From: Bob Pearson <rpearsonhpe@gmail.com>
To: "lizhijian@fujitsu.com" <lizhijian@fujitsu.com>,
Yanjun Zhu <yanjun.zhu@linux.dev>, Jason Gunthorpe <jgg@ziepe.ca>,
"linux-rdma@vger.kernel.org" <linux-rdma@vger.kernel.org>
Subject: Re: [PATCH for-next] RDMA/rxe: check rxe_pd before rxe_put in rxe_mr_cleanup()
Date: Fri, 15 Jul 2022 13:28:53 -0500 [thread overview]
Message-ID: <545a4df9-4c5d-a74c-5359-2a4f484a8829@gmail.com> (raw)
In-Reply-To: <11dafa5f-c52d-16c1-fe37-2cd45ab20474@fujitsu.com>
On 7/14/22 22:37, lizhijian@fujitsu.com wrote:
>
>
> On 15/07/2022 00:13, Bob Pearson wrote:
>> On 7/6/22 04:21, lizhijian@fujitsu.com wrote:
>>> It's possible mr_pd(mr) returns NULL if rxe_mr_alloc() fails.
>>>
>>> it fixes below panic:
>>> [ 114.163945] RPC: Registered rdma backchannel transport module.
>>> [ 116.868003] eth0 speed is unknown, defaulting to 1000
>>> [ 120.173114] rdma_rxe: rxe_mr_init_user: Unable to allocate memory for map
>>> [ 120.173159] ==================================================================
>>> [ 120.173161] BUG: KASAN: null-ptr-deref in __rxe_put+0x18/0x60 [rdma_rxe]
>>> [ 120.173194] Write of size 4 at addr 0000000000000080 by task rdma_flush_serv/685
>>> [ 120.173197]
>>> [ 120.173199] CPU: 0 PID: 685 Comm: rdma_flush_serv Not tainted 5.19.0-rc1-roce-flush+ #90
>>> [ 120.173203] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-27-g64f37cc530f1-prebuilt.qemu.org 04/01/2014
>>> [ 120.173208] Call Trace:
>>> [ 120.173216] <TASK>
>>> [ 120.173217] dump_stack_lvl+0x34/0x44
>>> [ 120.173250] kasan_report+0xab/0x120
>>> [ 120.173261] ? __rxe_put+0x18/0x60 [rdma_rxe]
>>> [ 120.173277] kasan_check_range+0xf9/0x1e0
>>> [ 120.173282] __rxe_put+0x18/0x60 [rdma_rxe]
>>> [ 120.173311] rxe_mr_cleanup+0x21/0x140 [rdma_rxe]
>>> [ 120.173328] __rxe_cleanup+0xff/0x1d0 [rdma_rxe]
>>> [ 120.173344] rxe_reg_user_mr+0xa7/0xc0 [rdma_rxe]
>>> [ 120.173360] ib_uverbs_reg_mr+0x265/0x460 [ib_uverbs]
>>> [ 120.173387] ? ib_uverbs_modify_qp+0x8b/0xd0 [ib_uverbs]
>>> [ 120.173433] ? ib_uverbs_create_cq+0x100/0x100 [ib_uverbs]
>>> [ 120.173461] ? uverbs_fill_udata+0x1d8/0x330 [ib_uverbs]
>>> [ 120.173488] ib_uverbs_handler_UVERBS_METHOD_INVOKE_WRITE+0x19d/0x250 [ib_uverbs]
>>> [ 120.173517] ? ib_uverbs_handler_UVERBS_METHOD_QUERY_CONTEXT+0x190/0x190 [ib_uverbs]
>>> [ 120.173547] ? radix_tree_next_chunk+0x31e/0x410
>>> [ 120.173559] ? uverbs_fill_udata+0x255/0x330 [ib_uverbs]
>>> [ 120.173587] ib_uverbs_cmd_verbs+0x11c2/0x1450 [ib_uverbs]
>>> [ 120.173616] ? ucma_put_ctx+0x16/0x50 [rdma_ucm]
>>> [ 120.173623] ? __rcu_read_unlock+0x43/0x60
>>> [ 120.173633] ? ib_uverbs_handler_UVERBS_METHOD_QUERY_CONTEXT+0x190/0x190 [ib_uverbs]
>>> [ 120.173661] ? uverbs_fill_udata+0x330/0x330 [ib_uverbs]
>>> [ 120.173711] ? avc_ss_reset+0xb0/0xb0
>>> [ 120.173722] ? vfs_fileattr_set+0x450/0x450
>>> [ 120.173742] ? should_fail+0x78/0x2b0
>>> [ 120.173745] ? __fsnotify_parent+0x38a/0x4e0
>>> [ 120.173764] ? ioctl_has_perm.constprop.0.isra.0+0x198/0x210
>>> [ 120.173784] ? should_fail+0x78/0x2b0
>>> [ 120.173787] ? selinux_bprm_creds_for_exec+0x550/0x550
>>> [ 120.173792] ib_uverbs_ioctl+0x114/0x1b0 [ib_uverbs]
>>> [ 120.173820] ? ib_uverbs_cmd_verbs+0x1450/0x1450 [ib_uverbs]
>>> [ 120.173861] __x64_sys_ioctl+0xb4/0xf0
>>> [ 120.173867] do_syscall_64+0x3b/0x90
>>> [ 120.173877] entry_SYSCALL_64_after_hwframe+0x46/0xb0
>>> [ 120.173884] RIP: 0033:0x7f4b563c14eb
>>> [ 120.173889] Code: ff ff ff 85 c0 79 9b 49 c7 c4 ff ff ff ff 5b 5d 4c 89 e0 41 5c c3 66 0f 1f 84 00 00 00 00 00 f3 0f 1e fa b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 55 b9 0c 00 f7 d8 64 89 01 48
>>> [ 120.173892] RSP: 002b:00007ffe0e4a6fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000010
>>>
>>> Signed-off-by: Li Zhijian <lizhijian@fujitsu.com>
>>> ---
>>> drivers/infiniband/sw/rxe/rxe_mr.c | 4 +++-
>>> 1 file changed, 3 insertions(+), 1 deletion(-)
>>>
>>> diff --git a/drivers/infiniband/sw/rxe/rxe_mr.c b/drivers/infiniband/sw/rxe/rxe_mr.c
>>> index 9a5c2af6a56f..cec5775a72f2 100644
>>> --- a/drivers/infiniband/sw/rxe/rxe_mr.c
>>> +++ b/drivers/infiniband/sw/rxe/rxe_mr.c
>>> @@ -695,8 +695,10 @@ int rxe_dereg_mr(struct ib_mr *ibmr, struct ib_udata *udata)
>>> void rxe_mr_cleanup(struct rxe_pool_elem *elem)
>>> {
>>> struct rxe_mr *mr = container_of(elem, typeof(*mr), elem);
>>> + struct rxe_pd *pd = mr_pd(mr);
>>>
>>> - rxe_put(mr_pd(mr));
>>> + if (pd)
>>> + rxe_put(pd);
>>>
>>> ib_umem_release(mr->umem);
>>>
>> Li,
>>
>> You seem to be fixing the problem in the wrong place.
>> All MRs should have an associated PD.
>
> Currently, in rxe_reg_user_mr process, PD will be associated to a MR only when the MR allotted map_set successfully.
>
> 164 int rxe_mr_init_user(struct rxe_pd *pd, u64 start, u64 length, u64 iova,
> 165 int access, struct rxe_mr *mr)
> 166 {
> ...
> 188 err = rxe_mr_alloc(mr, num_buf, 0);
> 189 if (err) {
> 190 pr_warn("%s: Unable to allocate memory for map\n",
> 191 __func__);
> 192 goto err_release_umem;
> 193 }
> ...
> 227 mr->ibmr.pd = &pd->ibpd; <<< associate the PD with a MR
>
>
> But if rxe_mr_alloc() fails, this rxe_pd will be put in rxe_mr_init_user()'s caller rxe_reg_user_mr().
>
> 912 static struct ib_mr *rxe_reg_user_mr(struct ib_pd *ibpd,
> 913 u64 start,
> 914 u64 length,
> 915 u64 iova,
> 916 int access, struct ib_udata *udata)
> 917 {
> 918 int err;
> 919 struct rxe_dev *rxe = to_rdev(ibpd->device);
> 920 struct rxe_pd *pd = to_rpd(ibpd);
> 921 struct rxe_mr *mr;
> 922
> 923 mr = rxe_alloc(&rxe->mr_pool);
> 924 if (!mr) {
> 925 err = -ENOMEM;
> 926 goto err2;
> 927 }
> 928
> 929
> 930 rxe_get(pd); <<< pair with rxe_put() in rxe_mr_cleanup() if rxe_mr_init_user() successes. or rxe_put() in err3 below.
> 931
> 932 err = rxe_mr_init_user(pd, start, length, iova, access, mr);
> 933 if (err)
> 934 goto err3;
> 935
> 936 rxe_finalize(mr);
> 937
> 938 return &mr->ibmr;
> 939
> 940 err3:
> 941 rxe_put(pd);
> 942 rxe_cleanup(mr);
> 943 err2:
> 944 return ERR_PTR(err);
> 945 }
>
> Thanks
>
>
>> The PD is passed in as a struct ib_pd to one of the MR registration APIs from rdma-core.
>> The PD is allocated in rdma-core and it should check that it has a valid PD before it calls
>> the rxe driver. I am not sure how you triggered the above behavior.
>>
>> The address of the PD is saved in the MR struct when the MR is registered and just should never
>> be NULL. Assuming there is a way to register an MR without a PD (I have never seen this) we should
>> check it in the registration routine not the cleanup routine and fail the call there.
>>
>> [Jason, Is there such a thing as an MR without a valid PD?]
>>
>> Bob
Li,
I just sent in an alternative patch that fixes up the error paths.
We not only have a problem with PD but also umem. I moved the setting
of PD up so it will always be set before cleanup gets called and also
checks if umem is set before freeing it. Please take a look at it.
Bob
next prev parent reply other threads:[~2022-07-15 18:28 UTC|newest]
Thread overview: 6+ messages / expand[flat|nested] mbox.gz Atom feed top
2022-07-06 9:21 [PATCH for-next] RDMA/rxe: check rxe_pd before rxe_put in rxe_mr_cleanup() lizhijian
2022-07-12 1:06 ` lizhijian
2022-07-14 16:13 ` Bob Pearson
2022-07-15 3:37 ` lizhijian
2022-07-15 18:28 ` Bob Pearson [this message]
2022-07-16 8:05 ` lizhijian
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=545a4df9-4c5d-a74c-5359-2a4f484a8829@gmail.com \
--to=rpearsonhpe@gmail.com \
--cc=jgg@ziepe.ca \
--cc=linux-rdma@vger.kernel.org \
--cc=lizhijian@fujitsu.com \
--cc=yanjun.zhu@linux.dev \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox