diff options
author | Jakub Kicinski <kuba@kernel.org> | 2025-04-08 12:59:48 -0700 |
---|---|---|
committer | Jakub Kicinski <kuba@kernel.org> | 2025-04-09 17:01:51 -0700 |
commit | a82dc19db13649aa4232ce37cb6f4ceff851e2fe (patch) | |
tree | 1c0351ac95b54efb6cfe7fd9f5ae598bb12a6fb6 /scripts/generate_rust_analyzer.py | |
parent | 420aabef3ab5fa743afb4d3d391f03ef0e777ca8 (diff) |
net: avoid potential race between netdev_get_by_index_lock() and netns switch
netdev_get_by_index_lock() performs following steps:
rcu_lock();
dev = lookup(netns, ifindex);
dev_get(dev);
rcu_unlock();
[... lock & validate the dev ...]
return dev
Validation right now only checks if the device is registered but since
the lookup is netns-aware we must also protect against the device
switching netns right after we dropped the RCU lock. Otherwise
the caller in netns1 may get a pointer to a device which has just
switched to netns2.
We can't hold the lock for the entire netns change process (because of
the NETDEV_UNREGISTER notifier), and there's no existing marking to
indicate that the netns is unlisted because of netns move, so add one.
AFAIU none of the existing netdev_get_by_index_lock() callers can
suffer from this problem (NAPI code double checks the netns membership
and other callers are either under rtnl_lock or not ns-sensitive),
so this patch does not have to be treated as a fix.
Reviewed-by: Joe Damato <jdamato@fastly.com>
Acked-by: Stanislav Fomichev <sdf@fomichev.me>
Link: https://patch.msgid.link/20250408195956.412733-2-kuba@kernel.org
Signed-off-by: Jakub Kicinski <kuba@kernel.org>
Diffstat (limited to 'scripts/generate_rust_analyzer.py')
0 files changed, 0 insertions, 0 deletions