Skip to content

Commit b1fd94e

Browse files
Florian Westphalummakynes
authored andcommitted
netfilter: use get_random_u32 instead of prandom
bh might occur while updating per-cpu rnd_state from user context, ie. local_out path. BUG: using smp_processor_id() in preemptible [00000000] code: nginx/2725 caller is nft_ng_random_eval+0x24/0x54 [nft_numgen] Call Trace: check_preemption_disabled+0xde/0xe0 nft_ng_random_eval+0x24/0x54 [nft_numgen] Use the random driver instead, this also avoids need for local prandom state. Moreover, prandom now uses the random driver since d415077 ("random32: use real rng for non-deterministic randomness"). Based on earlier patch from Pablo Neira. Fixes: 6b2faee ("netfilter: nft_meta: place prandom handling in a helper") Fixes: 978d8f9 ("netfilter: nft_numgen: add map lookups for numgen random operations") Signed-off-by: Florian Westphal <[email protected]> Signed-off-by: Pablo Neira Ayuso <[email protected]>
1 parent f5826c8 commit b1fd94e

File tree

2 files changed

+5
-20
lines changed

2 files changed

+5
-20
lines changed

net/netfilter/nft_meta.c

Lines changed: 2 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -14,6 +14,7 @@
1414
#include <linux/in.h>
1515
#include <linux/ip.h>
1616
#include <linux/ipv6.h>
17+
#include <linux/random.h>
1718
#include <linux/smp.h>
1819
#include <linux/static_key.h>
1920
#include <net/dst.h>
@@ -32,8 +33,6 @@
3233
#define NFT_META_SECS_PER_DAY 86400
3334
#define NFT_META_DAYS_PER_WEEK 7
3435

35-
static DEFINE_PER_CPU(struct rnd_state, nft_prandom_state);
36-
3736
static u8 nft_meta_weekday(void)
3837
{
3938
time64_t secs = ktime_get_real_seconds();
@@ -271,13 +270,6 @@ static bool nft_meta_get_eval_ifname(enum nft_meta_keys key, u32 *dest,
271270
return true;
272271
}
273272

274-
static noinline u32 nft_prandom_u32(void)
275-
{
276-
struct rnd_state *state = this_cpu_ptr(&nft_prandom_state);
277-
278-
return prandom_u32_state(state);
279-
}
280-
281273
#ifdef CONFIG_IP_ROUTE_CLASSID
282274
static noinline bool
283275
nft_meta_get_eval_rtclassid(const struct sk_buff *skb, u32 *dest)
@@ -389,7 +381,7 @@ void nft_meta_get_eval(const struct nft_expr *expr,
389381
break;
390382
#endif
391383
case NFT_META_PRANDOM:
392-
*dest = nft_prandom_u32();
384+
*dest = get_random_u32();
393385
break;
394386
#ifdef CONFIG_XFRM
395387
case NFT_META_SECPATH:
@@ -518,7 +510,6 @@ int nft_meta_get_init(const struct nft_ctx *ctx,
518510
len = IFNAMSIZ;
519511
break;
520512
case NFT_META_PRANDOM:
521-
prandom_init_once(&nft_prandom_state);
522513
len = sizeof(u32);
523514
break;
524515
#ifdef CONFIG_XFRM

net/netfilter/nft_numgen.c

Lines changed: 3 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -9,12 +9,11 @@
99
#include <linux/netlink.h>
1010
#include <linux/netfilter.h>
1111
#include <linux/netfilter/nf_tables.h>
12+
#include <linux/random.h>
1213
#include <linux/static_key.h>
1314
#include <net/netfilter/nf_tables.h>
1415
#include <net/netfilter/nf_tables_core.h>
1516

16-
static DEFINE_PER_CPU(struct rnd_state, nft_numgen_prandom_state);
17-
1817
struct nft_ng_inc {
1918
u8 dreg;
2019
u32 modulus;
@@ -135,12 +134,9 @@ struct nft_ng_random {
135134
u32 offset;
136135
};
137136

138-
static u32 nft_ng_random_gen(struct nft_ng_random *priv)
137+
static u32 nft_ng_random_gen(const struct nft_ng_random *priv)
139138
{
140-
struct rnd_state *state = this_cpu_ptr(&nft_numgen_prandom_state);
141-
142-
return reciprocal_scale(prandom_u32_state(state), priv->modulus) +
143-
priv->offset;
139+
return reciprocal_scale(get_random_u32(), priv->modulus) + priv->offset;
144140
}
145141

146142
static void nft_ng_random_eval(const struct nft_expr *expr,
@@ -168,8 +164,6 @@ static int nft_ng_random_init(const struct nft_ctx *ctx,
168164
if (priv->offset + priv->modulus - 1 < priv->offset)
169165
return -EOVERFLOW;
170166

171-
prandom_init_once(&nft_numgen_prandom_state);
172-
173167
return nft_parse_register_store(ctx, tb[NFTA_NG_DREG], &priv->dreg,
174168
NULL, NFT_DATA_VALUE, sizeof(u32));
175169
}

0 commit comments

Comments
 (0)