]> git.baikalelectronics.ru Git - kernel.git/commitdiff
tcp: annotate data-race around challenge_timestamp
authorEric Dumazet <edumazet@google.com>
Tue, 30 Aug 2022 18:56:55 +0000 (11:56 -0700)
committerJakub Kicinski <kuba@kernel.org>
Thu, 1 Sep 2022 02:56:48 +0000 (19:56 -0700)
challenge_timestamp can be read an written by concurrent threads.

This was expected, but we need to annotate the race to avoid potential issues.

Following patch moves challenge_timestamp and challenge_count
to per-netns storage to provide better isolation.

Fixes: 354e4aa391ed ("tcp: RFC 5961 5.2 Blind Data Injection Attack Mitigation")
Reported-by: syzbot <syzkaller@googlegroups.com>
Signed-off-by: Eric Dumazet <edumazet@google.com>
Acked-by: Neal Cardwell <ncardwell@google.com>
Signed-off-by: Jakub Kicinski <kuba@kernel.org>
net/ipv4/tcp_input.c

index ab5f0ea166f1a0535e299a9051406b5e2895f1f0..c184e15397a28ccfbac142ff0f1d05d555623147 100644 (file)
@@ -3629,11 +3629,11 @@ static void tcp_send_challenge_ack(struct sock *sk)
 
        /* Then check host-wide RFC 5961 rate limit. */
        now = jiffies / HZ;
-       if (now != challenge_timestamp) {
+       if (now != READ_ONCE(challenge_timestamp)) {
                u32 ack_limit = READ_ONCE(net->ipv4.sysctl_tcp_challenge_ack_limit);
                u32 half = (ack_limit + 1) >> 1;
 
-               challenge_timestamp = now;
+               WRITE_ONCE(challenge_timestamp, now);
                WRITE_ONCE(challenge_count, half + prandom_u32_max(ack_limit));
        }
        count = READ_ONCE(challenge_count);