From: Yael Chemla <ychemla@nvidia.com>
To: Kuniyuki Iwashima <kuniyu@amazon.com>
Cc: davem@davemloft.net, edumazet@google.com, horms@kernel.org,
kuba@kernel.org, kuni1840@gmail.com, netdev@vger.kernel.org,
pabeni@redhat.com
Subject: Re: [PATCH v1 net-next 4/4] net: Hold rtnl_net_lock() in (un)?register_netdevice_notifier_dev_net().
Date: Mon, 20 Jan 2025 20:55:07 +0200 [thread overview]
Message-ID: <dc118ae9-4ec0-4180-b7aa-90eba5283010@nvidia.com> (raw)
In-Reply-To: <20250116025435.85541-1-kuniyu@amazon.com>
On 16/01/2025 4:54, Kuniyuki Iwashima wrote:
> Thanks for the report!
>
> From: Yael Chemla <ychemla@nvidia.com>
> Date: Thu, 16 Jan 2025 00:16:27 +0200
>> we observed in our regression tests the following issue:
>>
>> BUG: KASAN: slab-use-after-free in notifier_call_chain+0x22c/0x280
>> kasan_report+0xbd/0xf0
>> RIP: 0033:0x7f70839018b7
>> kasan_save_stack+0x1c/0x40
>> kasan_save_track+0x10/0x30
>> __kasan_kmalloc+0x83/0x90
>> kasan_save_stack+0x1c/0x40
>> kasan_save_track+0x10/0x30
>> kasan_save_free_info+0x37/0x50
>> __kasan_slab_free+0x33/0x40
>> page dumped because: kasan: bad access detected
>> BUG: KASAN: slab-use-after-free in notifier_call_chain+0x222/0x280
>> kasan_report+0xbd/0xf0
>> RIP: 0033:0x7f70839018b7
>> kasan_save_stack+0x1c/0x40
>> kasan_save_track+0x10/0x30
>> __kasan_kmalloc+0x83/0x90
>> kasan_save_stack+0x1c/0x40
>> kasan_save_track+0x10/0x30
>> kasan_save_free_info+0x37/0x50
>> __kasan_slab_free+0x33/0x40
>> page dumped because: kasan: bad access detected
>>
>> and there are many more of that kind.
>
> Do you have any other stack traces with more callers info ?
> Also can you decode the trace with ./scripts/decode_stacktrace.sh ?
>
BUG: KASAN: slab-use-after-free in notifier_call_chain
(/usr/work/linux/kernel/notifier.c:75 (discriminator 2))
Read of size 8 at addr ffff88810cefb4c8 by task test-bridge-lag/21127
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS
rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
Call Trace:
<TASK>
dump_stack_lvl (/usr/work/linux/lib/dump_stack.c:123)
print_report (/usr/work/linux/mm/kasan/report.c:379
/usr/work/linux/mm/kasan/report.c:489)
? __virt_addr_valid (/usr/work/linux/./arch/x86/include/asm/preempt.h:84
(discriminator 13) /usr/work/linux/./include/linux/rcupdate.h:964
(discriminator 13) /usr/work/linux/./include/linux/mmzone.h:2058
(discriminator 13) /usr/work/linux/arch/x86/mm/physaddr.c:65
(discriminator 13))
kasan_report (/usr/work/linux/mm/kasan/report.c:604)
? notifier_call_chain (/usr/work/linux/kernel/notifier.c:75
(discriminator 2))
? notifier_call_chain (/usr/work/linux/kernel/notifier.c:75
(discriminator 2))
notifier_call_chain (/usr/work/linux/kernel/notifier.c:75 (discriminator 2))
call_netdevice_notifiers_info (/usr/work/linux/net/core/dev.c:2011)
unregister_netdevice_many_notify (/usr/work/linux/net/core/dev.c:11551)
? mark_held_locks (/usr/work/linux/kernel/locking/lockdep.c:4321
(discriminator 1))
? __mutex_lock (/usr/work/linux/kernel/locking/mutex.c:689
(discriminator 2) /usr/work/linux/kernel/locking/mutex.c:735
(discriminator 2))
? lockdep_hardirqs_on_prepare
(/usr/work/linux/kernel/locking/lockdep.c:4347
/usr/work/linux/kernel/locking/lockdep.c:4406)
? dev_ingress_queue_create (/usr/work/linux/net/core/dev.c:11492)
? __mutex_lock (/usr/work/linux/kernel/locking/mutex.c:689
(discriminator 2) /usr/work/linux/kernel/locking/mutex.c:735
(discriminator 2))
? __mutex_lock (/usr/work/linux/./arch/x86/include/asm/preempt.h:84
(discriminator 13) /usr/work/linux/kernel/locking/mutex.c:715
(discriminator 13) /usr/work/linux/kernel/locking/mutex.c:735
(discriminator 13))
? unregister_netdev (/usr/work/linux/./include/linux/netdevice.h:3236
/usr/work/linux/net/core/dev.c:11633)
? mutex_lock_io_nested (/usr/work/linux/kernel/locking/mutex.c:734)
? __mutex_unlock_slowpath
(/usr/work/linux/./arch/x86/include/asm/atomic64_64.h:101
/usr/work/linux/./include/linux/atomic/atomic-arch-fallback.h:4329
/usr/work/linux/./include/linux/atomic/atomic-long.h:1506
/usr/work/linux/./include/linux/atomic/atomic-instrumented.h:4481
/usr/work/linux/kernel/locking/mutex.c:913)
unregister_netdevice_queue (/usr/work/linux/net/core/dev.c:11487)
? unregister_netdevice_many (/usr/work/linux/net/core/dev.c:11476)
unregister_netdev (/usr/work/linux/net/core/dev.c:11635)
mlx5e_remove
(/usr/work/linux/drivers/net/ethernet/mellanox/mlx5/core/en_main.c:6552
/usr/work/linux/drivers/net/ethernet/mellanox/mlx5/core/en_main.c:6579)
mlx5_core
auxiliary_bus_remove (/usr/work/linux/drivers/base/auxiliary.c:230)
device_release_driver_internal (/usr/work/linux/drivers/base/dd.c:1275
/usr/work/linux/drivers/base/dd.c:1296)
? kobject_put (/usr/work/linux/./arch/x86/include/asm/atomic.h:93
(discriminator 4)
/usr/work/linux/./include/linux/atomic/atomic-arch-fallback.h:949
(discriminator 4)
/usr/work/linux/./include/linux/atomic/atomic-instrumented.h:401
(discriminator 4) /usr/work/linux/./include/linux/refcount.h:264
(discriminator 4) /usr/work/linux/./include/linux/refcount.h:307
(discriminator 4) /usr/work/linux/./include/linux/refcount.h:325
(discriminator 4) /usr/work/linux/./include/linux/kref.h:64
(discriminator 4) /usr/work/linux/lib/kobject.c:737 (discriminator 4))
bus_remove_device (/usr/work/linux/./include/linux/kobject.h:193
/usr/work/linux/drivers/base/base.h:73
/usr/work/linux/drivers/base/bus.c:583)
device_del (/usr/work/linux/drivers/base/power/power.h:142
/usr/work/linux/drivers/base/core.c:3855)
? mlx5_core_is_eth_enabled
(/usr/work/linux/drivers/net/ethernet/mellanox/mlx5/core/devlink.h:65)
mlx5_core
? __device_link_del (/usr/work/linux/drivers/base/core.c:3809)
? is_ib_enabled
(/usr/work/linux/drivers/net/ethernet/mellanox/mlx5/core/devlink.h:58)
mlx5_core
mlx5_rescan_drivers_locked
(/usr/work/linux/./include/linux/auxiliary_bus.h:241
/usr/work/linux/drivers/net/ethernet/mellanox/mlx5/core/dev.c:333
/usr/work/linux/drivers/net/ethernet/mellanox/mlx5/core/dev.c:535
/usr/work/linux/drivers/net/ethernet/mellanox/mlx5/core/dev.c:549) mlx5_core
mlx5_unregister_device
(/usr/work/linux/drivers/net/ethernet/mellanox/mlx5/core/dev.c:468)
mlx5_core
mlx5_uninit_one (/usr/work/linux/./include/linux/instrumented.h:68
/usr/work/linux/./include/asm-generic/bitops/instrumented-non-atomic.h:141
/usr/work/linux/drivers/net/ethernet/mellanox/mlx5/core/main.c:1563)
mlx5_core
remove_one
(/usr/work/linux/drivers/net/ethernet/mellanox/mlx5/core/main.c:965
/usr/work/linux/drivers/net/ethernet/mellanox/mlx5/core/main.c:2019)
mlx5_core
pci_device_remove (/usr/work/linux/./include/linux/pm_runtime.h:129
/usr/work/linux/drivers/pci/pci-driver.c:475)
device_release_driver_internal (/usr/work/linux/drivers/base/dd.c:1275
/usr/work/linux/drivers/base/dd.c:1296)
unbind_store (/usr/work/linux/drivers/base/bus.c:245)
kernfs_fop_write_iter (/usr/work/linux/fs/kernfs/file.c:338)
vfs_write (/usr/work/linux/fs/read_write.c:587 (discriminator 1)
/usr/work/linux/fs/read_write.c:679 (discriminator 1))
? do_user_addr_fault (/usr/work/linux/./include/linux/rcupdate.h:337
/usr/work/linux/./include/linux/rcupdate.h:849
/usr/work/linux/./include/linux/mm.h:740
/usr/work/linux/arch/x86/mm/fault.c:1340)
? kernel_write (/usr/work/linux/fs/read_write.c:660)
? lock_downgrade (/usr/work/linux/kernel/locking/lockdep.c:5857)
ksys_write (/usr/work/linux/fs/read_write.c:732)
? __x64_sys_read (/usr/work/linux/fs/read_write.c:721)
? do_user_addr_fault
(/usr/work/linux/./arch/x86/include/asm/preempt.h:84 (discriminator 13)
/usr/work/linux/./include/linux/rcupdate.h:98 (discriminator 13)
/usr/work/linux/./include/linux/rcupdate.h:882 (discriminator 13)
/usr/work/linux/./include/linux/mm.h:742 (discriminator 13)
/usr/work/linux/arch/x86/mm/fault.c:1340 (discriminator 13))
do_syscall_64 (/usr/work/linux/arch/x86/entry/common.c:52 (discriminator
1) /usr/work/linux/arch/x86/entry/common.c:83 (discriminator 1))
entry_SYSCALL_64_after_hwframe
(/usr/work/linux/arch/x86/entry/entry_64.S:130)
RIP: 0033:0x7f6a4d5018b7
>>
>> it happens after applying commit 7fb1073300a2 ("net: Hold
>> rtnl_net_lock() in (un)?register_netdevice_notifier_dev_net()")
>>
>> test scenario includes configuration and traffic over two namespaces
>> associated with two different VFs.
>
> Could you elaborate more about the test scenario, especially
> how each device/netns is dismantled after the test case ?
>
we set up a network configuration which includes two VFs isolated using
two namespaces (there’s also bridge in this topology), we pass some
traffic between VFs. At the end of test (cleanup) we delete network
namespaces, wait for 0.5 sec and unbind VFs of NIC.
note that when I extended the timeout after deleting the namespaces the
issue doesn’t reproduce.
> I guess the VF is moved to init_net ?
>
this should be the behavior in case deletion of the namespaces happens
before the unbind of VFs.
>>
>>
>> On 04/01/2025 8:37, Kuniyuki Iwashima wrote:
>>> (un)?register_netdevice_notifier_dev_net() hold RTNL before triggering
>>> the notifier for all netdev in the netns.
>>>
>>> Let's convert the RTNL to rtnl_net_lock().
>>>
>>> Note that move_netdevice_notifiers_dev_net() is assumed to be (but not
>>> yet) protected by per-netns RTNL of both src and dst netns; we need to
>>> convert wireless and hyperv drivers that call dev_change_net_namespace().
>>>
>>> Signed-off-by: Kuniyuki Iwashima <kuniyu@amazon.com>
>>> ---
>>> net/core/dev.c | 16 ++++++++++------
>>> 1 file changed, 10 insertions(+), 6 deletions(-)
>>>
>>> diff --git a/net/core/dev.c b/net/core/dev.c
>>> index f6c6559e2548..a0dd34463901 100644
>>> --- a/net/core/dev.c
>>> +++ b/net/core/dev.c
>>> @@ -1943,15 +1943,17 @@ int register_netdevice_notifier_dev_net(struct net_device *dev,
>>> struct notifier_block *nb,
>>> struct netdev_net_notifier *nn)
>>> {
>>> + struct net *net = dev_net(dev);
>>
>> it seems to happen since the net pointer is acquired here without a lock.
>> Note that KASAN issue is not triggered when executing with rtnl_lock()
>> taken before this line. and our kernel .config expands
>> rtnl_net_lock(net) to rtnl_lock() (CONFIG_DEBUG_NET_SMALL_RTNL is not set).
>
> It sounds like the device was being moved to another netns while
> unregister_netdevice_notifier_dev_net() was called.
>
> Could you check if dev_net() is changed before/after rtnl_lock() in
>
> * register_netdevice_notifier_dev_net()
> * unregister_netdevice_notifier_dev_net()
>
> ?
When checking dev_net before and after taking the lock the issue won’t
reproduce.
note that when issue reproduce we arrive to
unregister_netdevice_notifier_dev_net with an invalid net pointer
(verified it with prints of its value, and it's not the same consistent
value as is throughout rest of the test).
we suspect the issue related to the async ns deletion.
next prev parent reply other threads:[~2025-01-20 18:55 UTC|newest]
Thread overview: 16+ messages / expand[flat|nested] mbox.gz Atom feed top
2025-01-04 6:37 [PATCH v1 net-next 0/4] net: Hold per-netns RTNL during netdev notifier registration Kuniyuki Iwashima
2025-01-04 6:37 ` [PATCH v1 net-next 1/4] net: Convert netdev_chain to blocking_notifier Kuniyuki Iwashima
2025-01-08 2:28 ` kernel test robot
2025-01-04 6:37 ` [PATCH v1 net-next 2/4] net: Hold __rtnl_net_lock() in (un)?register_netdevice_notifier() Kuniyuki Iwashima
2025-01-04 6:37 ` [PATCH v1 net-next 3/4] net: Hold rtnl_net_lock() in (un)?register_netdevice_notifier_net() Kuniyuki Iwashima
2025-01-04 6:37 ` [PATCH v1 net-next 4/4] net: Hold rtnl_net_lock() in (un)?register_netdevice_notifier_dev_net() Kuniyuki Iwashima
2025-01-15 22:16 ` Yael Chemla
2025-01-16 2:54 ` Kuniyuki Iwashima
2025-01-20 18:55 ` Yael Chemla [this message]
2025-01-27 17:26 ` Yael Chemla
2025-01-27 17:54 ` Kuniyuki Iwashima
2025-01-27 23:26 ` Kuniyuki Iwashima
2025-01-29 16:21 ` Yael Chemla
2025-01-30 0:32 ` Kuniyuki Iwashima
2025-01-04 15:37 ` [PATCH v1 net-next 0/4] net: Hold per-netns RTNL during netdev notifier registration Jakub Kicinski
2025-01-05 7:59 ` Kuniyuki Iwashima
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=dc118ae9-4ec0-4180-b7aa-90eba5283010@nvidia.com \
--to=ychemla@nvidia.com \
--cc=davem@davemloft.net \
--cc=edumazet@google.com \
--cc=horms@kernel.org \
--cc=kuba@kernel.org \
--cc=kuni1840@gmail.com \
--cc=kuniyu@amazon.com \
--cc=netdev@vger.kernel.org \
--cc=pabeni@redhat.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).