Page MenuHomeFreeBSD

pf: protect the rpool from races
ClosedPublic

Authored by kp on Jan 13 2022, 10:06 AM.
Tags
None
Referenced Files
F150241504: D33874.id.diff
Mon, Mar 30, 1:31 PM
Unknown Object (File)
Mon, Mar 30, 2:59 AM
Unknown Object (File)
Sat, Mar 28, 7:06 AM
Unknown Object (File)
Fri, Mar 27, 10:53 PM
Unknown Object (File)
Thu, Mar 26, 12:25 PM
Unknown Object (File)
Thu, Mar 26, 11:14 AM
Unknown Object (File)
Wed, Mar 25, 8:39 PM
Unknown Object (File)
Fri, Mar 20, 7:29 AM

Details

Summary

The roundrobin pool stores its state in the rule, which could
potentially lead to invalid addresses being returned.

For example, thread A just executed PF_AINC(&rpool->counter) and
immediately afterwards thread B executes PF_ACPY(naddr, &rpool->counter)
(i.e. after the pf_match_addr() check of rpool->counter).

Lock the rpool with its own mutex to prevent these races. The
performance impact of this is expected to be low, as each rule has its
own lock, and the lock is also only relevant when state is being created
(so only for the initial packets of a connection, not for all traffic).

See also: https://redmine.pfsense.org/issues/12660
MFC after: 3 weeks
Sponsored by: Rubicon Communications, LLC ("Netgate")

Diff Detail

Repository
rS FreeBSD src repository - subversion
Lint
Lint Passed
Unit
No Test Coverage
Build Status
Buildable 43897
Build 40785: arc lint + arc unit