From patchwork Fri Oct 27 11:28:32 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: =?utf-8?b?TGVuYSBXYW5nICjnjovlqJwp?= X-Patchwork-Id: 13438552 X-Patchwork-Delegate: kuba@kernel.org Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net [23.128.96.19]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 661368489 for ; Fri, 27 Oct 2023 11:28:53 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=mediatek.com header.i=@mediatek.com header.b="TwE8US6+"; dkim=pass (1024-bit key) header.d=mediateko365.onmicrosoft.com header.i=@mediateko365.onmicrosoft.com header.b="s3/V/nJP" Received: from mailgw01.mediatek.com (unknown [60.244.123.138]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 7F7EA1B6; Fri, 27 Oct 2023 04:28:44 -0700 (PDT) X-UUID: f971e2fa74bb11eea33bb35ae8d461a2-20231027 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=mediatek.com; s=dk; h=MIME-Version:Content-Transfer-Encoding:Content-ID:Content-Type:Message-ID:Date:Subject:CC:To:From; bh=zTmwrXUjcPLWucza9yPjoN5DOgkNNxFrnx89ofoOgHc=; b=TwE8US6+zBSIgFH0k0dqTC8HhVduInOhTj7SQzq9RUlP0dWdaqn7ddshZwbXlz/xDWJVrfdRAVYQXZto4nAwmVVJmLTAjTOqiWRNnRBEj1IBLLWTt7/6ilfw5cY3MLjbfdMLm9YrDcsUuAj9Q4NWbLlvZQGyd2DVuz1J+RBQAiE=; X-CID-P-RULE: Release_Ham X-CID-O-INFO: VERSION:1.1.32,REQID:f777d997-428f-480a-ae01-6df004056b9b,IP:0,U RL:0,TC:0,Content:0,EDM:0,RT:0,SF:0,FILE:0,BULK:0,RULE:Release_Ham,ACTION: release,TS:0 X-CID-META: VersionHash:5f78ec9,CLOUDID:b3dff871-1bd3-4f48-b671-ada88705968c,B ulkID:nil,BulkQuantity:0,Recheck:0,SF:102,TC:nil,Content:1,EDM:-3,IP:nil,U RL:11|1,File:nil,Bulk:nil,QS:nil,BEC:nil,COL:0,OSI:0,OSA:0,AV:0,LES:1,SPR: NO,DKR:0,DKP:0,BRR:0,BRE:0 X-CID-BVR: 0,NGT X-CID-BAS: 0,NGT,0,_ X-CID-FACTOR: TF_CID_SPAM_ULN,TF_CID_SPAM_SNR X-UUID: f971e2fa74bb11eea33bb35ae8d461a2-20231027 Received: from mtkmbs10n1.mediatek.inc [(172.21.101.34)] by mailgw01.mediatek.com (envelope-from ) (Generic MTA with TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384 256/256) with ESMTP id 645001060; Fri, 27 Oct 2023 19:28:38 +0800 Received: from mtkmbs10n2.mediatek.inc (172.21.101.183) by MTKMBS14N1.mediatek.inc (172.21.101.75) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1118.26; Fri, 27 Oct 2023 19:28:35 +0800 Received: from APC01-PSA-obe.outbound.protection.outlook.com (172.21.101.237) by mtkmbs10n2.mediatek.inc (172.21.101.183) with Microsoft SMTP Server id 15.2.1118.26 via Frontend Transport; Fri, 27 Oct 2023 19:28:35 +0800 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=WWcKH2QOgUzEaharbNPLIj8HzPnpBlvSQF4xq6X8zE1IE84vMEhjrfpp72pzoFna1qYYoYw/dmg+IAO1KdKof1k8h9WQFg6Nr/HMIbnhegZy3R0b8HmMeKNfW+CSEhFJgnJUO4oncTT7OxwJl3Y+RLNRu6yiPEBIh+M6oEy7x8gJ2FpXa2SE2B2gk8Mk5goPkmvvdjAE4WOpSlnGp0ugwjNe+iYF3Lknx/EMFpAzm0xrDWLbzN25xwDCCDMcAGTphReOhEyG2JTqaitIQksuJ24zUyDF8dHEV/+6+nZQmiwxVnRUh39UI/LD/oHXI5KQkq99QopIbF+Y4XPgsbE/8A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=zTmwrXUjcPLWucza9yPjoN5DOgkNNxFrnx89ofoOgHc=; b=QITYGafcgFpgfuayGgI9/EXr7NMR3yXf74Py6GCRuijflbDCpSQEM64H/E+J2C/+Ep5ZxBNWmKOA+Qf1hxBbbOClDJzvQrVcbX+8cSMO+y029R5asoD1drk9L5VdFNRO26tR2ArLr+p5WWnvVBLO/1pmR7cA0eA1CQ63ctzrD4vrpMyYNRL0kV3fyrmjExs1fGiPx0lfDOyEQLC3r4yeJu7UExveO9OVQmDcFv3aquwVSXoVs83+wuFWksUO9JVYBRuIH57WcJyJIX4ToLw1A3rpDjnWMK5jHxgnaf/xyPpwlqE2AdU8ssuCEFgxLdpCaJ11swYuaKpXdZR/krXKUg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=mediatek.com; dmarc=pass action=none header.from=mediatek.com; dkim=pass header.d=mediatek.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mediateko365.onmicrosoft.com; s=selector2-mediateko365-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=zTmwrXUjcPLWucza9yPjoN5DOgkNNxFrnx89ofoOgHc=; b=s3/V/nJP+RdFk+lD2liuYMjDQuNXpyhUsnmWgMUkHDYP6pIg1chrTgweTT4mjhZXIEaovxPPS9pZXLqT3veiK1WdxbaLo7EDhafiUDCkozcBV02xlFbeLNP8aB79J6r9yIhserQrRkAOBxFi7bW3kyKZKzr+FsqYzmaFMkZ3ie4= Received: from SEZPR03MB6466.apcprd03.prod.outlook.com (2603:1096:101:4a::8) by JH0PR03MB7511.apcprd03.prod.outlook.com (2603:1096:990:14::13) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6933.19; Fri, 27 Oct 2023 11:28:32 +0000 Received: from SEZPR03MB6466.apcprd03.prod.outlook.com ([fe80::d556:7c13:6e10:9a97]) by SEZPR03MB6466.apcprd03.prod.outlook.com ([fe80::d556:7c13:6e10:9a97%4]) with mapi id 15.20.6933.019; Fri, 27 Oct 2023 11:28:32 +0000 From: =?utf-8?b?TGVuYSBXYW5nICjnjovlqJwp?= To: "davem@davemloft.net" , "kuba@kernel.org" , "matthias.bgg@gmail.com" , "pabeni@redhat.com" , "edumazet@google.com" CC: "linux-arm-kernel@lists.infradead.org" , "netdev@vger.kernel.org" , "linux-kernel@vger.kernel.org" , "linux-mediatek@lists.infradead.org" , "maze@google.com" , "cmllamas@google.com" Subject: [PATCH net-next] net:prevent shared skb corruption on rx-gro-list segmentation Thread-Topic: [PATCH net-next] net:prevent shared skb corruption on rx-gro-list segmentation Thread-Index: AQHaCMi3juco6AiSCEKGZptWFr/Uog== Date: Fri, 27 Oct 2023 11:28:32 +0000 Message-ID: Accept-Language: zh-CN, en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=mediatek.com; x-ms-publictraffictype: Email x-ms-traffictypediagnostic: SEZPR03MB6466:EE_|JH0PR03MB7511:EE_ x-ms-office365-filtering-correlation-id: bca524a5-abe5-4a05-4537-08dbd6dfd9ee x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: 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 x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:SEZPR03MB6466.apcprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230031)(366004)(39860400002)(376002)(136003)(346002)(396003)(230922051799003)(186009)(64100799003)(451199024)(1800799009)(66476007)(26005)(2616005)(38070700009)(38100700002)(36756003)(122000001)(86362001)(85182001)(6512007)(83380400001)(66556008)(64756008)(8676002)(4326008)(8936002)(54906003)(6506007)(110136005)(91956017)(66946007)(41300700001)(5660300002)(7416002)(2906002)(316002)(71200400001)(66446008)(76116006)(53546011)(6486002)(478600001);DIR:OUT;SFP:1102; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?utf-8?q?iq0yc6fK50oggrBtzV6dUt55vf22?= =?utf-8?q?zaYcsQ1caf50luP5zbqVqv0JL6VlrFlM4OLV8Zks0taow2j41MTPCEPGiOcGFahTv?= =?utf-8?q?T8f63gQTvIezuJpRiKZEK5WZlC0epyPn34LZHyn3rTVJNO1JsYEUEzUljxokpkcMi?= =?utf-8?q?UwPjLlpUW509IP2hfYLvWuLKPEuan7rDjehmDnvalcJTTZLGQWFQm/ruNRLXTArvH?= =?utf-8?q?xRUvdA+2GNDIiRe4UT2uFhOptPr8YXOLvO6FMFZ0bFSJvoXURgRy/yJ4NpS5rssZy?= =?utf-8?q?IKAHLKqWdElV11zrePGadfU8REvLsgVpThaBHcQhguF88WsIbfawtD0o71awd3bOW?= =?utf-8?q?MOwm8NJgOAQnE+m72byAs74bBU1nkx4aMXID4JryCIocfPSahuMm9t2VLuOoTgZR1?= =?utf-8?q?rbh1CLVZl3lpH2oU3MBiSK0ej47gKJJ/cAHB/4b+afTpF29uXhrPQzFUxX8Dgr1fS?= =?utf-8?q?hmI+Z5Akx6doRbJxE7ZaaRpdbOoxrzoy03Ql9Jrjg6Janv4ObJkHqS1nxyXcFhWGw?= =?utf-8?q?UxrkYf1u9Sd5QIM2+dHGepCAt43Ecn843wWvxeQ6whnCHL3EjZdG5mDBF9YdNnVDZ?= =?utf-8?q?le7/rtxuAeChZdNBB81Twn6gUFaZMQoQmPTnpvZHrGZFK5PyoA4sAGAmJT44qWzDZ?= =?utf-8?q?4ChtnvaGDpgiv1TZ4sYVtNMctGlfpmCndLIZ1ZIcT3+G335jettzmuh0N0/T9VWnV?= =?utf-8?q?foRxmRDBaxbm1ovneZ8Wvi+ubfVt9uUSo229nivbcouv6Co91vnuKdpMXr6AcocfD?= =?utf-8?q?PX/z0RiH29cwbQG5w6HJadfsu60aWAOKfmiAEPVqrUoiZmbKRO9q8cijN5sWLtZ/r?= =?utf-8?q?Ym+TuJ+FqLI4zrsWoFIXXwW0yvbvRpMCvL8OqysZ6EH1HKqrcvtLN2vvMH6d5AM2n?= =?utf-8?q?GM5nrZt2k7syF/JxrKH1EKyob6wOMV0zBF2/uEopGe7ASl1VEFaLSlumnkIF6oDDD?= =?utf-8?q?8gudMmd+1BCVeTQd0CIsyKHr0oNbr77PO2xumyxNiHZDpWvWBunwi7o9r40fMhtNW?= =?utf-8?q?g2TxGQqEoRiWAc71OQjTuKWnapz70SYVj9bj8nZ12uzTfoJFwTkjHnvSSyju3aeas?= =?utf-8?q?X1oFtEZxDGsZvUcCTA1EPUqVaLYat7x9Z+i9h1wE27DIPCfJsOHDbjnMXmk7o+jZ1?= =?utf-8?q?/YDBvkPxVDaLicuRLBwEuVI5gffYoZgcXdgnEiavJTYZ3Ad5cqX69FxFZ+yJHst+6?= =?utf-8?q?1Uh3JfFba1Z95vThklgstoa3a7V6euQd1moUucD2SdKWCXV2nD+KRP+w3tTBBVWKt?= =?utf-8?q?oA7w2tgxU0djZxWi+Per3aAy6gQHG2z94mGjQCZdmvIK1VtNRn//2B6VdxSZfQ66h?= =?utf-8?q?dr8XKby1aTopzud01P0TgMS4WkaPRkDSLwXu4W9h1sbn+SEpXeCcQYUBT21HVY/PY?= =?utf-8?q?tJcRuuy7v7n9oYe5XgfL/IWcqkJeTkOylCNCkYDX40QLh/QMoM+x0+dqntw2WZEhb?= =?utf-8?q?wlkbz5dWDqwsIFqFjRs7kEDABCoLOq65T0kT0BRZTRaQnV39yCUYltsrsQQFLhUK2?= =?utf-8?q?0IPTVUR9c07lFcC+PC2oyqUn17ZcMj2elw=3D=3D?= Content-ID: <7AD13706B34E3243B06346F5D8BB5B21@apcprd03.prod.outlook.com> Precedence: bulk X-Mailing-List: netdev@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: SEZPR03MB6466.apcprd03.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: bca524a5-abe5-4a05-4537-08dbd6dfd9ee X-MS-Exchange-CrossTenant-originalarrivaltime: 27 Oct 2023 11:28:32.4829 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: a7687ede-7a6b-4ef6-bace-642f677fbe31 X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: pyaBh43CtcEZpA22em/vAk7CcqQoLOK79I80Pn3ImRp2X+u/lA5Dx98t5qpUReVn7ZDg9sKzPNWIkezzPzDCBQ== X-MS-Exchange-Transport-CrossTenantHeadersStamped: JH0PR03MB7511 X-TM-AS-Product-Ver: SMEX-14.0.0.3152-9.1.1006-23728.005 X-TM-AS-Result: No-10--11.273600-8.000000 X-TMASE-MatchedRID: SKbLpZM5T57rGF2YAiBufhn0UD4GU5Iq6I7Cfs2GijW1eX0jEQ9c6j5u F8U3iZbPxhNmTkc2QakQzB2LH5qdIHAvdl/gU+kWyeVujmXuYYUhpWQUitAWG8A0eOJZYj7t+a/ zdHOJ3WnkizndBEr04f5ea+rBmZ5JqMLr8w1TE6hQiFNNqFvt1YiSXIsyDf91MG+k7K2p8r/Hb3 5aKn1Q4U4kHnA/WiqE1ODNrcSmC/IfLZjRGBdfQZ7tR0mnRAg1Wmr/8mnjMG7VMpDytURQKH1Xi rrq3Fh2fggDbY7vGPrKD20ZIof5hbrHOg4kwG3xplK4KT+wlsx/r8x3wtvaX43EVvTKniavA9qj I0r4m/drefdokZpqBID0SK8dS6vPhyg/LteTqKeeAiCmPx4NwMFrpUbb72MUGtkvK5L7RXEXvQk Gi3tjz/cUt5lc1lLgoGRyAacnhaa/1IRjkFXuT3jJ9OkL+F8ZyT7H4VZK27HvZX05Pm8yjX7cGd 19dSFd X-TM-AS-User-Approved-Sender: No X-TM-AS-User-Blocked-Sender: No X-TMASE-Result: 10--11.273600-8.000000 X-TMASE-Version: SMEX-14.0.0.3152-9.1.1006-23728.005 X-TM-SNTS-SMTP: CD63BED8D821E2848EE65AAA59DFCE7DC269D3AB3DD10A8E5C78AA464740D3462000:8 X-Patchwork-Delegate: kuba@kernel.org From 1d4aea846dd08d824e1097a933ed8618a6da03da Mon Sep 17 00:00:00 2001 From: lena wang Date: Fri, 27 Oct 2023 17:52:50 +0800 Subject: [PATCH net-next] net:prevent shared skb corruption on rx-gro- list segmentation shared skb triggers corruptions on rx-gro-list segmentation. [42438.749474] [ T1425] Unable to handle kernel NULL pointer dereference at virtual address 00000000000000d8 [42438.749530] [ T1425] Mem abort info: [42438.749547] [ T1425] ESR = 0x0000000096000006 [42438.749566] [ T1425] EC = 0x25: DABT (current EL), IL = 32 bits [42438.749588] [ T1425] SET = 0, FnV = 0 [42438.749606] [ T1425] EA = 0, S1PTW = 0 [42438.749623] [ T1425] FSC = 0x06: level 2 translation fault [42438.749642] [ T1425] Data abort info: [42438.749656] [ T1425] ISV = 0, ISS = 0x00000006 [42438.749674] [ T1425] CM = 0, WnR = 0 [42438.749691] [ T1425] user pgtable: 4k pages, 39-bit VAs, pgdp=00000001f96b9000 [42438.749714] [ T1425] [00000000000000d8] pgd=08000001f96ba003, p4d=08000001f96ba003, pud=08000001f96ba003, pmd=0000000000000000 [42438.749769] [ T1425] Internal error: Oops: 0000000096000006 [#1] PREEMPT SMP [42438.749796] [ T1425] cpufreq stop DVFS log done [42438.797144] [ T1425] Kernel Offset: 0x29eb000000 from 0xffffffc008000000 [42438.797185] [ T1425] PHYS_OFFSET: 0x40000000 [42438.797203] [ T1425] pstate: 80400005 (Nzcv daif +PAN -UAO) [42438.797219] [ T1425] pc : [0xffffffe9f3e38c34] __udp_gso_segment+0x24c/0x48c [42438.797248] [ T1425] lr : [0xffffffe9f3e38bf4] __udp_gso_segment+0x20c/0x48c [42438.797269] [ T1425] sp : ffffffc017acb5c0 [42438.797280] [ T1425] x29: ffffffc017acb5d0 x28: 000000000000c85f ...... [42438.799172] [ T1425] Call trace: [42438.799184] [ T1425] dump_backtrace+0xf4/0x118 [42438.799210] [ T1425] show_stack+0x18/0x24 [42438.799227] [ T1425] dump_stack_lvl+0x60/0x7c [42438.799250] [ T1425] dump_stack+0x18/0x3c [42438.799270] [ T1425] mrdump_common_die+0x24c/0x398 [mrdump] [42438.799354] [ T1425] ipanic_die+0x20/0x34 [mrdump] [42438.799425] [ T1425] notify_die+0x80/0xd8 [42438.799447] [ T1425] die+0x94/0x2b8 [42438.799463] [ T1425] __do_kernel_fault+0x264/0x298 [42438.799485] [ T1425] do_page_fault+0x98/0x4a0 [42438.799503] [ T1425] do_translation_fault+0x38/0x54 [42438.799521] [ T1425] do_mem_abort+0x58/0x118 [42438.799540] [ T1425] el1_abort+0x3c/0x5c [42438.799555] [ T1425] el1h_64_sync_handler+0x54/0x90 [42438.799575] [ T1425] el1h_64_sync+0x68/0x6c [42438.799591] [ T1425] __udp_gso_segment+0x24c/0x48c [42438.799611] [ T1425] udp4_ufo_fragment+0x118/0x15c [42438.799628] [ T1425] inet_gso_segment+0x164/0x338 [42438.799644] [ T1425] skb_mac_gso_segment+0xc4/0x13c [42438.799666] [ T1425] __skb_gso_segment+0xc4/0x124 [42438.799686] [ T1425] validate_xmit_skb+0x9c/0x2e0 [42438.799703] [ T1425] validate_xmit_skb_list+0x4c/0x80 [42438.799722] [ T1425] sch_direct_xmit+0x70/0x3d0 [42438.799739] [ T1425] __dev_queue_xmit+0x5f0/0xd40 [42438.799757] [ T1425] ip_finish_output2+0x3f8/0x460 [42438.799774] [ T1425] __ip_finish_output+0x194/0x240 [42438.799790] [ T1425] ip_finish_output+0x20/0xf4 [42438.799810] [ T1425] ip_output+0x100/0x1a0 [42438.799830] [ T1425] NF_HOOK+0xac/0x154 [42438.799848] [ T1425] ip_forward+0x308/0x320 [42438.799868] [ T1425] ip_sublist_rcv+0x1f0/0x25c [42438.799887] [ T1425] ip_list_rcv+0x138/0x174 [42438.799905] [ T1425] __netif_receive_skb_list_core+0x1e8/0x28c [42438.799923] [ T1425] netif_receive_skb_list_internal+0x1ec/0x2b4 [42438.799942] [ T1425] netif_receive_skb_list+0x2c/0x144 [42438.799960] [ T1425] ccmni_queue_state_callback+0x98/0x304 [ccmni] [42438.800009] [ T1425] port_net_queue_state_notify+0x178/0x1c0 [ccci_md_all] [42438.800257] [ T1425] ccci_port_queue_status_notify+0xf0/0x2a8 [ccci_md_all] [42438.800496] [ T1425] dpmaif_rxq_push_thread+0xb0/0x1d4 [ccci_dpmaif] [42438.800602] [ T1425] kthread+0x104/0x1d4 [42438.800621] [ T1425] ret_from_fork+0x10/0x20 In some scenarios the GRO-ed skb shared with multi users. This segmentation touches the shared heads which sets frag_list to null. After linearization the skb->next is null which results the corruption. So for shared skb, it needs to clone first than unclone with header and data separated for different devices. Signed-off-by: lena wang --- net/core/skbuff.c | 6 ++++++ 1 file changed, 6 insertions(+) err = skb_unclone(skb, GFP_ATOMIC); if (err) diff --git a/net/core/skbuff.c b/net/core/skbuff.c index b157efea5dea..adeb3ad9697b 100644 --- a/net/core/skbuff.c +++ b/net/core/skbuff.c @@ -4351,6 +4351,12 @@ struct sk_buff *skb_segment_list(struct sk_buff *skb, skb_push(skb, -skb_network_offset(skb) + offset); + if (skb_shared(skb)) { + skb = skb_share_check(skb, GFP_ATOMIC); + if (!skb) + goto err_linearize; + } + /* Ensure the head is writeable before touching the shared info */