linux-mm.kvack.org archive mirror
 help / color / mirror / Atom feed
* Re: [syzbot] WARNING: kmalloc bug in xdp_umem_create (2)
       [not found] <000000000000a3571605d27817b5@google.com>
@ 2022-02-10  6:08 ` syzbot
  2022-02-10  8:11   ` Willy Tarreau
  0 siblings, 1 reply; 6+ messages in thread
From: syzbot @ 2022-02-10  6:08 UTC (permalink / raw)
  To: akpm, andrii, ast, bjorn.topel, bjorn.topel, bjorn, bpf, daniel,
	davem, fgheet255t, hawk, john.fastabend, jonathan.lemon, kafai,
	kpsingh, kuba, linux-kernel, linux-mm, magnus.karlsson,
	mudongliangabcd, netdev, songliubraving, syzkaller-bugs,
	torvalds, w, yhs

syzbot has bisected this issue to:

commit 7661809d493b426e979f39ab512e3adf41fbcc69
Author: Linus Torvalds <torvalds@linux-foundation.org>
Date:   Wed Jul 14 16:45:49 2021 +0000

    mm: don't allow oversized kvmalloc() calls

bisection log:  https://syzkaller.appspot.com/x/bisect.txt?x=13bc74c2700000
start commit:   f4bc5bbb5fef Merge tag 'nfsd-5.17-2' of git://git.kernel.o..
git tree:       upstream
final oops:     https://syzkaller.appspot.com/x/report.txt?x=107c74c2700000
console output: https://syzkaller.appspot.com/x/log.txt?x=17bc74c2700000
kernel config:  https://syzkaller.appspot.com/x/.config?x=5707221760c00a20
dashboard link: https://syzkaller.appspot.com/bug?extid=11421fbbff99b989670e
syz repro:      https://syzkaller.appspot.com/x/repro.syz?x=12e514a4700000
C reproducer:   https://syzkaller.appspot.com/x/repro.c?x=15fcdf8a700000

Reported-by: syzbot+11421fbbff99b989670e@syzkaller.appspotmail.com
Fixes: 7661809d493b ("mm: don't allow oversized kvmalloc() calls")

For information about bisection process see: https://goo.gl/tpsmEJ#bisection


^ permalink raw reply	[flat|nested] 6+ messages in thread

* Re: [syzbot] WARNING: kmalloc bug in xdp_umem_create (2)
  2022-02-10  6:08 ` [syzbot] WARNING: kmalloc bug in xdp_umem_create (2) syzbot
@ 2022-02-10  8:11   ` Willy Tarreau
       [not found]     ` <359ee592-747f-8610-4180-5e1d2aba1b77@iogearbox.net>
  0 siblings, 1 reply; 6+ messages in thread
From: Willy Tarreau @ 2022-02-10  8:11 UTC (permalink / raw)
  To: syzbot
  Cc: akpm, andrii, ast, bjorn.topel, bjorn.topel, bjorn, bpf, daniel,
	davem, fgheet255t, hawk, john.fastabend, jonathan.lemon, kafai,
	kpsingh, kuba, linux-kernel, linux-mm, magnus.karlsson,
	mudongliangabcd, netdev, songliubraving, syzkaller-bugs,
	torvalds, yhs

On Wed, Feb 09, 2022 at 10:08:07PM -0800, syzbot wrote:
> syzbot has bisected this issue to:
> 
> commit 7661809d493b426e979f39ab512e3adf41fbcc69
> Author: Linus Torvalds <torvalds@linux-foundation.org>
> Date:   Wed Jul 14 16:45:49 2021 +0000
> 
>     mm: don't allow oversized kvmalloc() calls
> 
> bisection log:  https://syzkaller.appspot.com/x/bisect.txt?x=13bc74c2700000
> start commit:   f4bc5bbb5fef Merge tag 'nfsd-5.17-2' of git://git.kernel.o..
> git tree:       upstream
> final oops:     https://syzkaller.appspot.com/x/report.txt?x=107c74c2700000
> console output: https://syzkaller.appspot.com/x/log.txt?x=17bc74c2700000
> kernel config:  https://syzkaller.appspot.com/x/.config?x=5707221760c00a20
> dashboard link: https://syzkaller.appspot.com/bug?extid=11421fbbff99b989670e
> syz repro:      https://syzkaller.appspot.com/x/repro.syz?x=12e514a4700000
> C reproducer:   https://syzkaller.appspot.com/x/repro.c?x=15fcdf8a700000
> 
> Reported-by: syzbot+11421fbbff99b989670e@syzkaller.appspotmail.com
> Fixes: 7661809d493b ("mm: don't allow oversized kvmalloc() calls")
> 
> For information about bisection process see: https://goo.gl/tpsmEJ#bisection

Interesting, so in fact syzkaller has shown that the aforementioned
patch does its job well and has spotted a call path by which a single
userland setsockopt() can request more than 2 GB allocation in the
kernel. Most likely that's in fact what needs to be addressed.

FWIW the call trace at the URL above is:

Call Trace:
 kvmalloc include/linux/mm.h:806 [inline]
 kvmalloc_array include/linux/mm.h:824 [inline]
 kvcalloc include/linux/mm.h:829 [inline]
 xdp_umem_pin_pages net/xdp/xdp_umem.c:102 [inline]
 xdp_umem_reg net/xdp/xdp_umem.c:219 [inline]
 xdp_umem_create+0x6a5/0xf00 net/xdp/xdp_umem.c:252
 xsk_setsockopt+0x604/0x790 net/xdp/xsk.c:1068
 __sys_setsockopt+0x1fd/0x4e0 net/socket.c:2176
 __do_sys_setsockopt net/socket.c:2187 [inline]
 __se_sys_setsockopt net/socket.c:2184 [inline]
 __x64_sys_setsockopt+0xb5/0x150 net/socket.c:2184
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x44/0xae

and the meaningful part of the repro is:

  syscall(__NR_mmap, 0x1ffff000ul, 0x1000ul, 0ul, 0x32ul, -1, 0ul);
  syscall(__NR_mmap, 0x20000000ul, 0x1000000ul, 7ul, 0x32ul, -1, 0ul);
  syscall(__NR_mmap, 0x21000000ul, 0x1000ul, 0ul, 0x32ul, -1, 0ul);
  intptr_t res = 0;
  res = syscall(__NR_socket, 0x2cul, 3ul, 0);
  if (res != -1)
    r[0] = res;
  *(uint64_t*)0x20000080 = 0;
  *(uint64_t*)0x20000088 = 0xfff02000000;
  *(uint32_t*)0x20000090 = 0x800;
  *(uint32_t*)0x20000094 = 0;
  *(uint32_t*)0x20000098 = 0;
  syscall(__NR_setsockopt, r[0], 0x11b, 4, 0x20000080ul, 0x20ul);

Willy


^ permalink raw reply	[flat|nested] 6+ messages in thread

* Re: [syzbot] WARNING: kmalloc bug in xdp_umem_create (2)
       [not found]     ` <359ee592-747f-8610-4180-5e1d2aba1b77@iogearbox.net>
@ 2022-02-10 16:18       ` Björn Töpel
  2022-02-10 17:45         ` Dan Carpenter
  0 siblings, 1 reply; 6+ messages in thread
From: Björn Töpel @ 2022-02-10 16:18 UTC (permalink / raw)
  To: Daniel Borkmann
  Cc: Willy Tarreau, syzbot, akpm, Andrii Nakryiko, Alexei Starovoitov,
	Björn Töpel, bpf, David Miller, fgheet255t,
	Jesper Dangaard Brouer, John Fastabend, Jonathan Lemon,
	Martin KaFai Lau, KP Singh, Jakub Kicinski, LKML, linux-mm,
	Karlsson, Magnus, mudongliangabcd, Netdev, Song Liu,
	syzkaller-bugs, Linus Torvalds, Yonghong Song

On Thu, 10 Feb 2022 at 09:35, Daniel Borkmann <daniel@iogearbox.net> wrote:
>
> On 2/10/22 9:11 AM, Willy Tarreau wrote:
> > On Wed, Feb 09, 2022 at 10:08:07PM -0800, syzbot wrote:
> >> syzbot has bisected this issue to:
> >>
> >> commit 7661809d493b426e979f39ab512e3adf41fbcc69
> >> Author: Linus Torvalds <torvalds@linux-foundation.org>
> >> Date:   Wed Jul 14 16:45:49 2021 +0000
> >>
> >>      mm: don't allow oversized kvmalloc() calls
> >>
> >> bisection log:  https://syzkaller.appspot.com/x/bisect.txt?x=13bc74c2700000
> >> start commit:   f4bc5bbb5fef Merge tag 'nfsd-5.17-2' of git://git.kernel.o..
> >> git tree:       upstream
> >> final oops:     https://syzkaller.appspot.com/x/report.txt?x=107c74c2700000
> >> console output: https://syzkaller.appspot.com/x/log.txt?x=17bc74c2700000
> >> kernel config:  https://syzkaller.appspot.com/x/.config?x=5707221760c00a20
> >> dashboard link: https://syzkaller.appspot.com/bug?extid=11421fbbff99b989670e
> >> syz repro:      https://syzkaller.appspot.com/x/repro.syz?x=12e514a4700000
> >> C reproducer:   https://syzkaller.appspot.com/x/repro.c?x=15fcdf8a700000
> >>
> >> Reported-by: syzbot+11421fbbff99b989670e@syzkaller.appspotmail.com
> >> Fixes: 7661809d493b ("mm: don't allow oversized kvmalloc() calls")
> >>
> >> For information about bisection process see: https://goo.gl/tpsmEJ#bisection
> >
> > Interesting, so in fact syzkaller has shown that the aforementioned
> > patch does its job well and has spotted a call path by which a single
> > userland setsockopt() can request more than 2 GB allocation in the
> > kernel. Most likely that's in fact what needs to be addressed.
> >
> > FWIW the call trace at the URL above is:
> >
> > Call Trace:
> >   kvmalloc include/linux/mm.h:806 [inline]
> >   kvmalloc_array include/linux/mm.h:824 [inline]
> >   kvcalloc include/linux/mm.h:829 [inline]
> >   xdp_umem_pin_pages net/xdp/xdp_umem.c:102 [inline]
> >   xdp_umem_reg net/xdp/xdp_umem.c:219 [inline]
> >   xdp_umem_create+0x6a5/0xf00 net/xdp/xdp_umem.c:252
> >   xsk_setsockopt+0x604/0x790 net/xdp/xsk.c:1068
> >   __sys_setsockopt+0x1fd/0x4e0 net/socket.c:2176
> >   __do_sys_setsockopt net/socket.c:2187 [inline]
> >   __se_sys_setsockopt net/socket.c:2184 [inline]
> >   __x64_sys_setsockopt+0xb5/0x150 net/socket.c:2184
> >   do_syscall_x64 arch/x86/entry/common.c:50 [inline]
> >   do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
> >   entry_SYSCALL_64_after_hwframe+0x44/0xae
> >
> > and the meaningful part of the repro is:
> >
> >    syscall(__NR_mmap, 0x1ffff000ul, 0x1000ul, 0ul, 0x32ul, -1, 0ul);
> >    syscall(__NR_mmap, 0x20000000ul, 0x1000000ul, 7ul, 0x32ul, -1, 0ul);
> >    syscall(__NR_mmap, 0x21000000ul, 0x1000ul, 0ul, 0x32ul, -1, 0ul);
> >    intptr_t res = 0;
> >    res = syscall(__NR_socket, 0x2cul, 3ul, 0);
> >    if (res != -1)
> >      r[0] = res;
> >    *(uint64_t*)0x20000080 = 0;
> >    *(uint64_t*)0x20000088 = 0xfff02000000;
> >    *(uint32_t*)0x20000090 = 0x800;
> >    *(uint32_t*)0x20000094 = 0;
> >    *(uint32_t*)0x20000098 = 0;
> >    syscall(__NR_setsockopt, r[0], 0x11b, 4, 0x20000080ul, 0x20ul);
>
> Bjorn had a comment back then when the issue was first raised here:
>
>    https://lore.kernel.org/bpf/3f854ca9-f5d6-4065-c7b1-5e5b25ea742f@iogearbox.net/
>
> There was earlier discussion from Andrew to potentially retire the warning:
>
>    https://lore.kernel.org/bpf/20211201202905.b9892171e3f5b9a60f9da251@linux-foundation.org/
>
> Bjorn / Magnus / Andrew, anyone planning to follow-up on this issue?
>

Honestly, I would need some guidance on how to progress. I could just
change from U32_MAX to INT_MAX, but as I stated earlier (lore-link
above), that has a hacky feeling to it. Andrew's mail didn't really
land in a consensus. From my perspective, the code isn't broken, with
the memcg limits in consideration. Introducing a LARGE flag or a new
"_yes_this_can_be_huge_but_it_is_ok()" version would make sense if
this problem is applicable to more users in the kernel.

So, thoughts? ;-)


Björn


^ permalink raw reply	[flat|nested] 6+ messages in thread

* Re: [syzbot] WARNING: kmalloc bug in xdp_umem_create (2)
  2022-02-10 16:18       ` Björn Töpel
@ 2022-02-10 17:45         ` Dan Carpenter
  2022-02-10 17:56           ` Dan Carpenter
  0 siblings, 1 reply; 6+ messages in thread
From: Dan Carpenter @ 2022-02-10 17:45 UTC (permalink / raw)
  To: Björn Töpel
  Cc: Daniel Borkmann, Willy Tarreau, syzbot, akpm, Andrii Nakryiko,
	Alexei Starovoitov, Björn Töpel, bpf, David Miller,
	fgheet255t, Jesper Dangaard Brouer, John Fastabend,
	Jonathan Lemon, Martin KaFai Lau, KP Singh, Jakub Kicinski, LKML,
	linux-mm, Karlsson, Magnus, mudongliangabcd, Netdev, Song Liu,
	syzkaller-bugs, Linus Torvalds, Yonghong Song

On Thu, Feb 10, 2022 at 05:18:52PM +0100, Björn Töpel wrote:
> On Thu, 10 Feb 2022 at 09:35, Daniel Borkmann <daniel@iogearbox.net> wrote:
> >
> > On 2/10/22 9:11 AM, Willy Tarreau wrote:
> > > On Wed, Feb 09, 2022 at 10:08:07PM -0800, syzbot wrote:
> > >> syzbot has bisected this issue to:
> > >>
> > >> commit 7661809d493b426e979f39ab512e3adf41fbcc69
> > >> Author: Linus Torvalds <torvalds@linux-foundation.org>
> > >> Date:   Wed Jul 14 16:45:49 2021 +0000
> > >>
> > >>      mm: don't allow oversized kvmalloc() calls
> > >>
> > >> bisection log:  https://syzkaller.appspot.com/x/bisect.txt?x=13bc74c2700000
> > >> start commit:   f4bc5bbb5fef Merge tag 'nfsd-5.17-2' of git://git.kernel.o..
> > >> git tree:       upstream
> > >> final oops:     https://syzkaller.appspot.com/x/report.txt?x=107c74c2700000
> > >> console output: https://syzkaller.appspot.com/x/log.txt?x=17bc74c2700000
> > >> kernel config:  https://syzkaller.appspot.com/x/.config?x=5707221760c00a20
> > >> dashboard link: https://syzkaller.appspot.com/bug?extid=11421fbbff99b989670e
> > >> syz repro:      https://syzkaller.appspot.com/x/repro.syz?x=12e514a4700000
> > >> C reproducer:   https://syzkaller.appspot.com/x/repro.c?x=15fcdf8a700000
> > >>
> > >> Reported-by: syzbot+11421fbbff99b989670e@syzkaller.appspotmail.com
> > >> Fixes: 7661809d493b ("mm: don't allow oversized kvmalloc() calls")
> > >>
> > >> For information about bisection process see: https://goo.gl/tpsmEJ#bisection
> > >
> > > Interesting, so in fact syzkaller has shown that the aforementioned
> > > patch does its job well and has spotted a call path by which a single
> > > userland setsockopt() can request more than 2 GB allocation in the
> > > kernel. Most likely that's in fact what needs to be addressed.
> > >
> > > FWIW the call trace at the URL above is:
> > >
> > > Call Trace:
> > >   kvmalloc include/linux/mm.h:806 [inline]
> > >   kvmalloc_array include/linux/mm.h:824 [inline]
> > >   kvcalloc include/linux/mm.h:829 [inline]
> > >   xdp_umem_pin_pages net/xdp/xdp_umem.c:102 [inline]
> > >   xdp_umem_reg net/xdp/xdp_umem.c:219 [inline]
> > >   xdp_umem_create+0x6a5/0xf00 net/xdp/xdp_umem.c:252
> > >   xsk_setsockopt+0x604/0x790 net/xdp/xsk.c:1068
> > >   __sys_setsockopt+0x1fd/0x4e0 net/socket.c:2176
> > >   __do_sys_setsockopt net/socket.c:2187 [inline]
> > >   __se_sys_setsockopt net/socket.c:2184 [inline]
> > >   __x64_sys_setsockopt+0xb5/0x150 net/socket.c:2184
> > >   do_syscall_x64 arch/x86/entry/common.c:50 [inline]
> > >   do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
> > >   entry_SYSCALL_64_after_hwframe+0x44/0xae
> > >
> > > and the meaningful part of the repro is:
> > >
> > >    syscall(__NR_mmap, 0x1ffff000ul, 0x1000ul, 0ul, 0x32ul, -1, 0ul);
> > >    syscall(__NR_mmap, 0x20000000ul, 0x1000000ul, 7ul, 0x32ul, -1, 0ul);
> > >    syscall(__NR_mmap, 0x21000000ul, 0x1000ul, 0ul, 0x32ul, -1, 0ul);
> > >    intptr_t res = 0;
> > >    res = syscall(__NR_socket, 0x2cul, 3ul, 0);
> > >    if (res != -1)
> > >      r[0] = res;
> > >    *(uint64_t*)0x20000080 = 0;
> > >    *(uint64_t*)0x20000088 = 0xfff02000000;
> > >    *(uint32_t*)0x20000090 = 0x800;
> > >    *(uint32_t*)0x20000094 = 0;
> > >    *(uint32_t*)0x20000098 = 0;
> > >    syscall(__NR_setsockopt, r[0], 0x11b, 4, 0x20000080ul, 0x20ul);
> >
> > Bjorn had a comment back then when the issue was first raised here:
> >
> >    https://lore.kernel.org/bpf/3f854ca9-f5d6-4065-c7b1-5e5b25ea742f@iogearbox.net/
> >
> > There was earlier discussion from Andrew to potentially retire the warning:
> >
> >    https://lore.kernel.org/bpf/20211201202905.b9892171e3f5b9a60f9da251@linux-foundation.org/
> >
> > Bjorn / Magnus / Andrew, anyone planning to follow-up on this issue?
> >
> 
> Honestly, I would need some guidance on how to progress. I could just
> change from U32_MAX to INT_MAX

It would have to be lower than that.  The limit is on "npgs" but we are
allocating npgs * sizeof(struct page *) so it would have to:

	if (npgs > INT_MAX / sizeof(void *))
		return -EINVAL;

Is it normally going to huge?  You could call vmalloc() instead of
kvmalloc().

When Linus added the WARN_ON() for huge kvmalloc sizes, it was as a
reaction to a security bug where the size which was more than UINT_MAX
but not everything was prepared to handle ulong sizes.  He wanted
people who allocated large amounts of RAM to do it in a deliberate way
instead of by accident.

regards,
dan carpenter


^ permalink raw reply	[flat|nested] 6+ messages in thread

* Re: [syzbot] WARNING: kmalloc bug in xdp_umem_create (2)
  2022-02-10 17:45         ` Dan Carpenter
@ 2022-02-10 17:56           ` Dan Carpenter
  2022-02-10 18:04             ` Linus Torvalds
  0 siblings, 1 reply; 6+ messages in thread
From: Dan Carpenter @ 2022-02-10 17:56 UTC (permalink / raw)
  To: Björn Töpel
  Cc: Daniel Borkmann, Willy Tarreau, syzbot, akpm, Andrii Nakryiko,
	Alexei Starovoitov, Björn Töpel, bpf, David Miller,
	fgheet255t, Jesper Dangaard Brouer, John Fastabend,
	Jonathan Lemon, Martin KaFai Lau, KP Singh, Jakub Kicinski, LKML,
	linux-mm, Karlsson, Magnus, mudongliangabcd, Netdev, Song Liu,
	syzkaller-bugs, Linus Torvalds, Yonghong Song

On Thu, Feb 10, 2022 at 08:45:08PM +0300, Dan Carpenter wrote:
> Is it normally going to huge?  You could call vmalloc() instead of
> kvmalloc().

Wait that would make the allocation succeed...  We don't want that.
That was a dumb idea.  Forget I said that.

regards,
dan carpenter



^ permalink raw reply	[flat|nested] 6+ messages in thread

* Re: [syzbot] WARNING: kmalloc bug in xdp_umem_create (2)
  2022-02-10 17:56           ` Dan Carpenter
@ 2022-02-10 18:04             ` Linus Torvalds
  0 siblings, 0 replies; 6+ messages in thread
From: Linus Torvalds @ 2022-02-10 18:04 UTC (permalink / raw)
  To: Dan Carpenter
  Cc: Björn Töpel, Daniel Borkmann, Willy Tarreau, syzbot,
	Andrew Morton, Andrii Nakryiko, Alexei Starovoitov,
	Björn Töpel, bpf, David Miller, fgheet255t,
	Jesper Dangaard Brouer, John Fastabend, Jonathan Lemon,
	Martin KaFai Lau, KP Singh, Jakub Kicinski, LKML, Linux-MM,
	Karlsson, Magnus, mudongliangabcd, Netdev, Song Liu,
	syzkaller-bugs, Yonghong Song

On Thu, Feb 10, 2022 at 9:57 AM Dan Carpenter <dan.carpenter@oracle.com> wrote:
>
> Wait that would make the allocation succeed...  We don't want that.
> That was a dumb idea.  Forget I said that.

Well, sometimes that _can_ be the right model.

That said, pretty much every time this has come up, the kernel warning
has shown that yes, the code was broken and there really wasn't a
reason for doing allocations that big.

Of course, some people would be perfectly fine with the allocation
failing, they just don't want the warning. I didn't want __GFP_NOWARN
to shut it up originally because I wanted people to see all those
cases, but these days I think we can just say "yeah, people can shut
it up explicitly by saying 'go ahead and fail this allocation, don't
warn about it'".

So enough time has passed that by now I'd certainly be ok with something like

  --- a/mm/util.c
  +++ b/mm/util.c
  @@ -587,8 +587,10 @@ void *kvmalloc_node(size_t size,
                  return ret;

          /* Don't even allow crazy sizes */
  -       if (WARN_ON_ONCE(size > INT_MAX))
  +       if (unlikely(size > INT_MAX)) {
  +               WARN_ON_ONCE(!(flags & __GFP_NOWARN));
                  return NULL;
  +       }

          return __vmalloc_node(size, 1, flags, node,
                           __builtin_return_address(0));

(which is obviously COMPLETELY UNTESTED as well as being
whitespace-damaged, but you get the idea).

If somebody tests that patch and verifies it works, and writes a
little commit blurb for it, I'll apply it.

            Linus


^ permalink raw reply	[flat|nested] 6+ messages in thread

end of thread, other threads:[~2022-02-10 18:04 UTC | newest]

Thread overview: 6+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
     [not found] <000000000000a3571605d27817b5@google.com>
2022-02-10  6:08 ` [syzbot] WARNING: kmalloc bug in xdp_umem_create (2) syzbot
2022-02-10  8:11   ` Willy Tarreau
     [not found]     ` <359ee592-747f-8610-4180-5e1d2aba1b77@iogearbox.net>
2022-02-10 16:18       ` Björn Töpel
2022-02-10 17:45         ` Dan Carpenter
2022-02-10 17:56           ` Dan Carpenter
2022-02-10 18:04             ` Linus Torvalds

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).