Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp6886768rwb; Tue, 15 Nov 2022 05:08:32 -0800 (PST) X-Google-Smtp-Source: AA0mqf5eszkhDj6v9pBSuwKjxFfWsK7lh7iF7u4r8TnDmhjP9NJpRNJGKQ0MvPNGnPaZCymp+weQ X-Received: by 2002:a65:55c8:0:b0:457:a1a5:3ce with SMTP id k8-20020a6555c8000000b00457a1a503cemr16175879pgs.416.1668517712123; Tue, 15 Nov 2022 05:08:32 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1668517712; cv=none; d=google.com; s=arc-20160816; b=q6toBRbv9QZVc6LSoHMy/UGPyOAMVC7Qfv4A76tiltRNJFUJDP8f0+NvFRxHn3xP8h RhvSMJhg8TROxwDOIwRxwvA3ZE0QdU06fIqHJleWPGjZ3yG4idcQDspGeS9LsQn0gBb9 Q4yEABaLnes+sZovMVs8Yx7OnDy8kyjobpB1HVq/fFq+2jGX71ctiDLW8zyYfEJRy0sz hI9+WNdadvDBRRSUYAIsrJsEGM0z+5FQ9OhCXQw2IhQaMnfy9iPKBWv7Lah7eMbQbGPG BNFiBLhjYytbUfweutiJbv97wz5P+PRzhtm+XbItqfj/tAV4qgZkc1pViwzrkmFnFwwl i8OQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=iAp3GCmehVyuNhHC14mjklC9CGomnMwAaIYc4+gSGuY=; b=zrWQBrBXKI8gt5XNaLzPO3OONaUH4gfXPj8PWyIGfvQfzXrECefcZ4XBn0uFpx/ovq p7A7zml02LIzfacfrtE0nXvkP6H2dmNbskdhfnnQeUMit996o2Y0S7Lq6QK/KDHtCABx iQk+jcBjZjvzku/4Itb9/Nv5Ymx54RjB+65yicEdZo+8rSrSxzeMdG5iwZ0auSq2E8K9 ojcegxcJjqIMIiFuuyt/Eetl3NLnMWMYKucIrGmI8oqWMMijcwH+8hKUNyhMHE1c0KY+ nZJ63n4ChzAnAUur7sqnz8+MXc3kmkD4eJ/SnJzCL/jd2OMFtJVy40es3QXNTFvkeIBj F4Pg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=TO9lH6Cd; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id ij27-20020a170902ab5b00b001853b9b277bsi11251531plb.527.2022.11.15.05.08.20; Tue, 15 Nov 2022 05:08:32 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=TO9lH6Cd; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230171AbiKOLkM (ORCPT + 89 others); Tue, 15 Nov 2022 06:40:12 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:43924 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230153AbiKOLkK (ORCPT ); Tue, 15 Nov 2022 06:40:10 -0500 Received: from mail-ot1-x333.google.com (mail-ot1-x333.google.com [IPv6:2607:f8b0:4864:20::333]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 8C854220F0 for ; Tue, 15 Nov 2022 03:40:08 -0800 (PST) Received: by mail-ot1-x333.google.com with SMTP id db10-20020a0568306b0a00b0066d43e80118so8198377otb.1 for ; Tue, 15 Nov 2022 03:40:08 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=iAp3GCmehVyuNhHC14mjklC9CGomnMwAaIYc4+gSGuY=; b=TO9lH6CdS0DyvGX513VIpESOq/0YwmoEjcHTYscF02VB64/kWhtdAHIAvl4oTdYNh5 xGuKUF9/2Vl6th2X9YzjoSBh+xqHFCOJ4/BKfbH0CVL0BPr8qgDDfRWGh36X6eb46vo0 UeOT8unDXO9qc2k4jfFdJXXzi6jxIw6giXpT/J+L6lRjhzI+nN5NF1iuJsBoLE9Ne0Sq YB6oQWYEKxOi9Cexa/B02gOY388k53NhZ0axwGnzopjB+YNtpCd32i2c5ONenpwpObE8 ajyWvQz2GlbbEVKQ3NcM4v0QNaUIJL7E/LgmsqI3xJgnHzNYBi87LKGY1om5bbMd99Cn 95zA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=iAp3GCmehVyuNhHC14mjklC9CGomnMwAaIYc4+gSGuY=; b=mFUr5lIAY15/ywkPzQM/P7FPTf202nPbK87mNwjOWgjJJfuHvakUHkO5JQXHX0jHYr iqpcQv0yccQdGldSMo2CH7n/xR0HW71Zxtg/oj85XmMs6CO+UUAVcUHt/t1P9iNz2cxa GCCnH+I9FNwePI6OWXtnMayRAdzE7Mnls/mC4oMhJpdaAQbXpkgEEv4knlWQIJHupHfv GEk53S6EL/IJfZjsLx+KMZLW/Z8Na2nQeoN9BAJM9lNcnGT+D628fcTfzCpoJCzu4EVh qfpTg1QvSRzCrQykGnIR2CebEaMa/6C9KdU+HTUZXYLOufss0jr0H8++rZbRb2AhahzY A/wQ== X-Gm-Message-State: ANoB5pnsYNkGTvsudabjo3hTGkKPv7vUWCPoSoJDXXcFfVf7EAVs+jYO 3ku1veJ7XC8Vu7lUfagGZTu0stMhneyNdkTRS4lWbQ== X-Received: by 2002:a05:6830:43:b0:66c:9e9a:1f82 with SMTP id d3-20020a056830004300b0066c9e9a1f82mr7959449otp.269.1668512407512; Tue, 15 Nov 2022 03:40:07 -0800 (PST) MIME-Version: 1.0 References: <20221113170507.8205-1-yin31149@gmail.com> <0f385a7bcb8ccf71e39581d4be23b59d3bccc2e7.camel@redhat.com> In-Reply-To: <0f385a7bcb8ccf71e39581d4be23b59d3bccc2e7.camel@redhat.com> From: Dmitry Vyukov Date: Tue, 15 Nov 2022 12:39:56 +0100 Message-ID: Subject: Re: [PATCH v2] net: sched: fix memory leak in tcindex_set_parms To: Paolo Abeni Cc: Hawkins Jiawei , Jamal Hadi Salim , Cong Wang , Jiri Pirko , "David S. Miller" , Eric Dumazet , Jakub Kicinski , 18801353760@163.com, syzbot+232ebdbd36706c965ebf@syzkaller.appspotmail.com, syzkaller-bugs@googlegroups.com, Cong Wang , netdev@vger.kernel.org, linux-kernel@vger.kernel.org Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-17.6 required=5.0 tests=BAYES_00,DKIMWL_WL_MED, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF, ENV_AND_HDR_SPF_MATCH,RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS, USER_IN_DEF_DKIM_WL,USER_IN_DEF_SPF_WL autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, 15 Nov 2022 at 12:36, Paolo Abeni wrote: > > On Mon, 2022-11-14 at 01:05 +0800, Hawkins Jiawei wrote: > > Syzkaller reports a memory leak as follows: > > ==================================== > > BUG: memory leak > > unreferenced object 0xffff88810c287f00 (size 256): > > comm "syz-executor105", pid 3600, jiffies 4294943292 (age 12.990s) > > hex dump (first 32 bytes): > > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ > > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ > > backtrace: > > [] kmalloc_trace+0x20/0x90 mm/slab_common.c:1046 > > [] kmalloc include/linux/slab.h:576 [inline] > > [] kmalloc_array include/linux/slab.h:627 [inline] > > [] kcalloc include/linux/slab.h:659 [inline] > > [] tcf_exts_init include/net/pkt_cls.h:250 [inline] > > [] tcindex_set_parms+0xa7/0xbe0 net/sched/cls_tcindex.c:342 > > [] tcindex_change+0xdf/0x120 net/sched/cls_tcindex.c:553 > > [] tc_new_tfilter+0x4f2/0x1100 net/sched/cls_api.c:2147 > > [] rtnetlink_rcv_msg+0x4dc/0x5d0 net/core/rtnetlink.c:6082 > > [] netlink_rcv_skb+0x87/0x1d0 net/netlink/af_netlink.c:2540 > > [] netlink_unicast_kernel net/netlink/af_netlink.c:1319 [inline] > > [] netlink_unicast+0x397/0x4c0 net/netlink/af_netlink.c:1345 > > [] netlink_sendmsg+0x396/0x710 net/netlink/af_netlink.c:1921 > > [] sock_sendmsg_nosec net/socket.c:714 [inline] > > [] sock_sendmsg+0x56/0x80 net/socket.c:734 > > [] ____sys_sendmsg+0x178/0x410 net/socket.c:2482 > > [] ___sys_sendmsg+0xa8/0x110 net/socket.c:2536 > > [] __sys_sendmmsg+0x105/0x330 net/socket.c:2622 > > [] __do_sys_sendmmsg net/socket.c:2651 [inline] > > [] __se_sys_sendmmsg net/socket.c:2648 [inline] > > [] __x64_sys_sendmmsg+0x24/0x30 net/socket.c:2648 > > [] do_syscall_x64 arch/x86/entry/common.c:50 [inline] > > [] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 > > [] entry_SYSCALL_64_after_hwframe+0x63/0xcd > > ==================================== > > > > Kernel uses tcindex_change() to change an existing > > traffic-control-indices filter properties. During the > > process of changing, kernel clears the old > > traffic-control-indices filter result, and updates it > > by RCU assigning new traffic-control-indices data. > > > > Yet the problem is that, kernel clears the old > > traffic-control-indices filter result, without destroying > > its tcf_exts structure, which triggers the above > > memory leak. > > > > This patch solves it by using tcf_exts_destroy() to > > destroy the tcf_exts structure in old > > traffic-control-indices filter result, after the > > RCU grace period. > > > > [Thanks to the suggestion from Jakub Kicinski and Cong Wang] > > > > Fixes: b9a24bb76bf6 ("net_sched: properly handle failure case of tcf_exts_init()") > > Link: https://lore.kernel.org/all/0000000000001de5c505ebc9ec59@google.com/ > > Reported-by: syzbot+232ebdbd36706c965ebf@syzkaller.appspotmail.com > > Tested-by: syzbot+232ebdbd36706c965ebf@syzkaller.appspotmail.com > > Cc: Cong Wang > > Cc: Jakub Kicinski > > Signed-off-by: Hawkins Jiawei > > --- > > v2: > > - remove all 'will' in commit message according to Jakub Kicinski > > - add Fixes tag according to Jakub Kicinski > > - remove all ifdefs according to Jakub Kicinski and Cong Wang > > - add synchronize_rcu() before destorying old_e according to > > Cong Wang > > > > v1: https://lore.kernel.org/all/20221031060835.11722-1-yin31149@gmail.com/ > > net/sched/cls_tcindex.c | 8 ++++++++ > > 1 file changed, 8 insertions(+) > > > > diff --git a/net/sched/cls_tcindex.c b/net/sched/cls_tcindex.c > > index 1c9eeb98d826..d2fac9559d3e 100644 > > --- a/net/sched/cls_tcindex.c > > +++ b/net/sched/cls_tcindex.c > > @@ -338,6 +338,7 @@ tcindex_set_parms(struct net *net, struct tcf_proto *tp, unsigned long base, > > struct tcf_result cr = {}; > > int err, balloc = 0; > > struct tcf_exts e; > > + struct tcf_exts old_e = {}; > > > > err = tcf_exts_init(&e, net, TCA_TCINDEX_ACT, TCA_TCINDEX_POLICE); > > if (err < 0) > > @@ -479,6 +480,7 @@ tcindex_set_parms(struct net *net, struct tcf_proto *tp, unsigned long base, > > } > > > > if (old_r && old_r != r) { > > + old_e = old_r->exts; > > err = tcindex_filter_result_init(old_r, cp, net); > > if (err < 0) { > > kfree(f); > > @@ -510,6 +512,12 @@ tcindex_set_parms(struct net *net, struct tcf_proto *tp, unsigned long base, > > tcf_exts_destroy(&new_filter_result.exts); > > } > > > > + /* Note: old_e should be destroyed after the RCU grace period, > > + * to avoid possible use-after-free by concurrent readers. > > + */ > > + synchronize_rcu(); > > this could make tc reconfiguration potentially very slow. I'm wondering > if we can delegate the tcf_exts_destroy() to some workqueue? call_rcu?