Received: by 2002:a25:1985:0:0:0:0:0 with SMTP id 127csp4464063ybz; Tue, 28 Apr 2020 11:44:00 -0700 (PDT) X-Google-Smtp-Source: APiQypIYAaSaEz52JuwYEkAOVmu9E37a2ylRTcsKmXfOy8PY5lNzmrlbJi+Jy9y/E/bGb/dzJXzm X-Received: by 2002:a50:f61b:: with SMTP id c27mr22610461edn.256.1588099440374; Tue, 28 Apr 2020 11:44:00 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1588099440; cv=none; d=google.com; s=arc-20160816; b=KvkHMnReFb+aBSGb0E/rEe6hhinF8qr0T+qLeIcK60zQ2goU7AQAnV+jPBRbf7Dats Ls6u4LZcYs7dEWyjrevVVpglQTkhW3KUkyLIowuEjn3wjTS9h3EigoLcJLYLV4krmr1U s101iJ9PcUZSwFUVOGc4TWGhHVxed6ea3fB4bnsjHM+gPbxvubO7h5+dMlDFFgOWSBdt 0JdSd7ojss3D15c7U556KvgQ6U4aV2+FbCDWO5/N89rtWKbVy+dohIkKcxwSnOE7hGmE 339b0TSfy+aY+DtELYwQlR3FAF23ZznAoSNHe627fMktZ7Lgmvr9Z0HCKz6MRiKyF2QR bcRw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=cGWt4dekZYo53MssmQAnnqy/KqBbWyOh4kDInMJ4L/s=; b=vzNQPER+HTGy36vufpeoCdiQiki4GQyNeeIRH71zBcQMiBF9kJJ5lpGNeeLK+/iqND zt91Wa0co+n8Hy1ZA4gbwUyxmBYLBs2LCzTYWO8FCayhK0Bv5MeBSxlvv55q8ZvGHnlt 17+UOJXdse/EfiU6Mu2qiWg2GhLfVz/t4eVehyA0UZ881m4c8G8eAycEuofpN7G5MRSm HeIaI/n0DnrvKIXF8ar8EskoVkTz5WhHD1roQdCcnXRjh8cgdfFykUwsSc3zBJbzq1Xw OjDrur6GCnF8ukbKIesa4lGmtN/sMLjhFc3Rz7dvQsaN/ChVQSmaPyLBSp/fRLHehw7W 1vvg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Yd3Jxwvz; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id j19si2088650edp.118.2020.04.28.11.43.37; Tue, 28 Apr 2020 11:44:00 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Yd3Jxwvz; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730916AbgD1SkV (ORCPT + 99 others); Tue, 28 Apr 2020 14:40:21 -0400 Received: from mail.kernel.org ([198.145.29.99]:58142 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730733AbgD1SjT (ORCPT ); Tue, 28 Apr 2020 14:39:19 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id AA94F2085B; Tue, 28 Apr 2020 18:39:17 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1588099158; bh=lSLVL1PmZSuGhPXObhCxzR0Su9YRe26bgWIzVc9cV8k=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=Yd3JxwvzvyD9G+BDM/g0Qy0jRovNZqL02mYjGt9YQsEMrr9r1zLyuCODTp10YTCVC aGXTx67hFY9epqVvm1fj6eo99OIsnW21lOuBB3XykzsOW8v6MyZ+PR9D9EW6BY28XS ENl1BAKn2wsD2zNH+86eWMaFma4OV2BX6jJizHbM= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Pravin B Shelar , Yi-Hung Wei , syzbot+7ef50afd3a211f879112@syzkaller.appspotmail.com, Tonghao Zhang , "David S. Miller" Subject: [PATCH 5.4 066/168] net: openvswitch: ovs_ct_exit to be done under ovs_lock Date: Tue, 28 Apr 2020 20:24:00 +0200 Message-Id: <20200428182240.276239316@linuxfoundation.org> X-Mailer: git-send-email 2.26.2 In-Reply-To: <20200428182231.704304409@linuxfoundation.org> References: <20200428182231.704304409@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Tonghao Zhang [ Upstream commit 27de77cec985233bdf6546437b9761853265c505 ] syzbot wrote: | ============================= | WARNING: suspicious RCU usage | 5.7.0-rc1+ #45 Not tainted | ----------------------------- | net/openvswitch/conntrack.c:1898 RCU-list traversed in non-reader section!! | | other info that might help us debug this: | rcu_scheduler_active = 2, debug_locks = 1 | ... | | stack backtrace: | Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.12.0-0-ga698c8995f-prebuilt.qemu.org 04/01/2014 | Workqueue: netns cleanup_net | Call Trace: | ... | ovs_ct_exit | ovs_exit_net | ops_exit_list.isra.7 | cleanup_net | process_one_work | worker_thread To avoid that warning, invoke the ovs_ct_exit under ovs_lock and add lockdep_ovsl_is_held as optional lockdep expression. Link: https://lore.kernel.org/lkml/000000000000e642a905a0cbee6e@google.com Fixes: 11efd5cb04a1 ("openvswitch: Support conntrack zone limit") Cc: Pravin B Shelar Cc: Yi-Hung Wei Reported-by: syzbot+7ef50afd3a211f879112@syzkaller.appspotmail.com Signed-off-by: Tonghao Zhang Acked-by: Pravin B Shelar Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- net/openvswitch/conntrack.c | 3 ++- net/openvswitch/datapath.c | 4 +++- 2 files changed, 5 insertions(+), 2 deletions(-) --- a/net/openvswitch/conntrack.c +++ b/net/openvswitch/conntrack.c @@ -1890,7 +1890,8 @@ static void ovs_ct_limit_exit(struct net struct hlist_head *head = &info->limits[i]; struct ovs_ct_limit *ct_limit; - hlist_for_each_entry_rcu(ct_limit, head, hlist_node) + hlist_for_each_entry_rcu(ct_limit, head, hlist_node, + lockdep_ovsl_is_held()) kfree_rcu(ct_limit, rcu); } kfree(ovs_net->ct_limit_info->limits); --- a/net/openvswitch/datapath.c +++ b/net/openvswitch/datapath.c @@ -2430,8 +2430,10 @@ static void __net_exit ovs_exit_net(stru struct net *net; LIST_HEAD(head); - ovs_ct_exit(dnet); ovs_lock(); + + ovs_ct_exit(dnet); + list_for_each_entry_safe(dp, dp_next, &ovs_net->dps, list_node) __dp_destroy(dp);