Message ID | 1706609772-5783-1-git-send-email-schakrabarti@linux.microsoft.com |
---|---|
State | New |
Headers |
Return-Path: <linux-kernel+bounces-44367-ouuuleilei=gmail.com@vger.kernel.org> Delivered-To: ouuuleilei@gmail.com Received: by 2002:a05:7301:2087:b0:106:209c:c626 with SMTP id gs7csp1116967dyb; Tue, 30 Jan 2024 02:17:42 -0800 (PST) X-Google-Smtp-Source: AGHT+IFXc8MeIfJUAiEi6l1zRabs/FaA/L38igYh5YlZF29d3b8Zc1PnmXo4cT8mdoMYe5QDk9/W X-Received: by 2002:a17:906:7185:b0:a35:ec2a:2974 with SMTP id h5-20020a170906718500b00a35ec2a2974mr2779590ejk.37.1706609862596; Tue, 30 Jan 2024 02:17:42 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1706609862; cv=pass; d=google.com; s=arc-20160816; b=dUwmHSgKCKgeF6cUj/DAOJYKsZhbwxYiiEah7lpgopQF2KdU79eYAPYX67FPaWqqtC QrNXam2PXHrY07PdL+zLJydJX16GJbhaIavdvXZop+ETNSUqc0GTeCZxIP1+FLcdrjOS 8o41CRs8bEvLMc3O7+KzDYIutobIg0ijt5UxRjAadxa/yCrikKRy0Ov26jNdKxuPzZl+ ZIM6T/19gz4Y5MaVBDKkrvPzEjhmuG/QVIYiVCxwxAVj70nb/b3GQTaMprR+J9slniIW E9LC5tKjMsveSW+Xy0Xa7Ab4fVAI9ui/FoOZE5+t9aovzlLlwd0wi4NaEotdCaNBneoj jXow== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-unsubscribe:list-subscribe:list-id:precedence:message-id:date :subject:cc:to:from:dkim-signature:dkim-filter; bh=lWjvTitWSXmCVj9tD67yPr16D3fiYZ1z5BKjD2XlLRg=; fh=w+el2VdrgxgBQiE+vsFbZz8fYhkjhxPwAJQ7dF7QvGA=; b=n04URXDCTu+TK5TpFnlgq7I3ryqJL9bicKRkHP0X/YJGUyDj1y70gywi2tHqq3Nr3Z /Wq1ed7x6nRX3KMb8TshJ4noBTjXjBSC2jFX5uuq+BBM6/CV6x61rWGEi1PgPNQYDEnH Zk8utsLe9ojAlOI0D6yXD7t4p+Vppa2zTOE5q58TtXu1Z02YrJQ+UggN8XIyEHtLmWD0 /NGQjyuD4DuxPeWO0S5mlNA6XiUqst35WN0W6eNrFcxlXo4LnvSJRXNgdGdtKUyLqIjJ UXI3Ix6lm1GRl0Fl/7creNxiMbeiTS6ju04SeUpQFuYD0hDEfFF/WXQTQVVK9efe+z0M 58Xg== ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@linux.microsoft.com header.s=default header.b=EOXJFH0G; arc=pass (i=1 spf=pass spfdomain=linux.microsoft.com dkim=pass dkdomain=linux.microsoft.com dmarc=pass fromdomain=linux.microsoft.com); spf=pass (google.com: domain of linux-kernel+bounces-44367-ouuuleilei=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) smtp.mailfrom="linux-kernel+bounces-44367-ouuuleilei=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.microsoft.com Received: from am.mirrors.kernel.org (am.mirrors.kernel.org. [2604:1380:4601:e00::3]) by mx.google.com with ESMTPS id v8-20020a1709064e8800b00a35e84b0bf0si1252803eju.628.2024.01.30.02.17.42 for <ouuuleilei@gmail.com> (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 30 Jan 2024 02:17:42 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-44367-ouuuleilei=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) client-ip=2604:1380:4601:e00::3; Authentication-Results: mx.google.com; dkim=pass header.i=@linux.microsoft.com header.s=default header.b=EOXJFH0G; arc=pass (i=1 spf=pass spfdomain=linux.microsoft.com dkim=pass dkdomain=linux.microsoft.com dmarc=pass fromdomain=linux.microsoft.com); spf=pass (google.com: domain of linux-kernel+bounces-44367-ouuuleilei=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) smtp.mailfrom="linux-kernel+bounces-44367-ouuuleilei=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.microsoft.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by am.mirrors.kernel.org (Postfix) with ESMTPS id D0BD81F2AE12 for <ouuuleilei@gmail.com>; Tue, 30 Jan 2024 10:16:42 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 9F02A60EDB; Tue, 30 Jan 2024 10:16:22 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linux.microsoft.com header.i=@linux.microsoft.com header.b="EOXJFH0G" Received: from linux.microsoft.com (linux.microsoft.com [13.77.154.182]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 82C9F605B4; Tue, 30 Jan 2024 10:16:18 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=13.77.154.182 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1706609780; cv=none; b=BZeeDWrWw90crDzB/7gkEUxvK3bXsB3oxq3fteLEB7NScpShlbzLZmlAi2gwg6ANDpK/4lHOSE9tjebXIyTe7+lI3hQwg5kQ/tlCL7ttaHaRXXlwxac3mldz7cVLuD7dYOPR7gZW7TSGTCKjAPCfHCkxOcgMtlZPLErP2f3dYO8= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1706609780; c=relaxed/simple; bh=EKido4cfkiPSNL005kSWWswMbAIta1D446sWSq/aX7s=; h=From:To:Cc:Subject:Date:Message-Id; b=VvGm7zfonclBXn8maCGhqIrFck2gTm/aubYWuhEJYTXU4PPuk9uCYx/f8ynVeNZ7GUNuw0D1WAn+dX6fwpi4OxuRYOTGsL/GoQ6K0jBHyhSXqcPpQ85T9lVoCb3YcpnhX+vu+3KUg5MkJjHmFhCwyX6PMxmfo15wjj8NvrriFw0= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=linux.microsoft.com; spf=pass smtp.mailfrom=linux.microsoft.com; dkim=pass (1024-bit key) header.d=linux.microsoft.com header.i=@linux.microsoft.com header.b=EOXJFH0G; arc=none smtp.client-ip=13.77.154.182 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=linux.microsoft.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=linux.microsoft.com Received: by linux.microsoft.com (Postfix, from userid 1099) id 0489720541E2; Tue, 30 Jan 2024 02:16:18 -0800 (PST) DKIM-Filter: OpenDKIM Filter v2.11.0 linux.microsoft.com 0489720541E2 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linux.microsoft.com; s=default; t=1706609778; bh=lWjvTitWSXmCVj9tD67yPr16D3fiYZ1z5BKjD2XlLRg=; h=From:To:Cc:Subject:Date:From; b=EOXJFH0G7tayi52lb6OIV4X8MfQM5rdbWzzN8htV351zOxwFxrJGx4Gh9m0I4lhpz gi33oSm245JV5oWwlD11Eo2pd3O5Dauj5ZPPwRNu5kJ+IaSLeTGjDnsfDlNljn4Il5 PUlNQmoTnNJvmpKmPEeeXGIwvdCqEfLvdH5SkqbU= From: Souradeep Chakrabarti <schakrabarti@linux.microsoft.com> To: kys@microsoft.com, haiyangz@microsoft.com, wei.liu@kernel.org, decui@microsoft.com, davem@davemloft.net, edumazet@google.com, kuba@kernel.org, pabeni@redhat.com, longli@microsoft.com, yury.norov@gmail.com, leon@kernel.org, cai.huoqing@linux.dev, ssengar@linux.microsoft.com, vkuznets@redhat.com, tglx@linutronix.de, linux-hyperv@vger.kernel.org, netdev@vger.kernel.org, linux-kernel@vger.kernel.org, linux-rdma@vger.kernel.org Cc: schakrabarti@microsoft.com, Souradeep Chakrabarti <schakrabarti@linux.microsoft.com> Subject: [PATCH net] hv_netvsc: Fix race condition between netvsc_probe and netvsc_remove Date: Tue, 30 Jan 2024 02:16:12 -0800 Message-Id: <1706609772-5783-1-git-send-email-schakrabarti@linux.microsoft.com> X-Mailer: git-send-email 1.8.3.1 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: <linux-kernel.vger.kernel.org> List-Subscribe: <mailto:linux-kernel+subscribe@vger.kernel.org> List-Unsubscribe: <mailto:linux-kernel+unsubscribe@vger.kernel.org> X-getmail-retrieved-from-mailbox: INBOX X-GMAIL-THRID: 1789510143055426517 X-GMAIL-MSGID: 1789510143055426517 |
Series |
[net] hv_netvsc: Fix race condition between netvsc_probe and netvsc_remove
|
|
Commit Message
Souradeep Chakrabarti
Jan. 30, 2024, 10:16 a.m. UTC
In commit ac5047671758 ("hv_netvsc: Disable NAPI before closing the
VMBus channel"), napi_disable was getting called for all channels,
including all subchannels without confirming if they are enabled or not.
Which caused hv_netvsc getting hung at napi_disable, when netvsc_probe()
and netvsc_remove() are happening simultaneously and netvsc_remove()
calls cancel_work_sync(&nvdev->subchan_work) before netvsc_sc_open()
calls napi_enable for the sub channels. Which causes NAPIF_STATE_SCHED
bit not getting cleared for the subchannels.
Now during netvsc_device_remove(), when napi_disable is called for those
subchannels, napi_disable gets stuck on infinite msleep.
Call trace:
[ 654.559417] task:modprobe state:D stack: 0 pid: 2321 ppid: 1091 flags:0x00004002
[ 654.568030] Call Trace:
[ 654.571221] <TASK>
[ 654.573790] __schedule+0x2d6/0x960
[ 654.577733] schedule+0x69/0xf0
[ 654.581214] schedule_timeout+0x87/0x140
[ 654.585463] ? __bpf_trace_tick_stop+0x20/0x20
[ 654.590291] msleep+0x2d/0x40
[ 654.593625] napi_disable+0x2b/0x80
[ 654.597437] netvsc_device_remove+0x8a/0x1f0 [hv_netvsc]
[ 654.603935] rndis_filter_device_remove+0x194/0x1c0 [hv_netvsc]
[ 654.611101] ? do_wait_intr+0xb0/0xb0
[ 654.615753] netvsc_remove+0x7c/0x120 [hv_netvsc]
[ 654.621675] vmbus_remove+0x27/0x40 [hv_vmbus]
Fixes: ac5047671758 ("hv_netvsc: Disable NAPI before closing the VMBus channel")
Signed-off-by: Souradeep Chakrabarti <schakrabarti@linux.microsoft.com>
---
drivers/net/hyperv/netvsc.c | 5 ++++-
1 file changed, 4 insertions(+), 1 deletion(-)
Comments
> -----Original Message----- > From: Souradeep Chakrabarti <schakrabarti@linux.microsoft.com> > Sent: Tuesday, January 30, 2024 5:16 AM > To: KY Srinivasan <kys@microsoft.com>; Haiyang Zhang > <haiyangz@microsoft.com>; wei.liu@kernel.org; Dexuan Cui > <decui@microsoft.com>; davem@davemloft.net; edumazet@google.com; > kuba@kernel.org; pabeni@redhat.com; Long Li <longli@microsoft.com>; > yury.norov@gmail.com; leon@kernel.org; cai.huoqing@linux.dev; > ssengar@linux.microsoft.com; vkuznets@redhat.com; tglx@linutronix.de; > linux-hyperv@vger.kernel.org; netdev@vger.kernel.org; linux- > kernel@vger.kernel.org; linux-rdma@vger.kernel.org > Cc: Souradeep Chakrabarti <schakrabarti@microsoft.com>; Souradeep > Chakrabarti <schakrabarti@linux.microsoft.com> > Subject: [PATCH net] hv_netvsc: Fix race condition between netvsc_probe > and netvsc_remove > > In commit ac5047671758 ("hv_netvsc: Disable NAPI before closing the > VMBus channel"), napi_disable was getting called for all channels, > including all subchannels without confirming if they are enabled or not. > > Which caused hv_netvsc getting hung at napi_disable, when netvsc_probe() > and netvsc_remove() are happening simultaneously and netvsc_remove() > calls cancel_work_sync(&nvdev->subchan_work) before netvsc_sc_open() > calls napi_enable for the sub channels. Which causes NAPIF_STATE_SCHED > bit not getting cleared for the subchannels. > > Now during netvsc_device_remove(), when napi_disable is called for those > subchannels, napi_disable gets stuck on infinite msleep. > > Call trace: > [ 654.559417] task:modprobe state:D stack: 0 pid: 2321 ppid: > 1091 flags:0x00004002 > [ 654.568030] Call Trace: > [ 654.571221] <TASK> > [ 654.573790] __schedule+0x2d6/0x960 > [ 654.577733] schedule+0x69/0xf0 > [ 654.581214] schedule_timeout+0x87/0x140 > [ 654.585463] ? __bpf_trace_tick_stop+0x20/0x20 > [ 654.590291] msleep+0x2d/0x40 > [ 654.593625] napi_disable+0x2b/0x80 > [ 654.597437] netvsc_device_remove+0x8a/0x1f0 [hv_netvsc] > [ 654.603935] rndis_filter_device_remove+0x194/0x1c0 [hv_netvsc] > [ 654.611101] ? do_wait_intr+0xb0/0xb0 > [ 654.615753] netvsc_remove+0x7c/0x120 [hv_netvsc] > [ 654.621675] vmbus_remove+0x27/0x40 [hv_vmbus] > > Fixes: ac5047671758 ("hv_netvsc: Disable NAPI before closing the VMBus > channel") > Signed-off-by: Souradeep Chakrabarti <schakrabarti@linux.microsoft.com> Please add: Cc: stable@vger.kernel.org Otherwise, all look good! Reviewed-by: Haiyang Zhang <haiyangz@microsoft.com> > --- > drivers/net/hyperv/netvsc.c | 5 ++++- > 1 file changed, 4 insertions(+), 1 deletion(-) > > diff --git a/drivers/net/hyperv/netvsc.c b/drivers/net/hyperv/netvsc.c > index 1dafa44155d0..a6fcbda64ecc 100644 > --- a/drivers/net/hyperv/netvsc.c > +++ b/drivers/net/hyperv/netvsc.c > @@ -708,7 +708,10 @@ void netvsc_device_remove(struct hv_device *device) > /* Disable NAPI and disassociate its context from the device. */ > for (i = 0; i < net_device->num_chn; i++) { > /* See also vmbus_reset_channel_cb(). */ > - napi_disable(&net_device->chan_table[i].napi); > + /* only disable enabled NAPI channel */ > + if (i < ndev->real_num_rx_queues) > + napi_disable(&net_device->chan_table[i].napi); > + > netif_napi_del(&net_device->chan_table[i].napi); > } > > -- > 2.34.1
diff --git a/drivers/net/hyperv/netvsc.c b/drivers/net/hyperv/netvsc.c index 1dafa44155d0..a6fcbda64ecc 100644 --- a/drivers/net/hyperv/netvsc.c +++ b/drivers/net/hyperv/netvsc.c @@ -708,7 +708,10 @@ void netvsc_device_remove(struct hv_device *device) /* Disable NAPI and disassociate its context from the device. */ for (i = 0; i < net_device->num_chn; i++) { /* See also vmbus_reset_channel_cb(). */ - napi_disable(&net_device->chan_table[i].napi); + /* only disable enabled NAPI channel */ + if (i < ndev->real_num_rx_queues) + napi_disable(&net_device->chan_table[i].napi); + netif_napi_del(&net_device->chan_table[i].napi); }