summaryrefslogtreecommitdiff
path: root/sys/net
diff options
context:
space:
mode:
authormvs <mvs@cvs.openbsd.org>2020-10-03 00:23:56 +0000
committermvs <mvs@cvs.openbsd.org>2020-10-03 00:23:56 +0000
commitabeb3688fa2815e2090f8bea8d5e44741cd244eb (patch)
tree3505757aea1a915ecdfd0ff8053936aa19b15257 /sys/net
parent698b3ef75ae663b0942612b4aad7e926369ecb61 (diff)
Introduce `if_cloners_lock' rwlock and use it to serialize
if_clone_{create,destroy}(). This fixes the races described below. if_clone_{create,destroy}() are kernel locked, but since they touch various sleep points introduced by rwlocks and M_WAITOK allocations, without serialization they can intersect due to race condition. The avoided races are: 1. While performing if_clone_create(), concurrent thread which performing if_clone_create() can attach `ifp' with the same `if_xname' and made inconsistent `if_list' where all attached interfaces linked. 2. While performing if_clone_create(), concurrent thread which performing if_clone_destroy() can kill this incomplete `ifp'. 3. While performing if_clone_destroy(), concurrent thread which performing if_clone_destroy() can kill this dying `ifp'. ok claudio@ kn@ mpi@ sashan@
Diffstat (limited to 'sys/net')
-rw-r--r--sys/net/if.c25
1 files changed, 20 insertions, 5 deletions
diff --git a/sys/net/if.c b/sys/net/if.c
index 52b3d78142f..d49be448477 100644
--- a/sys/net/if.c
+++ b/sys/net/if.c
@@ -1,4 +1,4 @@
-/* $OpenBSD: if.c,v 1.619 2020/08/19 11:23:59 kn Exp $ */
+/* $OpenBSD: if.c,v 1.620 2020/10/03 00:23:55 mvs Exp $ */
/* $NetBSD: if.c,v 1.35 1996/05/07 05:26:04 thorpej Exp $ */
/*
@@ -87,6 +87,7 @@
#include <sys/percpu.h>
#include <sys/proc.h>
#include <sys/stdint.h> /* uintptr_t */
+#include <sys/rwlock.h>
#include <net/if.h>
#include <net/if_dl.h>
@@ -227,6 +228,8 @@ TAILQ_HEAD(, ifg_group) ifg_head = TAILQ_HEAD_INITIALIZER(ifg_head);
LIST_HEAD(, if_clone) if_cloners = LIST_HEAD_INITIALIZER(if_cloners);
int if_cloners_count;
+struct rwlock if_cloners_lock = RWLOCK_INITIALIZER("clonerlock");
+
/* hooks should only be added, deleted, and run from a process context */
struct mutex if_hooks_mtx = MUTEX_INITIALIZER(IPL_NONE);
void if_hooks_run(struct task_list *);
@@ -1139,19 +1142,25 @@ if_clone_create(const char *name, int rdomain)
if (ifc == NULL)
return (EINVAL);
- if (ifunit(name) != NULL)
- return (EEXIST);
+ rw_enter_write(&if_cloners_lock);
+
+ if (ifunit(name) != NULL) {
+ ret = EEXIST;
+ goto unlock;
+ }
ret = (*ifc->ifc_create)(ifc, unit);
if (ret != 0 || (ifp = ifunit(name)) == NULL)
- return (ret);
+ goto unlock;
NET_LOCK();
if_addgroup(ifp, ifc->ifc_name);
if (rdomain != 0)
if_setrdomain(ifp, rdomain);
NET_UNLOCK();
+unlock:
+ rw_exit_write(&if_cloners_lock);
return (ret);
}
@@ -1173,9 +1182,13 @@ if_clone_destroy(const char *name)
if (ifc->ifc_destroy == NULL)
return (EOPNOTSUPP);
+ rw_enter_write(&if_cloners_lock);
+
ifp = ifunit(name);
- if (ifp == NULL)
+ if (ifp == NULL) {
+ rw_exit_write(&if_cloners_lock);
return (ENXIO);
+ }
NET_LOCK();
if (ifp->if_flags & IFF_UP) {
@@ -1187,6 +1200,8 @@ if_clone_destroy(const char *name)
NET_UNLOCK();
ret = (*ifc->ifc_destroy)(ifp);
+ rw_exit_write(&if_cloners_lock);
+
return (ret);
}