Message ID | 728181e9-6b35-0092-3d01-3d7aff4521b6@sberdevices.ru |
---|---|
Headers |
Return-Path: <linux-kernel-owner@vger.kernel.org> Delivered-To: ouuuleilei@gmail.com Received: by 2002:a59:b0ea:0:b0:3b6:4342:cba0 with SMTP id b10csp640071vqo; Sat, 25 Mar 2023 15:48:39 -0700 (PDT) X-Google-Smtp-Source: AKy350b3v0d4SowUrfgtQqDcb57eplHxCKQGPi2XFEDkL6So2iJgJdOvR+a6X4ewKoUzkANWHyrZ X-Received: by 2002:a17:902:daca:b0:19d:553:746b with SMTP id q10-20020a170902daca00b0019d0553746bmr8473239plx.66.1679784519394; Sat, 25 Mar 2023 15:48:39 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1679784519; cv=none; d=google.com; s=arc-20160816; b=Z0lgRcGYekeamFLuI5AlhIE3o+w3gA68LdNI6u1zBET0I//GNQpqKQglIrhl3iBcFd Tav0L85myLfHxYBSXeCOOYkLmJYEIhyXvDohWOIvZCN2FDPn9xyxMN9xH/KMgEkYk5DU FzjYBvvTzCiadOMFMSwEBB2djCO1lvlP1ddNn8ylWzJCfiSBqTmTvsNymcY32K1gzfrX AId7JSsJL6d7Qsr6/Fs+mNZzF6V2PP+A+K2OJcTU8pt2RBtUJcYF13QoJxlE1RwOGD+v JBAIGIfuB7FTjjzX+3bnjRVzLSfl7tSXxwURYDdKnzmqsILUi/I5OLbfiDiLdjfM2HBj JG7Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:subject:from:cc:to :content-language:user-agent:mime-version:date:message-id :dkim-signature; bh=fgF6s5R3U6VGsdB/76CfdbRQ/kHWhdlTZAEkRxHRzOU=; b=paPph0eskWp+tRs//9DbbqxDYfU/KXj3Nx+iVpHXkIq+gLDzQJsEnsbVvxfi4XdJBl 0jQgtW9a+GCWAZyoB46YVQwTocLbcRlHENwxwxgWCQhsZICelJ/KrGLU7JWX8sG2dN/I hMs1B5RKr4McOQmPo6tYX8sOqd5rd2jM2UxhItfCXhcUTpThmyVf0Itb6YuyLRUvM6Py 4czYRlWe2wniT7eWFkVAk1kzYwirY9BEz80OVFem8OhwrbCeyrXkpul7OTCZaHi2Aj3o BZ3w/6pY1y2+4FhGShOKTnTEuyLDQBhLysSvN7brFzaa95HYfrjvV1/AVA6e+8kd2wqz COCA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@sberdevices.ru header.s=mail header.b=iTjZCzqq; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=sberdevices.ru Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id q15-20020a17090311cf00b0019e68e3d533si25322225plh.98.2023.03.25.15.48.26; Sat, 25 Mar 2023 15:48:39 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@sberdevices.ru header.s=mail header.b=iTjZCzqq; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=sberdevices.ru Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231801AbjCYWK0 (ORCPT <rfc822;makky5685@gmail.com> + 99 others); Sat, 25 Mar 2023 18:10:26 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:53192 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230237AbjCYWKZ (ORCPT <rfc822;linux-kernel@vger.kernel.org>); Sat, 25 Mar 2023 18:10:25 -0400 Received: from mx.sberdevices.ru (mx.sberdevices.ru [45.89.227.171]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 03DBE40E3; Sat, 25 Mar 2023 15:10:24 -0700 (PDT) Received: from s-lin-edge02.sberdevices.ru (localhost [127.0.0.1]) by mx.sberdevices.ru (Postfix) with ESMTP id 3E8665FD02; Sun, 26 Mar 2023 01:10:22 +0300 (MSK) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sberdevices.ru; s=mail; t=1679782222; bh=fgF6s5R3U6VGsdB/76CfdbRQ/kHWhdlTZAEkRxHRzOU=; h=Message-ID:Date:MIME-Version:To:From:Subject:Content-Type; b=iTjZCzqqvkvHNC4fPC01IAwWRMJV4u+8bQHj8MNii9ziKxmjwKxbRhIt8ON1j5NZS fJ6Y1/kkJfRhKSXyc3ncWGKu84OaN6OR7S3GK7XEouS7s4rG7exPqoTq5AHuv+KC/2 vG+6QVm6iJucexsLFx377/IkmLXxBehCtfYVC8fsxJi+/g6qRZwmPHc96fwJkQDaoE tGFDxbxgZW4NVdi4/8iXBG6YqRYSorVJDk1QoEAZU1n7p+YbBylOqQSiWY0BDRvl/k 0TOq8FArtPx9XBsAtYgwJuz8Ieao36Cjsj0MEMhhJ2H69ymVXeOtmbttyNk3/O51WZ YLqS64FKcSrbw== Received: from S-MS-EXCH01.sberdevices.ru (S-MS-EXCH01.sberdevices.ru [172.16.1.4]) by mx.sberdevices.ru (Postfix) with ESMTP; Sun, 26 Mar 2023 01:10:22 +0300 (MSK) Message-ID: <728181e9-6b35-0092-3d01-3d7aff4521b6@sberdevices.ru> Date: Sun, 26 Mar 2023 01:07:05 +0300 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Thunderbird/102.7.1 Content-Language: en-US To: Stefan Hajnoczi <stefanha@redhat.com>, Stefano Garzarella <sgarzare@redhat.com>, "David S. Miller" <davem@davemloft.net>, Eric Dumazet <edumazet@google.com>, Jakub Kicinski <kuba@kernel.org>, Paolo Abeni <pabeni@redhat.com>, Bobby Eshleman <bobby.eshleman@bytedance.com> CC: <kvm@vger.kernel.org>, <virtualization@lists.linux-foundation.org>, <netdev@vger.kernel.org>, <linux-kernel@vger.kernel.org>, <kernel@sberdevices.ru>, <oxffffaa@gmail.com>, <avkrasnov@sberdevices.ru> From: Arseniy Krasnov <avkrasnov@sberdevices.ru> Subject: [RFC PATCH v2 0/3] fix header length on skb merging Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: 7bit X-Originating-IP: [172.16.1.6] X-ClientProxiedBy: S-MS-EXCH02.sberdevices.ru (172.16.1.5) To S-MS-EXCH01.sberdevices.ru (172.16.1.4) X-KSMG-Rule-ID: 4 X-KSMG-Message-Action: clean X-KSMG-AntiSpam-Status: not scanned, disabled by settings X-KSMG-AntiSpam-Interceptor-Info: not scanned X-KSMG-AntiPhishing: not scanned, disabled by settings X-KSMG-AntiVirus: Kaspersky Secure Mail Gateway, version 1.1.2.30, bases: 2023/03/25 20:38:00 #21009968 X-KSMG-AntiVirus-Status: Clean, skipped X-Spam-Status: No, score=-0.2 required=5.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,DKIM_VALID_EF,SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: <linux-kernel.vger.kernel.org> X-Mailing-List: linux-kernel@vger.kernel.org X-getmail-retrieved-from-mailbox: =?utf-8?q?INBOX?= X-GMAIL-THRID: =?utf-8?q?1761381732430930894?= X-GMAIL-MSGID: =?utf-8?q?1761381732430930894?= |
Series |
fix header length on skb merging
|
|
Message
Arseniy Krasnov
March 25, 2023, 10:07 p.m. UTC
Hello, this patchset fixes appending newly arrived skbuff to the last skbuff of the socket's queue during rx path. Problem fires when we are trying to append data to skbuff which was already processed in dequeue callback at least once. Dequeue callback calls function 'skb_pull()' which changes 'skb->len'. In current implementation 'skb->len' is used to update length in header of last skbuff after new data was copied to it. This is bug, because value in header is used to calculate 'rx_bytes'/'fwd_cnt' and thus must be constant during skbuff lifetime. Here is example, we have two skbuffs: skb0 with length 10 and skb1 with length 4. 1) skb0 arrives, hdr->len == skb->len == 10, rx_bytes == 10 2) Read 3 bytes from skb0, skb->len == 7, hdr->len == 10, rx_bytes == 10 3) skb1 arrives, hdr->len == skb->len == 4, rx_bytes == 14 4) Append skb1 to skb0, skb0 now has skb->len == 11, hdr->len == 11. But value of 11 in header is invalid. 5) Read whole skb0, update rx_bytes by 11 from skb0's header. 6) At this moment rx_bytes == 3, but socket's queue is empty. This bug starts to fire since: commit 077706165717 ("virtio/vsock: don't use skbuff state to account credit") In fact, it presents before, but didn't triggered due to a little bit buggy implementation of credit calculation logic. So i'll use Fixes tag for it. I really forgot about this branch in rx path when implemented patch 077706165717. This patchset contains 3 patches: 1) Fix itself. 2) Patch with WARN_ONCE() to catch such problems in future. 3) Patch with test which triggers skb appending logic. It looks like simple test with several 'send()' and 'recv()', but it checks, that skbuff appending works ok. Link to v1: https://lore.kernel.org/netdev/e141e6f1-00ae-232c-b840-b146bdb10e99@sberdevices.ru/ Changelog: v1 -> v2: - Replace 'WARN()' with 'WARN_ONCE()'. - Clean and refactor source code of the reproducer, now it is test for vsock_test suite. - Commit messages update. Arseniy Krasnov (3): virtio/vsock: fix header length on skb merging virtio/vsock: WARN_ONCE() for invalid state of socket test/vsock: new skbuff appending test net/vmw_vsock/virtio_transport_common.c | 9 ++- tools/testing/vsock/vsock_test.c | 90 +++++++++++++++++++++++++ 2 files changed, 98 insertions(+), 1 deletion(-)