.917779] [<ffffffff81502d55>] rtnetlink_rcv+0x25/0x40 [ 178.923159] [<ffffffff815218d1>] netlink_unicast+0x1b1/0x230 [ 178.928887] [<ffffffff81521c4e>] netlink_sendmsg+0x2fe/0x3b0 [ 178.934615] [<ffffffff814dbe22>] sock_sendmsg+0xd2/0xf0 So we must check if peer was setup in veth_get_stats64() As pointed out by Ben Hutchings, priv->peer is missing proper synchronization. Adding RCU protection is a safe and well documented way to make sure we don't access about to be freed or already freed data. Reported-by: Tom Parkin <tparkin@katalix.com> Signed-off-by: Eric Dumazet <edumazet@google.com> CC: Ben Hutchings <bhutchings@solarflare.com> --- drivers/net/veth.c | 58 +++++++++++++++++++++++++++++-------------- 1 file changed, 40 insertions(+), 18 deletions(-) diff --git a/drivers/net/veth.c b/drivers/net/veth.c index 8b2e112..e778bff 100644 --- a/drivers/net/veth.c +++ b/drivers/net/veth.c @@ -32,7 +32,7 @@ struct pcpu_vstats { }; struct veth_priv { - struct net_device *peer; + struct net_device __rcu *peer; atomic64_t dropped; }; @@ -89,10 +89,10 @@ static int veth_get_sset_count(struct net_device *dev, int sset) static void veth_get_ethtool_stats(struct net_device *dev, struct ethtool_stats *stats, u64 *data) { - struct veth_priv *priv; + struct veth_priv *priv = netdev_priv(dev); + struct net_device *peer = rtnl_dereference(priv->peer); - priv = netdev_priv(dev); - data[0] = priv->peer->ifindex; + data[0] = peer ? peer->ifindex : 0; } static const struct ethtool_ops veth_ethtool_ops = { @@ -107,9 +107,15 @@ static const struct ethtool_ops veth_ethtool_ops = { static netdev_tx_t veth_xmit(struct sk_buff *skb, struct net_device *dev) { struct veth_priv *priv = netdev_priv(dev); - struct net_device *rcv = priv->peer; + struct net_device *rcv; int length = skb->len; + rcu_read_lock(); + rcv = rcu_dereference(priv->peer); + if (unlikely(!rcv)) { + kfree_skb(skb); + goto drop; + } /* don't change ip_summed == CHECKSUM_PARTIAL, as that * will cause bad checksum on forwarded packets */ @@ -125,9 +131,10 @@ static netdev_tx_t veth_xmit(struct sk_buff *skb, struct net_device *dev) stats->packets++; u64_stats_update_end(&stats->syncp); } else { +drop: atomic64_inc(&priv->dropped); } - + rcu_read_unlock(); return NETDEV_TX_OK; } @@ -162,30 +169,36 @@ static struct rtnl_link_stats64 *veth_get_stats64(struct net_device *dev, struct rtnl_link_stats64 *tot) { struct veth_priv *priv = netdev_priv(dev); + struct net_device *peer; struct pcpu_vstats one; tot->tx_dropped = veth_stats_one(&one, dev); tot->tx_bytes = one.bytes; tot->tx_packets = one.packets; - tot->rx_dropped = veth_stats_one(&one, priv->peer); - tot->rx_bytes = one.bytes; - tot->rx_packets = one.packets; + rcu_read_lock(); + peer = rcu_dereference(priv->peer); + if (peer) { + tot->rx_dropped = veth_stats_one(&one, peer); + tot->rx_bytes = one.bytes; + tot->rx_packets = one.packets; + } + rcu_read_unlock(); return tot; } static int veth_open(struct net_device *dev) { - struct veth_priv *priv; + struct veth_priv *priv = netdev_priv(dev); + struct net_device *peer = rtnl_dereference(priv->peer); - priv = netdev_priv(dev); - if (priv->peer == NULL) + if (!peer) return -ENOTCONN; - if (priv->peer->flags & IFF_UP) { + if (peer->flags & IFF_UP) { netif_carrier_on(dev); - netif_carrier_on(priv->peer); + netif_carrier_on(peer); } return 0; } @@ -195,7 +208,7 @@ static int veth_close(struct net_device *dev) struct veth_priv *priv = netdev_priv(dev); netif_carrier_off(dev); - netif_carrier_off(priv->peer); + netif_carrier_off(rtnl_dereference(priv->peer)); return 0; } @@ -380,10 +393,10 @@ static int veth_newlink(struct net *src_net, struct net_device *dev, */ priv = netdev_priv(dev); - priv->peer = peer; + rcu_assign_pointer(priv->peer, peer); priv = netdev_priv(peer); - priv->peer = dev; + rcu_assign_pointer(priv->peer, dev); return 0; err_register_dev: @@ -404,7 +417,16 @@ static void veth_dellink(struct net_device *dev, struct list_head *head) struct net_device *peer; priv = netdev_priv(dev); - peer = priv->peer; + peer = rtnl_dereference(priv->peer); + + /* Note : dellink() is called from default_device_exit_batch(), + * before a rcu_synchronize() point. The devices are guaranteed + * not being freed before one RCU grace period. + */ + RCU_INIT_POINTER(priv->peer, NULL); + + priv = netdev_priv(peer); + RCU_INIT_POINTER(priv->peer, NULL); unregister_netdevice_queue(dev, head); unregister_netdevice_queue(peer, head); ^ permalink raw reply related [flat|nested] 8+ messages in thread
* Re: NULL pointer dereference in veth_stats_one 2013-01-05 1:42 ` Eric Dumazet @ 2013-01-08 3:43 ` David Miller 0 siblings, 0 replies; 8+ messages in thread From: David Miller @ 2013-01-08 3:43 UTC (permalink / raw) To: erdnetdev; +Cc: bhutchings, tparkin, netdev From: Eric Dumazet <erdnetdev@gmail.com> Date: Fri, 04 Jan 2013 17:42:40 -0800 > From: Eric Dumazet <edumazet@google.com> ... > [PATCH v2 net-next] veth: avoid a NULL deref in veth_stats_one Applied, thanks Eric. ^ permalink raw reply [flat|nested] 8+ messages in thread
end of thread, other threads:[~2013-01-08 3:43 UTC | newest] Thread overview: 8+ messages (download: mbox.gz follow: Atom feed -- links below jump to the message on this page -- 2013-01-04 10:59 NULL pointer dereference in veth_stats_one Tom Parkin 2013-01-04 15:45 ` Eric Dumazet 2013-01-04 16:17 ` Eric Dumazet 2013-01-04 18:17 ` Ben Hutchings 2013-01-04 19:23 ` Eric Dumazet 2013-01-04 20:25 ` Ben Hutchings 2013-01-05 1:42 ` Eric Dumazet 2013-01-08 3:43 ` David Miller
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox; as well as URLs for NNTP newsgroup(s).