Received: by 2002:a05:6a10:f347:0:0:0:0 with SMTP id d7csp736835pxu; Fri, 11 Dec 2020 13:04:27 -0800 (PST) X-Google-Smtp-Source: ABdhPJxdKn2/lHg1xs2n2z6vutC5OQI2f53DGSUJYwR96gIhGxLveCb3pV9cnXbb/lrcBqkBW7Vd X-Received: by 2002:a17:907:2070:: with SMTP id qp16mr12449037ejb.503.1607720666740; Fri, 11 Dec 2020 13:04:26 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1607720666; cv=none; d=google.com; s=arc-20160816; b=tpOqjGaTu8ekDqX3XnXTXg74ijfvEhQxEIpXEoEtrokJZe6TWydD7ZIeqCiHEJP+cc TftUaSVa5z1FZdKfXBFmb8yDF4cK2TAwOP1aL9ST6ioOBKTCWhFi15lFbrdSasEDv1NJ kgzejLIgsWK0r3rh2j/fkBh1AZ0mB4s8kOFI49azSQeAbVcfudElGijBKMVNl2WQLAOC AQzugcjiTn3dcvTjyOdbCZDsdgcwZ1Ec2gMOwt6886fC9NTJtSZumf66i+UCj3qMvKmU OZrWgpqTF++2Kj75C4EeGwX2TSuoeYbkuixm2JpCmVqesHtlZDcW1ayE5R+TMhFf/B4p XiuQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=2xnuyvnwtl69CovewvxJx+Borf5alfAstAFCWLgP0is=; b=xfPr/6sKqlGEN4uSZh8NJ/aEE5VLAknZnFacagPAscca8G/11p8x1HY9A5YE4BerXa pG2qaTxT14Hr8EKBvY7SYbkNsNBLgQWAzqE4tuc41fQhWorPJ//ZUwWXcRYGEJqkVb90 CyncfwIStruKGMbIeLs5qK/DWXCZLwUXM7zpHLrnwGn5G2OrDbecy+WxBfmDEF34URwY Vk7LCoBXhOXMP5T391Iu6vJI5vP0FzNOo5UQYNRBxiOA9QqEOB7VJ5z90HwFpYvgNdD/ HhoAsBPdEM8ohBZtUnQ06k2CccjznuLrKgAL64vlMurdBOfU89mQ5Wc9BmOWc3XXgOWG 9V2A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=gYugMWpc; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id r17si5147922ejd.551.2020.12.11.13.04.03; Fri, 11 Dec 2020 13:04:26 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=gYugMWpc; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2392735AbgLJRmf (ORCPT + 99 others); Thu, 10 Dec 2020 12:42:35 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:58200 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2392657AbgLJRO5 (ORCPT ); Thu, 10 Dec 2020 12:14:57 -0500 Received: from mail-io1-xd44.google.com (mail-io1-xd44.google.com [IPv6:2607:f8b0:4864:20::d44]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 1DA1CC0613D6 for ; Thu, 10 Dec 2020 09:14:17 -0800 (PST) Received: by mail-io1-xd44.google.com with SMTP id i18so6292995ioa.1 for ; Thu, 10 Dec 2020 09:14:17 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=2xnuyvnwtl69CovewvxJx+Borf5alfAstAFCWLgP0is=; b=gYugMWpcDs1ICP2+5ut3yFEMN2MbDgxKqBw1YPJeIqWz2g4n7pzELepy0QrAguL+DJ G2v7H2wnQ0RzOlSrGHKetr7NnoVA857JdeBF7j+XHVbwOqqKHC7cBTmdOmaE8VCCAjWY FBzl/IA9np/eq0mMfhoFswSta4BlsKvd96ev8eWqrRT5JA4DemgYbuvComwKi4bkL2pj SqZ8NWFFPgVPqKDKEH5b4KC1kc+kaKj4pJnfQkwfuAw1w1Zlg+yrnIPS0JszVgDnZEux AWpreardBhSvkZXKktX8d3N4y2J1/927Kt7BY3CNb9TVkWvCCICmoFirqdctPB2qOPBp Nrxw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=2xnuyvnwtl69CovewvxJx+Borf5alfAstAFCWLgP0is=; b=EDg3HNvIYid+heqFh2PuA6MFjaYUrIRBoFGUVJLUdQZvwSHqI1FWs6gERKS2VlbJF5 K4ecNKsHrwjUqjF/METiI344dhumM9NMH/+Z+odlQE4x+iPmimDwWbJhPOgo9tdd4RYR 208EMDV+wtLWG/iweZc3mZBFHqUUTtDrPbXCm+FxfB4K08rvpQtKNOgRMwe1WmT9AOUp TmUIsmMPZG0ty1rh2Mka6b5jsnffq7hQ0tUgM46JPNk2xgxBZLazjuvhdgn6wAFXoh4+ yWUVrtj2fEdfLT5g6VKP+lK9SxziAPwFceruk01fQOdgzy63RS3gG9xZymrWtfB+g597 C9qg== X-Gm-Message-State: AOAM533KuywMiS8iDIh6F5E0wchKfkXSatXllUPpIFjZbrykbu/wscDr EgU+MAOml9IFOY2Y2H8D3aZ1+7DVjMPCQdV6DfBTeg== X-Received: by 2002:a5d:9f0b:: with SMTP id q11mr9557997iot.157.1607620456089; Thu, 10 Dec 2020 09:14:16 -0800 (PST) MIME-Version: 1.0 References: <000000000000b4862805b54ef573@google.com> In-Reply-To: From: Eric Dumazet Date: Thu, 10 Dec 2020 18:14:04 +0100 Message-ID: Subject: Re: WARNING in sk_stream_kill_queues (5) To: Marco Elver Cc: Eric Dumazet , netdev , Andrew Morton , David Miller , Dmitry Vyukov , Alexander Potapenko , Jann Horn , Jakub Kicinski , LKML , Stephen Rothwell , syzkaller-bugs , Willem de Bruijn , syzbot Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Dec 10, 2020 at 5:51 PM Marco Elver wrote: > > On Wed, Dec 09, 2020 at 01:47PM +0100, Marco Elver wrote: > > On Tue, Dec 08, 2020 at 08:06PM +0100, Marco Elver wrote: > > > On Thu, 3 Dec 2020 at 19:01, Eric Dumazet wrote: > > > > On 12/3/20 6:41 PM, Marco Elver wrote: > > > > > > > > > One more experiment -- simply adding > > > > > > > > > > --- a/net/core/skbuff.c > > > > > +++ b/net/core/skbuff.c > > > > > @@ -207,7 +207,21 @@ struct sk_buff *__alloc_skb(unsigned int size, gfp_t gfp_mask, > > > > > */ > > > > > size = SKB_DATA_ALIGN(size); > > > > > size += SKB_DATA_ALIGN(sizeof(struct skb_shared_info)); > > > > > + size = 1 << kmalloc_index(size); /* HACK */ > > > > > data = kmalloc_reserve(size, gfp_mask, node, &pfmemalloc); > > > > > > > > > > > > > > > also got rid of the warnings. Something must be off with some value that > > > > > is computed in terms of ksize(). If not, I don't have any explanation > > > > > for why the above hides the problem. > > > > > > > > Maybe the implementations of various macros (SKB_DATA_ALIGN and friends) > > > > hae some kind of assumptions, I will double check this. > > > > > > If I force kfence to return 4K sized allocations for everything, the > > > warnings remain. That might suggest that it's not due to a missed > > > ALIGN. > > > > > > Is it possible that copies or moves are a problem? E.g. we copy > > > something from kfence -> non-kfence object (or vice-versa), and > > > ksize() no longer matches, then things go wrong? > > > > I was able to narrow it down to allocations of size 640. I also narrowed > > it down to 5 allocations that go through kfence that start triggering > > the issue. I have attached the list of those 5 allocations with > > allocation + free stacks. I'll try to go through them, maybe I get > > lucky eventually. :-) > > [...] > > > kfence-#3 [0xffff88843681ac00-0xffff88843681ae7f, size=640, cache=kmalloc-1k] allocated by task 17012: > > __kmalloc_reserve net/core/skbuff.c:142 [inline] > > __alloc_skb+0xb8/0x3f0 net/core/skbuff.c:210 > > alloc_skb_fclone include/linux/skbuff.h:1144 [inline] > > sk_stream_alloc_skb+0xd3/0x650 net/ipv4/tcp.c:888 > > tso_fragment net/ipv4/tcp_output.c:2124 [inline] > > tcp_write_xmit+0x1366/0x3510 net/ipv4/tcp_output.c:2674 > > __tcp_push_pending_frames+0x68/0x1f0 net/ipv4/tcp_output.c:2866 > > tcp_push_pending_frames include/net/tcp.h:1864 [inline] > > tcp_data_snd_check net/ipv4/tcp_input.c:5374 [inline] > > tcp_rcv_established+0x57c/0x10b0 net/ipv4/tcp_input.c:5869 > > tcp_v4_do_rcv+0x361/0x4c0 net/ipv4/tcp_ipv4.c:1668 > > sk_backlog_rcv include/net/sock.h:1010 [inline] > > __release_sock+0xd7/0x260 net/core/sock.c:2523 > > release_sock+0x40/0x120 net/core/sock.c:3053 > > sk_wait_data+0x127/0x2b0 net/core/sock.c:2565 > > tcp_recvmsg+0x1106/0x1b60 net/ipv4/tcp.c:2181 > > inet_recvmsg+0xb1/0x270 net/ipv4/af_inet.c:848 > > sock_recvmsg_nosec net/socket.c:885 [inline] > > sock_recvmsg net/socket.c:903 [inline] > > sock_recvmsg net/socket.c:899 [inline] > > ____sys_recvmsg+0x2fd/0x3a0 net/socket.c:2563 > > ___sys_recvmsg+0xd9/0x1b0 net/socket.c:2605 > > __sys_recvmsg+0x8b/0x130 net/socket.c:2641 > > __do_sys_recvmsg net/socket.c:2651 [inline] > > __se_sys_recvmsg net/socket.c:2648 [inline] > > __x64_sys_recvmsg+0x43/0x50 net/socket.c:2648 > > do_syscall_64+0x34/0x80 arch/x86/entry/common.c:46 > > entry_SYSCALL_64_after_hwframe+0x44/0xa9 > > So I started putting gdb to work, and whenever I see an allocation > exactly like the above that goes through tso_fragment() a warning > immediately follows. > > Long story short, I somehow synthesized this patch that appears to fix > things, but I can't explain why exactly: > > | --- a/net/core/skbuff.c > | +++ b/net/core/skbuff.c > | @@ -1679,13 +1679,6 @@ int pskb_expand_head(struct sk_buff *skb, int nhead, int ntail, > | > | skb_metadata_clear(skb); > | > | - /* It is not generally safe to change skb->truesize. > | - * For the moment, we really care of rx path, or > | - * when skb is orphaned (not attached to a socket). > | - */ > | - if (!skb->sk || skb->destructor == sock_edemux) > | - skb->truesize += size - osize; > | - > | return 0; > | > | nofrags: > > Now, here are the breadcrumbs I followed: > > > 1. Breakpoint on kfence_ksize() -- first allocation that matches the above: > > | #0 __kfence_ksize (s=18446612700164612096) at mm/kfence/core.c:726 > | #1 0xffffffff816fbf30 in kfence_ksize (addr=0xffff888436856000) at mm/kfence/core.c:737 > | #2 0xffffffff816217cf in ksize (objp=0xffff888436856000) at mm/slab_common.c:1178 > | #3 0xffffffff84896911 in __alloc_skb (size=914710528, gfp_mask=2592, flags=0, node=-1) at net/core/skbuff.c:217 > | #4 0xffffffff84d0ba73 in alloc_skb_fclone (priority=, size=) at ./include/linux/skbuff.h:1144 > | #5 sk_stream_alloc_skb (sk=0xffff8881176cc000, size=0, gfp=2592, force_schedule=232) at net/ipv4/tcp.c:888 > | #6 0xffffffff84d41c36 in tso_fragment (gfp=, mss_now=, len=, > | skb=, sk=) at net/ipv4/tcp_output.c:2124 > | #7 tcp_write_xmit (sk=0xffff8881176cc000, mss_now=21950, nonagle=3096, push_one=-1996874776, gfp=0) > | at net/ipv4/tcp_output.c:2674 > | #8 0xffffffff84d43e48 in __tcp_push_pending_frames (sk=0xffff8881176cc000, cur_mss=337, nonagle=0) > | at ./include/net/sock.h:918 > | #9 0xffffffff84d3259c in tcp_push_pending_frames (sk=) at ./include/net/tcp.h:1864 > | #10 tcp_data_snd_check (sk=) at net/ipv4/tcp_input.c:5374 > | #11 tcp_rcv_established (sk=0xffff8881176cc000, skb=0x0 ) at net/ipv4/tcp_input.c:5869 > | #12 0xffffffff84d56731 in tcp_v4_do_rcv (sk=0xffff8881176cc000, skb=0xffff888117f52ea0) at net/ipv4/tcp_ipv4.c:1668 > | [...] > > Set watchpoint on skb->truesize: > > | (gdb) frame 3 > | #3 0xffffffff84896911 in __alloc_skb (size=914710528, gfp_mask=2592, flags=0, node=-1) at net/core/skbuff.c:217 > | 217 size = SKB_WITH_OVERHEAD(ksize(data)); > | (gdb) p &skb->truesize > | $5 = (unsigned int *) 0xffff888117f55f90 > | (gdb) awatch *0xffff888117f55f90 > | Hardware access (read/write) watchpoint 6: *0xffff888117f55f90 > > 2. Some time later, we see that the skb with kfence-allocated data > is cloned: > > | Thread 7 hit Hardware access (read/write) watchpoint 6: *0xffff888117f55f90 > | > | Value = 1570 > | 0xffffffff84886947 in __skb_clone (n=0xffff888117f55fa0, skb=0xffff888117f55ec0) at net/core/skbuff.c:1002 > | 1002 C(truesize); > | (gdb) bt > | #0 0xffffffff84886947 in __skb_clone (n=0xffff888117f55fa0, skb=0xffff888117f55ec0) at net/core/skbuff.c:1002 > | #1 0xffffffff8488bfb9 in skb_clone (skb=0xffff888117f55ec0, gfp_mask=2592) at net/core/skbuff.c:1454 > | #2 0xffffffff84d3cd1c in __tcp_transmit_skb (sk=0xffff8881176cc000, skb=0xffff888117f55ec0, clone_it=0, gfp_mask=2592, > | rcv_nxt=0) at net/ipv4/tcp_output.c:1267 > | #3 0xffffffff84d4125b in tcp_transmit_skb (gfp_mask=, clone_it=, skb=, > | sk=) at ./include/linux/tcp.h:439 > | #4 tcp_write_xmit (sk=0xffff8881176cc000, mss_now=392485600, nonagle=1326, push_one=-1996875104, gfp=0) > | at net/ipv4/tcp_output.c:2688 > | #5 0xffffffff84d43e48 in __tcp_push_pending_frames (sk=0xffff8881176cc000, cur_mss=337, nonagle=0) > | at ./include/net/sock.h:918 > | #6 0xffffffff84d3259c in tcp_push_pending_frames (sk=) at ./include/net/tcp.h:1864 > | #7 tcp_data_snd_check (sk=) at net/ipv4/tcp_input.c:5374 > | #8 tcp_rcv_established (sk=0xffff8881176cc000, skb=0x0 ) at net/ipv4/tcp_input.c:5869 > | #9 0xffffffff84d56731 in tcp_v4_do_rcv (sk=0xffff8881176cc000, skb=0xffff888117f57820) at net/ipv4/tcp_ipv4.c:1668 > | #10 0xffffffff8487bf67 in sk_backlog_rcv (skb=, sk=) at ./include/net/sock.h:1010 > [...] > > > 3. The original skb (that was cloned) has its truesize adjusted > after a pskb_expand_head(): > > | Thread 2 hit Hardware access (read/write) watchpoint 6: *0xffff888117f55f90 > | > | Old value = 1570 > | New value = 1954 > > ^^ the difference between the old and the new value is exactly > 384, which is also the final underflow of the sk_wmem_queued > that triggers the warning. Presumably if the original allocation > had been through kmalloc-1k and not KFENCE, the difference here > would have been 0, since ksize() of the original allocation in > step (1) would have been 1024, and not 640 (difference of 384). > > | 0xffffffff8488d84b in pskb_expand_head (skb=0xffff888117f55ec0, nhead=401956752, ntail=1954, gfp_mask=2298092192) > | at net/core/skbuff.c:1687 > | 1687 skb->truesize += size - osize; > | (gdb) bt > | #0 0xffffffff8488d84b in pskb_expand_head (skb=0xffff888117f55ec0, nhead=401956752, ntail=1954, gfp_mask=2298092192) > | at net/core/skbuff.c:1687 > | #1 0xffffffff8488de01 in skb_prepare_for_shift (skb=) at ./arch/x86/include/asm/atomic.h:29 > | #2 skb_prepare_for_shift (skb=0xffff888117f55ec0) at net/core/skbuff.c:3276 > | #3 0xffffffff848936b1 in skb_shift (tgt=0xffff888117f549c0, skb=0xffff888117f55ec0, shiftlen=674) at net/core/skbuff.c:3351 > | #4 0xffffffff84d264de in tcp_skb_shift (shiftlen=, pcount=, from=, > | to=) at net/ipv4/tcp_input.c:1497 > | #5 tcp_shift_skb_data (dup_sack=, end_seq=, start_seq=, state=, > | skb=, sk=) at net/ipv4/tcp_input.c:1605 > | #6 tcp_sacktag_walk (skb=0xffff888117f55ec0, sk=0xffff8881176cc000, next_dup=0x894, > | state=0xffffffff88fa1aa0 , start_seq=0, end_seq=401956752, dup_sack_in=false) > | at net/ipv4/tcp_input.c:1670 > | #7 0xffffffff84d276de in tcp_sacktag_write_queue (sk=0xffff888117f55f90, ack_skb=0x1888117f55f90, prior_snd_una=2196, > | state=0xffffffff88fa1aa0 ) at net/ipv4/tcp_input.c:1931 > | #8 0xffffffff84d2ca1d in tcp_ack (sk=0xffff8881176cc000, skb=0x1888117f55f90, flag=16643) at net/ipv4/tcp_input.c:3758 > | #9 0xffffffff84d32387 in tcp_rcv_established (sk=0xffff8881176cc000, skb=0xffff888117f54020) at net/ipv4/tcp_input.c:5858 > | #10 0xffffffff84d56731 in tcp_v4_do_rcv (sk=0xffff8881176cc000, skb=0xffff888117f54020) at net/ipv4/tcp_ipv4.c:1668 > [...] > > > Any of this make sense? Very nice debugging ! I guess we could fix this in skb_prepare_for_shift(), eventually caring for the truesize manipulation (or reverting the change done in pskb_expand_head(), since only kfence is having this issue. (All TCP skbs in output path have the same allocation size for skb->head) diff --git a/net/core/skbuff.c b/net/core/skbuff.c index e578544b2cc7110ec2f6bcf4c29d93e4b4b1ad14..798b51eeeaa4fbed65d41d9eab207dbbf438dab3 100644 --- a/net/core/skbuff.c +++ b/net/core/skbuff.c @@ -3270,7 +3270,14 @@ EXPORT_SYMBOL(skb_split); */ static int skb_prepare_for_shift(struct sk_buff *skb) { - return skb_cloned(skb) && pskb_expand_head(skb, 0, 0, GFP_ATOMIC); + unsigned int ret = 0, save; + + if (skb_cloned(skb)) { + save = skb->truesize; + ret = pskb_expand_head(skb, 0, 0, GFP_ATOMIC); + skb->truesize = save; + } + return ret; }