Received: by 2002:a05:7412:b130:b0:e2:908c:2ebd with SMTP id az48csp2432495rdb; Mon, 20 Nov 2023 10:32:53 -0800 (PST) X-Google-Smtp-Source: AGHT+IHdYbkkDY8wiiZQj4xslurjFForn4w7KoDiFfS7O1VtXrxn5y6RUIeRSG+wcFvj0W3hKi8g X-Received: by 2002:a05:6808:309d:b0:3b6:cda3:f379 with SMTP id bl29-20020a056808309d00b003b6cda3f379mr12271807oib.13.1700505172950; Mon, 20 Nov 2023 10:32:52 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1700505172; cv=none; d=google.com; s=arc-20160816; b=jlY7TYnkSUFx8kZYQq88M8cJfOdmje3a6Vr3K+NEdaUt9cpCpt5nxzluqtpQW15gXS 31Hp0M8nivH/SGLWW86S05L71RzpiN/hr9q9CLiM0r/6kwgTPOW1F0ZNaYN/wfJEaUjB gRhOVVAyqvTxQPEfLSV4D3FPrmjDaxCqls9V4m+DurtV4/fRyHArS7itYaGMY/6jZylH 5c2ObVgroxfK9RimV+3mOh6wqXlU5fx9SibdPo9eZuEC5n6mpxvH+tJtFNv4xsJZxTty q1sEoNWXa8HopXx1TxzUqkBodrF9bnR55tn2SC8TZIrqa5D7AtKa6H737UVRDQIhqYzv t1/Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:autocrypt :references:cc:to:from:content-language:subject:user-agent :mime-version:date:message-id:dkim-signature; bh=JQKqeOCNXeZ0nxaIJQRxwCvrWoWO36a0tmBuhjIQhrM=; fh=YISkhr1MD4c51JkB3T74KRxbi5/bC1VaxOLCFlzjC2c=; b=RVCKF2WUcZ/KyHwG9xZHUrUQVDWhQgFEiPO7QUF5loq80kgkN/fftcDahPMsCNQG63 Vrk7+gbViuINGNXQoEb0SAHz+VdSqo5+H/XA6mpLxI/CO7LjoI2D5pZ/pTiE4AzagSfJ D/DWCn4XuGB1QM9Dv8Q42leSEhAT2yT/vtcGsLemGXP5+OLRLgDCeI8JubemL+bB0kCn Ad0sXIuuwEtcsqqEDoeglEPkBoR2isEK3NYcqkzZ/w35eN0kulzo0XDVIxP3Qvi5/fD0 Xj1YfqL4U8NdnmjdkZqTFg6TZQ44M3kRTpdLaiTUqNeUX7LRKZoJoDim5P4zCAJN9GZm bppw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=RxKaQ6hm; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:7 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from snail.vger.email (snail.vger.email. [2620:137:e000::3:7]) by mx.google.com with ESMTPS id n15-20020a63e04f000000b005b96af23fecsi8845947pgj.496.2023.11.20.10.32.49 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 20 Nov 2023 10:32:52 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:7 as permitted sender) client-ip=2620:137:e000::3:7; Authentication-Results: mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=RxKaQ6hm; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:7 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by snail.vger.email (Postfix) with ESMTP id 3071580DEA43; Mon, 20 Nov 2023 10:32:28 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at snail.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232210AbjKTScS (ORCPT + 99 others); Mon, 20 Nov 2023 13:32:18 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:54754 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229497AbjKTScQ (ORCPT ); Mon, 20 Nov 2023 13:32:16 -0500 Received: from mail-ed1-x52e.google.com (mail-ed1-x52e.google.com [IPv6:2a00:1450:4864:20::52e]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 8DC7FC9 for ; Mon, 20 Nov 2023 10:32:12 -0800 (PST) Received: by mail-ed1-x52e.google.com with SMTP id 4fb4d7f45d1cf-53e2308198eso6739360a12.1 for ; Mon, 20 Nov 2023 10:32:12 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; t=1700505131; x=1701109931; darn=vger.kernel.org; h=content-transfer-encoding:in-reply-to:autocrypt:references:cc:to :from:content-language:subject:user-agent:mime-version:date :message-id:from:to:cc:subject:date:message-id:reply-to; bh=JQKqeOCNXeZ0nxaIJQRxwCvrWoWO36a0tmBuhjIQhrM=; b=RxKaQ6hmPW7NIsqncNbMiKg/yVLy6SMYcmBsbgVN5ZJEdY5wW6Li6h8RsrJCCxDRD5 3kbCpqdD5nuBxspgKl4A5iL1ViBKv1jo4EvLzeBwsYTtCNQ8ltGHS9xMR6zVnr0JBXfh AUoRab0xFrxGrMazo9T/lKXpy1QFhUbMR1xhvHN3zRWBb+lk/EOQ+71whgU9GHKeg2BH issvlpbplbgUgu/0b68U5eTj9g4drFEMi6ZWJo1WLDQ7Djc6xn0+RuOaLv+SJY0O6Vjy CUznriknbpL0vlRM8jsHzqbUFL8sXsZ8kLVZJY6LUK3FsE2FgWspxjr9zEOJQPkGv4qG eNZA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1700505131; x=1701109931; h=content-transfer-encoding:in-reply-to:autocrypt:references:cc:to :from:content-language:subject:user-agent:mime-version:date :message-id:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=JQKqeOCNXeZ0nxaIJQRxwCvrWoWO36a0tmBuhjIQhrM=; b=SBzkJlUN+owLDTo8eG14iVZYE0b611N0Pow2YMvCuMQkWuSzS/sZKpdPAW28gfWvRo jzPDkg1N7KN5YtJiQ4wdJJ5zyUyHlx/sVBD7+ktRa5nrfTNEbMbPymu6Pqnh+tD2UKRO 6Rja6HDa37qRTGLj1dOnREteqyOb3/+eACrYuwHUccoLrmU8hNoEVf3Y+0UhPbFtZHia elQr0rlkbO12ePXCa8gGaYSqrbzC5sEq1ydGlojSPdLWZQc2Loj3JtsyH2jAvkDUiRDE CvWAp/0HgaiQMr5lKHTk0UHMJKHP047Ov/oZSCW1WjlhwvzYqSCmRpQT4dvzCssG/IzX /JDg== X-Gm-Message-State: AOJu0YxmhjRoXh+1Wi0SySDiWJT9D7cRmzrNSAQWHhG+zfzTrKhc7ORJ zk64KGGBm5Xe390Iu4LLiWGdUg== X-Received: by 2002:a17:906:5197:b0:9ba:fe6:225 with SMTP id y23-20020a170906519700b009ba0fe60225mr6326061ejk.55.1700505130969; Mon, 20 Nov 2023 10:32:10 -0800 (PST) Received: from [192.168.1.20] ([178.197.222.11]) by smtp.gmail.com with ESMTPSA id kq14-20020a170906abce00b009fcb10eecb2sm1999386ejb.84.2023.11.20.10.32.08 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Mon, 20 Nov 2023 10:32:09 -0800 (PST) Message-ID: <0954d66f-a685-4aaa-90a4-3d3492c79cd4@linaro.org> Date: Mon, 20 Nov 2023 19:32:06 +0100 MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Subject: Re: [PATCH] nfc: virtual_ncidev: Add variable to check if ndev is running Content-Language: en-US From: Krzysztof Kozlowski To: Phi Nguyen , bongsu.jeon@samsung.com Cc: "netdev@vger.kernel.org" , "linux-kernel@vger.kernel.org" , "syzbot+6eb09d75211863f15e3e@syzkaller.appspotmail.com" References: <20231119164705.1991375-1-phind.uet@gmail.com> <20231120044706epcms2p48c4579db14cc4f3274031036caac4718@epcms2p4> <20d93e83-66c0-28d9-4426-a0d4c098f303@gmail.com> <8bce1251-7a6b-4b4c-b700-9d97c664689f@gmail.com> <9db5e25f-9fe1-45d9-9a3b-91c45c6cdddf@linaro.org> Autocrypt: addr=krzysztof.kozlowski@linaro.org; keydata= xsFNBFVDQq4BEAC6KeLOfFsAvFMBsrCrJ2bCalhPv5+KQF2PS2+iwZI8BpRZoV+Bd5kWvN79 cFgcqTTuNHjAvxtUG8pQgGTHAObYs6xeYJtjUH0ZX6ndJ33FJYf5V3yXqqjcZ30FgHzJCFUu JMp7PSyMPzpUXfU12yfcRYVEMQrmplNZssmYhiTeVicuOOypWugZKVLGNm0IweVCaZ/DJDIH gNbpvVwjcKYrx85m9cBVEBUGaQP6AT7qlVCkrf50v8bofSIyVa2xmubbAwwFA1oxoOusjPIE J3iadrwpFvsZjF5uHAKS+7wHLoW9hVzOnLbX6ajk5Hf8Pb1m+VH/E8bPBNNYKkfTtypTDUCj NYcd27tjnXfG+SDs/EXNUAIRefCyvaRG7oRYF3Ec+2RgQDRnmmjCjoQNbFrJvJkFHlPeHaeS BosGY+XWKydnmsfY7SSnjAzLUGAFhLd/XDVpb1Een2XucPpKvt9ORF+48gy12FA5GduRLhQU vK4tU7ojoem/G23PcowM1CwPurC8sAVsQb9KmwTGh7rVz3ks3w/zfGBy3+WmLg++C2Wct6nM Pd8/6CBVjEWqD06/RjI2AnjIq5fSEH/BIfXXfC68nMp9BZoy3So4ZsbOlBmtAPvMYX6U8VwD TNeBxJu5Ex0Izf1NV9CzC3nNaFUYOY8KfN01X5SExAoVTr09ewARAQABzTRLcnp5c3p0b2Yg S296bG93c2tpIDxrcnp5c3p0b2Yua296bG93c2tpQGxpbmFyby5vcmc+wsGUBBMBCgA+FiEE m9B+DgxR+NWWd7dUG5NDfTtBYpsFAmI+BxMCGwMFCRRfreEFCwkIBwIGFQoJCAsCBBYCAwEC HgECF4AACgkQG5NDfTtBYptgbhAAjAGunRoOTduBeC7V6GGOQMYIT5n3OuDSzG1oZyM4kyvO XeodvvYv49/ng473E8ZFhXfrre+c1olbr1A8pnz9vKVQs9JGVa6wwr/6ddH7/yvcaCQnHRPK mnXyP2BViBlyDWQ71UC3N12YCoHE2cVmfrn4JeyK/gHCvcW3hUW4i5rMd5M5WZAeiJj3rvYh v8WMKDJOtZFXxwaYGbvFJNDdvdTHc2x2fGaWwmXMJn2xs1ZyFAeHQvrp49mS6PBQZzcx0XL5 cU9ZjhzOZDn6Apv45/C/lUJvPc3lo/pr5cmlOvPq1AsP6/xRXsEFX/SdvdxJ8w9KtGaxdJuf rpzLQ8Ht+H0lY2On1duYhmro8WglOypHy+TusYrDEry2qDNlc/bApQKtd9uqyDZ+rx8bGxyY qBP6bvsQx5YACI4p8R0J43tSqWwJTP/R5oPRQW2O1Ye1DEcdeyzZfifrQz58aoZrVQq+innR aDwu8qDB5UgmMQ7cjDSeAQABdghq7pqrA4P8lkA7qTG+aw8Z21OoAyZdUNm8NWJoQy8m4nUP gmeeQPRc0vjp5JkYPgTqwf08cluqO6vQuYL2YmwVBIbO7cE7LNGkPDA3RYMu+zPY9UUi/ln5 dcKuEStFZ5eqVyqVoZ9eu3RTCGIXAHe1NcfcMT9HT0DPp3+ieTxFx6RjY3kYTGLOwU0EVUNc NAEQAM2StBhJERQvgPcbCzjokShn0cRA4q2SvCOvOXD+0KapXMRFE+/PZeDyfv4dEKuCqeh0 hihSHlaxTzg3TcqUu54w2xYskG8Fq5tg3gm4kh1Gvh1LijIXX99ABA8eHxOGmLPRIBkXHqJY oHtCvPc6sYKNM9xbp6I4yF56xVLmHGJ61KaWKf5KKWYgA9kfHufbja7qR0c6H79LIsiYqf92 H1HNq1WlQpu/fh4/XAAaV1axHFt/dY/2kU05tLMj8GjeQDz1fHas7augL4argt4e+jum3Nwt yupodQBxncKAUbzwKcDrPqUFmfRbJ7ARw8491xQHZDsP82JRj4cOJX32sBg8nO2N5OsFJOcd 5IE9v6qfllkZDAh1Rb1h6DFYq9dcdPAHl4zOj9EHq99/CpyccOh7SrtWDNFFknCmLpowhct9 5ZnlavBrDbOV0W47gO33WkXMFI4il4y1+Bv89979rVYn8aBohEgET41SpyQz7fMkcaZU+ok/ +HYjC/qfDxT7tjKXqBQEscVODaFicsUkjheOD4BfWEcVUqa+XdUEciwG/SgNyxBZepj41oVq FPSVE+Ni2tNrW/e16b8mgXNngHSnbsr6pAIXZH3qFW+4TKPMGZ2rZ6zITrMip+12jgw4mGjy 5y06JZvA02rZT2k9aa7i9dUUFggaanI09jNGbRA/ABEBAAHCwXwEGAEKACYCGwwWIQSb0H4O DFH41ZZ3t1Qbk0N9O0FimwUCYDzvagUJFF+UtgAKCRAbk0N9O0Fim9JzD/0auoGtUu4mgnna oEEpQEOjgT7l9TVuO3Qa/SeH+E0m55y5Fjpp6ZToc481za3xAcxK/BtIX5Wn1mQ6+szfrJQ6 59y2io437BeuWIRjQniSxHz1kgtFECiV30yHRgOoQlzUea7FgsnuWdstgfWi6LxstswEzxLZ Sj1EqpXYZE4uLjh6dW292sO+j4LEqPYr53hyV4I2LPmptPE9Rb9yCTAbSUlzgjiyyjuXhcwM qf3lzsm02y7Ooq+ERVKiJzlvLd9tSe4jRx6Z6LMXhB21fa5DGs/tHAcUF35hSJrvMJzPT/+u /oVmYDFZkbLlqs2XpWaVCo2jv8+iHxZZ9FL7F6AHFzqEFdqGnJQqmEApiRqH6b4jRBOgJ+cY qc+rJggwMQcJL9F+oDm3wX47nr6jIsEB5ZftdybIzpMZ5V9v45lUwmdnMrSzZVgC4jRGXzsU EViBQt2CopXtHtYfPAO5nAkIvKSNp3jmGxZw4aTc5xoAZBLo0OV+Ezo71pg3AYvq0a3/oGRG KQ06ztUMRrj8eVtpImjsWCd0bDWRaaR4vqhCHvAG9iWXZu4qh3ipie2Y0oSJygcZT7H3UZxq fyYKiqEmRuqsvv6dcbblD8ZLkz1EVZL6djImH5zc5x8qpVxlA0A0i23v5QvN00m6G9NFF0Le D2GYIS41Kv4Isx2dEFh+/Q== In-Reply-To: <9db5e25f-9fe1-45d9-9a3b-91c45c6cdddf@linaro.org> Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (snail.vger.email [0.0.0.0]); Mon, 20 Nov 2023 10:32:28 -0800 (PST) On 20/11/2023 19:29, Krzysztof Kozlowski wrote: > On 20/11/2023 19:23, Phi Nguyen wrote: >> On 11/20/2023 6:45 PM, Krzysztof Kozlowski wrote: >>> On 20/11/2023 11:39, Nguyen Dinh Phi wrote: >>>>>>> mutex_lock(&vdev->mtx); >>>>>>> kfree_skb(vdev->send_buff); >>>>>>> vdev->send_buff = NULL; >>>>>>> + vdev->running = false; >>>>>>> mutex_unlock(&vdev->mtx); >>>>>>> >>>>>>> return 0; >>>>>>> @@ -50,7 +55,7 @@ static int virtual_nci_send(struct nci_dev *ndev, struct sk_buff *skb) >>>>>>> struct virtual_nci_dev *vdev = nci_get_drvdata(ndev); >>>>>>> >>>>>>> mutex_lock(&vdev->mtx); >>>>>>> - if (vdev->send_buff) { >>>>>>> + if (vdev->send_buff || !vdev->running) { >>>>>> >>>>>> Dear Krzysztof, >>>>>> >>>>>> I agree this defensive code. >>>>>> But i think NFC submodule has to avoid this situation.(calling send function of closed nci_dev) >>>>>> Could you check this? >>>>> >>>>> This code looks not effective. At this point vdev->send_buff is always >>>>> false, so the additional check would not bring any value. >>>>> >>>>> I don't see this fixing anything. Syzbot also does not seem to agree. >>>>> >>>>> Nguyen, please test your patches against syzbot *before* sending them. >>>>> If you claim this fixes the report, please provide me the link to syzbot >>>>> test results confirming it is fixed. >>>>> >>>>> I looked at syzbot dashboard and do not see this issue fixed with this >>>>> patch. >>>>> >>>>> Best regards, >>>>> Krzysztof >>>>> >>>> >>>> Hi Krzysztof, >>>> >>>> I've submitted it to syzbot, it is the test request that created at >>>> [2023/11/20 09:39] in dashboard link >>>> https://syzkaller.appspot.com/bug?extid=6eb09d75211863f15e3e >>> >>> ...and I see there two errors. >>> >> These are because I sent email wrongly and syzbot truncates the patch >> and can not compile >> >>> I don't know, maybe I miss something obvious (our brains like to do it >>> sometimes), but please explain me how this could fix anything? >>> >>> Best regards, >>> Krzysztof >>> >> >> The issue arises when an skb is added to the send_buff after invoking >> ndev->ops->close() but before unregistering the device. In such cases, >> the virtual device will generate a copy of skb, but with no consumer >> thereafter. Consequently, this object persists indefinitely. >> >> This problem seems to stem from the existence of time gaps between >> ops->close() and the destruction of the workqueue. During this interval, >> incoming requests continue to trigger the send function. > > I asked how this could fix anything. Can you respond to my original comment? > > Look: > >>>>> This code looks not effective. At this point vdev->send_buff is always >>>>> false, so the additional check would not bring any value. Uh, now I see, I missed that's the if here is for send_buff != NULL, so quite different case than virtual_nci_close(). Best regards, Krzysztof