* [PATCH] neighbour: Prevent Race condition in neighbour subsytem
@ 2021-04-21 19:42 Chinmay Agarwal
2021-04-21 21:50 ` patchwork-bot+netdevbpf
0 siblings, 1 reply; 2+ messages in thread
From: Chinmay Agarwal @ 2021-04-21 19:42 UTC (permalink / raw)
To: netdev, davem, xiyou.wangcong; +Cc: chinmay.12cs207, sharathv
Following Race Condition was detected:
<CPU A, t0>: Executing: __netif_receive_skb() ->__netif_receive_skb_core()
-> arp_rcv() -> arp_process().arp_process() calls __neigh_lookup() which
takes a reference on neighbour entry 'n'.
Moves further along, arp_process() and calls neigh_update()->
__neigh_update(). Neighbour entry is unlocked just before a call to
neigh_update_gc_list.
This unlocking paves way for another thread that may take a reference on
the same and mark it dead and remove it from gc_list.
<CPU B, t1> - neigh_flush_dev() is under execution and calls
neigh_mark_dead(n) marking the neighbour entry 'n' as dead. Also n will be
removed from gc_list.
Moves further along neigh_flush_dev() and calls
neigh_cleanup_and_release(n), but since reference count increased in t1,
'n' couldn't be destroyed.
<CPU A, t3>- Code hits neigh_update_gc_list, with neighbour entry
set as dead.
<CPU A, t4> - arp_process() finally calls neigh_release(n), destroying
the neighbour entry and we have a destroyed ntry still part of gc_list.
Fixes: eb4e8fac00d1("neighbour: Prevent a dead entry from updating gc_list")
Signed-off-by: Chinmay Agarwal <chinagar@codeaurora.org>
---
net/core/neighbour.c | 4 ++++
1 file changed, 4 insertions(+)
diff --git a/net/core/neighbour.c b/net/core/neighbour.c
index c26ecbe..bce395ed 100644
--- a/net/core/neighbour.c
+++ b/net/core/neighbour.c
@@ -133,6 +133,9 @@ static void neigh_update_gc_list(struct neighbour *n)
write_lock_bh(&n->tbl->lock);
write_lock(&n->lock);
+ if (n->dead)
+ goto out;
+
/* remove from the gc list if new state is permanent or if neighbor
* is externally learned; otherwise entry should be on the gc list
*/
@@ -149,6 +152,7 @@ static void neigh_update_gc_list(struct neighbour *n)
atomic_inc(&n->tbl->gc_entries);
}
+out:
write_unlock(&n->lock);
write_unlock_bh(&n->tbl->lock);
}
--
The Qualcomm Innovation Center, Inc. is a member of the Code Aurora Forum,
a Linux Foundation Collaborative Project
^ permalink raw reply related [flat|nested] 2+ messages in thread
* Re: [PATCH] neighbour: Prevent Race condition in neighbour subsytem
2021-04-21 19:42 [PATCH] neighbour: Prevent Race condition in neighbour subsytem Chinmay Agarwal
@ 2021-04-21 21:50 ` patchwork-bot+netdevbpf
0 siblings, 0 replies; 2+ messages in thread
From: patchwork-bot+netdevbpf @ 2021-04-21 21:50 UTC (permalink / raw)
To: Chinmay Agarwal; +Cc: netdev, davem, xiyou.wangcong, chinmay.12cs207, sharathv
Hello:
This patch was applied to netdev/net.git (refs/heads/master):
On Thu, 22 Apr 2021 01:12:22 +0530 you wrote:
> Following Race Condition was detected:
>
> <CPU A, t0>: Executing: __netif_receive_skb() ->__netif_receive_skb_core()
> -> arp_rcv() -> arp_process().arp_process() calls __neigh_lookup() which
> takes a reference on neighbour entry 'n'.
> Moves further along, arp_process() and calls neigh_update()->
> __neigh_update(). Neighbour entry is unlocked just before a call to
> neigh_update_gc_list.
>
> [...]
Here is the summary with links:
- neighbour: Prevent Race condition in neighbour subsytem
https://git.kernel.org/netdev/net/c/eefb45eef5c4
You are awesome, thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/patchwork/pwbot.html
^ permalink raw reply [flat|nested] 2+ messages in thread
end of thread, other threads:[~2021-04-21 21:50 UTC | newest]
Thread overview: 2+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2021-04-21 19:42 [PATCH] neighbour: Prevent Race condition in neighbour subsytem Chinmay Agarwal
2021-04-21 21:50 ` patchwork-bot+netdevbpf
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).