Received: by 2002:a05:6a10:c604:0:0:0:0 with SMTP id y4csp713916pxt; Fri, 6 Aug 2021 11:52:51 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzuBTampW9Fs/zAUeKoiXM+ZZEQKRttMqbw1gZ0BtnBTCtFKgMY+5SeTNN+rntGMCNSG+iT X-Received: by 2002:a02:4444:: with SMTP id o65mr11123280jaa.24.1628275969652; Fri, 06 Aug 2021 11:52:49 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1628275969; cv=none; d=google.com; s=arc-20160816; b=qYSzI9B/Jpvx5cFSjeyY7BH/l2XS9YjgdXbPC7lmv8GIRC5mPhWwmHUCiunCBUQsow N5TJD0jUA740Mwol1HdF/HBXo94UGRu5WMNtxeikY7MhbFfHyff5AymbnSRCsM4DkI5t Dp4S8fllYAWq/dADbVDIak4rI1lpQGIfXJN2QeR/F14Mcx+4d1S8mMGyiUhwwq7Mt7ak dvX8iWAIZjDyyKLJBclrpDeUBSzPfIczNNVNDJeESlHZH0HK7AlnaI1ssOko6DM6b1s3 Pr2xChsW5SqrCpVxhMbU332sFqq7KU8m3vzyQsPkNraN51Ocz/bDj0hjrF8d3JyhQ5oV WCXg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=iPsQiHsO3mzbRRb3d/KylaBQPfvt2L5vMAOr3FtNujc=; b=yEEJKSUGOoL/Ns5fcohaGUVT3ar7hI63F8JWNdthZL75vsuHhcD5iI8xHoUVvTacVH ym0pA4JgOLeQ+HQW8eeCdFxrNS3rmER+UHR6JcDqKGcGhjnQ/DudzttBoPSVmipDcASo DcQLoWGoVIjU4H242cxri0mvSi7Di+h4Dm7O8pZdS4BNlFY3a6prLM1H5OSaK//VqlhE lRd60bO4hPls2mf93eBo0UOhQEHO52hm//HTrOBRfnfzTYTnSeikPZwer6mitA/2UQRu bh5ivZPbb61J1QVOpZAo/56rtVgNCW72Qo0Z4EWW+mJ1pv81S84cFrB8en6qxtmagLIR 1fxg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=CSTD0cUb; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id h15si9400435ile.62.2021.08.06.11.52.36; Fri, 06 Aug 2021 11:52:49 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=CSTD0cUb; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231953AbhHFNvv (ORCPT + 99 others); Fri, 6 Aug 2021 09:51:51 -0400 Received: from mail.kernel.org ([198.145.29.99]:48804 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230057AbhHFNvu (ORCPT ); Fri, 6 Aug 2021 09:51:50 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id CFE1061158; Fri, 6 Aug 2021 13:51:33 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1628257894; bh=k2Y9aipZPPlCNLObLR0DkEodjX0SsKq8KVYfy4+SmJ4=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=CSTD0cUbb7/rlh/ckG9AvuJUOVMY2C4ZT11OSwYwyDHS+2bR1DWwXJvOXaXFmE4MT /oeNPTshZlVHgw6vOVBXRtBwVEtUfz0AtH5NsSZppxwLEXQSJsb8p6WtPnq4JXyWtg 24RMczCMIfGnM1abNyFPSFU3Xi9buuUDDhxBDqYA= Date: Fri, 6 Aug 2021 15:51:31 +0200 From: Greg KH To: Jakub Kicinski Cc: Kefeng Wang , linux-kernel@vger.kernel.org, netdev@vger.kernel.org, hannes@stressinduktion.org, davem@davemloft.net, akpm@linux-foundation.org, Daniel Borkmann , Eric Dumazet , Minmin chen Subject: Re: [PATCH v2] once: Fix panic when module unload Message-ID: References: <20210806082124.96607-1-wangkefeng.wang@huawei.com> <20210806064328.1b54a7f0@kicinski-fedora-pc1c0hjn.dhcp.thefacebook.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20210806064328.1b54a7f0@kicinski-fedora-pc1c0hjn.dhcp.thefacebook.com> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Aug 06, 2021 at 06:43:28AM -0700, Jakub Kicinski wrote: > On Fri, 6 Aug 2021 16:21:24 +0800 Kefeng Wang wrote: > > DO_ONCE > > DEFINE_STATIC_KEY_TRUE(___once_key); > > __do_once_done > > once_disable_jump(once_key); > > INIT_WORK(&w->work, once_deferred); > > struct once_work *w; > > w->key = key; > > schedule_work(&w->work); module unload > > //*the key is > > destroy* > > process_one_work > > once_deferred > > BUG_ON(!static_key_enabled(work->key)); > > static_key_count((struct static_key *)x) //*access key, crash* > > > > When module uses DO_ONCE mechanism, it could crash due to the above > > concurrency problem, we could reproduce it with link[1]. > > > > Fix it by add/put module refcount in the once work process. > > > > [1] https://lore.kernel.org/netdev/eaa6c371-465e-57eb-6be9-f4b16b9d7cbf@huawei.com/ > > Seems reasonable. Greg does it look good to you? Me? I was not paying attention to this at all, sorry... > I think we can take it thru networking since nobody cared to pick up v1. Sure, I trust you :)