[Devel] [PATCH] [NETNS45] network namespace locking rules
Denis V. Lunev
den at openvz.org
Fri Sep 28 07:36:54 PDT 2007
Current locking for network namespace list/initialization is broken.
for_each_net is called under single rtnl_lock in
register_netdevice_notifier.
Locking:
net_mutex -> rtnl_lock() -> dev_base_lock
Reasoning:
- net_mutex holds serialization of the addition/removal of
subsystems/modules and the creation/destruction of network
namespaces as a whole
- loopback device is one of such subsystems and it takes
rtnl_lock inside
- per/namespace RTNL netlink socket requires an iteration over
namespace list inside rtnl_unlock, which is called inside net_mutex
Resume:
net_namespace_list is guarded by both rtnl_lock & net_mutex and
can be safely iterated under any of them
Signed-off-by: Denis V. Lunev <den at openvz.org>
--------
diff --git a/include/net/net_namespace.h b/include/net/net_namespace.h
index b8186ea..2845992 100644
--- a/include/net/net_namespace.h
+++ b/include/net/net_namespace.h
@@ -174,8 +174,21 @@ static inline void release_net(struct net *net)
atomic_dec(&net->use_count);
}
-extern void net_lock(void);
-extern void net_unlock(void);
+/*
+ * Locking:
+ * net_mutex -> rtnl_lock() -> dev_base_lock
+ * Reasoning:
+ * - net_mutex holds serialization of the addition/removal of
+ * subsystems/modules and the creation/destruction of network
+ * namespaces as a whole
+ * - loopback device is one of such subsystems and it takes
+ * rtnl_lock inside
+ * - per/namespace RTNL netlink socket requires an iteration over
+ * namespace list inside rtnl_unlock, which is called inside net_mutex
+ * Resume:
+ * net_namespace_list is guarded by both rtnl_lock & net_mutex and
+ * can be safely iterated under any of them
+ */
#define for_each_net(VAR) \
list_for_each_entry(VAR, &net_namespace_list, list)
diff --git a/net/core/net_namespace.c b/net/core/net_namespace.c
index 026e39a..07682a2 100644
--- a/net/core/net_namespace.c
+++ b/net/core/net_namespace.c
@@ -10,6 +10,7 @@
/*
* Our network namespace constructor/destructor lists
+ * Locking rules are described in details in include/net/net_namespace.h
*/
static LIST_HEAD(pernet_list);
@@ -24,16 +25,6 @@ static struct kmem_cache *net_cachep;
struct net init_net;
EXPORT_SYMBOL_GPL(init_net);
-void net_lock(void)
-{
- mutex_lock(&net_list_mutex);
-}
-
-void net_unlock(void)
-{
- mutex_unlock(&net_list_mutex);
-}
-
static struct net *net_alloc(void)
{
return kmem_cache_alloc(net_cachep, GFP_KERNEL);
@@ -71,9 +62,9 @@ static void cleanup_net(struct work_struct *work)
mutex_lock(&net_mutex);
/* Don't let anyone else find us. */
- net_lock();
+ rtnl_lock();
list_del(&net->list);
- net_unlock();
+ rtnl_unlock();
/* Run all of the network namespace exit methods */
pernet_count = 0;
@@ -193,9 +184,9 @@ struct net *copy_net_ns(unsigned long flags, struct net *old_net)
if (err)
goto out_unlock;
- net_lock();
+ rtnl_lock();
list_add_tail(&new_net->list, &net_namespace_list);
- net_unlock();
+ rtnl_unlock();
out_unlock:
@@ -220,14 +211,13 @@ static int __init net_ns_init(void)
mutex_lock(&net_mutex);
err = setup_net(&init_net);
- net_lock();
+ rtnl_lock();
list_add_tail(&init_net.list, &net_namespace_list);
- net_unlock();
+ rtnl_unlock();
mutex_unlock(&net_mutex);
if (err)
panic("Could not setup the initial network namespace");
-
return 0;
}
diff --git a/net/core/rtnetlink.c b/net/core/rtnetlink.c
index 82ebc23..e610313 100644
--- a/net/core/rtnetlink.c
+++ b/net/core/rtnetlink.c
@@ -73,16 +73,24 @@ void __rtnl_unlock(void)
void rtnl_unlock(void)
{
struct net *net;
- mutex_unlock(&rtnl_mutex);
-
- net_lock();
+
+retry:
for_each_net(net) {
struct sock *rtnl = net->rtnl;
+
+ if (rtnl == NULL || rtnl->sk_receive_queue.qlen == 0)
+ continue;
+
+ get_net(net);
+ mutex_unlock(&rtnl_mutex);
if (rtnl && rtnl->sk_receive_queue.qlen)
rtnl->sk_data_ready(rtnl, 0);
- }
- net_unlock();
+ mutex_lock(&rtnl_mutex);
+ put_net(net);
+ goto retry;
+ }
+ mutex_unlock(&rtnl_mutex);
netdev_run_todo();
}
More information about the Devel
mailing list