[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <1287655930-16879-1-git-send-email-timo.teras@iki.fi>
Date: Thu, 21 Oct 2010 13:12:10 +0300
From: Timo Teräs <timo.teras@....fi>
To: netdev@...r.kernel.org
Cc: Timo Teräs <timo.teras@....fi>
Subject: [PATCH] ipv4: synchronize bind() with RTM_NEWADDR notifications
Otherwise we have race condition to user land:
1. process A changes IP address
2. kernel sends RTM_NEWADDR
3. process B gets notification
4. process B tries to bind() to new IP but that fails with
EADDRNOTAVAIL because FIB is not yet updated and inet_addr_type() in
inet_bind() does not recognize the IP as local
5. kernel calls inetaddr_chain notifiers which updates FIB
IPv6 side seems to handle the notifications properly: bind()
immediately after RTM_NEWADDR succeeds as expected. This is because
ipv6_chk_addr() uses inet6_addr_lst which is updated before address
notification.
Signed-off-by: Timo Teräs <timo.teras@....fi>
---
net/ipv4/af_inet.c | 9 +++++++++
net/ipv6/af_inet6.c | 4 +++-
2 files changed, 12 insertions(+), 1 deletions(-)
diff --git a/net/ipv4/af_inet.c b/net/ipv4/af_inet.c
index 6a1100c..21200e4 100644
--- a/net/ipv4/af_inet.c
+++ b/net/ipv4/af_inet.c
@@ -466,6 +466,15 @@ int inet_bind(struct socket *sock, struct sockaddr *uaddr, int addr_len)
if (addr_len < sizeof(struct sockaddr_in))
goto out;
+ /* Acquire rtnl_lock to synchronize with possible simultaneous
+ * IP-address changes. This is needed because when RTM_NEWADDR
+ * is sent the new IP is not yet in FIB, but alas inet_addr_type
+ * checks the address type using FIB. Acquiring rtnl lock once
+ * makse sure that any address for which RTM_NEWADDR was sent
+ * earlier exists also in FIB. */
+ rtnl_lock();
+ rtnl_unlock();
+
chk_addr_ret = inet_addr_type(sock_net(sk), addr->sin_addr.s_addr);
/* Not specified by any standard per-se, however it breaks too
diff --git a/net/ipv6/af_inet6.c b/net/ipv6/af_inet6.c
index 56b9bf2..6fc37f4 100644
--- a/net/ipv6/af_inet6.c
+++ b/net/ipv6/af_inet6.c
@@ -300,7 +300,9 @@ int inet6_bind(struct socket *sock, struct sockaddr *uaddr, int addr_len)
goto out;
}
- /* Reproduce AF_INET checks to make the bindings consitant */
+ /* Reproduce AF_INET checks to make the bindings consistent */
+ rtnl_lock();
+ rtnl_unlock();
v4addr = addr->sin6_addr.s6_addr32[3];
chk_addr_ret = inet_addr_type(net, v4addr);
if (!sysctl_ip_nonlocal_bind &&
--
1.7.1
--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists