Return-path: Received: from nbd.name ([46.4.11.11]:48843 "EHLO nbd.name" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752370AbcENSyS (ORCPT ); Sat, 14 May 2016 14:54:18 -0400 Subject: Re: [PATCH] mac80211: mesh: flush mesh paths early in sta destroy To: Bob Copeland , Johannes Berg References: <1463248198-3926-1-git-send-email-me@bobcopeland.com> Cc: linux-wireless@vger.kernel.org, fred.veldini@gmail.com From: Felix Fietkau Message-ID: (sfid-20160514_205439_808662_0D0128EF) Date: Sat, 14 May 2016 20:54:13 +0200 MIME-Version: 1.0 In-Reply-To: <1463248198-3926-1-git-send-email-me@bobcopeland.com> Content-Type: text/plain; charset=utf-8 Sender: linux-wireless-owner@vger.kernel.org List-ID: On 2016-05-14 19:49, Bob Copeland wrote: > Currently, the mesh paths associated with a nexthop station are cleaned > up in the following code path: > > __sta_info_destroy_part1 > synchronize_net() > __sta_info_destroy_part2 > -> cleanup_single_sta > -> mesh_sta_cleanup > -> mesh_plink_deactivate > -> mesh_path_flush_by_nexthop > > However, there are a couple of problems here: > > 1) the paths aren't flushed at all if the MPM is running in userspace > (e.g. when using wpa_supplicant or authsae) > > 2) there is no synchronize_rcu between removing the path and readers > accessing the nexthop, which means the following race is possible: > > CPU0 CPU1 > ~~~~ ~~~~ > sta_info_destroy_part1() > synchronize_net() > rcu_read_lock() > mesh_nexthop_resolve() > mpath = mesh_path_lookup() > [...] -> mesh_path_flush_by_nexthop() > sta = rcu_dereference( > mpath->next_hop) > kfree(sta) > access sta <-- CRASH > > Fix both of these by unconditionally flushing paths in part1 of sta > destroy. The synchronize_net() will then happen after paths > are flushed, preventing mesh_path_lookup from finding a path with > the to-be-freed nexthop sta. > > Also, add a new sta bit and a check in mesh_path_assign_nexthop() to > avoid adding it back between the flush and the synchronize_net(). > > Fixes this crash: > > [ 348.529295] BUG: unable to handle kernel paging request at 00020040 > [ 348.530014] IP: [] ieee80211_mps_set_frame_flags+0x40/0xaa [mac80211] > [ 348.530014] *pde = 00000000 > [ 348.530014] Oops: 0000 [#1] PREEMPT > [ 348.530014] Modules linked in: drbg ansi_cprng ctr ccm ppp_generic slhc ipt_MASQUERADE nf_nat_masquerade_ipv4 8021q ] > [ 348.530014] CPU: 0 PID: 20597 Comm: wget Tainted: G O 4.6.0-rc5-wt=V1 #1 > [ 348.530014] Hardware name: To Be Filled By O.E.M./To be filled by O.E.M., BIOS 080016 11/07/2014 > [ 348.530014] task: f64fa280 ti: f4f9c000 task.ti: f4f9c000 > [ 348.530014] EIP: 0060:[] EFLAGS: 00010246 CPU: 0 > [ 348.530014] EIP is at ieee80211_mps_set_frame_flags+0x40/0xaa [mac80211] > [ 348.530014] EAX: f4ce63e0 EBX: 00000088 ECX: f3788416 EDX: 00020008 > [ 348.530014] ESI: 00000000 EDI: 00000088 EBP: f6409a4c ESP: f6409a40 > [ 348.530014] DS: 007b ES: 007b FS: 0000 GS: 0033 SS: 0068 > [ 348.530014] CR0: 80050033 CR2: 00020040 CR3: 33190000 CR4: 00000690 > [ 348.530014] Stack: > [ 348.530014] 00000000 f4ce63e0 f5f9bd80 f6409a64 f9291d80 0000ce67 f5d51e00 f4ce63e0 > [ 348.530014] f3788416 f6409a80 f9291dc1 f4ce8320 f4ce63e0 f5d51e00 f4ce63e0 f4ce8320 > [ 348.530014] f6409a98 f9277f6f 00000000 00000000 0000007c 00000000 f6409b2c f9278dd1 > [ 348.530014] Call Trace: > [ 348.530014] [] mesh_nexthop_lookup+0xbb/0xc8 [mac80211] > [ 348.530014] [] mesh_nexthop_resolve+0x34/0xd8 [mac80211] > [ 348.530014] [] ieee80211_xmit+0x92/0xc1 [mac80211] > [ 348.530014] [] __ieee80211_subif_start_xmit+0x807/0x83c [mac80211] > [ 348.530014] [] ? sch_direct_xmit+0xd7/0x1b3 > [ 348.530014] [] ? __local_bh_enable_ip+0x5d/0x7b > [ 348.530014] [] ? nf_nat_ipv4_out+0x4c/0xd0 [nf_nat_ipv4] > [ 348.530014] [] ? iptable_nat_ipv4_fn+0xf/0xf [iptable_nat] > [ 348.530014] [] ? netif_skb_features+0x14d/0x30a > [ 348.530014] [] ieee80211_subif_start_xmit+0xa/0xe [mac80211] > [ 348.530014] [] dev_hard_start_xmit+0x1f8/0x267 > [ 348.530014] [] ? validate_xmit_skb.isra.120.part.121+0x10/0x253 > [ 348.530014] [] sch_direct_xmit+0x8b/0x1b3 > [ 348.530014] [] __dev_queue_xmit+0x2c8/0x513 > [ 348.530014] [] dev_queue_xmit+0xa/0xc > [ 348.530014] [] batadv_send_skb_packet+0xd6/0xec [batman_adv] > [ 348.530014] [] batadv_send_unicast_skb+0x15/0x4a [batman_adv] > [ 348.530014] [] batadv_dat_send_data+0x27e/0x310 [batman_adv] > [ 348.530014] [] ? batadv_tt_global_hash_find.isra.11+0x8/0xa [batman_adv] > [ 348.530014] [] batadv_dat_snoop_outgoing_arp_request+0x208/0x23d [batman_adv] > [ 348.530014] [] batadv_interface_tx+0x206/0x385 [batman_adv] > [ 348.530014] [] dev_hard_start_xmit+0x1f8/0x267 > [ 348.530014] [] ? validate_xmit_skb.isra.120.part.121+0x10/0x253 > [ 348.530014] [] sch_direct_xmit+0x8b/0x1b3 > [ 348.530014] [] __dev_queue_xmit+0x2c8/0x513 > [ 348.530014] [] ? igb_xmit_frame+0x57/0x72 [igb] > [ 348.530014] [] dev_queue_xmit+0xa/0xc > [ 348.530014] [] br_dev_queue_push_xmit+0xeb/0xfb [bridge] > [ 348.530014] [] br_forward_finish+0x29/0x74 [bridge] > [ 348.530014] [] ? deliver_clone+0x3b/0x3b [bridge] > [ 348.530014] [] __br_forward+0x89/0xe7 [bridge] > [ 348.530014] [] ? br_dev_queue_push_xmit+0xfb/0xfb [bridge] > [ 348.530014] [] deliver_clone+0x34/0x3b [bridge] > [ 348.530014] [] ? br_flood+0x95/0x95 [bridge] > [ 348.530014] [] br_flood+0x77/0x95 [bridge] > [ 348.530014] [] br_flood_forward+0x13/0x1a [bridge] > [ 348.530014] [] ? br_flood+0x95/0x95 [bridge] > [ 348.530014] [] br_handle_frame_finish+0x392/0x3db [bridge] > [ 348.530014] [] ? nf_iterate+0x2b/0x6b > [ 348.530014] [] br_handle_frame+0x1e6/0x240 [bridge] > [ 348.530014] [] ? br_handle_local_finish+0x6a/0x6a [bridge] > [ 348.530014] [] __netif_receive_skb_core+0x43a/0x66b > [ 348.530014] [] ? br_handle_frame_finish+0x3db/0x3db [bridge] > [ 348.530014] [] ? resched_curr+0x19/0x37 > [ 348.530014] [] ? check_preempt_wakeup+0xbf/0xfe > [ 348.530014] [] ? ktime_get_with_offset+0x5c/0xfc > [ 348.530014] [] __netif_receive_skb+0x47/0x55 > [ 348.530014] [] netif_receive_skb_internal+0x40/0x5a > [ 348.530014] [] napi_gro_receive+0x3a/0x94 > [ 348.530014] [] igb_poll+0x6fd/0x9ad [igb] > [ 348.530014] [] ? swake_up_locked+0x14/0x26 > [ 348.530014] [] net_rx_action+0xde/0x250 > [ 348.530014] [] __do_softirq+0x8a/0x163 > [ 348.530014] [] ? __hrtimer_tasklet_trampoline+0x19/0x19 > [ 348.530014] [] do_softirq_own_stack+0x26/0x2c > [ 348.530014] > [ 348.530014] [] irq_exit+0x31/0x6f > [ 348.530014] [] do_IRQ+0x8d/0xa0 > [ 348.530014] [] common_interrupt+0x2c/0x40 > [ 348.530014] Code: e7 8c 00 66 81 ff 88 00 75 12 85 d2 75 0e b2 c3 b8 83 e9 29 f9 e8 a7 5f f9 c6 eb 74 66 81 e3 8c 005 > [ 348.530014] EIP: [] ieee80211_mps_set_frame_flags+0x40/0xaa [mac80211] SS:ESP 0068:f6409a40 > [ 348.530014] CR2: 0000000000020040 > [ 348.530014] ---[ end trace 48556ac26779732e ]--- > [ 348.530014] Kernel panic - not syncing: Fatal exception in interrupt > [ 348.530014] Kernel Offset: disabled > > Cc: stable@vger.kernel.org > Reported-by: Fred Veldini > Tested-by: Fred Veldini > Signed-off-by: Bob Copeland > --- > From git history, this appears to go back to earliest commits adding > authsae support. I reproduced in a 4.4 kernel, which predates all of > the mesh pathtable rework, though it is harder to hit there than in > the current code. > > This is slightly different from the version Fred tested (CCed) -- > the version I sent him didn't have the BLOCK_MPATH part, but that > seems necessary to me to prevent re-adding in hwmp_route_info_get(). > But I can reproduce the above crash and this patch fixes it for > me. > --- > net/mac80211/mesh_pathtbl.c | 4 ++++ > net/mac80211/sta_info.c | 10 ++++++++++ > net/mac80211/sta_info.h | 2 ++ > 3 files changed, 16 insertions(+) > > diff --git a/net/mac80211/sta_info.h b/net/mac80211/sta_info.h > index c8b8ccc370eb..65ecd3746c3b 100644 > --- a/net/mac80211/sta_info.h > +++ b/net/mac80211/sta_info.h > @@ -70,6 +70,7 @@ > * @WLAN_STA_MPSP_RECIPIENT: local STA is recipient of a MPSP. > * @WLAN_STA_PS_DELIVER: station woke up, but we're still blocking TX > * until pending frames are delivered > + * @WLAN_STA_BLOCK_MPATH: block adding this station as a mesh path > * > * @NUM_WLAN_STA_FLAGS: number of defined flags > */ > @@ -100,6 +101,7 @@ enum ieee80211_sta_info_flags { > WLAN_STA_MPSP_OWNER, > WLAN_STA_MPSP_RECIPIENT, > WLAN_STA_PS_DELIVER, > + WLAN_STA_BLOCK_MPATH, I think this flag needs to be added to sta_flag_names in debugfs_sta.c - Felix