lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CANn89i+rpLGkgob=EJ6AKSSrRodvCv0FMMAndK6NCfL5YeGjFA@mail.gmail.com>
Date: Fri, 21 Feb 2025 05:48:00 +0100
From: Eric Dumazet <edumazet@...gle.com>
To: Antoine Tenart <atenart@...nel.org>
Cc: davem@...emloft.net, kuba@...nel.org, pabeni@...hat.com, 
	stephen@...workplumber.org, gregkh@...uxfoundation.org, 
	maxime.chevallier@...tlin.com, christophe.leroy@...roup.eu, 
	netdev@...r.kernel.org
Subject: Re: [PATCH net-next v2 1/4] net-sysfs: remove rtnl_trylock from
 device attributes

On Tue, Feb 4, 2025 at 6:03 PM Antoine Tenart <atenart@...nel.org> wrote:
>
> There is an ABBA deadlock between net device unregistration and sysfs
> files being accessed[1][2]. To prevent this from happening all paths
> taking the rtnl lock after the sysfs one (actually kn->active refcount)
> use rtnl_trylock and return early (using restart_syscall)[3], which can
> make syscalls to spin for a long time when there is contention on the
> rtnl lock[4].
>
> There are not many possibilities to improve the above:
> - Rework the entire net/ locking logic.
> - Invert two locks in one of the paths — not possible.
>
> But here it's actually possible to drop one of the locks safely: the
> kernfs_node refcount. More details in the code itself, which comes with
> lots of comments.
>
> Note that we check the device is alive in the added sysfs_rtnl_lock
> helper to disallow sysfs operations to run after device dismantle has
> started. This also help keeping the same behavior as before. Because of
> this calls to dev_isalive in sysfs ops were removed.
>
> [1] https://lore.kernel.org/netdev/49A4D5D5.5090602@trash.net/
> [2] https://lore.kernel.org/netdev/m14oyhis31.fsf@fess.ebiederm.org/
> [3] https://lore.kernel.org/netdev/20090226084924.16cb3e08@nehalam/
> [4] https://lore.kernel.org/all/20210928125500.167943-1-atenart@kernel.org/T/
>
> Signed-off-by: Antoine Tenart <atenart@...nel.org>
> ---
>  include/linux/rtnetlink.h |   1 +
>  net/core/net-sysfs.c      | 186 +++++++++++++++++++++++++++-----------
>  net/core/rtnetlink.c      |   5 +
>  3 files changed, 139 insertions(+), 53 deletions(-)
>
> diff --git a/include/linux/rtnetlink.h b/include/linux/rtnetlink.h
> index 4bc2ee0b10b0..ccaaf4c7d5f6 100644
> --- a/include/linux/rtnetlink.h
> +++ b/include/linux/rtnetlink.h
> @@ -43,6 +43,7 @@ extern void rtnl_lock(void);
>  extern void rtnl_unlock(void);
>  extern int rtnl_trylock(void);
>  extern int rtnl_is_locked(void);
> +extern int rtnl_lock_interruptible(void);
>  extern int rtnl_lock_killable(void);
>  extern bool refcount_dec_and_rtnl_lock(refcount_t *r);
>
> diff --git a/net/core/net-sysfs.c b/net/core/net-sysfs.c
> index 07cb99b114bd..e012234c739a 100644
> --- a/net/core/net-sysfs.c
> +++ b/net/core/net-sysfs.c
> @@ -42,6 +42,87 @@ static inline int dev_isalive(const struct net_device *dev)
>         return READ_ONCE(dev->reg_state) <= NETREG_REGISTERED;
>  }
>
> +/* There is a possible ABBA deadlock between rtnl_lock and kernfs_node->active,
> + * when unregistering a net device and accessing associated sysfs files. The
> + * potential deadlock is as follow:
> + *
> + *         CPU 0                                         CPU 1
> + *
> + *    rtnl_lock                                   vfs_read
> + *    unregister_netdevice_many                   kernfs_seq_start
> + *    device_del / kobject_put                      kernfs_get_active (kn->active++)
> + *    kernfs_drain                                sysfs_kf_seq_show
> + *    wait_event(                                 rtnl_lock
> + *       kn->active == KN_DEACTIVATED_BIAS)       -> waits on CPU 0 to release
> + *    -> waits on CPU 1 to decrease kn->active       the rtnl lock.
> + *
> + * The historical fix was to use rtnl_trylock with restart_syscall to bail out
> + * of sysfs operations when the lock couldn't be taken. This fixed the above
> + * issue as it allowed CPU 1 to bail out of the ABBA situation.
> + *
> + * But it came with performances issues, as syscalls are being restarted in
> + * loops when there was contention on the rtnl lock, with huge slow downs in
> + * specific scenarios (e.g. lots of virtual interfaces created and userspace
> + * daemons querying their attributes).
> + *
> + * The idea below is to bail out of the active kernfs_node protection
> + * (kn->active) while trying to take the rtnl lock.
> + *
> + * This replaces rtnl_lock() and still has to be used with rtnl_unlock(). The
> + * net device is guaranteed to be alive if this returns successfully.
> + */
> +static int sysfs_rtnl_lock(struct kobject *kobj, struct attribute *attr,
> +                          struct net_device *ndev)
> +{
> +       struct kernfs_node *kn;
> +       int ret = 0;
> +
> +       /* First, we hold a reference to the net device as the unregistration
> +        * path might run in parallel. This will ensure the net device and the
> +        * associated sysfs objects won't be freed while we try to take the rtnl
> +        * lock.
> +        */
> +       dev_hold(ndev);
> +       /* sysfs_break_active_protection was introduced to allow self-removal of
> +        * devices and their associated sysfs files by bailing out of the
> +        * sysfs/kernfs protection. We do this here to allow the unregistration
> +        * path to complete in parallel. The following takes a reference on the
> +        * kobject and the kernfs_node being accessed.
> +        *
> +        * This works because we hold a reference onto the net device and the
> +        * unregistration path will wait for us eventually in netdev_run_todo
> +        * (outside an rtnl lock section).
> +        */
> +       kn = sysfs_break_active_protection(kobj, attr);
> +       /* We can now try to take the rtnl lock. This can't deadlock us as the
> +        * unregistration path is able to drain sysfs files (kernfs_node) thanks
> +        * to the above dance.
> +        */
> +       if (rtnl_lock_interruptible()) {
> +               ret = -ERESTARTSYS;
> +               goto unbreak;
> +       }
> +       /* Check dismantle on the device hasn't started, otherwise deny the
> +        * operation.
> +        */
> +       if (!dev_isalive(ndev)) {
> +               rtnl_unlock();
> +               ret = -ENODEV;
> +               goto unbreak;
> +       }
> +       /* We are now sure the device dismantle hasn't started nor that it can
> +        * start before we exit the locking section as we hold the rtnl lock.
> +        * There's no need to keep unbreaking the sysfs protection nor to hold
> +        * a net device reference from that point; that was only needed to take
> +        * the rtnl lock.
> +        */
> +unbreak:
> +       sysfs_unbreak_active_protection(kn);
> +       dev_put(ndev);
> +
> +       return ret;
> +}
> +
>  /* use same locking rules as GIF* ioctl's */
>  static ssize_t netdev_show(const struct device *dev,
>                            struct device_attribute *attr, char *buf,
> @@ -95,14 +176,14 @@ static ssize_t netdev_store(struct device *dev, struct device_attribute *attr,
>         if (ret)
>                 goto err;
>
> -       if (!rtnl_trylock())
> -               return restart_syscall();
> +       ret = sysfs_rtnl_lock(&dev->kobj, &attr->attr, netdev);
> +       if (ret)
> +               goto err;
> +
> +       ret = (*set)(netdev, new);
> +       if (ret == 0)
> +               ret = len;
>
> -       if (dev_isalive(netdev)) {
> -               ret = (*set)(netdev, new);
> -               if (ret == 0)
> -                       ret = len;
> -       }
>         rtnl_unlock();
>   err:
>         return ret;
> @@ -220,7 +301,7 @@ static ssize_t carrier_store(struct device *dev, struct device_attribute *attr,
>         struct net_device *netdev = to_net_dev(dev);
>
>         /* The check is also done in change_carrier; this helps returning early
> -        * without hitting the trylock/restart in netdev_store.
> +        * without hitting the locking section in netdev_store.
>          */
>         if (!netdev->netdev_ops->ndo_change_carrier)
>                 return -EOPNOTSUPP;
> @@ -234,8 +315,9 @@ static ssize_t carrier_show(struct device *dev,
>         struct net_device *netdev = to_net_dev(dev);
>         int ret = -EINVAL;
>
> -       if (!rtnl_trylock())
> -               return restart_syscall();
> +       ret = sysfs_rtnl_lock(&dev->kobj, &attr->attr, netdev);
> +       if (ret)
> +               return ret;
>
>         if (netif_running(netdev)) {
>                 /* Synchronize carrier state with link watch,
> @@ -245,8 +327,8 @@ static ssize_t carrier_show(struct device *dev,
>
>                 ret = sysfs_emit(buf, fmt_dec, !!netif_carrier_ok(netdev));
>         }
> -       rtnl_unlock();
>
> +       rtnl_unlock();
>         return ret;
>  }

There is a difference in behavior though..

# modprobe dummy numdummies=1
# ip link sh dev dummy0
17: dummy0: <BROADCAST,NOARP> mtu 1500 qdisc noop state DOWN mode
DEFAULT group default qlen 1000
    link/ether ba:d3:e9:c3:a7:fc brd ff:ff:ff:ff:ff:ff

Old kernels

# cat /sys/class/net/dummy0/carrier
cat: /sys/class/net/dummy0/carrier: Invalid argument

After your patch we have instead an empty string, no error.

# cat /sys/class/net/dummy0/carrier | wc
      0       0       0

Is it ok for you if I submit the following fix ?

diff --git a/net/core/net-sysfs.c b/net/core/net-sysfs.c
index 3fe2c521e5740436687f09c572754c5d071038f4..7f9bb4c52d265d6858b82e6bee3a735b64a90457
100644
--- a/net/core/net-sysfs.c
+++ b/net/core/net-sysfs.c
@@ -313,12 +313,13 @@ static ssize_t carrier_show(struct device *dev,
                            struct device_attribute *attr, char *buf)
 {
        struct net_device *netdev = to_net_dev(dev);
-       int ret = -EINVAL;
+       int ret;

        ret = sysfs_rtnl_lock(&dev->kobj, &attr->attr, netdev);
        if (ret)
                return ret;

+       ret = -EINVAL;
        if (netif_running(netdev)) {
                /* Synchronize carrier state with link watch,
                 * see also rtnl_getlink().

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ