From: Hangbin Liu <liuhangbin@gmail.com>
To: Jiayuan Chen <jiayuan.chen@linux.dev>
Cc: "David S. Miller" <davem@davemloft.net>,
David Ahern <dsahern@kernel.org>,
Eric Dumazet <edumazet@google.com>,
Jakub Kicinski <kuba@kernel.org>, Paolo Abeni <pabeni@redhat.com>,
Simon Horman <horms@kernel.org>, David Ahern <dsahern@gmail.com>,
netdev@vger.kernel.org, linux-kernel@vger.kernel.org,
Fei Liu <feliu@redhat.com>
Subject: Re: [PATCH net] ipv6: fix data race in fib6_metric_set() using cmpxchg
Date: Thu, 26 Mar 2026 07:13:36 +0000 [thread overview]
Message-ID: <acTcoK1P7SFpDfwV@fedora> (raw)
In-Reply-To: <acTV0uiLrGTByBAC@fedora>
On Thu, Mar 26, 2026 at 06:44:43AM +0000, Hangbin Liu wrote:
> On Thu, Mar 26, 2026 at 02:23:15PM +0800, Jiayuan Chen wrote:
> >
> > On 3/26/26 12:22 PM, Hangbin Liu wrote:
> > > fib6_metric_set() may be called concurrently from softirq context without
> > > holding the FIB table lock. A typical path is:
> > >
> > > ndisc_router_discovery()
> > > spin_unlock_bh(&table->tb6_lock) <- lock released
> > > fib6_metric_set(rt, RTAX_HOPLIMIT, ...) <- lockless call
> > >
> > > When two CPUs process Router Advertisement packets for the same router
> > > simultaneously, they can both arrive at fib6_metric_set() with the same
> > > fib6_info pointer whose fib6_metrics still points to dst_default_metrics.
> > >
> > > if (f6i->fib6_metrics == &dst_default_metrics) { /* both CPUs: true */
> > > struct dst_metrics *p = kzalloc_obj(*p, GFP_ATOMIC);
> > > refcount_set(&p->refcnt, 1);
> > > f6i->fib6_metrics = p; /* CPU1 overwrites CPU0's p -> p0 leaked */
> > > }
> > >
> > > The dst_metrics allocated by the losing CPU has refcnt=1 but no pointer
> > > to it anywhere in memory, producing a kmemleak report:
> > >
> > > unreferenced object 0xff1100025aca1400 (size 96):
> > > comm "softirq", pid 0, jiffies 4299271239
> > > backtrace:
> > > kmalloc_trace+0x28a/0x380
> > > fib6_metric_set+0xcd/0x180
> > > ndisc_router_discovery+0x12dc/0x24b0
> > > icmpv6_rcv+0xc16/0x1360
> > >
> > > Fix this by replacing the plain pointer store with cmpxchg() and free
> > > the allocation safely when competition failed.
> > >
> > > Fixes: d4ead6b34b67 ("net/ipv6: move metrics from dst to rt6_info")
> > > Reported-by: Fei Liu <feliu@redhat.com>
> > > Signed-off-by: Hangbin Liu <liuhangbin@gmail.com>
> > > ---
> > > net/ipv6/ip6_fib.c | 6 ++++--
> > > 1 file changed, 4 insertions(+), 2 deletions(-)
> > >
> > > diff --git a/net/ipv6/ip6_fib.c b/net/ipv6/ip6_fib.c
> > > index dd26657b6a4a..64de761f40d5 100644
> > > --- a/net/ipv6/ip6_fib.c
> > > +++ b/net/ipv6/ip6_fib.c
> > > @@ -730,14 +730,16 @@ void fib6_metric_set(struct fib6_info *f6i, int metric, u32 val)
> > > if (!f6i)
> > > return;
> > > - if (f6i->fib6_metrics == &dst_default_metrics) {
> > > + if (READ_ONCE(f6i->fib6_metrics) == &dst_default_metrics) {
> > > + struct dst_metrics *dflt = (struct dst_metrics *)&dst_default_metrics;
> > > struct dst_metrics *p = kzalloc_obj(*p, GFP_ATOMIC);
> > > if (!p)
> > > return;
> > > refcount_set(&p->refcnt, 1);
> > > - f6i->fib6_metrics = p;
> > > + if (cmpxchg(&f6i->fib6_metrics, dflt, p) != dflt)
> > > + kfree(p);
> > > }
> >
> >
> > [...]
> >
> > > f6i->fib6_metrics->metrics[metric - 1] = val;
> >
> > Suggest using marked accessors to suppress KCSAN warnings:
> >
> > struct dst_metrics *m = READ_ONCE(f6i->fib6_metrics);
> > WRITE_ONCE(m->metrics[metric - 1], val);
>
> Thanks, I will update this in next version.
BTW, do we really need to WRITE_ONCE here? What if the `val` are different
on 2 CPUs? This would hide the problem, right?
Thanks
Hangbin
next prev parent reply other threads:[~2026-03-26 7:13 UTC|newest]
Thread overview: 9+ messages / expand[flat|nested] mbox.gz Atom feed top
2026-03-26 4:22 [PATCH net] ipv6: fix data race in fib6_metric_set() using cmpxchg Hangbin Liu
2026-03-26 6:23 ` Jiayuan Chen
2026-03-26 6:44 ` Hangbin Liu
2026-03-26 7:13 ` Hangbin Liu [this message]
2026-03-26 7:59 ` Jiayuan Chen
2026-03-26 12:05 ` Eric Dumazet
2026-03-26 13:13 ` Hangbin Liu
2026-03-26 13:43 ` Jiayuan Chen
2026-03-26 14:01 ` Eric Dumazet
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=acTcoK1P7SFpDfwV@fedora \
--to=liuhangbin@gmail.com \
--cc=davem@davemloft.net \
--cc=dsahern@gmail.com \
--cc=dsahern@kernel.org \
--cc=edumazet@google.com \
--cc=feliu@redhat.com \
--cc=horms@kernel.org \
--cc=jiayuan.chen@linux.dev \
--cc=kuba@kernel.org \
--cc=linux-kernel@vger.kernel.org \
--cc=netdev@vger.kernel.org \
--cc=pabeni@redhat.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox