[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <9f5c3a9e10f46ef193abdd1c490972147b83a978.camel@kernel.org>
Date: Mon, 01 Jul 2024 18:29:12 +0800
From: Geliang Tang <geliang@...nel.org>
To: "D. Wythe" <alibuda@...ux.alibaba.com>, John Fastabend
<john.fastabend@...il.com>, Jakub Sitnicki <jakub@...udflare.com>, "David
S. Miller" <davem@...emloft.net>, Eric Dumazet <edumazet@...gle.com>, Jakub
Kicinski <kuba@...nel.org>, Paolo Abeni <pabeni@...hat.com>, Alexei
Starovoitov <ast@...nel.org>, Daniel Borkmann <daniel@...earbox.net>
Cc: Geliang Tang <tanggeliang@...inos.cn>, David Ahern <dsahern@...nel.org>,
Eduard Zingerman <eddyz87@...il.com>, Mykola Lysenko <mykolal@...com>,
Martin KaFai Lau <martin.lau@...ux.dev>, Song Liu <song@...nel.org>,
Yonghong Song <yonghong.song@...ux.dev>, KP Singh <kpsingh@...nel.org>,
Stanislav Fomichev <sdf@...gle.com>, Hao Luo <haoluo@...gle.com>, Jiri Olsa
<jolsa@...nel.org>, Shuah Khan <shuah@...nel.org>, Mykyta Yatsenko
<yatsenko@...a.com>, Miao Xu <miaxu@...a.com>, Yuran Pereira
<yuran.pereira@...mail.com>, Huacai Chen <chenhuacai@...nel.org>, Tiezhu
Yang <yangtiezhu@...ngson.cn>, netdev@...r.kernel.org, bpf@...r.kernel.org,
linux-kselftest@...r.kernel.org
Subject: Re: [PATCH net v3 2/2] skmsg: bugfix for sk_msg sge iteration
Hello,
On Mon, 2024-07-01 at 17:00 +0800, D. Wythe wrote:
>
>
> On 6/28/24 1:47 PM, Geliang Tang wrote:
> > From: Geliang Tang <tanggeliang@...inos.cn>
> >
> > Every time run this BPF selftests (./test_sockmap) on a Loongarch
> > platform,
> > a Kernel panic occurs:
> >
> > '''
> > Oops[#1]:
> > CPU: 20 PID: 23245 Comm: test_sockmap Tainted: G OE 6.10.0-
> > rc2+ #32
> > Hardware name: LOONGSON Dabieshan/Loongson-TC542F0, BIOS
> > Loongson-UDK2018
> > ... ...
> > ra: 90000000043a315c tcp_bpf_sendmsg+0x23c/0x420
> > ERA: 900000000426cd1c sk_msg_memcopy_from_iter+0xbc/0x220
> > CRMD: 000000b0 (PLV0 -IE -DA +PG DACF=CC DACM=CC -WE)
> > PRMD: 0000000c (PPLV0 +PIE +PWE)
> > EUEN: 00000007 (+FPE +SXE +ASXE -BTE)
> > ECFG: 00071c1d (LIE=0,2-4,10-12 VS=7)
> > ESTAT: 00010000 [PIL] (IS= ECode=1 EsubCode=0)
> > BADV: 0000000000000040
> > PRID: 0014c011 (Loongson-64bit, Loongson-3C5000)
> > Modules linked in: tls xt_CHECKSUM xt_MASQUERADE xt_conntrack
> > ipt_REJECT
> > Process test_sockmap (pid: 23245, threadinfo=00000000aeb68043,
> > task=...)
> > Stack : ... ...
> > ...
> > Call Trace:
> > [<900000000426cd1c>] sk_msg_memcopy_from_iter+0xbc/0x220
> > [<90000000043a315c>] tcp_bpf_sendmsg+0x23c/0x420
> > [<90000000041cafc8>] __sock_sendmsg+0x68/0xe0
> > [<90000000041cc4bc>] ____sys_sendmsg+0x2bc/0x360
> > [<90000000041cea18>] ___sys_sendmsg+0xb8/0x120
> > [<90000000041cf1f8>] __sys_sendmsg+0x98/0x100
> > [<90000000045b76ec>] do_syscall+0x8c/0xc0
> > [<90000000030e1da4>] handle_syscall+0xc4/0x160
> >
> > Code: ...
> >
> > ---[ end trace 0000000000000000 ]---
> > '''
> >
> > This crash is because a NULL pointer is passed to page_address() in
> > sk_msg_memcopy_from_iter(). Due to the difference in architecture,
> > page_address(0) will not trigger a panic on the X86 platform but
> > will panic
> > on the Loogarch platform. So this bug was hidden on the x86
> > platform, but
> > now it is exposed on the Loogarch platform.
> >
> > This bug is a logic error indeed. In sk_msg_memcopy_from_iter(), an
> > invalid
> > "sge" is always used:
> >
> > if (msg->sg.copybreak >= sge->length) {
> > msg->sg.copybreak = 0;
> > sk_msg_iter_var_next(i);
> > if (i == msg->sg.end)
> > break;
> > sge = sk_msg_elem(msg, i);
> > }
> >
> > If the value of i is 2, msg->sg.end is also 2 when entering this if
> > block.
> > sk_msg_iter_var_next() increases i by 1, and now i is 3, which is
> > no longer
> > equal to msg->sg.end. The break will not be triggered, and the next
> > sge
> > obtained by sk_msg_elem(3) will be an invalid one.
> >
> > The correct approach is to check (i == msg->sg.end) first, and then
> > invoke
> > sk_msg_iter_var_next() if they are not equal.
> >
> > Fixes: 604326b41a6f ("bpf, sockmap: convert to generic sk_msg
> > interface")
> > Signed-off-by: Geliang Tang <tanggeliang@...inos.cn>
> > ---
> > net/core/skmsg.c | 2 +-
> > 1 file changed, 1 insertion(+), 1 deletion(-)
> >
> > diff --git a/net/core/skmsg.c b/net/core/skmsg.c
> > index 44952cdd1425..1906d0d0eeac 100644
> > --- a/net/core/skmsg.c
> > +++ b/net/core/skmsg.c
> > @@ -378,9 +378,9 @@ int sk_msg_memcopy_from_iter(struct sock *sk,
> > struct iov_iter *from,
> > /* This is possible if a trim operation shrunk the
> > buffer */
> > if (msg->sg.copybreak >= sge->length) {
> > msg->sg.copybreak = 0;
> > - sk_msg_iter_var_next(i);
> > if (i == msg->sg.end)
> > break;
> > + sk_msg_iter_var_next(i);
> Reviewed-by: D. Wythe <alibuda@...ux.alibaba.com>
Thanks for your review.
But this change breaks test_sockmap. Will send a v4 to fix this.
Changes Requested.
-Geliang
> > sge = sk_msg_elem(msg, i);
> > }
> >
>
>
>
Powered by blists - more mailing lists