public inbox for netdev@vger.kernel.org
 help / color / mirror / Atom feed
From: nai lin <ayano2023th@gmail.com>
To: Eric Dumazet <edumazet@google.com>
Cc: netdev@vger.kernel.org, "David S. Miller" <davem@davemloft.net>,
	Jakub Kicinski <kuba@kernel.org>, Paolo Abeni <pabeni@redhat.com>,
	Simon Horman <horms@kernel.org>,
	"Liam R. Howlett" <Liam.Howlett@oracle.com>,
	Anjali Kulkarni <anjali.k.kulkarni@oracle.com>,
	Li RongQing <lirongqing@baidu.com>,
	David Howells <dhowells@redhat.com>,
	Kuniyuki Iwashima <kuniyu@amazon.com>,
	linux-kernel@vger.kernel.org
Subject: Re: [PATCH] netlink: fix potential race issue in netlink_native_seq_show()
Date: Thu, 18 Jan 2024 10:15:08 +0800	[thread overview]
Message-ID: <20240118021508.GA18638@pkf-toy> (raw)
In-Reply-To: <CANn89iKjRpfDY=7CVdudHp8hMveqnq4zrQGw_AXhAcnPheOZBw@mail.gmail.com>

On Wed, Jan 17, 2024 at 11:28:24AM +0100, Eric Dumazet wrote:
> On Wed, Jan 17, 2024 at 9:38 AM nai lin <ayano2023th@gmail.com> wrote:
> >
> > Access to the nlk group should be protected by netlink_lock_table() like
> > commit <f773608026ee> ("netlink: access nlk groups safely in netlink bind
> > and getname"), otherwise there will be potential race conditions.
> >
> > Signed-off-by: nai lin <ayano2023th@gmail.com>
> 
> OK, I think you forgot to include this tag I suggested earlier to you.
> 
> Fixes: e341694e3eb5 ("netlink: Convert netlink_lookup() to use RCU
> protected hash table")
> 
Sorry I forgot to include fix tag, thank you for pointing out my problem
and thank you very much for your work.
> > ---
> >  net/netlink/af_netlink.c | 3 ++-
> >  1 file changed, 2 insertions(+), 1 deletion(-)
> >
> > diff --git a/net/netlink/af_netlink.c b/net/netlink/af_netlink.c
> > index 4ed8ffd58ff3..61ad81fb80f5 100644
> > --- a/net/netlink/af_netlink.c
> > +++ b/net/netlink/af_netlink.c
> > @@ -2693,6 +2693,7 @@ static int netlink_native_seq_show(struct seq_file *seq, void *v)
> >                 struct sock *s = v;
> >                 struct netlink_sock *nlk = nlk_sk(s);
> >
> > +               netlink_lock_table();
> 
> netlink_lock_table() is heavy weight, appropriate for contexts where
> we might sleep.
> 
> We could instead use a helper to acquire the lock for a very small period.
> 
> diff --git a/net/netlink/af_netlink.c b/net/netlink/af_netlink.c
> index 4ed8ffd58ff375f3fa9f262e6f3b4d1a1aaf2731..c50ca0f5adfb9691e6df37b4ac518b95c2d7908f
> 100644
> --- a/net/netlink/af_netlink.c
> +++ b/net/netlink/af_netlink.c
> @@ -1136,6 +1136,18 @@ static int netlink_connect(struct socket *sock,
> struct sockaddr *addr,
>         return err;
>  }
> 
> +static u32 netlink_get_groups_mask(const struct netlink_sock *nlk)
> +{
> +       unsigned long flags;
> +       u32 res;
> +
> +       read_lock_irqsave(&nl_table_lock, flags);
> +       res = nlk->groups ? nlk->groups[0] : 0;
> +       read_unlock_irqrestore(&nl_table_lock, flags);
> +
> +       return res;
> +}
> +
>  static int netlink_getname(struct socket *sock, struct sockaddr *addr,
>                            int peer)
>  {
> @@ -1153,9 +1165,7 @@ static int netlink_getname(struct socket *sock,
> struct sockaddr *addr,
>         } else {
>                 /* Paired with WRITE_ONCE() in netlink_insert() */
>                 nladdr->nl_pid = READ_ONCE(nlk->portid);
> -               netlink_lock_table();
> -               nladdr->nl_groups = nlk->groups ? nlk->groups[0] : 0;
> -               netlink_unlock_table();
> +               nladdr->nl_groups = netlink_get_groups_mask(nlk);
>         }
>         return sizeof(*nladdr);
>  }
> @@ -2697,7 +2707,7 @@ static int netlink_native_seq_show(struct
> seq_file *seq, void *v)
>                            s,
>                            s->sk_protocol,
>                            nlk->portid,
> -                          nlk->groups ? (u32)nlk->groups[0] : 0,
> +                          netlink_get_groups_mask(nlk),
>                            sk_rmem_alloc_get(s),
>                            sk_wmem_alloc_get(s),
>                            READ_ONCE(nlk->cb_running),

      reply	other threads:[~2024-01-18  2:15 UTC|newest]

Thread overview: 3+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2024-01-17  8:37 [PATCH] netlink: fix potential race issue in netlink_native_seq_show() nai lin
2024-01-17 10:28 ` Eric Dumazet
2024-01-18  2:15   ` nai lin [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20240118021508.GA18638@pkf-toy \
    --to=ayano2023th@gmail.com \
    --cc=Liam.Howlett@oracle.com \
    --cc=anjali.k.kulkarni@oracle.com \
    --cc=davem@davemloft.net \
    --cc=dhowells@redhat.com \
    --cc=edumazet@google.com \
    --cc=horms@kernel.org \
    --cc=kuba@kernel.org \
    --cc=kuniyu@amazon.com \
    --cc=linux-kernel@vger.kernel.org \
    --cc=lirongqing@baidu.com \
    --cc=netdev@vger.kernel.org \
    --cc=pabeni@redhat.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox