From: Sven Eckelmann <sven@narfation.org>
To: "B.A.T.M.A.N" <b.a.t.m.a.n@lists.open-mesh.net>
Subject: Re: [B.A.T.M.A.N.] Use of ref_get_unless_zero() ?
Date: Fri, 04 Mar 2016 16:50:43 +0100 [thread overview]
Message-ID: <2378940.op5bKN67gL@sven-edge> (raw)
In-Reply-To: <20160304152132.GV15541@lunn.ch>
[-- Attachment #1: Type: text/plain, Size: 2644 bytes --]
On Friday 04 March 2016 16:21:32 Andrew Lunn wrote:
> Hi
>
> I'm sometimes getting a crash after removing a hard interface when the
> batadv_send_outstanding_bat_org_packet() is called in a work queue.
> It calls
>
> static void batadv_iv_ogm_aggregate_new(const unsigned char *packet_buff,
> int packet_len, unsigned long
> send_time, bool direct_link,
> struct batadv_hard_iface
> *if_incoming, struct batadv_hard_iface *if_outgoing, int own_packet)
> {
> struct batadv_priv *bat_priv = netdev_priv(if_incoming->soft_iface);
> struct batadv_forw_packet *forw_packet_aggr;
> unsigned char *skb_buff;
> unsigned int skb_size;
>
> if (!kref_get_unless_zero(&if_incoming->refcount))
> return;
>
> if (!kref_get_unless_zero(&if_outgoing->refcount))
> goto out_free_incoming;
>
>
> Given that we have:
>
> static inline void batadv_hardif_put(struct batadv_hard_iface *hard_iface)
> {
> kref_put(&hard_iface->refcount, batadv_hardif_release);
> }
>
> does using kref_get_unless_zero() make sense? If it is zero, hasn't it
> been freed by the kref_put that set it to zero?
At least it makes sense for the outgoing interface because it is only in a
rcu_read_lock in batadv_iv_ogm_schedule (batadv_iv_ogm_queue_add ->
batadv_iv_ogm_aggregate_new). The batadv_hardif_list is traversed with
list_for_each_entry_rcu and it is expected that one entry (maybe) gets dropped
from the list. The batadv_hardif_release will only queue the actual free of
the memory (kfree_rcu) and every function which wants to get a reference has
to increase the counter with kref_get_unless_zero to check that it is not
actually in the waiting-to-be-freed-phase.
But you have something which needs to be fixed (you see a crash). Question is
what is causing the crash and what can be done against it. I am currently
wondering how the if_incoming interface is being protected. It is not fetched
from a list via a rcu list access primitive and it is not protected via
rcu_read_lock. I can also not see where the reference for the forw_packet-
>if_incoming is increased. It is just accessed in
batadv_send_outstanding_bat_ogm_packet (and later send to the mentioned
function via batadv_schedule_bat_ogm). Also batadv_add_bcast_packet_to_list
doesn't increase the reference counter for if_incoming before adding to the
forward packet. So I would just say that the reference counting for
batadv_hard_iface is broken.
Kind regards,
Sven
[-- Attachment #2: This is a digitally signed message part. --]
[-- Type: application/pgp-signature, Size: 819 bytes --]
next prev parent reply other threads:[~2016-03-04 15:50 UTC|newest]
Thread overview: 6+ messages / expand[flat|nested] mbox.gz Atom feed top
2016-03-04 15:21 [B.A.T.M.A.N.] Use of ref_get_unless_zero() ? Andrew Lunn
2016-03-04 15:37 ` Antonio Quartulli
2016-03-04 15:50 ` Sven Eckelmann [this message]
2016-03-04 15:53 ` Sven Eckelmann
2016-03-04 16:00 ` Sven Eckelmann
2016-03-04 16:21 ` Andrew Lunn
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=2378940.op5bKN67gL@sven-edge \
--to=sven@narfation.org \
--cc=b.a.t.m.a.n@lists.open-mesh.net \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox