Module Name: src Committed By: ozaki-r Date: Thu Jul 27 09:53:57 UTC 2017
Modified Files: src/sys/net: raw_cb.c src/sys/netipsec: key.c keysock.c keysock.h Log Message: Let PF_KEY socks hold their own lock instead of softnet_lock Operations on SAD and SPD are executed via PF_KEY socks. The operations include deletions of SAs and SPs that will use synchronization mechanisms such as pserialize_perform to wait for references to SAs and SPs to be released. It is known that using such mechanisms with holding softnet_lock causes a dead lock. We should avoid the situation. To generate a diff of this commit: cvs rdiff -u -r1.22 -r1.23 src/sys/net/raw_cb.c cvs rdiff -u -r1.195 -r1.196 src/sys/netipsec/key.c cvs rdiff -u -r1.58 -r1.59 src/sys/netipsec/keysock.c cvs rdiff -u -r1.9 -r1.10 src/sys/netipsec/keysock.h Please note that diffs are not public domain; they are subject to the copyright notices on the relevant files.
Modified files: Index: src/sys/net/raw_cb.c diff -u src/sys/net/raw_cb.c:1.22 src/sys/net/raw_cb.c:1.23 --- src/sys/net/raw_cb.c:1.22 Wed May 21 20:43:56 2014 +++ src/sys/net/raw_cb.c Thu Jul 27 09:53:57 2017 @@ -1,4 +1,4 @@ -/* $NetBSD: raw_cb.c,v 1.22 2014/05/21 20:43:56 rmind Exp $ */ +/* $NetBSD: raw_cb.c,v 1.23 2017/07/27 09:53:57 ozaki-r Exp $ */ /* * Copyright (c) 1980, 1986, 1993 @@ -32,7 +32,7 @@ */ #include <sys/cdefs.h> -__KERNEL_RCSID(0, "$NetBSD: raw_cb.c,v 1.22 2014/05/21 20:43:56 rmind Exp $"); +__KERNEL_RCSID(0, "$NetBSD: raw_cb.c,v 1.23 2017/07/27 09:53:57 ozaki-r Exp $"); #include <sys/param.h> #include <sys/systm.h> @@ -104,7 +104,6 @@ raw_detach(struct socket *so) KASSERT(rp != NULL); KASSERT(solocked(so)); - KASSERT(so->so_lock == softnet_lock); /* XXX */ /* Remove the last reference. */ LIST_REMOVE(rp, rcb_list); @@ -113,6 +112,10 @@ raw_detach(struct socket *so) /* Note: sofree() drops the socket's lock. */ sofree(so); kmem_free(rp, rcb_len); + if (so->so_lock != softnet_lock) { + so->so_lock = softnet_lock; + mutex_obj_hold(softnet_lock); + } mutex_enter(softnet_lock); } Index: src/sys/netipsec/key.c diff -u src/sys/netipsec/key.c:1.195 src/sys/netipsec/key.c:1.196 --- src/sys/netipsec/key.c:1.195 Thu Jul 27 06:59:28 2017 +++ src/sys/netipsec/key.c Thu Jul 27 09:53:57 2017 @@ -1,4 +1,4 @@ -/* $NetBSD: key.c,v 1.195 2017/07/27 06:59:28 ozaki-r Exp $ */ +/* $NetBSD: key.c,v 1.196 2017/07/27 09:53:57 ozaki-r Exp $ */ /* $FreeBSD: src/sys/netipsec/key.c,v 1.3.2.3 2004/02/14 22:23:23 bms Exp $ */ /* $KAME: key.c,v 1.191 2001/06/27 10:46:49 sakane Exp $ */ @@ -32,7 +32,7 @@ */ #include <sys/cdefs.h> -__KERNEL_RCSID(0, "$NetBSD: key.c,v 1.195 2017/07/27 06:59:28 ozaki-r Exp $"); +__KERNEL_RCSID(0, "$NetBSD: key.c,v 1.196 2017/07/27 09:53:57 ozaki-r Exp $"); /* * This code is referd to RFC 2367 @@ -7591,6 +7591,8 @@ key_init(void) sysctl_net_key_compat_setup(NULL); RUN_ONCE(&key_init_once, key_do_init); + + key_init_so(); } /* Index: src/sys/netipsec/keysock.c diff -u src/sys/netipsec/keysock.c:1.58 src/sys/netipsec/keysock.c:1.59 --- src/sys/netipsec/keysock.c:1.58 Thu May 25 04:45:59 2017 +++ src/sys/netipsec/keysock.c Thu Jul 27 09:53:57 2017 @@ -1,4 +1,4 @@ -/* $NetBSD: keysock.c,v 1.58 2017/05/25 04:45:59 ozaki-r Exp $ */ +/* $NetBSD: keysock.c,v 1.59 2017/07/27 09:53:57 ozaki-r Exp $ */ /* $FreeBSD: src/sys/netipsec/keysock.c,v 1.3.2.1 2003/01/24 05:11:36 sam Exp $ */ /* $KAME: keysock.c,v 1.25 2001/08/13 20:07:41 itojun Exp $ */ @@ -32,7 +32,7 @@ */ #include <sys/cdefs.h> -__KERNEL_RCSID(0, "$NetBSD: keysock.c,v 1.58 2017/05/25 04:45:59 ozaki-r Exp $"); +__KERNEL_RCSID(0, "$NetBSD: keysock.c,v 1.59 2017/07/27 09:53:57 ozaki-r Exp $"); /* This code has derived from sys/net/rtsock.c on FreeBSD2.2.5 */ @@ -83,6 +83,15 @@ static int key_sendup0(struct rawcb *, s int key_registered_sb_max = (2048 * MHLEN); /* XXX arbitrary */ +static kmutex_t *key_so_mtx; + +void +key_init_so(void) +{ + + key_so_mtx = mutex_obj_alloc(MUTEX_DEFAULT, IPL_NONE); +} + /* * key_output() */ @@ -436,6 +445,12 @@ key_attach(struct socket *so, int proto) so->so_pcb = kp; s = splsoftnet(); + + KASSERT(so->so_lock == NULL); + mutex_obj_hold(key_so_mtx); + so->so_lock = key_so_mtx; + solock(so); + error = raw_attach(so, proto); if (error) { PFKEY_STATINC(PFKEY_STAT_SOCKERR); Index: src/sys/netipsec/keysock.h diff -u src/sys/netipsec/keysock.h:1.9 src/sys/netipsec/keysock.h:1.10 --- src/sys/netipsec/keysock.h:1.9 Fri Jun 2 03:32:51 2017 +++ src/sys/netipsec/keysock.h Thu Jul 27 09:53:57 2017 @@ -1,4 +1,4 @@ -/* $NetBSD: keysock.h,v 1.9 2017/06/02 03:32:51 ozaki-r Exp $ */ +/* $NetBSD: keysock.h,v 1.10 2017/07/27 09:53:57 ozaki-r Exp $ */ /* $FreeBSD: src/sys/netipsec/keysock.h,v 1.1.4.1 2003/01/24 05:11:36 sam Exp $ */ /* $KAME: keysock.h,v 1.8 2000/03/27 05:11:06 sumikawa Exp $ */ @@ -72,6 +72,8 @@ struct keycb { int kp_registered; /* registered socket */ }; +void key_init_so(void); + int key_sendup (struct socket *, struct sadb_msg *, u_int, int); int key_sendup_mbuf (struct socket *, struct mbuf *, int); #endif /* _KERNEL */