bpf hold buffer in-use flag
Guy Helmer
guy.helmer at gmail.com
Sun Jan 13 22:07:47 UTC 2013
On Jan 11, 2013, at 5:48 PM, Christian Peron <csjp at sqrt.ca> wrote:
> Guy,
>
> Can you please describe the race and how to reproduce it? When we introduced zerocopy-bpf, we also introduced bpf_bufheld() and bpf_bufreclaimed() which are effectively nops for the regular buffer mode. Maybe we could maintain state there as well? In any case, I would like to understand the race/and reproduce it
>
> Thanks!
Related to rwatson's comment from r175903, dropping the bpf descriptor lock while performing the uiomove() in bpfread() enables a couple of races: 1) simultaneous reads on a bpf device (not great), and 2) races between bpfread() and catchpacket() (panics due to NULL pointer dereference).
The symptom I encountered was a panic in catchpacket() where the save buffer was NULL. I added diagnostic code and found that one of the two buffers was being lost. As I reviewed the code, it seemed that the only way this could happen was if the hold buffer was being invalidated (rotated) out from under these lines in bpfread():
BPFD_UNLOCK(d);
/*
* Move data from hold buffer into user space.
* We know the entire buffer is transferred since
* we checked above that the read buffer is bpf_bufsize bytes.
*
* XXXRW: More synchronization needed here: what if a second thread
* issues a read on the same fd at the same time? Don't want this
* getting invalidated.
*/
error = bpf_uiomove(d, d->bd_hbuf, d->bd_hlen, uio);
BPFD_LOCK(d);
d->bd_fbuf = d->bd_hbuf; /* if other code in the driver simultaneously sets hbuf to NULL, this loses a buffer! */
d->bd_hbuf = NULL;
d->bd_hlen = 0;
bpf_buf_reclaimed(d);
BPFD_UNLOCK(d);
My instrumented code validated this hypothesis, and I added the bd_hbuf_in_use flag to allow dropping the descriptor lock over the bpf_uiomove() call while protecting the hold buffer from rotation anywhere else in the driver. In my own tree, I have left some additional diagnostic code to make sure hbuf is still valid after uiomove completes, and that code has not been triggered since I added the bd_hbuf_in_use flag and associated code.
The way I was able to trigger the panic in catchpacket() was to call pcap_setfilter() more than one time on a live, promiscuous pcap descriptor while reading from a very busy network. I was able to temporarily work around this issue by using the BIOCSETFNR ioctl directly on the bpf descriptor rather than using pcap_setfilter(), which avoided calling reset_d() in the ioctl handler and thus avoided clearing bd_hbuf in a race with bpfread().
Just as I'm writing this, I realized the code that triggered the problem may have called pcap_setfilter() in a separate thread from the packet reading thread. I wrote a unit test for this issue, but as it was single-threaded, I was never able to cause the crash with it.
Regarding the zero-copy code, I'm not sure how bpf_bufheld() could be used as a general approach to solving this race. It appears to me that a condition variable is necessary to work around the necessity of releasing the bpf descriptor lock over the uiomove() call.
Hope this helps!
Guy
>
> On 2012-11-13, at 3:40 PM, Guy Helmer wrote:
>
>> To try to completely resolve the race in bpfread(), I have put together these changes to add a flag to indicate when the hold buffer cannot be modified because it is in use. Since it's my first time using mtx_sleep() and wakeup(), I wanted to run these past the list to see if I can get any feedback on the approach.
>>
>>
>> Index: bpf.c
>> ===================================================================
>> --- bpf.c (revision 242997)
>> +++ bpf.c (working copy)
>> @@ -819,6 +819,7 @@ bpfopen(struct cdev *dev, int flags, int fmt, stru
>> * particular buffer method.
>> */
>> bpf_buffer_init(d);
>> + d->bd_hbuf_in_use = 0;
>> d->bd_bufmode = BPF_BUFMODE_BUFFER;
>> d->bd_sig = SIGIO;
>> d->bd_direction = BPF_D_INOUT;
>> @@ -872,6 +873,9 @@ bpfread(struct cdev *dev, struct uio *uio, int iof
>> callout_stop(&d->bd_callout);
>> timed_out = (d->bd_state == BPF_TIMED_OUT);
>> d->bd_state = BPF_IDLE;
>> + while (d->bd_hbuf_in_use)
>> + mtx_sleep(&d->bd_hbuf_in_use, &d->bd_lock,
>> + PRINET|PCATCH, "bd_hbuf", 0);
>> /*
>> * If the hold buffer is empty, then do a timed sleep, which
>> * ends when the timeout expires or when enough packets
>> @@ -940,27 +944,27 @@ bpfread(struct cdev *dev, struct uio *uio, int iof
>> /*
>> * At this point, we know we have something in the hold slot.
>> */
>> + d->bd_hbuf_in_use = 1;
>> BPFD_UNLOCK(d);
>>
>> /*
>> * Move data from hold buffer into user space.
>> * We know the entire buffer is transferred since
>> * we checked above that the read buffer is bpf_bufsize bytes.
>> - *
>> - * XXXRW: More synchronization needed here: what if a second thread
>> - * issues a read on the same fd at the same time? Don't want this
>> - * getting invalidated.
>> + *
>> + * We do not have to worry about simultaneous reads because
>> + * we waited for sole access to the hold buffer above.
>> */
>> error = bpf_uiomove(d, d->bd_hbuf, d->bd_hlen, uio);
>>
>> BPFD_LOCK(d);
>> - if (d->bd_hbuf != NULL) {
>> - /* Free the hold buffer only if it is still valid. */
>> - d->bd_fbuf = d->bd_hbuf;
>> - d->bd_hbuf = NULL;
>> - d->bd_hlen = 0;
>> - bpf_buf_reclaimed(d);
>> - }
>> + KASSERT(d->bd_hbuf != NULL, ("bpfread: lost bd_hbuf"));
>> + d->bd_fbuf = d->bd_hbuf;
>> + d->bd_hbuf = NULL;
>> + d->bd_hlen = 0;
>> + bpf_buf_reclaimed(d);
>> + d->bd_hbuf_in_use = 0;
>> + wakeup(&d->bd_hbuf_in_use);
>> BPFD_UNLOCK(d);
>>
>> return (error);
>> @@ -1114,6 +1118,9 @@ reset_d(struct bpf_d *d)
>>
>> BPFD_LOCK_ASSERT(d);
>>
>> + while (d->bd_hbuf_in_use)
>> + mtx_sleep(&d->bd_hbuf_in_use, &d->bd_lock, PRINET,
>> + "bd_hbuf", 0);
>> if ((d->bd_hbuf != NULL) &&
>> (d->bd_bufmode != BPF_BUFMODE_ZBUF || bpf_canfreebuf(d))) {
>> /* Free the hold buffer. */
>> @@ -1254,6 +1261,9 @@ bpfioctl(struct cdev *dev, u_long cmd, caddr_t add
>>
>> BPFD_LOCK(d);
>> n = d->bd_slen;
>> + while (d->bd_hbuf_in_use)
>> + mtx_sleep(&d->bd_hbuf_in_use, &d->bd_lock,
>> + PRINET, "bd_hbuf", 0);
>> if (d->bd_hbuf)
>> n += d->bd_hlen;
>> BPFD_UNLOCK(d);
>> @@ -1967,6 +1977,9 @@ filt_bpfread(struct knote *kn, long hint)
>> ready = bpf_ready(d);
>> if (ready) {
>> kn->kn_data = d->bd_slen;
>> + while (d->bd_hbuf_in_use)
>> + mtx_sleep(&d->bd_hbuf_in_use, &d->bd_lock,
>> + PRINET, "bd_hbuf", 0);
>> if (d->bd_hbuf)
>> kn->kn_data += d->bd_hlen;
>> } else if (d->bd_rtout > 0 && d->bd_state == BPF_IDLE) {
>> @@ -2299,6 +2312,9 @@ catchpacket(struct bpf_d *d, u_char *pkt, u_int pk
>> * spot to do it.
>> */
>> if (d->bd_fbuf == NULL && bpf_canfreebuf(d)) {
>> + while (d->bd_hbuf_in_use)
>> + mtx_sleep(&d->bd_hbuf_in_use, &d->bd_lock,
>> + PRINET, "bd_hbuf", 0);
>> d->bd_fbuf = d->bd_hbuf;
>> d->bd_hbuf = NULL;
>> d->bd_hlen = 0;
>> @@ -2341,6 +2357,9 @@ catchpacket(struct bpf_d *d, u_char *pkt, u_int pk
>> ++d->bd_dcount;
>> return;
>> }
>> + while (d->bd_hbuf_in_use)
>> + mtx_sleep(&d->bd_hbuf_in_use, &d->bd_lock,
>> + PRINET, "bd_hbuf", 0);
>> ROTATE_BUFFERS(d);
>> do_wakeup = 1;
>> curlen = 0;
>> Index: bpf.h
>> ===================================================================
>> --- bpf.h (revision 242997)
>> +++ bpf.h (working copy)
>> @@ -1235,7 +1235,8 @@ SYSCTL_DECL(_net_bpf);
>> /*
>> * Rotate the packet buffers in descriptor d. Move the store buffer into the
>> * hold slot, and the free buffer ino the store slot. Zero the length of the
>> - * new store buffer. Descriptor lock should be held.
>> + * new store buffer. Descriptor lock should be held. Hold buffer must
>> + * not be marked "in use".
>> */
>> #define ROTATE_BUFFERS(d) do { \
>> (d)->bd_hbuf = (d)->bd_sbuf; \
>> Index: bpf_buffer.c
>> ===================================================================
>> --- bpf_buffer.c (revision 242997)
>> +++ bpf_buffer.c (working copy)
>> @@ -189,6 +189,9 @@ bpf_buffer_ioctl_sblen(struct bpf_d *d, u_int *i)
>> return (EINVAL);
>> }
>>
>> + while (d->bd_hbuf_in_use)
>> + mtx_sleep(&d->bd_hbuf_in_use, &d->bd_lock,
>> + PRINET, "bd_hbuf", 0);
>> /* Free old buffers if set */
>> if (d->bd_fbuf != NULL)
>> free(d->bd_fbuf, M_BPF);
>> Index: bpfdesc.h
>> ===================================================================
>> --- bpfdesc.h (revision 242997)
>> +++ bpfdesc.h (working copy)
>> @@ -63,6 +63,7 @@ struct bpf_d {
>> caddr_t bd_sbuf; /* store slot */
>> caddr_t bd_hbuf; /* hold slot */
>> caddr_t bd_fbuf; /* free slot */
>> + int bd_hbuf_in_use; /* don't rotate buffers */
>> int bd_slen; /* current length of store buffer */
>> int bd_hlen; /* current length of hold buffer */
>>
>> _______________________________________________
>> freebsd-net at freebsd.org mailing list
>> http://lists.freebsd.org/mailman/listinfo/freebsd-net
>> To unsubscribe, send any mail to "freebsd-net-unsubscribe at freebsd.org"
>
More information about the freebsd-net
mailing list