Skip to content

Commit a9a76a3

Browse files
Florian Westphalgregkh
authored andcommitted
xfrm: policy: init locks early
commit c282222a45cb9503cbfbebfdb60491f06ae84b49 upstream. Dmitry reports following splat: INFO: trying to register non-static key. the code is fine but needs lockdep annotation. turning off the locking correctness validator. CPU: 0 PID: 13059 Comm: syz-executor1 Not tainted 4.10.0-rc7-next-20170207 #1 [..] spin_lock_bh include/linux/spinlock.h:304 [inline] xfrm_policy_flush+0x32/0x470 net/xfrm/xfrm_policy.c:963 xfrm_policy_fini+0xbf/0x560 net/xfrm/xfrm_policy.c:3041 xfrm_net_init+0x79f/0x9e0 net/xfrm/xfrm_policy.c:3091 ops_init+0x10a/0x530 net/core/net_namespace.c:115 setup_net+0x2ed/0x690 net/core/net_namespace.c:291 copy_net_ns+0x26c/0x530 net/core/net_namespace.c:396 create_new_namespaces+0x409/0x860 kernel/nsproxy.c:106 unshare_nsproxy_namespaces+0xae/0x1e0 kernel/nsproxy.c:205 SYSC_unshare kernel/fork.c:2281 [inline] Problem is that when we get error during xfrm_net_init we will call xfrm_policy_fini which will acquire xfrm_policy_lock before it was initialized. Just move it around so locks get set up first. Reported-by: Dmitry Vyukov <dvyukov@google.com> Fixes: 283bc9f ("xfrm: Namespacify xfrm state/policy locks") Signed-off-by: Florian Westphal <fw@strlen.de> Signed-off-by: Steffen Klassert <steffen.klassert@secunet.com> Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
1 parent 0a5766a commit a9a76a3

1 file changed

Lines changed: 5 additions & 5 deletions

File tree

net/xfrm/xfrm_policy.c

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -3030,6 +3030,11 @@ static int __net_init xfrm_net_init(struct net *net)
30303030
{
30313031
int rv;
30323032

3033+
/* Initialize the per-net locks here */
3034+
spin_lock_init(&net->xfrm.xfrm_state_lock);
3035+
rwlock_init(&net->xfrm.xfrm_policy_lock);
3036+
mutex_init(&net->xfrm.xfrm_cfg_mutex);
3037+
30333038
rv = xfrm_statistics_init(net);
30343039
if (rv < 0)
30353040
goto out_statistics;
@@ -3046,11 +3051,6 @@ static int __net_init xfrm_net_init(struct net *net)
30463051
if (rv < 0)
30473052
goto out;
30483053

3049-
/* Initialize the per-net locks here */
3050-
spin_lock_init(&net->xfrm.xfrm_state_lock);
3051-
rwlock_init(&net->xfrm.xfrm_policy_lock);
3052-
mutex_init(&net->xfrm.xfrm_cfg_mutex);
3053-
30543054
return 0;
30553055

30563056
out:

0 commit comments

Comments
 (0)