Date: Wed, 20 Oct 2004 00:35:10 +0200 From: Max Laier <max@love2party.net> To: Andre Oppermann <andre@freebsd.org> Cc: cvs-src@freebsd.org Subject: Re: cvs commit: src/sys/sys protosw.h src/sys/kern uipc_domain.cuipc_socket2.c Message-ID: <200410200035.19752.max@love2party.net> In-Reply-To: <41758B35.D5340AEA@freebsd.org> References: <200410191513.i9JFDUbf072176@repoman.freebsd.org> <200410192329.46723.max@love2party.net> <41758B35.D5340AEA@freebsd.org>
next in thread | previous in thread | raw e-mail | index | archive | help
--nextPart3269231.sYBdOc9t0i Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable Content-Disposition: inline On Tuesday 19 October 2004 23:46, Andre Oppermann wrote: <...> > > problems. For example, in ip_icmp.c line 457 ff we have: > > > > ctlfunc =3D > > inetsw[ip_protox[icp->icmp_ip.ip_p]].pr_ctlinput; if (ctlfunc) > > (*ctlfunc)(code, (struct sockaddr *)&icmpsrc, > > (void *)&icp->icmp_ip); > > Ok, this one is easy to fix. I'll audit the code for any other of these > abuses. One of many, I am afraid. > > This is clearly a problem if we can remove protocols. There might be mo= re > > places where we (temporary) cache values from the protocol array. Anoth= er > > problem might be that we check for protocol existence early and assume > > that this remains true ... > > Well, too bad if some code tries to remember this. Doesn't hurt then. > From my reading of many parts of the netinet/* code this is usually not > a problem and the code is rather well behaved. I refuse to take this > argument as reason to not have loadable protocols. "... usually ... rather ..." I really urge you, to reconsider. Many have=20 argumented in the same way. I understand that it is nice to have this=20 possibility, but it *does* cause *real* problems! > > I'd suggest, that you remove the possibility to remove protocols > > completely. It is very likely that there are no races with adding > > protocols - though it might take "some time" for the protocol to be ful= ly > > useable - but the removal is critical. > > I don't think it should be a one-way street. To be able to unload > protocols is an important but seldomly used function and it's certainly n= ot > that a crash is guarnteed. Far from it. > > > We also have to check that really all code can cope with the addition a= nd > > properly reinitializes it's view of the protocol arrays. > > The point of the protocol arrays is precisely to have them as the only > and sole place where such information is stored. Any code that copies > any part of it to its own private structures is horribly broken by design > and must be fixed anyway! (BTW: I'm not aware of any code within netinet= /* > that does this.) I mentioned one above, I am sure there are others. Some as obvious as the o= ne=20 above, some less so ... > > Another point: If you really want to keep the possibility to remove a > > protocol, you have to introduce some busy counter that pervents removal > > while the kernel is inside a protocol function. This has to be handled = by > > the protocol itself, but it has to be taken care of somehow. > > Yes, the protocol has to be able to handle its own unloading. I have > documented that fact. If a protocol in unable to do so it should simply > refuse any unload attempts with EBUSY. Divert can be paniced with the sysctl code, btw. You have something like: lock; unlock; SYSCTL_OUT; <-- this can be made to take *some* time lock; <-- this will panic once the lock is destroyed And there are other problems. Yes, it is not a problem in the common case, = but=20 you have to account for edge cases as well! =2D-=20 /"\ Best regards, | mlaier@freebsd.org \ / Max Laier | ICQ #67774661 X http://pf4freebsd.love2party.net/ | mlaier@EFnet / \ ASCII Ribbon Campaign | Against HTML Mail and News --nextPart3269231.sYBdOc9t0i Content-Type: application/pgp-signature -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.6 (FreeBSD) iD8DBQBBdZanXyyEoT62BG0RAqacAJ4p7xH50oz47gf+QjkMVZd9FeSvgACfUj4e bC0+2SLN9ZjnBlbH+eoX/S0= =mwLt -----END PGP SIGNATURE----- --nextPart3269231.sYBdOc9t0i--
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200410200035.19752.max>