Willem de Bruijn <[email protected]> wrote: >On Thu, Aug 6, 2020 at 1:48 PM linmiaohe <[email protected]> wrote: >> >> From: Miaohe Lin <[email protected]> >> >> We could be trapped in deadloop when we try to copy userspace skb >> frags buffers to kernel with a cloned skb: >> Reproduce code snippet: >> skb = alloc_skb(UBUF_DATA_LEN, GFP_ATOMIC); >> clone = skb_clone(skb, GFP_ATOMIC); >> skb_zcopy_set_nouarg(clone, NULL); >> pskb_expand_head(skb, 0, 0, GFP_ATOMIC); >> >> Catch this unexpected case and return -EINVAL in skb_orphan_frags() >> before we call skb_copy_ubufs() to fix it. > >Is this a hypothetical codepath? > >skb zerocopy carefully tracks clone calls where necessary. See the call to >skb_orphan_frags in skb_clone, and the implementation of that callee. > >The only caller of skb zerocopy with nouarg is tpacket_fill_skb, as of commit >5cd8d46ea156 ("packet: copy user buffers before orphan or clone"). > >As the commit subject indicates, this sets skb_zcopy_set_nouarg exactly to be >sure that any clone will trigger a copy of "zerocopy" >user data to private kernel memory. > >No clone must happen between alloc_skb and skb_zcopy_set_nouarg, indeed. But >AFAIK, none exists.
Since we always call skb_orphan_frags in skb_clone, is it unnecessary to call skb_orphan_frags in pskb_expand_head when skb is cloned ? Thanks.

