]> git.ipfire.org Git - thirdparty/kernel/stable.git/commitdiff
bridge: br_vlan_fill_forward_path_pvid: use br_vlan_group_rcu()
authorEric Woudstra <ericwouds@gmail.com>
Tue, 7 Oct 2025 08:15:01 +0000 (10:15 +0200)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Sun, 19 Oct 2025 14:23:09 +0000 (16:23 +0200)
[ Upstream commit bbf0c98b3ad9edaea1f982de6c199cc11d3b7705 ]

net/bridge/br_private.h:1627 suspicious rcu_dereference_protected() usage!
other info that might help us debug this:

rcu_scheduler_active = 2, debug_locks = 1
7 locks held by socat/410:
 #0: ffff88800d7a9c90 (sk_lock-AF_INET){+.+.}-{0:0}, at: inet_stream_connect+0x43/0xa0
 #1: ffffffff9a779900 (rcu_read_lock){....}-{1:3}, at: __ip_queue_xmit+0x62/0x1830
 [..]
 #6: ffffffff9a779900 (rcu_read_lock){....}-{1:3}, at: nf_hook.constprop.0+0x8a/0x440

Call Trace:
 lockdep_rcu_suspicious.cold+0x4f/0xb1
 br_vlan_fill_forward_path_pvid+0x32c/0x410 [bridge]
 br_fill_forward_path+0x7a/0x4d0 [bridge]

Use to correct helper, non _rcu variant requires RTNL mutex.

Fixes: bcf2766b1377 ("net: bridge: resolve forwarding path for VLAN tag actions in bridge devices")
Signed-off-by: Eric Woudstra <ericwouds@gmail.com>
Signed-off-by: Florian Westphal <fw@strlen.de>
Signed-off-by: Sasha Levin <sashal@kernel.org>
net/bridge/br_vlan.c

index 23a82567fe624967f0e68ca8c183f0527debd911..54b0f24eb08ff2206f037785fe84e45e842a07cc 100644 (file)
@@ -1455,7 +1455,7 @@ void br_vlan_fill_forward_path_pvid(struct net_bridge *br,
        if (!br_opt_get(br, BROPT_VLAN_ENABLED))
                return;
 
-       vg = br_vlan_group(br);
+       vg = br_vlan_group_rcu(br);
 
        if (idx >= 0 &&
            ctx->vlan[idx].proto == br->vlan_proto) {