[dpdk-dev] [dpdk-stable] [PATCH v2] mem: fix the alloc size roundup overflow

Bing Zhao bingz at mellanox.com
Thu May 7 14:16:09 CEST 2020


Hi David,
I've changed the space into tabs in v3 and suppressed this one.

Thanks a lot

BR. Bing

> -----Original Message-----
> From: David Marchand <david.marchand at redhat.com>
> Sent: Thursday, May 7, 2020 8:12 PM
> To: Burakov, Anatoly <anatoly.burakov at intel.com>; Bing Zhao
> <bingz at mellanox.com>
> Cc: Thomas Monjalon <thomas at monjalon.net>; dev <dev at dpdk.org>;
> dpdk stable <stable at dpdk.org>; sergio.gonzalez.monroy at intel.com
> Subject: Re: [dpdk-stable] [PATCH v2] mem: fix the alloc size roundup
> overflow
> 
> On Thu, May 7, 2020 at 1:55 PM Burakov, Anatoly
> <anatoly.burakov at intel.com> wrote:
> >
> > On 07-May-20 8:41 AM, Bing Zhao wrote:
> > > The size checking is done in the caller. The size parameter is an
> > > unsigned (64b wide) right now, so the comparison with zero should
> be
> > > enough in most cases. But it won't help in the following case.
> > > If the allocating request input a huge number by mistake, e.g.,
> some
> > > overflow after the calculation (especially subtraction), the
> > > checking in the caller will succeed since it is not zero. Indeed,
> > > there is not enough space in the system to support such huge
> memory allocation.
> > > Usually it will return failure in the following code. But if the
> > > input size is just a little smaller than the UINT64_MAX, like -2 in
> > > signed type.
> > > The roundup will cause an overflow and then "reset" the size to 0,
> > > and then only a header (128B now) with zero length will be
> returned.
> > > The following will be the previous allocation header.
> > > It should be OK in most cases if the application won't access the
> > > memory body. Or else, some critical issue will be caused and not
> > > easy to debug. So this issue should be prevented at the beginning,
> > > like other big size failure, NULL pointer should be returned also.
> > >
> > > Fixes: fdf20fa7bee9 ("add prefix to cache line macros")
> > > Cc: stable at dpdk.org
> > >
> > > Signed-off-by: Bing Zhao <bingz at mellanox.com>
> > > ---
> > > v2: add unit test for this case
> > > ---
> > >   app/test/test_malloc.c              | 12 ++++++++++++
> > >   lib/librte_eal/common/malloc_heap.c |  3 +++
> > >   2 files changed, 15 insertions(+)
> > >
> > > diff --git a/app/test/test_malloc.c b/app/test/test_malloc.c index
> > > 40a2f50..a96c060 100644
> > > --- a/app/test/test_malloc.c
> > > +++ b/app/test/test_malloc.c
> > > @@ -846,6 +846,18 @@
> > >       if (bad_ptr != NULL)
> > >               goto err_return;
> > >
> > > +     /* rte_malloc expected to return null with size will cause
> overflow */
> > > +     align = RTE_CACHE_LINE_SIZE;
> > > +     size = (size_t)-8;
> > > +
> > > +     bad_ptr = rte_malloc(type, size, align);
> > > +     if (bad_ptr != NULL)
> > > +             goto err_return;
> > > +
> > > +     bad_ptr = rte_realloc(NULL, size, align);
> > > +        if (bad_ptr != NULL)
> > > +                goto err_return;
> >
> > You're mixing space and tabs as indentation here.
> 
> Will fix while applying.
> 
> >
> > Otherwise,
> >
> > Reviewed-by: Anatoly Burakov <anatoly.burakov at intel.com>
> 
> You acked the v1, so I will go with it.
> Thanks for the work Bing, Anatoly.
> 
> 
> --
> David Marchand



More information about the dev mailing list