[Devel] [PATCH] ms/tcp: fix potential huge kmalloc() calls in TCP_REPAIR
Andrey Ryabinin
aryabinin at virtuozzo.com
Tue Apr 9 13:23:18 MSK 2019
On 4/9/19 1:19 PM, Andrey Ryabinin wrote:
>
>
> On 4/9/19 12:34 PM, Konstantin Khorenko wrote:
>> From: Eric Dumazet <edumazet at google.com>
>>
>> tcp_send_rcvq() is used for re-injecting data into tcp receive queue.
>>
>> Problems :
>>
>> - No check against size is performed, allowed user to fool kernel in
>> attempting very large memory allocations, eventually triggering
>> OOM when memory is fragmented.
>>
>> - In case of fault during the copy we do not return correct errno.
>>
>> Lets use alloc_skb_with_frags() to cook optimal skbs.
>>
>> Fixes: 292e8d8c8538 ("tcp: Move rcvq sending to tcp_input.c")
>> Fixes: c0e88ff0f256 ("tcp: Repair socket queues")
>> Signed-off-by: Eric Dumazet <edumazet at google.com>
>> Cc: Pavel Emelyanov <xemul at parallels.com>
>> Acked-by: Pavel Emelyanov <xemul at parallels.com>
>> Signed-off-by: David S. Miller <davem at davemloft.net>
>>
>> CRIU often triggers 8 order page allocation while restoring TCP sockets
>> without this patch.
>> https://jira.sw.ru/browse/PSBM-93672
>>
>> (cherry picked from commit 5d4c9bfbabdb1d497f21afd81501e5c54b0c85d9)
>> Signed-off-by: Konstantin Khorenko <khorenko at virtuozzo.com>
>> ---
>> net/ipv4/tcp_input.c | 22 +++++++++++++++++++---
>> 1 file changed, 19 insertions(+), 3 deletions(-)
>>
>> diff --git a/net/ipv4/tcp_input.c b/net/ipv4/tcp_input.c
>> index 015c6fd7ec83..d0a6f767189d 100644
>> --- a/net/ipv4/tcp_input.c
>> +++ b/net/ipv4/tcp_input.c
>> @@ -4470,19 +4470,34 @@ static int __must_check tcp_queue_rcv(struct sock *sk, struct sk_buff *skb, int
>> int tcp_send_rcvq(struct sock *sk, struct msghdr *msg, size_t size)
>> {
>> struct sk_buff *skb;
>> + int err = -ENOMEM;
>> + int data_len = 0;
>> bool fragstolen;
>>
>> if (size == 0)
>> return 0;
>>
>> - skb = alloc_skb(size, sk->sk_allocation);
>> + if (size > PAGE_SIZE) {
>> + int npages = min_t(size_t, size >> PAGE_SHIFT, MAX_SKB_FRAGS);
>> +
>> + data_len = npages << PAGE_SHIFT;
>> + size = data_len + (size & ~PAGE_MASK);
>> + }
>> + skb = alloc_skb_with_frags(size - data_len, data_len,
>> + PAGE_ALLOC_COSTLY_ORDER,
>> + &err, sk->sk_allocation);
>> if (!skb)
>> goto err;
>>
>> + skb_put(skb, size - data_len);
>> + skb->data_len = data_len;
>> + skb->len = size;
>> +
>> if (tcp_try_rmem_schedule(sk, skb, skb->truesize))
>> goto err_free;
>>
>> - if (memcpy_from_msg(skb_put(skb, size), msg, size))
>> + err = skb_copy_datagram_from_iter(skb, 0, &msg->msg_iter, size);
>
> skb_copy_datagram_iovec(skb, 0, msg->msg_iov, size) ?
Correction: skb_copy_datagram_from_iovec(skb, 0, msg->msg_iov, 0, size)
>
>
>> + if (err)
>> goto err_free;
>>
>> TCP_SKB_CB(skb)->seq = tcp_sk(sk)->rcv_nxt;
>> @@ -4498,7 +4513,8 @@ int tcp_send_rcvq(struct sock *sk, struct msghdr *msg, size_t size)
>> err_free:
>> kfree_skb(skb);
>> err:
>> - return -ENOMEM;
>> + return err;
>> +
>> }
>>
>> static void tcp_data_queue(struct sock *sk, struct sk_buff *skb)
>>
More information about the Devel
mailing list