Source-Changes-HG archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
[src/trunk]: src/sys/net Call ether_input/m_freem without holding a lock or r...
details: https://anonhg.NetBSD.org/src/rev/74c4298e0e7d
branches: trunk
changeset: 335031:74c4298e0e7d
user: ozaki-r <ozaki-r%NetBSD.org@localhost>
date: Mon Dec 22 09:42:45 2014 +0000
description:
Call ether_input/m_freem without holding a lock or referencing unnecessary objects
When NET_MPSAFE on, a bridge tries to pass up a packet to Layer 3
(or call m_freem) with holding a lock or referencing unnecessary
objects. That causes random lock ups. The change fixes the issue.
diffstat:
sys/net/if_bridge.c | 21 +++++++++++----------
1 files changed, 11 insertions(+), 10 deletions(-)
diffs (79 lines):
diff -r d76c4cc34fe1 -r 74c4298e0e7d sys/net/if_bridge.c
--- a/sys/net/if_bridge.c Mon Dec 22 08:16:21 2014 +0000
+++ b/sys/net/if_bridge.c Mon Dec 22 09:42:45 2014 +0000
@@ -1,4 +1,4 @@
-/* $NetBSD: if_bridge.c,v 1.91 2014/08/15 15:32:24 ozaki-r Exp $ */
+/* $NetBSD: if_bridge.c,v 1.92 2014/12/22 09:42:45 ozaki-r Exp $ */
/*
* Copyright 2001 Wasabi Systems, Inc.
@@ -80,7 +80,7 @@
*/
#include <sys/cdefs.h>
-__KERNEL_RCSID(0, "$NetBSD: if_bridge.c,v 1.91 2014/08/15 15:32:24 ozaki-r Exp $");
+__KERNEL_RCSID(0, "$NetBSD: if_bridge.c,v 1.92 2014/12/22 09:42:45 ozaki-r Exp $");
#ifdef _KERNEL_OPT
#include "opt_bridge_ipf.h"
@@ -1804,6 +1804,7 @@
if (!(m->m_flags & (M_BCAST|M_MCAST)) &&
!bstp_state_before_learning(bif)) {
struct bridge_iflist *_bif;
+ struct ifnet *_ifp = NULL;
BRIDGE_LOCK(sc);
LIST_FOREACH(_bif, &sc->sc_iflist, bif_next) {
@@ -1812,21 +1813,22 @@
if (_bif->bif_flags & IFBIF_LEARNING)
(void) bridge_rtupdate(sc,
eh->ether_shost, ifp, 0, IFBAF_DYNAMIC);
- m->m_pkthdr.rcvif = _bif->bif_ifp;
- ether_input(_bif->bif_ifp, m);
+ _ifp = m->m_pkthdr.rcvif = _bif->bif_ifp;
break;
}
/* We just received a packet that we sent out. */
- if (bridge_ourether(_bif, eh, 1)) {
- m_freem(m);
+ if (bridge_ourether(_bif, eh, 1))
break;
- }
}
BRIDGE_UNLOCK(sc);
if (_bif != NULL) {
bridge_release_member(sc, bif);
+ if (_ifp != NULL)
+ ether_input(_ifp, m);
+ else
+ m_freem(m);
return;
}
}
@@ -1844,8 +1846,8 @@
* we've done historically. This also prevents some obnoxious behaviour.
*/
if (bstp_state_before_learning(bif)) {
+ bridge_release_member(sc, bif);
ether_input(ifp, m);
- bridge_release_member(sc, bif);
return;
}
@@ -1908,13 +1910,12 @@
bridge_enqueue(sc, dst_if, mc, 1);
}
+ BRIDGE_UNLOCK(sc);
if (bmcast)
ether_input(src_if, m);
else if (!used)
m_freem(m);
-
- BRIDGE_UNLOCK(sc);
}
/*
Home |
Main Index |
Thread Index |
Old Index