Received: by 2002:a05:6a10:f347:0:0:0:0 with SMTP id d7csp2593230pxu; Mon, 14 Dec 2020 06:26:21 -0800 (PST) X-Google-Smtp-Source: ABdhPJzOz4zP/c43rXcNhnTrahBlPJVyXWWSZm4mWja814XQ8FdfIx0eSZsiC4GDnoHL96bFv0R3 X-Received: by 2002:aa7:c2d8:: with SMTP id m24mr10417984edp.300.1607955980876; Mon, 14 Dec 2020 06:26:20 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1607955980; cv=none; d=google.com; s=arc-20160816; b=tC7YhTUpOxy3WpF6w5WmpWRNzZM7i4khT6Rbmt9bBAam6WFQB8FDgYa/vKpxKs5myt LD5DsrnTQnfk7h4zPHybzF9apKa3BmZLNzpABQyevVA6Rd8ZtUkipCFPYHOSyyGrh26W bB0d9syTGX1xUgi07ctWHblLcy+eCv1Deb9m8BR2exBJOLYl3FJ8WCejUMTB4gNsctC9 HLUrCjSvVaP0m1r3L2ylfbeC+2jlUI/HJDvcKAJrF0SPgEllVHi2k0EyD0K6TjgyI1Tq J8sd/EwkSNnlyc3E2esDGVfv+NK0C28PsTHBmWHrMXiKHwKO11ST/5IylShsJufPuvHN RVTg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=fHMGOG9XGGX2S8lH0eaqu8mmPkkQUQ+KKQLPpJ+q8rA=; b=O8TmnYrKIZqQROlHmjdYaGSuTeXjvUwMq92SZfP83qGBomlc2VeE9NQdxT+TUGIodl PQ0PvJsFv2lCW9kniVl4OfS0KdMwsFFfD4HVtj3yt93L/lWDOMBMiN8nAq4z4kmK+HGq ibK8/BHSLqenmcoJX/qKFDQpxwlf8SzWqV2FDiN9Q/w+jyteX+BFAbRlIijGnMzULrNs js0oXn2GsQ1FjtimGyhaK5duUK28589W3zktShDTR6Gt77VjcKgw5nizatz6NOjenK9v rVaiQekUTYgl20xhV8j9AvWgne77tGA6vS7/rred8KBInnAEqfLZ2sRC62M1bedVyfC9 uU5w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=qE4Ym0mX; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id f15si9843848ejr.2.2020.12.14.06.25.57; Mon, 14 Dec 2020 06:26:20 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=qE4Ym0mX; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2406601AbgLNKJ4 (ORCPT + 99 others); Mon, 14 Dec 2020 05:09:56 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:33324 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731455AbgLNKJ4 (ORCPT ); Mon, 14 Dec 2020 05:09:56 -0500 Received: from mail-oi1-x243.google.com (mail-oi1-x243.google.com [IPv6:2607:f8b0:4864:20::243]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 49ED9C0613CF for ; Mon, 14 Dec 2020 02:09:16 -0800 (PST) Received: by mail-oi1-x243.google.com with SMTP id s2so18633780oij.2 for ; Mon, 14 Dec 2020 02:09:16 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=fHMGOG9XGGX2S8lH0eaqu8mmPkkQUQ+KKQLPpJ+q8rA=; b=qE4Ym0mXRsgQqJnvYQ8APWlGHgzzBKCSHnVWnONJJFA/vq0F9Lvoqwb3gbAUo/5yeo EpCQNbxOY5N9TVcDQ1+sVeaZaPVRU0ozKGk67y7H5gKdnOVuu2Xq6nm9yzxDkEsI1SoI Tk0u8DzGulAhv3sj7/O9i3aeSF2YGVCv3qcqqICLVVVBuPnOdsDL57iu7ayKu+GpHaKi 8GblBHdaoqVDrWV7lmkCLrhZZtNdnKHc/nws2rqqf1VVyjlQFlJz1FMuziN5Gi64OdFP DTMeu+fV0BIsae0B2CcN9N2yWIceo7rGKeVnS7ykLE2/nkl6etJmFEJwRfWdZHGlkeb2 NoOA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=fHMGOG9XGGX2S8lH0eaqu8mmPkkQUQ+KKQLPpJ+q8rA=; b=Wxp4VCZbNDCtq3PqCpGjGtC6aPXZXzLObLHKlVdk1FM/2fRUJq387Oirc7umNCX7/5 Ou3wkmX1yEW4HC9A66SGQG1k6PU7EaJoBTbsb6xh0sGkh9fZVHHyX8mWAxkiyYg0HYGE 9G0lZcMiHos0KYFcJZty4s/n71SkJkMyPiMfilD5sCzbej4mjz4R9EbmbDr9jX417bmY oOh8mSvE5Gy9qiAU2aJ+8VWbpQpkjDZclaHeMvDolM4Ygwk07+s0qTZe4NIsnffx4sJV VOxGsKvOciJ7yuLvRhlG4hRTlq0ThY46VxEcwXEhJPtwJtcz06NVO7SJR2ETWmAOltRj 2BGA== X-Gm-Message-State: AOAM531q4n0FtuSZC9VqUs+kOLwZIgrt2Ob/aHiZjHdPjo5IhvMmtOlM GxnnVruL7a2dSmYD+mh4e5GiFcqM4mocsTrPchbUAw== X-Received: by 2002:aca:ddd6:: with SMTP id u205mr13383698oig.121.1607940554182; Mon, 14 Dec 2020 02:09:14 -0800 (PST) MIME-Version: 1.0 References: <000000000000b4862805b54ef573@google.com> In-Reply-To: From: Marco Elver Date: Mon, 14 Dec 2020 11:09:02 +0100 Message-ID: Subject: Re: WARNING in sk_stream_kill_queues (5) To: Eric Dumazet Cc: Eric Dumazet , netdev , Andrew Morton , David Miller , Dmitry Vyukov , Alexander Potapenko , Jann Horn , Jakub Kicinski , LKML , Stephen Rothwell , syzkaller-bugs , Willem de Bruijn , syzbot Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, 10 Dec 2020 at 20:01, Marco Elver wrote: > On Thu, 10 Dec 2020 at 18:14, Eric Dumazet wrote: > > On Thu, Dec 10, 2020 at 5:51 PM Marco Elver wrote: > [...] > > > So I started putting gdb to work, and whenever I see an allocation > > > exactly like the above that goes through tso_fragment() a warning > > > immediately follows. > > > > > > Long story short, I somehow synthesized this patch that appears to fix > > > things, but I can't explain why exactly: > > > > > > | --- a/net/core/skbuff.c > > > | +++ b/net/core/skbuff.c > > > | @@ -1679,13 +1679,6 @@ int pskb_expand_head(struct sk_buff *skb, int nhead, int ntail, > > > | > > > | skb_metadata_clear(skb); > > > | > > > | - /* It is not generally safe to change skb->truesize. > > > | - * For the moment, we really care of rx path, or > > > | - * when skb is orphaned (not attached to a socket). > > > | - */ > > > | - if (!skb->sk || skb->destructor == sock_edemux) > > > | - skb->truesize += size - osize; > > > | - > > > | return 0; > > > | > > > | nofrags: > > > > > > Now, here are the breadcrumbs I followed: > > > > > > > > > 1. Breakpoint on kfence_ksize() -- first allocation that matches the above: > > > > > > | #0 __kfence_ksize (s=18446612700164612096) at mm/kfence/core.c:726 > > > | #1 0xffffffff816fbf30 in kfence_ksize (addr=0xffff888436856000) at mm/kfence/core.c:737 > > > | #2 0xffffffff816217cf in ksize (objp=0xffff888436856000) at mm/slab_common.c:1178 > > > | #3 0xffffffff84896911 in __alloc_skb (size=914710528, gfp_mask=2592, flags=0, node=-1) at net/core/skbuff.c:217 > > > | #4 0xffffffff84d0ba73 in alloc_skb_fclone (priority=, size=) at ./include/linux/skbuff.h:1144 > > > | #5 sk_stream_alloc_skb (sk=0xffff8881176cc000, size=0, gfp=2592, force_schedule=232) at net/ipv4/tcp.c:888 > > > | #6 0xffffffff84d41c36 in tso_fragment (gfp=, mss_now=, len=, > > > | skb=, sk=) at net/ipv4/tcp_output.c:2124 > > > | #7 tcp_write_xmit (sk=0xffff8881176cc000, mss_now=21950, nonagle=3096, push_one=-1996874776, gfp=0) > > > | at net/ipv4/tcp_output.c:2674 > > > | #8 0xffffffff84d43e48 in __tcp_push_pending_frames (sk=0xffff8881176cc000, cur_mss=337, nonagle=0) > > > | at ./include/net/sock.h:918 > > > | #9 0xffffffff84d3259c in tcp_push_pending_frames (sk=) at ./include/net/tcp.h:1864 > > > | #10 tcp_data_snd_check (sk=) at net/ipv4/tcp_input.c:5374 > > > | #11 tcp_rcv_established (sk=0xffff8881176cc000, skb=0x0 ) at net/ipv4/tcp_input.c:5869 > > > | #12 0xffffffff84d56731 in tcp_v4_do_rcv (sk=0xffff8881176cc000, skb=0xffff888117f52ea0) at net/ipv4/tcp_ipv4.c:1668 > > > | [...] > > > > > > Set watchpoint on skb->truesize: > > > > > > | (gdb) frame 3 > > > | #3 0xffffffff84896911 in __alloc_skb (size=914710528, gfp_mask=2592, flags=0, node=-1) at net/core/skbuff.c:217 > > > | 217 size = SKB_WITH_OVERHEAD(ksize(data)); > > > | (gdb) p &skb->truesize > > > | $5 = (unsigned int *) 0xffff888117f55f90 > > > | (gdb) awatch *0xffff888117f55f90 > > > | Hardware access (read/write) watchpoint 6: *0xffff888117f55f90 > > > > > > 2. Some time later, we see that the skb with kfence-allocated data > > > is cloned: > > > > > > | Thread 7 hit Hardware access (read/write) watchpoint 6: *0xffff888117f55f90 > > > | > > > | Value = 1570 > > > | 0xffffffff84886947 in __skb_clone (n=0xffff888117f55fa0, skb=0xffff888117f55ec0) at net/core/skbuff.c:1002 > > > | 1002 C(truesize); > > > | (gdb) bt > > > | #0 0xffffffff84886947 in __skb_clone (n=0xffff888117f55fa0, skb=0xffff888117f55ec0) at net/core/skbuff.c:1002 > > > | #1 0xffffffff8488bfb9 in skb_clone (skb=0xffff888117f55ec0, gfp_mask=2592) at net/core/skbuff.c:1454 > > > | #2 0xffffffff84d3cd1c in __tcp_transmit_skb (sk=0xffff8881176cc000, skb=0xffff888117f55ec0, clone_it=0, gfp_mask=2592, > > > | rcv_nxt=0) at net/ipv4/tcp_output.c:1267 > > > | #3 0xffffffff84d4125b in tcp_transmit_skb (gfp_mask=, clone_it=, skb=, > > > | sk=) at ./include/linux/tcp.h:439 > > > | #4 tcp_write_xmit (sk=0xffff8881176cc000, mss_now=392485600, nonagle=1326, push_one=-1996875104, gfp=0) > > > | at net/ipv4/tcp_output.c:2688 > > > | #5 0xffffffff84d43e48 in __tcp_push_pending_frames (sk=0xffff8881176cc000, cur_mss=337, nonagle=0) > > > | at ./include/net/sock.h:918 > > > | #6 0xffffffff84d3259c in tcp_push_pending_frames (sk=) at ./include/net/tcp.h:1864 > > > | #7 tcp_data_snd_check (sk=) at net/ipv4/tcp_input.c:5374 > > > | #8 tcp_rcv_established (sk=0xffff8881176cc000, skb=0x0 ) at net/ipv4/tcp_input.c:5869 > > > | #9 0xffffffff84d56731 in tcp_v4_do_rcv (sk=0xffff8881176cc000, skb=0xffff888117f57820) at net/ipv4/tcp_ipv4.c:1668 > > > | #10 0xffffffff8487bf67 in sk_backlog_rcv (skb=, sk=) at ./include/net/sock.h:1010 > > > [...] > > > > > > > > > 3. The original skb (that was cloned) has its truesize adjusted > > > after a pskb_expand_head(): > > > > > > | Thread 2 hit Hardware access (read/write) watchpoint 6: *0xffff888117f55f90 > > > | > > > | Old value = 1570 > > > | New value = 1954 > > > > > > ^^ the difference between the old and the new value is exactly > > > 384, which is also the final underflow of the sk_wmem_queued > > > that triggers the warning. Presumably if the original allocation > > > had been through kmalloc-1k and not KFENCE, the difference here > > > would have been 0, since ksize() of the original allocation in > > > step (1) would have been 1024, and not 640 (difference of 384). > > > > > > | 0xffffffff8488d84b in pskb_expand_head (skb=0xffff888117f55ec0, nhead=401956752, ntail=1954, gfp_mask=2298092192) > > > | at net/core/skbuff.c:1687 > > > | 1687 skb->truesize += size - osize; > > > | (gdb) bt > > > | #0 0xffffffff8488d84b in pskb_expand_head (skb=0xffff888117f55ec0, nhead=401956752, ntail=1954, gfp_mask=2298092192) > > > | at net/core/skbuff.c:1687 > > > | #1 0xffffffff8488de01 in skb_prepare_for_shift (skb=) at ./arch/x86/include/asm/atomic.h:29 > > > | #2 skb_prepare_for_shift (skb=0xffff888117f55ec0) at net/core/skbuff.c:3276 > > > | #3 0xffffffff848936b1 in skb_shift (tgt=0xffff888117f549c0, skb=0xffff888117f55ec0, shiftlen=674) at net/core/skbuff.c:3351 > > > | #4 0xffffffff84d264de in tcp_skb_shift (shiftlen=, pcount=, from=, > > > | to=) at net/ipv4/tcp_input.c:1497 > > > | #5 tcp_shift_skb_data (dup_sack=, end_seq=, start_seq=, state=, > > > | skb=, sk=) at net/ipv4/tcp_input.c:1605 > > > | #6 tcp_sacktag_walk (skb=0xffff888117f55ec0, sk=0xffff8881176cc000, next_dup=0x894, > > > | state=0xffffffff88fa1aa0 , start_seq=0, end_seq=401956752, dup_sack_in=false) > > > | at net/ipv4/tcp_input.c:1670 > > > | #7 0xffffffff84d276de in tcp_sacktag_write_queue (sk=0xffff888117f55f90, ack_skb=0x1888117f55f90, prior_snd_una=2196, > > > | state=0xffffffff88fa1aa0 ) at net/ipv4/tcp_input.c:1931 > > > | #8 0xffffffff84d2ca1d in tcp_ack (sk=0xffff8881176cc000, skb=0x1888117f55f90, flag=16643) at net/ipv4/tcp_input.c:3758 > > > | #9 0xffffffff84d32387 in tcp_rcv_established (sk=0xffff8881176cc000, skb=0xffff888117f54020) at net/ipv4/tcp_input.c:5858 > > > | #10 0xffffffff84d56731 in tcp_v4_do_rcv (sk=0xffff8881176cc000, skb=0xffff888117f54020) at net/ipv4/tcp_ipv4.c:1668 > > > [...] > > > > > > > > > Any of this make sense? > > > > Very nice debugging ! > > > > I guess we could fix this in skb_prepare_for_shift(), eventually > > caring for the truesize manipulation > > (or reverting the change done in pskb_expand_head(), since only kfence > > is having this issue. > > Phew, good to hear I finally got lucky. :-) > > Either option is fine, as long as it avoids this problem in future. > Hopefully it can be fixed for 5.11. > > > (All TCP skbs in output path have the same allocation size for skb->head) > > > > diff --git a/net/core/skbuff.c b/net/core/skbuff.c > > index e578544b2cc7110ec2f6bcf4c29d93e4b4b1ad14..798b51eeeaa4fbed65d41d9eab207dbbf438dab3 > > 100644 > > --- a/net/core/skbuff.c > > +++ b/net/core/skbuff.c > > @@ -3270,7 +3270,14 @@ EXPORT_SYMBOL(skb_split); > > */ > > static int skb_prepare_for_shift(struct sk_buff *skb) > > { > > - return skb_cloned(skb) && pskb_expand_head(skb, 0, 0, GFP_ATOMIC); > > + unsigned int ret = 0, save; > > + > > + if (skb_cloned(skb)) { > > + save = skb->truesize; > > + ret = pskb_expand_head(skb, 0, 0, GFP_ATOMIC); > > + skb->truesize = save; > > + } > > + return ret; > > } > > FWIW, > > Tested-by: Marco Elver Has this patch, or similar, already been sent? Thanks, -- Marco