Page MenuHomeFreeBSD

pf: protect the rpool from races
ClosedPublic

Authored by kp on Jan 13 2022, 10:06 AM.
Tags
None
Referenced Files
Unknown Object (File)
Sat, Mar 30, 5:12 PM
Unknown Object (File)
Mar 4 2024, 9:12 AM
Unknown Object (File)
Feb 11 2024, 5:07 AM
Unknown Object (File)
Jan 12 2024, 7:56 AM
Unknown Object (File)
Dec 20 2023, 7:15 AM
Unknown Object (File)
Dec 18 2023, 12:19 PM
Unknown Object (File)
Nov 25 2023, 9:44 AM
Unknown Object (File)
Nov 22 2023, 12:02 PM

Details

Summary

The roundrobin pool stores its state in the rule, which could
potentially lead to invalid addresses being returned.

For example, thread A just executed PF_AINC(&rpool->counter) and
immediately afterwards thread B executes PF_ACPY(naddr, &rpool->counter)
(i.e. after the pf_match_addr() check of rpool->counter).

Lock the rpool with its own mutex to prevent these races. The
performance impact of this is expected to be low, as each rule has its
own lock, and the lock is also only relevant when state is being created
(so only for the initial packets of a connection, not for all traffic).

See also: https://redmine.pfsense.org/issues/12660
MFC after: 3 weeks
Sponsored by: Rubicon Communications, LLC ("Netgate")

Diff Detail

Repository
rG FreeBSD src repository
Lint
Lint Not Applicable
Unit
Tests Not Applicable