lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Thu, 4 Aug 2016 13:48:48 -0300
From:	Marcelo Ricardo Leitner <marcelo.leitner@...il.com>
To:	Eric Dumazet <eric.dumazet@...il.com>
Cc:	netdev@...r.kernel.org, Neal Cardwell <ncardwell@...gle.com>
Subject: Re: Hitting WARN_ON_ONCE on skb_try_coalesce

On Thu, Aug 04, 2016 at 11:07:38AM -0300, Marcelo Ricardo Leitner wrote:
> Em 04-08-2016 02:55, Eric Dumazet escreveu:
> > On Wed, 2016-08-03 at 20:36 -0300, Marcelo Ricardo Leitner wrote:
> > > Hi,
> > > 
> > > I have two namespaces linked with a veth and netem in one of them adding 20ms
> > > latency, and doing netperf from one to another. I'm on commit
> > > 7cf210dc267861360cf6968b69bf512475aca985, net updated today, and I'm hitting
> > > this:
> > > 
> > > [ 1043.024555] WARNING: CPU: 3 PID: 19902 at ...../linux/net/core/skbuff.c:4289 skb_try_coalesce+0x414/0x430
> > > [ 1043.024556] Kernel panic - not syncing: panic_on_warn set ...
> > > 
> > > [ 1043.024601] CPU: 3 PID: 19902 Comm: netserver Not tainted 4.7.0-standard+ #20
> > > [ 1043.024631] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.9.1-1.fc24 04/01/2014
> > > [ 1043.024667]  0000000000000086 00000000db033d46 ffff880035733ad8 ffffffff813d630d
> > > [ 1043.024705]  0000000000000000 ffffffff81a35655 ffff880035733b60 ffffffff811b5e3d
> > > [ 1043.024741]  ffff880000000008 ffff880035733b70 ffff880035733b08 00000000db033d46
> > > [ 1043.024777] Call Trace:
> > > [ 1043.024794]  [<ffffffff813d630d>] dump_stack+0x63/0x86
> > > [ 1043.024818]  [<ffffffff811b5e3d>] panic+0xe4/0x226
> > > [ 1043.024842]  [<ffffffff816ae244>] ? skb_try_coalesce+0x414/0x430
> > > [ 1043.024870]  [<ffffffff810a5f13>] __warn+0xe3/0xf0
> > > [ 1043.024892]  [<ffffffff810a602d>] warn_slowpath_null+0x1d/0x20
> > > [ 1043.024919]  [<ffffffff816ae244>] skb_try_coalesce+0x414/0x430
> > > [ 1043.024945]  [<ffffffff817165f3>] tcp_try_coalesce+0x63/0xd0
> > > [ 1043.024977]  [<ffffffff81718497>] tcp_queue_rcv+0x57/0x140
> > > [ 1043.025003]  [<ffffffff8171e132>] tcp_rcv_established+0x3f2/0x6f0
> > > [ 1043.025029]  [<ffffffff81728815>] tcp_v4_do_rcv+0x145/0x200
> > > [ 1043.025054]  [<ffffffff816a4387>] __release_sock+0x87/0xf0
> > > [ 1043.025078]  [<ffffffff816a4420>] release_sock+0x30/0xa0
> > > [ 1043.025102]  [<ffffffff81711d8c>] tcp_recvmsg+0x5fc/0xb70
> > > [ 1043.025126]  [<ffffffff8174051e>] inet_recvmsg+0x7e/0xb0
> > > [ 1043.025151]  [<ffffffff8169f61d>] sock_recvmsg+0x3d/0x50
> > > [ 1043.025175]  [<ffffffff8169f85a>] SYSC_recvfrom+0xda/0x150
> > > [ 1043.025201]  [<ffffffff811157df>] ? do_setitimer+0x1bf/0x220
> > > [ 1043.025226]  [<ffffffff81115891>] ? alarm_setitimer+0x51/0x90
> > > [ 1043.025252]  [<ffffffff816a0bbe>] SyS_recvfrom+0xe/0x10
> > > [ 1043.025277]  [<ffffffff817df132>] entry_SYSCALL_64_fastpath+0x1a/0xa4
> > > 
> > > That's:
> > >         WARN_ON_ONCE(delta < len);
> > > 
> > > Netperf command line is:
> > > netperf -cC -l 10 -t TCP_STREAM \
> > > 		-H 192.168.10.1 -L 192.168.10.2
> > > 
> > > netem is added on netperf/client side.
> > > 
> > > It triggers it right at the beginning of the test.
> > > 
> > > I can reproduce it 100% of the times with above setup.
> > > - Removing netem made it stop reproducing.
> > > - Reducing netem latency to 10ms, still warns
> > > - Reducing netem latency to 1ms, still warns
> > > - Reducing netem latency to 0ms, it stops reproducing it
> > > 
> > > This system is not generating a kdump, I'm looking into it.
> > 
> > This is caused by the skb_orphan_partial() call from netem.
> 
> That also explains why I couldn't trigger it with sctp then.
> 
> > 
> > This breaks if packet is re-injected instead of being sent to a physical
> > NIC.
> > 
> 
> This truesize change will also break rx buffer accounting, as delta will
> become negative and propagated to the merged skb.
> 
> I'm trying to save it on netem cb and restore it before pushing it forward.

If we pack the struct, we have enough space to save the original
truesize and restore it when dequeing it.
This way the skb won't be charging sender buf too much while sitting on
netem queue and will allow proper accouting on rx buf if it's
reinjected.

The check on skb->sk in the last chunk is for handling duplicated
packets.

This patch makes it not trigger the Warn for this test. Wdyt?

---8<---

--- a/net/sched/sch_netem.c
+++ b/net/sched/sch_netem.c
@@ -147,7 +147,8 @@ struct netem_sched_data {
 struct netem_skb_cb {
 	psched_time_t	time_to_send;
 	ktime_t		tstamp_save;
-};
+	unsigned int	truesize;
+} __attribute__ ((packed));
 
 
 static struct sk_buff *netem_rb_to_skb(struct rb_node *rb)
@@ -428,6 +429,7 @@ static int netem_enqueue(struct sk_buff *skb, struct Qdisc *sch,
 	struct sk_buff *skb2;
 	struct sk_buff *segs = NULL;
 	unsigned int len = 0, last_len, prev_len = qdisc_pkt_len(skb);
+	unsigned int truesize;
 	int nb = 0;
 	int count = 1;
 	int rc = NET_XMIT_SUCCESS;
@@ -452,8 +454,10 @@ static int netem_enqueue(struct sk_buff *skb, struct Qdisc *sch,
 	/* If a delay is expected, orphan the skb. (orphaning usually takes
 	 * place at TX completion time, so _before_ the link transit delay)
 	 */
-	if (q->latency || q->jitter)
+	if (q->latency || q->jitter) {
+		truesize = skb->truesize;
 		skb_orphan_partial(skb);
+	}
 
 	/*
 	 * If we need to duplicate packet, then re-insert at top of the
@@ -508,6 +512,7 @@ static int netem_enqueue(struct sk_buff *skb, struct Qdisc *sch,
 	qdisc_qstats_backlog_inc(sch, skb);
 
 	cb = netem_skb_cb(skb);
+	cb->truesize = truesize;
 	if (q->gap == 0 ||		/* not doing reordering */
 	    q->counter < q->gap - 1 ||	/* inside last reordering gap */
 	    q->reorder < get_crandom(&q->reorder_cor)) {
@@ -591,6 +596,10 @@ tfifo_dequeue:
 	if (skb) {
 		qdisc_qstats_backlog_dec(sch, skb);
 deliver:
+		if (skb->sk && skb->truesize == 1) {
+			skb->truesize = netem_skb_cb(skb)->truesize;
+			atomic_add(skb->truesize - 1, &skb->sk->sk_wmem_alloc);
+		}
 		qdisc_bstats_update(sch, skb);
 		return skb;
 	}

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ