* [PATCH v2] RDMA/core: Fix race when resolving IP address
@ 2019-06-28 8:49 Dag Moxnes
2019-07-05 2:19 ` Parav Pandit
0 siblings, 1 reply; 5+ messages in thread
From: Dag Moxnes @ 2019-06-28 8:49 UTC (permalink / raw)
To: dag.moxnes, dledford, jgg, leon, parav; +Cc: linux-rdma, linux-kernel
Use neighbour lock when copying MAC address from neighbour data struct
in dst_fetch_ha.
When not using the lock, it is possible for the function to race with
neigh_update, causing it to copy an invalid MAC address.
It is possible to provoke this error by calling rdma_resolve_addr in a
tight loop, while deleting the corresponding ARP entry in another tight
loop.
Signed-off-by: Dag Moxnes <dag.moxnes@oracle.com>
Signed-off-by: Håkon Bugge <haakon.bugge@oracle.com>
---
v1 -> v2:
* Modified implementation to improve readability
---
drivers/infiniband/core/addr.c | 9 ++++++---
1 file changed, 6 insertions(+), 3 deletions(-)
diff --git a/drivers/infiniband/core/addr.c b/drivers/infiniband/core/addr.c
index 2f7d141598..51323ffbc5 100644
--- a/drivers/infiniband/core/addr.c
+++ b/drivers/infiniband/core/addr.c
@@ -333,11 +333,14 @@ static int dst_fetch_ha(const struct dst_entry *dst,
if (!n)
return -ENODATA;
- if (!(n->nud_state & NUD_VALID)) {
+ read_lock_bh(&n->lock);
+ if (n->nud_state & NUD_VALID) {
+ memcpy(dev_addr->dst_dev_addr, n->ha, MAX_ADDR_LEN);
+ read_unlock_bh(&n->lock);
+ } else {
+ read_unlock_bh(&n->lock);
neigh_event_send(n, NULL);
ret = -ENODATA;
- } else {
- memcpy(dev_addr->dst_dev_addr, n->ha, MAX_ADDR_LEN);
}
neigh_release(n);
--
2.20.1
^ permalink raw reply related [flat|nested] 5+ messages in thread
* Re: [PATCH v2] RDMA/core: Fix race when resolving IP address
2019-06-28 8:49 [PATCH v2] RDMA/core: Fix race when resolving IP address Dag Moxnes
@ 2019-07-05 2:19 ` Parav Pandit
2019-07-05 4:09 ` Leon Romanovsky
2019-07-05 9:03 ` Dag Moxnes
0 siblings, 2 replies; 5+ messages in thread
From: Parav Pandit @ 2019-07-05 2:19 UTC (permalink / raw)
To: Dag Moxnes
Cc: Doug Ledford, Jason Gunthorpe, Leon Romanovsky, Parav Pandit,
linux-rdma, Linux Kernel Mailing List
On Fri, Jun 28, 2019 at 2:20 PM Dag Moxnes <dag.moxnes@oracle.com> wrote:
>
> Use neighbour lock when copying MAC address from neighbour data struct
> in dst_fetch_ha.
>
> When not using the lock, it is possible for the function to race with
> neigh_update, causing it to copy an invalid MAC address.
>
> It is possible to provoke this error by calling rdma_resolve_addr in a
> tight loop, while deleting the corresponding ARP entry in another tight
> loop.
>
> Signed-off-by: Dag Moxnes <dag.moxnes@oracle.com>
> Signed-off-by: Håkon Bugge <haakon.bugge@oracle.com>
>
> ---
> v1 -> v2:
> * Modified implementation to improve readability
> ---
> drivers/infiniband/core/addr.c | 9 ++++++---
> 1 file changed, 6 insertions(+), 3 deletions(-)
>
> diff --git a/drivers/infiniband/core/addr.c b/drivers/infiniband/core/addr.c
> index 2f7d141598..51323ffbc5 100644
> --- a/drivers/infiniband/core/addr.c
> +++ b/drivers/infiniband/core/addr.c
> @@ -333,11 +333,14 @@ static int dst_fetch_ha(const struct dst_entry *dst,
> if (!n)
> return -ENODATA;
>
> - if (!(n->nud_state & NUD_VALID)) {
> + read_lock_bh(&n->lock);
> + if (n->nud_state & NUD_VALID) {
> + memcpy(dev_addr->dst_dev_addr, n->ha, MAX_ADDR_LEN);
> + read_unlock_bh(&n->lock);
> + } else {
> + read_unlock_bh(&n->lock);
> neigh_event_send(n, NULL);
> ret = -ENODATA;
> - } else {
> - memcpy(dev_addr->dst_dev_addr, n->ha, MAX_ADDR_LEN);
> }
>
> neigh_release(n);
> --
> 2.20.1
>
Reviewed-by: Parav Pandit <parav@mellanox.com>
A sample trace such as below in commit message would be good to have.
Or the similar one that you noticed with ARP delete sequence.
neigh_changeaddr()
neigh_flush_dev()
n->nud_state = NUD_NOARP;
Having some issues with office outlook, so replying via gmail.
^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: [PATCH v2] RDMA/core: Fix race when resolving IP address
2019-07-05 2:19 ` Parav Pandit
@ 2019-07-05 4:09 ` Leon Romanovsky
2019-07-09 12:26 ` Jason Gunthorpe
2019-07-05 9:03 ` Dag Moxnes
1 sibling, 1 reply; 5+ messages in thread
From: Leon Romanovsky @ 2019-07-05 4:09 UTC (permalink / raw)
To: Parav Pandit
Cc: Dag Moxnes, Doug Ledford, Jason Gunthorpe, Parav Pandit,
linux-rdma, Linux Kernel Mailing List
On Fri, Jul 05, 2019 at 07:49:06AM +0530, Parav Pandit wrote:
> On Fri, Jun 28, 2019 at 2:20 PM Dag Moxnes <dag.moxnes@oracle.com> wrote:
> >
> > Use neighbour lock when copying MAC address from neighbour data struct
> > in dst_fetch_ha.
> >
> > When not using the lock, it is possible for the function to race with
> > neigh_update, causing it to copy an invalid MAC address.
> >
> > It is possible to provoke this error by calling rdma_resolve_addr in a
> > tight loop, while deleting the corresponding ARP entry in another tight
> > loop.
> >
> > Signed-off-by: Dag Moxnes <dag.moxnes@oracle.com>
> > Signed-off-by: Håkon Bugge <haakon.bugge@oracle.com>
> >
> > ---
> > v1 -> v2:
> > * Modified implementation to improve readability
> > ---
> > drivers/infiniband/core/addr.c | 9 ++++++---
> > 1 file changed, 6 insertions(+), 3 deletions(-)
> >
> > diff --git a/drivers/infiniband/core/addr.c b/drivers/infiniband/core/addr.c
> > index 2f7d141598..51323ffbc5 100644
> > --- a/drivers/infiniband/core/addr.c
> > +++ b/drivers/infiniband/core/addr.c
> > @@ -333,11 +333,14 @@ static int dst_fetch_ha(const struct dst_entry *dst,
> > if (!n)
> > return -ENODATA;
> >
> > - if (!(n->nud_state & NUD_VALID)) {
> > + read_lock_bh(&n->lock);
> > + if (n->nud_state & NUD_VALID) {
> > + memcpy(dev_addr->dst_dev_addr, n->ha, MAX_ADDR_LEN);
> > + read_unlock_bh(&n->lock);
> > + } else {
> > + read_unlock_bh(&n->lock);
> > neigh_event_send(n, NULL);
> > ret = -ENODATA;
> > - } else {
> > - memcpy(dev_addr->dst_dev_addr, n->ha, MAX_ADDR_LEN);
> > }
> >
> > neigh_release(n);
> > --
> > 2.20.1
> >
> Reviewed-by: Parav Pandit <parav@mellanox.com>
>
> A sample trace such as below in commit message would be good to have.
> Or the similar one that you noticed with ARP delete sequence.
>
> neigh_changeaddr()
> neigh_flush_dev()
> n->nud_state = NUD_NOARP;
>
> Having some issues with office outlook, so replying via gmail.
Your replies from gmail looks much better when you used Outlook - proper
spacing between quoted text and your reply.
Thanks
^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: [PATCH v2] RDMA/core: Fix race when resolving IP address
2019-07-05 2:19 ` Parav Pandit
2019-07-05 4:09 ` Leon Romanovsky
@ 2019-07-05 9:03 ` Dag Moxnes
1 sibling, 0 replies; 5+ messages in thread
From: Dag Moxnes @ 2019-07-05 9:03 UTC (permalink / raw)
To: Parav Pandit
Cc: Doug Ledford, Jason Gunthorpe, Leon Romanovsky, Parav Pandit,
linux-rdma, Linux Kernel Mailing List
Den 05.07.2019 04:19, skrev Parav Pandit:
> On Fri, Jun 28, 2019 at 2:20 PM Dag Moxnes <dag.moxnes@oracle.com> wrote:
>> Use neighbour lock when copying MAC address from neighbour data struct
>> in dst_fetch_ha.
>>
>> When not using the lock, it is possible for the function to race with
>> neigh_update, causing it to copy an invalid MAC address.
>>
>> It is possible to provoke this error by calling rdma_resolve_addr in a
>> tight loop, while deleting the corresponding ARP entry in another tight
>> loop.
>>
>> Signed-off-by: Dag Moxnes <dag.moxnes@oracle.com>
>> Signed-off-by: Håkon Bugge <haakon.bugge@oracle.com>
>>
>> ---
>> v1 -> v2:
>> * Modified implementation to improve readability
>> ---
>> drivers/infiniband/core/addr.c | 9 ++++++---
>> 1 file changed, 6 insertions(+), 3 deletions(-)
>>
>> diff --git a/drivers/infiniband/core/addr.c b/drivers/infiniband/core/addr.c
>> index 2f7d141598..51323ffbc5 100644
>> --- a/drivers/infiniband/core/addr.c
>> +++ b/drivers/infiniband/core/addr.c
>> @@ -333,11 +333,14 @@ static int dst_fetch_ha(const struct dst_entry *dst,
>> if (!n)
>> return -ENODATA;
>>
>> - if (!(n->nud_state & NUD_VALID)) {
>> + read_lock_bh(&n->lock);
>> + if (n->nud_state & NUD_VALID) {
>> + memcpy(dev_addr->dst_dev_addr, n->ha, MAX_ADDR_LEN);
>> + read_unlock_bh(&n->lock);
>> + } else {
>> + read_unlock_bh(&n->lock);
>> neigh_event_send(n, NULL);
>> ret = -ENODATA;
>> - } else {
>> - memcpy(dev_addr->dst_dev_addr, n->ha, MAX_ADDR_LEN);
>> }
>>
>> neigh_release(n);
>> --
>> 2.20.1
>>
> Reviewed-by: Parav Pandit <parav@mellanox.com>
>
> A sample trace such as below in commit message would be good to have.
> Or the similar one that you noticed with ARP delete sequence.
>
> neigh_changeaddr()
> neigh_flush_dev()
> n->nud_state = NUD_NOARP;
>
> Having some issues with office outlook, so replying via gmail.
Hi Parav,
Thanks for your review. I'll add a sample trace to the commit message as
you suggest.
Regards,
-Dag
^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: [PATCH v2] RDMA/core: Fix race when resolving IP address
2019-07-05 4:09 ` Leon Romanovsky
@ 2019-07-09 12:26 ` Jason Gunthorpe
0 siblings, 0 replies; 5+ messages in thread
From: Jason Gunthorpe @ 2019-07-09 12:26 UTC (permalink / raw)
To: Leon Romanovsky
Cc: Parav Pandit, Dag Moxnes, Doug Ledford, Parav Pandit, linux-rdma,
Linux Kernel Mailing List
On Fri, Jul 05, 2019 at 07:09:50AM +0300, Leon Romanovsky wrote:
> On Fri, Jul 05, 2019 at 07:49:06AM +0530, Parav Pandit wrote:
> > On Fri, Jun 28, 2019 at 2:20 PM Dag Moxnes <dag.moxnes@oracle.com> wrote:
> > >
> > > Use neighbour lock when copying MAC address from neighbour data struct
> > > in dst_fetch_ha.
> > >
> > > When not using the lock, it is possible for the function to race with
> > > neigh_update, causing it to copy an invalid MAC address.
> > >
> > > It is possible to provoke this error by calling rdma_resolve_addr in a
> > > tight loop, while deleting the corresponding ARP entry in another tight
> > > loop.
> > >
> > > Signed-off-by: Dag Moxnes <dag.moxnes@oracle.com>
> > > Signed-off-by: Håkon Bugge <haakon.bugge@oracle.com>
> > >
> > > v1 -> v2:
> > > * Modified implementation to improve readability
> > > drivers/infiniband/core/addr.c | 9 ++++++---
> > > 1 file changed, 6 insertions(+), 3 deletions(-)
> > >
> > > diff --git a/drivers/infiniband/core/addr.c b/drivers/infiniband/core/addr.c
> > > index 2f7d141598..51323ffbc5 100644
> > > +++ b/drivers/infiniband/core/addr.c
> > > @@ -333,11 +333,14 @@ static int dst_fetch_ha(const struct dst_entry *dst,
> > > if (!n)
> > > return -ENODATA;
> > >
> > > - if (!(n->nud_state & NUD_VALID)) {
> > > + read_lock_bh(&n->lock);
> > > + if (n->nud_state & NUD_VALID) {
> > > + memcpy(dev_addr->dst_dev_addr, n->ha, MAX_ADDR_LEN);
> > > + read_unlock_bh(&n->lock);
> > > + } else {
> > > + read_unlock_bh(&n->lock);
> > > neigh_event_send(n, NULL);
> > > ret = -ENODATA;
> > > - } else {
> > > - memcpy(dev_addr->dst_dev_addr, n->ha, MAX_ADDR_LEN);
> > > }
> > >
> > > neigh_release(n);
> > >
> > Reviewed-by: Parav Pandit <parav@mellanox.com>
> >
> > A sample trace such as below in commit message would be good to have.
> > Or the similar one that you noticed with ARP delete sequence.
> >
> > neigh_changeaddr()
> > neigh_flush_dev()
> > n->nud_state = NUD_NOARP;
> >
> > Having some issues with office outlook, so replying via gmail.
>
> Your replies from gmail looks much better when you used Outlook - proper
> spacing between quoted text and your reply.
Why not use thunderbird or something?
Jason
^ permalink raw reply [flat|nested] 5+ messages in thread
end of thread, other threads:[~2019-07-09 12:26 UTC | newest]
Thread overview: 5+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2019-06-28 8:49 [PATCH v2] RDMA/core: Fix race when resolving IP address Dag Moxnes
2019-07-05 2:19 ` Parav Pandit
2019-07-05 4:09 ` Leon Romanovsky
2019-07-09 12:26 ` Jason Gunthorpe
2019-07-05 9:03 ` Dag Moxnes
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.