>Number: 182851 >Category: kern >Synopsis: thread-unsafe handled routing tables >Confidential: no >Severity: non-critical >Priority: low >Responsible: freebsd-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: sw-bug >Submitter-Id: current-users >Arrival-Date: Wed Oct 09 07:00:00 UTC 2013 >Closed-Date: >Last-Modified: >Originator: Slawa Olhovchenkov >Release: 9.2, 10.0 >Organization: >Environment: >Description: sys/net/radix.c contains
/* * Work area -- the following point to 3 buffers of size max_keylen, * allocated in this order in a block of memory malloc'ed by rn_init. * rn_zeros, rn_ones are set in rn_init and used in readonly afterwards. * addmask_key is used in rn_addmask in rw mode and not thread-safe. */ static char *rn_zeros, *rn_ones, *addmask_key; addmask_key used by rn_addmask (called from rn_lookup, rn_addroute and rn_delete). In all cases rn_addmask used in RW mode w/o proper locking. addmask_key is absolutly globaly used -- for IPv4, IPv6 and other at once. As result -- incorrect routing lookup, routing update and so. (for example: kernel: rn_addmask: mask impossibly already in tree) >How-To-Repeat: >Fix: Delete global addmask_key. Use local (on stack in rn_addmask) buffer. >Release-Note: >Audit-Trail: >Unformatted: _______________________________________________ freebsd-bugs@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-bugs To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"