[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <70d94a71-2654-4647-97f3-1017adee1fd4@linux.alibaba.com>
Date: Mon, 1 Jul 2024 17:00:05 +0800
From: "D. Wythe" <alibuda@...ux.alibaba.com>
To: Geliang Tang <geliang@...nel.org>,
John Fastabend <john.fastabend@...il.com>,
Jakub Sitnicki <jakub@...udflare.com>, "David S. Miller"
<davem@...emloft.net>, Eric Dumazet <edumazet@...gle.com>,
Jakub Kicinski <kuba@...nel.org>, Paolo Abeni <pabeni@...hat.com>,
Alexei Starovoitov <ast@...nel.org>, Daniel Borkmann <daniel@...earbox.net>
Cc: Geliang Tang <tanggeliang@...inos.cn>, David Ahern <dsahern@...nel.org>,
Eduard Zingerman <eddyz87@...il.com>, Mykola Lysenko <mykolal@...com>,
Martin KaFai Lau <martin.lau@...ux.dev>, Song Liu <song@...nel.org>,
Yonghong Song <yonghong.song@...ux.dev>, KP Singh <kpsingh@...nel.org>,
Stanislav Fomichev <sdf@...gle.com>, Hao Luo <haoluo@...gle.com>,
Jiri Olsa <jolsa@...nel.org>, Shuah Khan <shuah@...nel.org>,
Mykyta Yatsenko <yatsenko@...a.com>, Miao Xu <miaxu@...a.com>,
Yuran Pereira <yuran.pereira@...mail.com>,
Huacai Chen <chenhuacai@...nel.org>, Tiezhu Yang <yangtiezhu@...ngson.cn>,
netdev@...r.kernel.org, bpf@...r.kernel.org, linux-kselftest@...r.kernel.org
Subject: Re: [PATCH net v3 2/2] skmsg: bugfix for sk_msg sge iteration
On 6/28/24 1:47 PM, Geliang Tang wrote:
> From: Geliang Tang <tanggeliang@...inos.cn>
>
> Every time run this BPF selftests (./test_sockmap) on a Loongarch platform,
> a Kernel panic occurs:
>
> '''
> Oops[#1]:
> CPU: 20 PID: 23245 Comm: test_sockmap Tainted: G OE 6.10.0-rc2+ #32
> Hardware name: LOONGSON Dabieshan/Loongson-TC542F0, BIOS Loongson-UDK2018
> ... ...
> ra: 90000000043a315c tcp_bpf_sendmsg+0x23c/0x420
> ERA: 900000000426cd1c sk_msg_memcopy_from_iter+0xbc/0x220
> CRMD: 000000b0 (PLV0 -IE -DA +PG DACF=CC DACM=CC -WE)
> PRMD: 0000000c (PPLV0 +PIE +PWE)
> EUEN: 00000007 (+FPE +SXE +ASXE -BTE)
> ECFG: 00071c1d (LIE=0,2-4,10-12 VS=7)
> ESTAT: 00010000 [PIL] (IS= ECode=1 EsubCode=0)
> BADV: 0000000000000040
> PRID: 0014c011 (Loongson-64bit, Loongson-3C5000)
> Modules linked in: tls xt_CHECKSUM xt_MASQUERADE xt_conntrack ipt_REJECT
> Process test_sockmap (pid: 23245, threadinfo=00000000aeb68043, task=...)
> Stack : ... ...
> ...
> Call Trace:
> [<900000000426cd1c>] sk_msg_memcopy_from_iter+0xbc/0x220
> [<90000000043a315c>] tcp_bpf_sendmsg+0x23c/0x420
> [<90000000041cafc8>] __sock_sendmsg+0x68/0xe0
> [<90000000041cc4bc>] ____sys_sendmsg+0x2bc/0x360
> [<90000000041cea18>] ___sys_sendmsg+0xb8/0x120
> [<90000000041cf1f8>] __sys_sendmsg+0x98/0x100
> [<90000000045b76ec>] do_syscall+0x8c/0xc0
> [<90000000030e1da4>] handle_syscall+0xc4/0x160
>
> Code: ...
>
> ---[ end trace 0000000000000000 ]---
> '''
>
> This crash is because a NULL pointer is passed to page_address() in
> sk_msg_memcopy_from_iter(). Due to the difference in architecture,
> page_address(0) will not trigger a panic on the X86 platform but will panic
> on the Loogarch platform. So this bug was hidden on the x86 platform, but
> now it is exposed on the Loogarch platform.
>
> This bug is a logic error indeed. In sk_msg_memcopy_from_iter(), an invalid
> "sge" is always used:
>
> if (msg->sg.copybreak >= sge->length) {
> msg->sg.copybreak = 0;
> sk_msg_iter_var_next(i);
> if (i == msg->sg.end)
> break;
> sge = sk_msg_elem(msg, i);
> }
>
> If the value of i is 2, msg->sg.end is also 2 when entering this if block.
> sk_msg_iter_var_next() increases i by 1, and now i is 3, which is no longer
> equal to msg->sg.end. The break will not be triggered, and the next sge
> obtained by sk_msg_elem(3) will be an invalid one.
>
> The correct approach is to check (i == msg->sg.end) first, and then invoke
> sk_msg_iter_var_next() if they are not equal.
>
> Fixes: 604326b41a6f ("bpf, sockmap: convert to generic sk_msg interface")
> Signed-off-by: Geliang Tang <tanggeliang@...inos.cn>
> ---
> net/core/skmsg.c | 2 +-
> 1 file changed, 1 insertion(+), 1 deletion(-)
>
> diff --git a/net/core/skmsg.c b/net/core/skmsg.c
> index 44952cdd1425..1906d0d0eeac 100644
> --- a/net/core/skmsg.c
> +++ b/net/core/skmsg.c
> @@ -378,9 +378,9 @@ int sk_msg_memcopy_from_iter(struct sock *sk, struct iov_iter *from,
> /* This is possible if a trim operation shrunk the buffer */
> if (msg->sg.copybreak >= sge->length) {
> msg->sg.copybreak = 0;
> - sk_msg_iter_var_next(i);
> if (i == msg->sg.end)
> break;
> + sk_msg_iter_var_next(i);
Reviewed-by: D. Wythe <alibuda@...ux.alibaba.com>
> sge = sk_msg_elem(msg, i);
> }
>
Powered by blists - more mailing lists