Skip to content

Commit c4eaca2

Browse files
author
Florian Westphal
committed
netfilter: nft_set_pipapo: don't check genbit from packetpath lookups
The pipapo set type is special in that it has two copies of its datastructure: one live copy containing only valid elements and one on-demand clone used during transaction where adds/deletes happen. This clone is not visible to the datapath. This is unlike all other set types in nftables, those all link new elements into their live hlist/tree. For those sets, the lookup functions must skip the new elements while the transaction is ongoing to ensure consistency. As the clone is shallow, removal does have an effect on the packet path: once the transaction enters the commit phase the 'gencursor' bit that determines which elements are active and which elements should be ignored (because they are no longer valid) is flipped. This causes the datapath lookup to ignore these elements if they are found during lookup. This opens up a small race window where pipapo has an inconsistent view of the dataset from when the transaction-cpu flipped the genbit until the transaction-cpu calls nft_pipapo_commit() to swap live/clone pointers: cpu0 cpu1 has added new elements to clone has marked elements as being inactive in new generation perform lookup in the set enters commit phase: I) increments the genbit A) observes new genbit removes elements from the clone so they won't be found anymore B) lookup in datastructure can't see new elements yet, but old elements are ignored -> Only matches elements that were not changed in the transaction II) calls nft_pipapo_commit(), clone and live pointers are swapped. C New nft_lookup happening now will find matching elements. Consider a packet matching range r1-r2: cpu0 processes following transaction: 1. remove r1-r2 2. add r1-r3 P is contained in both ranges. Therefore, cpu1 should always find a match for P. Due to above race, this is not the case: cpu1 does find r1-r2, but then ignores it due to the genbit indicating the range has been removed. At the same time, r1-r3 is not visible yet, because it can only be found in the clone. The situation persists for all lookups until after cpu0 hits II). The fix is easy: Don't check the genbit from pipapo lookup functions. This is possible because unlike the other set types, the new elements are not reachable from the live copy of the dataset. The clone/live pointer swap is enough to avoid matching on old elements while at the same time all new elements are exposed in one go. After this change, step B above returns a match in r1-r2. This is fine: r1-r2 only becomes truly invalid the moment they get freed. This happens after a synchronize_rcu() call and rcu read lock is held via netfilter hook traversal (nf_hook_slow()). Cc: Stefano Brivio <[email protected]> Fixes: 3c4287f ("nf_tables: Add set type for arbitrary concatenation of ranges") Signed-off-by: Florian Westphal <[email protected]>
1 parent 5e13f2c commit c4eaca2

File tree

2 files changed

+19
-5
lines changed

2 files changed

+19
-5
lines changed

net/netfilter/nft_set_pipapo.c

Lines changed: 18 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -510,6 +510,23 @@ static struct nft_pipapo_elem *pipapo_get(const struct nft_pipapo_match *m,
510510
*
511511
* This function is called from the data path. It will search for
512512
* an element matching the given key in the current active copy.
513+
* Unlike other set types, this uses NFT_GENMASK_ANY instead of
514+
* nft_genmask_cur().
515+
*
516+
* This is because new (future) elements are not reachable from
517+
* priv->match, they get added to priv->clone instead.
518+
* When the commit phase flips the generation bitmask, the
519+
* 'now old' entries are skipped but without the 'now current'
520+
* elements becoming visible. Using nft_genmask_cur() thus creates
521+
* inconsistent state: matching old entries get skipped but thew
522+
* newly matching entries are unreachable.
523+
*
524+
* GENMASK will still find the 'now old' entries which ensures consistent
525+
* priv->match view.
526+
*
527+
* nft_pipapo_commit swaps ->clone and ->match shortly after the
528+
* genbit flip. As ->clone doesn't contain the old entries in the first
529+
* place, lookup will only find the now-current ones.
513530
*
514531
* Return: ntables API extension pointer or NULL if no match.
515532
*/
@@ -518,12 +535,11 @@ nft_pipapo_lookup(const struct net *net, const struct nft_set *set,
518535
const u32 *key)
519536
{
520537
struct nft_pipapo *priv = nft_set_priv(set);
521-
u8 genmask = nft_genmask_cur(net);
522538
const struct nft_pipapo_match *m;
523539
const struct nft_pipapo_elem *e;
524540

525541
m = rcu_dereference(priv->match);
526-
e = pipapo_get(m, (const u8 *)key, genmask, get_jiffies_64());
542+
e = pipapo_get(m, (const u8 *)key, NFT_GENMASK_ANY, get_jiffies_64());
527543

528544
return e ? &e->ext : NULL;
529545
}

net/netfilter/nft_set_pipapo_avx2.c

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1152,7 +1152,6 @@ nft_pipapo_avx2_lookup(const struct net *net, const struct nft_set *set,
11521152
struct nft_pipapo *priv = nft_set_priv(set);
11531153
const struct nft_set_ext *ext = NULL;
11541154
struct nft_pipapo_scratch *scratch;
1155-
u8 genmask = nft_genmask_cur(net);
11561155
const struct nft_pipapo_match *m;
11571156
const struct nft_pipapo_field *f;
11581157
const u8 *rp = (const u8 *)key;
@@ -1248,8 +1247,7 @@ nft_pipapo_avx2_lookup(const struct net *net, const struct nft_set *set,
12481247
if (last) {
12491248
const struct nft_set_ext *e = &f->mt[ret].e->ext;
12501249

1251-
if (unlikely(nft_set_elem_expired(e) ||
1252-
!nft_set_elem_active(e, genmask)))
1250+
if (unlikely(nft_set_elem_expired(e)))
12531251
goto next_match;
12541252

12551253
ext = e;

0 commit comments

Comments
 (0)