Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp2981372imu; Sun, 9 Dec 2018 14:13:18 -0800 (PST) X-Google-Smtp-Source: AFSGD/XvfC14GcFmQf2J98dfL+exnQKtrf+iNA/w7lHBghNrE5D58ChFsDD1lDXzyXR/w5ZRR6r8 X-Received: by 2002:a63:c24c:: with SMTP id l12mr8886634pgg.146.1544393598655; Sun, 09 Dec 2018 14:13:18 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1544393598; cv=none; d=google.com; s=arc-20160816; b=0igEeJrVCNUk+fRHW59G6g+Sm2s10PSgdzyR9g1Vvx9W8aYHHmHlOLJGePUpYPH9ID 68jdNBKGtginq3rexoEy2ySKYwDk19xjv9CbuQ6WJQDhOoJN7wBsYs5wtEnEZlRQf3dH Fd6S2iZZg9M78Z8rT/QjGobXQHZ9ouR0BthhmoUwOQZQLooRRXQ28r6N9OjAVHyAdabJ oOs64svR5BHsZ/EauHZwgSvbqhbO/i6LAdAq5FC/oy0jLHIS1sF76a1r5mA6LN4MO1qO awiwPj86lihdcbZf+JktGq9zfDAR7yyU45CmahfNEKp4rFYL46mr/v6wxI07b3uJkVje JBdw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:subject:message-id:date:cc:to :from:mime-version:content-transfer-encoding:content-disposition; bh=pFEmZiGqA03xMbr8DEJX4cWMKgxTADxtVESXlCDogWw=; b=wgQyddRTzF8OW+FfKXXHdzmCqQohiR6E7PSKtre2xXKyozaBnn25KrPLlOW/0Ik/42 ocRjCYn6LHelJplLH5gGhnV/fNqPU2ejpSCzx4ilRTwDsDRkAm2p8nX2/cV7DqnGLc7D s9dalQpzEaY5uxA/GWyR9I+wmUhU7kWdFEXUittMmrydsVK1VrdhqcisvL0RO7HZuGW9 HmaUALGnQ7xkRNJaXjoka3oW3VUExBl4k2jDm5IR7l9Tj+CkgK8LIj8N9dx17amutBqF 5xEYZB5hmGDzmlj6pBuyFUK9yXhqcGejmjpMe7jPBf0ba6MavdcSR/5H4FvPn4mEgQS5 7rvQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id k142si9284552pfd.174.2018.12.09.14.13.03; Sun, 09 Dec 2018 14:13:18 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728266AbeLIWLh (ORCPT + 99 others); Sun, 9 Dec 2018 17:11:37 -0500 Received: from shadbolt.e.decadent.org.uk ([88.96.1.126]:37710 "EHLO shadbolt.e.decadent.org.uk" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728257AbeLIWLf (ORCPT ); Sun, 9 Dec 2018 17:11:35 -0500 Received: from pub.yeoldevic.com ([81.174.156.145] helo=deadeye) by shadbolt.decadent.org.uk with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.89) (envelope-from ) id 1gW735-0002iY-0J; Sun, 09 Dec 2018 21:55:39 +0000 Received: from ben by deadeye with local (Exim 4.91) (envelope-from ) id 1gW72g-0003Vu-Kk; Sun, 09 Dec 2018 21:55:14 +0000 Content-Type: text/plain; charset="UTF-8" Content-Disposition: inline Content-Transfer-Encoding: 8bit MIME-Version: 1.0 From: Ben Hutchings To: linux-kernel@vger.kernel.org, stable@vger.kernel.org CC: akpm@linux-foundation.org, "Ira Weiny" , "Aaron Knister" , "Jason Gunthorpe" Date: Sun, 09 Dec 2018 21:50:33 +0000 Message-ID: X-Mailer: LinuxStableQueue (scripts by bwh) X-Patchwork-Hint: ignore Subject: [PATCH 3.16 210/328] IB/ipoib: Avoid a race condition between start_xmit and cm_rep_handler In-Reply-To: X-SA-Exim-Connect-IP: 81.174.156.145 X-SA-Exim-Mail-From: ben@decadent.org.uk X-SA-Exim-Scanned: No (on shadbolt.decadent.org.uk); SAEximRunCond expanded to false Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 3.16.62-rc1 review patch. If anyone has any objections, please let me know. ------------------ From: Aaron Knister commit 816e846c2eb9129a3e0afa5f920c8bbc71efecaa upstream. Inside of start_xmit() the call to check if the connection is up and the queueing of the packets for later transmission is not atomic which leaves a window where cm_rep_handler can run, set the connection up, dequeue pending packets and leave the subsequently queued packets by start_xmit() sitting on neigh->queue until they're dropped when the connection is torn down. This only applies to connected mode. These dropped packets can really upset TCP, for example, and cause multi-minute delays in transmission for open connections. Here's the code in start_xmit where we check to see if the connection is up: if (ipoib_cm_get(neigh)) { if (ipoib_cm_up(neigh)) { ipoib_cm_send(dev, skb, ipoib_cm_get(neigh)); goto unref; } } The race occurs if cm_rep_handler execution occurs after the above connection check (specifically if it gets to the point where it acquires priv->lock to dequeue pending skb's) but before the below code snippet in start_xmit where packets are queued. if (skb_queue_len(&neigh->queue) < IPOIB_MAX_PATH_REC_QUEUE) { push_pseudo_header(skb, phdr->hwaddr); spin_lock_irqsave(&priv->lock, flags); __skb_queue_tail(&neigh->queue, skb); spin_unlock_irqrestore(&priv->lock, flags); } else { ++dev->stats.tx_dropped; dev_kfree_skb_any(skb); } The patch acquires the netif tx lock in cm_rep_handler for the section where it sets the connection up and dequeues and retransmits deferred skb's. Fixes: 839fcaba355a ("IPoIB: Connected mode experimental support") Signed-off-by: Aaron Knister Tested-by: Ira Weiny Reviewed-by: Ira Weiny Signed-off-by: Jason Gunthorpe Signed-off-by: Ben Hutchings --- drivers/infiniband/ulp/ipoib/ipoib_cm.c | 2 ++ 1 file changed, 2 insertions(+) --- a/drivers/infiniband/ulp/ipoib/ipoib_cm.c +++ b/drivers/infiniband/ulp/ipoib/ipoib_cm.c @@ -996,12 +996,14 @@ static int ipoib_cm_rep_handler(struct i skb_queue_head_init(&skqueue); + netif_tx_lock_bh(p->dev); spin_lock_irq(&priv->lock); set_bit(IPOIB_FLAG_OPER_UP, &p->flags); if (p->neigh) while ((skb = __skb_dequeue(&p->neigh->queue))) __skb_queue_tail(&skqueue, skb); spin_unlock_irq(&priv->lock); + netif_tx_unlock_bh(p->dev); while ((skb = __skb_dequeue(&skqueue))) { skb->dev = p->dev;