Skip to content

Commit 28e6b67

Browse files
borkmanndavem330
authored andcommitted
net: sched: fix refcount imbalance in actions
Since commit 55334a5 ("net_sched: act: refuse to remove bound action outside"), we end up with a wrong reference count for a tc action. Test case 1: FOO="1,6 0 0 4294967295," BAR="1,6 0 0 4294967294," tc filter add dev foo parent 1: bpf bytecode "$FOO" flowid 1:1 \ action bpf bytecode "$FOO" tc actions show action bpf action order 0: bpf bytecode '1,6 0 0 4294967295' default-action pipe index 1 ref 1 bind 1 tc actions replace action bpf bytecode "$BAR" index 1 tc actions show action bpf action order 0: bpf bytecode '1,6 0 0 4294967294' default-action pipe index 1 ref 2 bind 1 tc actions replace action bpf bytecode "$FOO" index 1 tc actions show action bpf action order 0: bpf bytecode '1,6 0 0 4294967295' default-action pipe index 1 ref 3 bind 1 Test case 2: FOO="1,6 0 0 4294967295," tc filter add dev foo parent 1: bpf bytecode "$FOO" flowid 1:1 action ok tc actions show action gact action order 0: gact action pass random type none pass val 0 index 1 ref 1 bind 1 tc actions add action drop index 1 RTNETLINK answers: File exists [...] tc actions show action gact action order 0: gact action pass random type none pass val 0 index 1 ref 2 bind 1 tc actions add action drop index 1 RTNETLINK answers: File exists [...] tc actions show action gact action order 0: gact action pass random type none pass val 0 index 1 ref 3 bind 1 What happens is that in tcf_hash_check(), we check tcf_common for a given index and increase tcfc_refcnt and conditionally tcfc_bindcnt when we've found an existing action. Now there are the following cases: 1) We do a late binding of an action. In that case, we leave the tcfc_refcnt/tcfc_bindcnt increased and are done with the ->init() handler. This is correctly handeled. 2) We replace the given action, or we try to add one without replacing and find out that the action at a specific index already exists (thus, we go out with error in that case). In case of 2), we have to undo the reference count increase from tcf_hash_check() in the tcf_hash_check() function. Currently, we fail to do so because of the 'tcfc_bindcnt > 0' check which bails out early with an -EPERM error. Now, while commit 55334a5 prevents 'tc actions del action ...' on an already classifier-bound action to drop the reference count (which could then become negative, wrap around etc), this restriction only accounts for invocations outside a specific action's ->init() handler. One possible solution would be to add a flag thus we possibly trigger the -EPERM ony in situations where it is indeed relevant. After the patch, above test cases have correct reference count again. Fixes: 55334a5 ("net_sched: act: refuse to remove bound action outside") Signed-off-by: Daniel Borkmann <[email protected]> Reviewed-by: Cong Wang <[email protected]> Signed-off-by: David S. Miller <[email protected]>
1 parent 990c9b3 commit 28e6b67

File tree

2 files changed

+13
-6
lines changed

2 files changed

+13
-6
lines changed

include/net/act_api.h

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -99,14 +99,20 @@ struct tc_action_ops {
9999

100100
int tcf_hash_search(struct tc_action *a, u32 index);
101101
void tcf_hash_destroy(struct tc_action *a);
102-
int tcf_hash_release(struct tc_action *a, int bind);
103102
u32 tcf_hash_new_index(struct tcf_hashinfo *hinfo);
104103
int tcf_hash_check(u32 index, struct tc_action *a, int bind);
105104
int tcf_hash_create(u32 index, struct nlattr *est, struct tc_action *a,
106105
int size, int bind);
107106
void tcf_hash_cleanup(struct tc_action *a, struct nlattr *est);
108107
void tcf_hash_insert(struct tc_action *a);
109108

109+
int __tcf_hash_release(struct tc_action *a, bool bind, bool strict);
110+
111+
static inline int tcf_hash_release(struct tc_action *a, bool bind)
112+
{
113+
return __tcf_hash_release(a, bind, false);
114+
}
115+
110116
int tcf_register_action(struct tc_action_ops *a, unsigned int mask);
111117
int tcf_unregister_action(struct tc_action_ops *a);
112118
int tcf_action_destroy(struct list_head *actions, int bind);

net/sched/act_api.c

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -45,15 +45,15 @@ void tcf_hash_destroy(struct tc_action *a)
4545
}
4646
EXPORT_SYMBOL(tcf_hash_destroy);
4747

48-
int tcf_hash_release(struct tc_action *a, int bind)
48+
int __tcf_hash_release(struct tc_action *a, bool bind, bool strict)
4949
{
5050
struct tcf_common *p = a->priv;
5151
int ret = 0;
5252

5353
if (p) {
5454
if (bind)
5555
p->tcfc_bindcnt--;
56-
else if (p->tcfc_bindcnt > 0)
56+
else if (strict && p->tcfc_bindcnt > 0)
5757
return -EPERM;
5858

5959
p->tcfc_refcnt--;
@@ -64,9 +64,10 @@ int tcf_hash_release(struct tc_action *a, int bind)
6464
ret = 1;
6565
}
6666
}
67+
6768
return ret;
6869
}
69-
EXPORT_SYMBOL(tcf_hash_release);
70+
EXPORT_SYMBOL(__tcf_hash_release);
7071

7172
static int tcf_dump_walker(struct sk_buff *skb, struct netlink_callback *cb,
7273
struct tc_action *a)
@@ -136,7 +137,7 @@ static int tcf_del_walker(struct sk_buff *skb, struct tc_action *a)
136137
head = &hinfo->htab[tcf_hash(i, hinfo->hmask)];
137138
hlist_for_each_entry_safe(p, n, head, tcfc_head) {
138139
a->priv = p;
139-
ret = tcf_hash_release(a, 0);
140+
ret = __tcf_hash_release(a, false, true);
140141
if (ret == ACT_P_DELETED) {
141142
module_put(a->ops->owner);
142143
n_i++;
@@ -408,7 +409,7 @@ int tcf_action_destroy(struct list_head *actions, int bind)
408409
int ret = 0;
409410

410411
list_for_each_entry_safe(a, tmp, actions, list) {
411-
ret = tcf_hash_release(a, bind);
412+
ret = __tcf_hash_release(a, bind, true);
412413
if (ret == ACT_P_DELETED)
413414
module_put(a->ops->owner);
414415
else if (ret < 0)

0 commit comments

Comments
 (0)