From: Neil Horman Patch to close a race condition in ip_vs_conn_flush. In an smp system, it is possible for an connection timer to expire, calling ip_vs_conn_expire while the connection table is being flushed, before ct_write_lock_bh is acquired. Since the list iterator loop in ip_vs_con_flush releases and re-acquires the spinlock (even though it doesn't re-enable softirqs), it is possible for the expiration function to modify the connection list, while it is being traversed in ip_vs_conn_flush. The result is that the next pointer gets set to NULL, and subsequently dereferenced, resulting in an oops. This patch removes the lock release and re-aquisition from the loop, closing the race window. Tested by myself, and those who origionally experienced the crash and reported it to me, with successful results. Signed-off-by: Neil Horman Cc: "David S. Miller" Cc: Signed-off-by: Andrew Morton --- net/ipv4/ipvs/ip_vs_conn.c | 24 ++++-------------------- 1 files changed, 4 insertions(+), 20 deletions(-) diff -puN net/ipv4/ipvs/ip_vs_conn.c~ipvs-close-race-conditions-on-ip_vs_conn_tab-list-modification net/ipv4/ipvs/ip_vs_conn.c --- 25/net/ipv4/ipvs/ip_vs_conn.c~ipvs-close-race-conditions-on-ip_vs_conn_tab-list-modification 2005-06-24 22:37:46.000000000 -0700 +++ 25-akpm/net/ipv4/ipvs/ip_vs_conn.c 2005-06-24 22:37:46.000000000 -0700 @@ -548,7 +548,6 @@ void ip_vs_conn_expire_now(struct ip_vs_ { if (del_timer(&cp->timer)) mod_timer(&cp->timer, jiffies); - __ip_vs_conn_put(cp); } @@ -801,21 +800,12 @@ void ip_vs_random_dropentry(void) continue; } - /* - * Drop the entry, and drop its ct if not referenced - */ - atomic_inc(&cp->refcnt); - ct_write_unlock(hash); - - if ((ct = cp->control)) - atomic_inc(&ct->refcnt); IP_VS_DBG(4, "del connection\n"); ip_vs_conn_expire_now(cp); - if (ct) { + if (cp->control) { IP_VS_DBG(4, "del conn template\n"); - ip_vs_conn_expire_now(ct); + ip_vs_conn_expire_now(cp->control); } - ct_write_lock(hash); } ct_write_unlock_bh(hash); } @@ -829,7 +819,6 @@ static void ip_vs_conn_flush(void) { int idx; struct ip_vs_conn *cp; - struct ip_vs_conn *ct; flush_again: for (idx=0; idxrefcnt); - ct_write_unlock(idx); - if ((ct = cp->control)) - atomic_inc(&ct->refcnt); IP_VS_DBG(4, "del connection\n"); ip_vs_conn_expire_now(cp); - if (ct) { + if (cp->control) { IP_VS_DBG(4, "del conn template\n"); - ip_vs_conn_expire_now(ct); + ip_vs_conn_expire_now(cp->control); } - ct_write_lock(idx); } ct_write_unlock_bh(idx); } _