netdev.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* [PATCH net] netpoll: guard __netpoll_send_skb() with RCU read lock
@ 2025-03-03 11:44 Breno Leitao
  2025-03-05  1:47 ` Jakub Kicinski
  0 siblings, 1 reply; 6+ messages in thread
From: Breno Leitao @ 2025-03-03 11:44 UTC (permalink / raw)
  To: David S. Miller, Eric Dumazet, Jakub Kicinski, Paolo Abeni,
	Simon Horman, Amerigo Wang
  Cc: netdev, linux-kernel, kernel-team, Breno Leitao

The function __netpoll_send_skb() is being invoked without holding the
RCU read lock. This oversight triggers a warning message when
CONFIG_PROVE_RCU_LIST is enabled:

	net/core/netpoll.c:330 suspicious rcu_dereference_check() usage!

	 netpoll_send_skb
	 netpoll_send_udp
	 write_ext_msg
	 console_flush_all
	 console_unlock
	 vprintk_emit

To prevent npinfo from disappearing unexpectedly, ensure that
__netpoll_send_skb() is protected with the RCU read lock.

Fixes: 2899656b494dcd1 ("netpoll: take rcu_read_lock_bh() in netpoll_send_skb_on_dev()")
Signed-off-by: Breno Leitao <leitao@debian.org>
---
 net/core/netpoll.c | 1 +
 1 file changed, 1 insertion(+)

diff --git a/net/core/netpoll.c b/net/core/netpoll.c
index 62b4041aae1ae..cac389105e2d1 100644
--- a/net/core/netpoll.c
+++ b/net/core/netpoll.c
@@ -326,6 +326,7 @@ static netdev_tx_t __netpoll_send_skb(struct netpoll *np, struct sk_buff *skb)
 
 	lockdep_assert_irqs_disabled();
 
+	guard(rcu)();
 	dev = np->dev;
 	npinfo = rcu_dereference_bh(dev->npinfo);
 

---
base-commit: 7eb172143d5508b4da468ed59ee857c6e5e01da6
change-id: 20250303-netpoll_rcu_v2-fed72eb0cb83

Best regards,
-- 
Breno Leitao <leitao@debian.org>


^ permalink raw reply related	[flat|nested] 6+ messages in thread

* Re: [PATCH net] netpoll: guard __netpoll_send_skb() with RCU read lock
  2025-03-03 11:44 [PATCH net] netpoll: guard __netpoll_send_skb() with RCU read lock Breno Leitao
@ 2025-03-05  1:47 ` Jakub Kicinski
  2025-03-05  9:09   ` Breno Leitao
  0 siblings, 1 reply; 6+ messages in thread
From: Jakub Kicinski @ 2025-03-05  1:47 UTC (permalink / raw)
  To: Breno Leitao
  Cc: David S. Miller, Eric Dumazet, Paolo Abeni, Simon Horman,
	Amerigo Wang, netdev, linux-kernel, kernel-team

On Mon, 03 Mar 2025 03:44:12 -0800 Breno Leitao wrote:
> +	guard(rcu)();

Scoped guards if you have to.
Preferably just lock/unlock like a normal person..

^ permalink raw reply	[flat|nested] 6+ messages in thread

* Re: [PATCH net] netpoll: guard __netpoll_send_skb() with RCU read lock
  2025-03-05  1:47 ` Jakub Kicinski
@ 2025-03-05  9:09   ` Breno Leitao
  2025-03-05 16:07     ` Jakub Kicinski
  2025-03-05 16:09     ` Andrew Lunn
  0 siblings, 2 replies; 6+ messages in thread
From: Breno Leitao @ 2025-03-05  9:09 UTC (permalink / raw)
  To: Jakub Kicinski
  Cc: David S. Miller, Eric Dumazet, Paolo Abeni, Simon Horman,
	Amerigo Wang, netdev, linux-kernel, kernel-team

Hello Jakub,

On Tue, Mar 04, 2025 at 05:47:32PM -0800, Jakub Kicinski wrote:
> On Mon, 03 Mar 2025 03:44:12 -0800 Breno Leitao wrote:
> > +	guard(rcu)();
> 
> Scoped guards if you have to.
> Preferably just lock/unlock like a normal person..

Sure, I thought that we would be moving to scoped guards all across the
board, at least that was my reading for a similar patch I sent a while
ago:

	https://lore.kernel.org/all/20250224123016.GA17456@noisy.programming.kicks-ass.net/

Anyway, in which case should I use scoped guard instead of just being
like a normal person?

Thanks for the review,
--breno

^ permalink raw reply	[flat|nested] 6+ messages in thread

* Re: [PATCH net] netpoll: guard __netpoll_send_skb() with RCU read lock
  2025-03-05  9:09   ` Breno Leitao
@ 2025-03-05 16:07     ` Jakub Kicinski
  2025-03-05 16:09     ` Andrew Lunn
  1 sibling, 0 replies; 6+ messages in thread
From: Jakub Kicinski @ 2025-03-05 16:07 UTC (permalink / raw)
  To: Breno Leitao
  Cc: David S. Miller, Eric Dumazet, Paolo Abeni, Simon Horman,
	Amerigo Wang, netdev, linux-kernel, kernel-team

On Wed, 5 Mar 2025 01:09:49 -0800 Breno Leitao wrote:
> On Tue, Mar 04, 2025 at 05:47:32PM -0800, Jakub Kicinski wrote:
> > On Mon, 03 Mar 2025 03:44:12 -0800 Breno Leitao wrote:  
> > > +	guard(rcu)();  
> > 
> > Scoped guards if you have to.
> > Preferably just lock/unlock like a normal person..  
> 
> Sure, I thought that we would be moving to scoped guards all across the
> board, at least that was my reading for a similar patch I sent a while
> ago:
> 
> 	https://lore.kernel.org/all/20250224123016.GA17456@noisy.programming.kicks-ass.net/
> 
> Anyway, in which case should I use scoped guard instead 

We are certainly not moving to guards in networking. Too C++-sy.
Just lock / unlock please, correctly around the variable you actually
intend to protect.

Quoting documentation:

  Using device-managed and cleanup.h constructs
  ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  
  Netdev remains skeptical about promises of all "auto-cleanup" APIs,
  including even ``devm_`` helpers, historically. They are not the preferred
  style of implementation, merely an acceptable one.
  
  Use of ``guard()`` is discouraged within any function longer than 20 lines,
  ``scoped_guard()`` is considered more readable. Using normal lock/unlock is
  still (weakly) preferred.
  
  Low level cleanup constructs (such as ``__free()``) can be used when building
  APIs and helpers, especially scoped iterators. However, direct use of
  ``__free()`` within networking core and drivers is discouraged.
  Similar guidance applies to declaring variables mid-function.
  
See: https://www.kernel.org/doc/html/next/process/maintainer-netdev.html#using-device-managed-and-cleanup-h-constructs

^ permalink raw reply	[flat|nested] 6+ messages in thread

* Re: [PATCH net] netpoll: guard __netpoll_send_skb() with RCU read lock
  2025-03-05  9:09   ` Breno Leitao
  2025-03-05 16:07     ` Jakub Kicinski
@ 2025-03-05 16:09     ` Andrew Lunn
  2025-03-05 18:51       ` Breno Leitao
  1 sibling, 1 reply; 6+ messages in thread
From: Andrew Lunn @ 2025-03-05 16:09 UTC (permalink / raw)
  To: Breno Leitao
  Cc: Jakub Kicinski, David S. Miller, Eric Dumazet, Paolo Abeni,
	Simon Horman, Amerigo Wang, netdev, linux-kernel, kernel-team

On Wed, Mar 05, 2025 at 01:09:49AM -0800, Breno Leitao wrote:
> Hello Jakub,
> 
> On Tue, Mar 04, 2025 at 05:47:32PM -0800, Jakub Kicinski wrote:
> > On Mon, 03 Mar 2025 03:44:12 -0800 Breno Leitao wrote:
> > > +	guard(rcu)();
> > 
> > Scoped guards if you have to.
> > Preferably just lock/unlock like a normal person..
> 
> Sure, I thought that we would be moving to scoped guards all across the
> board, at least that was my reading for a similar patch I sent a while
> ago:
> 
> 	https://lore.kernel.org/all/20250224123016.GA17456@noisy.programming.kicks-ass.net/
> 
> Anyway, in which case should I use scoped guard instead of just being
> like a normal person?

https://www.kernel.org/doc/html/latest/process/maintainer-netdev.html

  Section 1.6.5: Using device-managed and cleanup.h constructs

  Netdev remains skeptical about promises of all “auto-cleanup” APIs,
  including even devm_ helpers, historically. They are not the
  preferred style of implementation, merely an acceptable one.

  Use of guard() is discouraged within any function longer than 20
  lines, scoped_guard() is considered more readable. Using normal
  lock/unlock is still (weakly) preferred.

  Low level cleanup constructs (such as __free()) can be used when
  building APIs and helpers, especially scoped iterators. However,
  direct use of __free() within networking core and drivers is
  discouraged. Similar guidance applies to declaring variables
  mid-function.

So you need to spend time to find out what each subsystems view is on
various APIs.

	Andrew

^ permalink raw reply	[flat|nested] 6+ messages in thread

* Re: [PATCH net] netpoll: guard __netpoll_send_skb() with RCU read lock
  2025-03-05 16:09     ` Andrew Lunn
@ 2025-03-05 18:51       ` Breno Leitao
  0 siblings, 0 replies; 6+ messages in thread
From: Breno Leitao @ 2025-03-05 18:51 UTC (permalink / raw)
  To: Andrew Lunn
  Cc: Jakub Kicinski, David S. Miller, Eric Dumazet, Paolo Abeni,
	Simon Horman, Amerigo Wang, netdev, linux-kernel, kernel-team

On Wed, Mar 05, 2025 at 05:09:14PM +0100, Andrew Lunn wrote:
> On Wed, Mar 05, 2025 at 01:09:49AM -0800, Breno Leitao wrote:
> > Hello Jakub,
> > 
> > On Tue, Mar 04, 2025 at 05:47:32PM -0800, Jakub Kicinski wrote:
> > > On Mon, 03 Mar 2025 03:44:12 -0800 Breno Leitao wrote:
> > > > +	guard(rcu)();
> > > 
> > > Scoped guards if you have to.
> > > Preferably just lock/unlock like a normal person..
> > 
> > Sure, I thought that we would be moving to scoped guards all across the
> > board, at least that was my reading for a similar patch I sent a while
> > ago:
> > 
> > 	https://lore.kernel.org/all/20250224123016.GA17456@noisy.programming.kicks-ass.net/
> > 
> > Anyway, in which case should I use scoped guard instead of just being
> > like a normal person?
> 
> https://www.kernel.org/doc/html/latest/process/maintainer-netdev.html
> 
>   Section 1.6.5: Using device-managed and cleanup.h constructs
> 
>   Netdev remains skeptical about promises of all “auto-cleanup” APIs,
>   including even devm_ helpers, historically. They are not the
>   preferred style of implementation, merely an acceptable one.
> 
>   Use of guard() is discouraged within any function longer than 20
>   lines, scoped_guard() is considered more readable. Using normal
>   lock/unlock is still (weakly) preferred.
> 
>   Low level cleanup constructs (such as __free()) can be used when
>   building APIs and helpers, especially scoped iterators. However,
>   direct use of __free() within networking core and drivers is
>   discouraged. Similar guidance applies to declaring variables
>   mid-function.
> 
> So you need to spend time to find out what each subsystems view is on
> various APIs.

That is clear. thanks for the heads-up!

--breno

^ permalink raw reply	[flat|nested] 6+ messages in thread

end of thread, other threads:[~2025-03-05 18:51 UTC | newest]

Thread overview: 6+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2025-03-03 11:44 [PATCH net] netpoll: guard __netpoll_send_skb() with RCU read lock Breno Leitao
2025-03-05  1:47 ` Jakub Kicinski
2025-03-05  9:09   ` Breno Leitao
2025-03-05 16:07     ` Jakub Kicinski
2025-03-05 16:09     ` Andrew Lunn
2025-03-05 18:51       ` Breno Leitao

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).