netdev.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* [PATCH net] ipv4: Fix use-after-free when flushing FIB tables
@ 2017-12-18  8:13 Ido Schimmel
  2017-12-19 16:32 ` David Miller
  0 siblings, 1 reply; 5+ messages in thread
From: Ido Schimmel @ 2017-12-18  8:13 UTC (permalink / raw)
  To: netdev; +Cc: davem, alexander.h.duyck, fengguang.wu, dsahern, mlxsw,
	Ido Schimmel

Since commit 0ddcf43d5d4a ("ipv4: FIB Local/MAIN table collapse") the
local table uses the same trie allocated for the main table when custom
rules are not in use.

When a net namespace is dismantled, the main table is flushed and freed
(via an RCU callback) before the local table. In case the callback is
invoked before the local table is iterated, a use-after-free can occur.

Fix this by iterating over the FIB tables in reverse order, so that the
main table is always freed after the local table.

Fixes: 0ddcf43d5d4a ("ipv4: FIB Local/MAIN table collapse")
Signed-off-by: Ido Schimmel <idosch@mellanox.com>
Reported-by: Fengguang Wu <fengguang.wu@intel.com>
---
 net/ipv4/fib_frontend.c | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/net/ipv4/fib_frontend.c b/net/ipv4/fib_frontend.c
index f52d27a422c3..d93850848c97 100644
--- a/net/ipv4/fib_frontend.c
+++ b/net/ipv4/fib_frontend.c
@@ -1298,14 +1298,14 @@ static int __net_init ip_fib_net_init(struct net *net)
 
 static void ip_fib_net_exit(struct net *net)
 {
-	unsigned int i;
+	int i;
 
 	rtnl_lock();
 #ifdef CONFIG_IP_MULTIPLE_TABLES
 	RCU_INIT_POINTER(net->ipv4.fib_main, NULL);
 	RCU_INIT_POINTER(net->ipv4.fib_default, NULL);
 #endif
-	for (i = 0; i < FIB_TABLE_HASHSZ; i++) {
+	for (i = FIB_TABLE_HASHSZ - 1; i >= 0; i--) {
 		struct hlist_head *head = &net->ipv4.fib_table_hash[i];
 		struct hlist_node *tmp;
 		struct fib_table *tb;
-- 
2.14.3

^ permalink raw reply related	[flat|nested] 5+ messages in thread

* Re: [PATCH net] ipv4: Fix use-after-free when flushing FIB tables
  2017-12-18  8:13 [PATCH net] ipv4: Fix use-after-free when flushing FIB tables Ido Schimmel
@ 2017-12-19 16:32 ` David Miller
  2017-12-19 17:34   ` Alexander Duyck
  0 siblings, 1 reply; 5+ messages in thread
From: David Miller @ 2017-12-19 16:32 UTC (permalink / raw)
  To: idosch; +Cc: netdev, alexander.h.duyck, fengguang.wu, dsahern, mlxsw

From: Ido Schimmel <idosch@mellanox.com>
Date: Mon, 18 Dec 2017 10:13:20 +0200

> Since commit 0ddcf43d5d4a ("ipv4: FIB Local/MAIN table collapse") the
> local table uses the same trie allocated for the main table when custom
> rules are not in use.
> 
> When a net namespace is dismantled, the main table is flushed and freed
> (via an RCU callback) before the local table. In case the callback is
> invoked before the local table is iterated, a use-after-free can occur.
> 
> Fix this by iterating over the FIB tables in reverse order, so that the
> main table is always freed after the local table.
> 
> Fixes: 0ddcf43d5d4a ("ipv4: FIB Local/MAIN table collapse")
> Signed-off-by: Ido Schimmel <idosch@mellanox.com>
> Reported-by: Fengguang Wu <fengguang.wu@intel.com>

This is really too clever of a fix I think :-)

I would prefer if we fixed things more explicitly.

In struct fib_table you can add a "data_ref" integer.  Any pointer
reference created to fib_table->__data increases this counter.  It is
always done inside of RTNL locking, so should be doable without
atomics or extra locking.

For a non-aliased fib_table we go:

	if (!--fib_table->data_ref)
		kfree(fib_table);

And for aliased ones we do something like:

	if (fib_table->tb_data != fib_table->__data) {
		void *data = fib_table->fb_data;
		struct fib_table *alias;

		alias = container_of(data, struct fib_table, __data[0]);
		if (!--alias->data_ref)
			kfree(alias);
		kfree(fib_table);
	}

Something like that.

^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: [PATCH net] ipv4: Fix use-after-free when flushing FIB tables
  2017-12-19 16:32 ` David Miller
@ 2017-12-19 17:34   ` Alexander Duyck
  2017-12-19 18:49     ` Ido Schimmel
  0 siblings, 1 reply; 5+ messages in thread
From: Alexander Duyck @ 2017-12-19 17:34 UTC (permalink / raw)
  To: David Miller
  Cc: Ido Schimmel, Netdev, Duyck, Alexander H, Fengguang Wu,
	David Ahern, mlxsw

On Tue, Dec 19, 2017 at 8:32 AM, David Miller <davem@davemloft.net> wrote:
> From: Ido Schimmel <idosch@mellanox.com>
> Date: Mon, 18 Dec 2017 10:13:20 +0200
>
>> Since commit 0ddcf43d5d4a ("ipv4: FIB Local/MAIN table collapse") the
>> local table uses the same trie allocated for the main table when custom
>> rules are not in use.
>>
>> When a net namespace is dismantled, the main table is flushed and freed
>> (via an RCU callback) before the local table. In case the callback is
>> invoked before the local table is iterated, a use-after-free can occur.
>>
>> Fix this by iterating over the FIB tables in reverse order, so that the
>> main table is always freed after the local table.
>>
>> Fixes: 0ddcf43d5d4a ("ipv4: FIB Local/MAIN table collapse")
>> Signed-off-by: Ido Schimmel <idosch@mellanox.com>
>> Reported-by: Fengguang Wu <fengguang.wu@intel.com>
>
> This is really too clever of a fix I think :-)
>
> I would prefer if we fixed things more explicitly.
>
> In struct fib_table you can add a "data_ref" integer.  Any pointer
> reference created to fib_table->__data increases this counter.  It is
> always done inside of RTNL locking, so should be doable without
> atomics or extra locking.
>
> For a non-aliased fib_table we go:
>
>         if (!--fib_table->data_ref)
>                 kfree(fib_table);
>
> And for aliased ones we do something like:
>
>         if (fib_table->tb_data != fib_table->__data) {
>                 void *data = fib_table->fb_data;
>                 struct fib_table *alias;
>
>                 alias = container_of(data, struct fib_table, __data[0]);
>                 if (!--alias->data_ref)
>                         kfree(alias);
>                 kfree(fib_table);
>         }
>
> Something like that.

That seems like unneeded complexity when the issue is just the order
that these were created in versus the order they are freed in. As long
as we always destroy the one containing the alias before the one that
has the actual data we don't need to have a reference count. Basically
the issue is the bring-up and the tear-down order. It isn't something
that really needs a reference count since it would always be either 1
or 2. My preference would be to just add a comment explaining that
local must always be destroyed before the main trie in order to
guarantee that there are no external references to the data contained
in main when it is freed.

The one question I have in all this is if I did the bring-up in the
right order in the first place. I'm wondering if local should be where
the combined trie lives instead of main. Local is currently destroyed
after main anyway so I wonder if it wouldn't have been better if
everything lived in local since from what I can tell it looks like we
add rules for local first before we do so in main. The complexity of
that patch would be higher though since the patch would need to be
much larger and touch multiple files.

- Alex

^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: [PATCH net] ipv4: Fix use-after-free when flushing FIB tables
  2017-12-19 17:34   ` Alexander Duyck
@ 2017-12-19 18:49     ` Ido Schimmel
  2017-12-19 19:01       ` David Miller
  0 siblings, 1 reply; 5+ messages in thread
From: Ido Schimmel @ 2017-12-19 18:49 UTC (permalink / raw)
  To: Alexander Duyck
  Cc: David Miller, Ido Schimmel, Netdev, Duyck, Alexander H,
	Fengguang Wu, David Ahern, mlxsw

On Tue, Dec 19, 2017 at 09:34:16AM -0800, Alexander Duyck wrote:
> That seems like unneeded complexity when the issue is just the order
> that these were created in versus the order they are freed in. As long
> as we always destroy the one containing the alias before the one that
> has the actual data we don't need to have a reference count. Basically
> the issue is the bring-up and the tear-down order. It isn't something
> that really needs a reference count since it would always be either 1
> or 2. My preference would be to just add a comment explaining that
> local must always be destroyed before the main trie in order to
> guarantee that there are no external references to the data contained
> in main when it is freed.
> 
> The one question I have in all this is if I did the bring-up in the
> right order in the first place. I'm wondering if local should be where
> the combined trie lives instead of main. Local is currently destroyed
> after main anyway so I wonder if it wouldn't have been better if
> everything lived in local since from what I can tell it looks like we
> add rules for local first before we do so in main. The complexity of
> that patch would be higher though since the patch would need to be
> much larger and touch multiple files.

I decided to go with the original patch because it resulted in a very
small diff (patch is needed in -stable as well), but I agree with Dave
about it not being explicit enough.

How about I'll send v2 with a comment and then we can try Alex's
suggestion in net-next?

Thanks

^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: [PATCH net] ipv4: Fix use-after-free when flushing FIB tables
  2017-12-19 18:49     ` Ido Schimmel
@ 2017-12-19 19:01       ` David Miller
  0 siblings, 0 replies; 5+ messages in thread
From: David Miller @ 2017-12-19 19:01 UTC (permalink / raw)
  To: idosch
  Cc: alexander.duyck, idosch, netdev, alexander.h.duyck, fengguang.wu,
	dsahern, mlxsw

From: Ido Schimmel <idosch@idosch.org>
Date: Tue, 19 Dec 2017 20:49:13 +0200

> How about I'll send v2 with a comment and then we can try Alex's
> suggestion in net-next?

Sounds good.

^ permalink raw reply	[flat|nested] 5+ messages in thread

end of thread, other threads:[~2017-12-19 19:01 UTC | newest]

Thread overview: 5+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2017-12-18  8:13 [PATCH net] ipv4: Fix use-after-free when flushing FIB tables Ido Schimmel
2017-12-19 16:32 ` David Miller
2017-12-19 17:34   ` Alexander Duyck
2017-12-19 18:49     ` Ido Schimmel
2017-12-19 19:01       ` David Miller

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).