netdev.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* [PATCH net] net/sched: cls_api: fix error handling causing NULL dereference
@ 2025-02-13 22:36 Pierre Riteau
  2025-02-14 12:43 ` Michal Swiatkowski
  2025-02-15 17:30 ` patchwork-bot+netdevbpf
  0 siblings, 2 replies; 5+ messages in thread
From: Pierre Riteau @ 2025-02-13 22:36 UTC (permalink / raw)
  To: netdev; +Cc: Pierre Riteau

tcf_exts_miss_cookie_base_alloc() calls xa_alloc_cyclic() which can
return 1 if the allocation succeeded after wrapping. This was treated as
an error, with value 1 returned to caller tcf_exts_init_ex() which sets
exts->actions to NULL and returns 1 to caller fl_change().

fl_change() treats err == 1 as success, calling tcf_exts_validate_ex()
which calls tcf_action_init() with exts->actions as argument, where it
is dereferenced.

Example trace:

BUG: kernel NULL pointer dereference, address: 0000000000000000
CPU: 114 PID: 16151 Comm: handler114 Kdump: loaded Not tainted 5.14.0-503.16.1.el9_5.x86_64 #1
RIP: 0010:tcf_action_init+0x1f8/0x2c0
Call Trace:
 tcf_action_init+0x1f8/0x2c0
 tcf_exts_validate_ex+0x175/0x190
 fl_change+0x537/0x1120 [cls_flower]

Fixes: 80cd22c35c90 ("net/sched: cls_api: Support hardware miss to tc action")
Signed-off-by: Pierre Riteau <pierre@stackhpc.com>
---
 net/sched/cls_api.c | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/net/sched/cls_api.c b/net/sched/cls_api.c
index 8e47e5355be6..4f648af8cfaa 100644
--- a/net/sched/cls_api.c
+++ b/net/sched/cls_api.c
@@ -97,7 +97,7 @@ tcf_exts_miss_cookie_base_alloc(struct tcf_exts *exts, struct tcf_proto *tp,
 
 	err = xa_alloc_cyclic(&tcf_exts_miss_cookies_xa, &n->miss_cookie_base,
 			      n, xa_limit_32b, &next, GFP_KERNEL);
-	if (err)
+	if (err < 0)
 		goto err_xa_alloc;
 
 	exts->miss_cookie_node = n;
-- 
2.43.5


^ permalink raw reply related	[flat|nested] 5+ messages in thread

* Re: [PATCH net] net/sched: cls_api: fix error handling causing NULL dereference
  2025-02-13 22:36 [PATCH net] net/sched: cls_api: fix error handling causing NULL dereference Pierre Riteau
@ 2025-02-14 12:43 ` Michal Swiatkowski
  2025-02-14 14:21   ` Pierre Riteau
  2025-02-15 17:30 ` patchwork-bot+netdevbpf
  1 sibling, 1 reply; 5+ messages in thread
From: Michal Swiatkowski @ 2025-02-14 12:43 UTC (permalink / raw)
  To: Pierre Riteau; +Cc: netdev

On Thu, Feb 13, 2025 at 11:36:10PM +0100, Pierre Riteau wrote:
> tcf_exts_miss_cookie_base_alloc() calls xa_alloc_cyclic() which can
> return 1 if the allocation succeeded after wrapping. This was treated as
> an error, with value 1 returned to caller tcf_exts_init_ex() which sets
> exts->actions to NULL and returns 1 to caller fl_change().
> 
> fl_change() treats err == 1 as success, calling tcf_exts_validate_ex()
> which calls tcf_action_init() with exts->actions as argument, where it
> is dereferenced.
> 
> Example trace:
> 
> BUG: kernel NULL pointer dereference, address: 0000000000000000
> CPU: 114 PID: 16151 Comm: handler114 Kdump: loaded Not tainted 5.14.0-503.16.1.el9_5.x86_64 #1
> RIP: 0010:tcf_action_init+0x1f8/0x2c0
> Call Trace:
>  tcf_action_init+0x1f8/0x2c0
>  tcf_exts_validate_ex+0x175/0x190
>  fl_change+0x537/0x1120 [cls_flower]
> 
> Fixes: 80cd22c35c90 ("net/sched: cls_api: Support hardware miss to tc action")
> Signed-off-by: Pierre Riteau <pierre@stackhpc.com>
> ---
>  net/sched/cls_api.c | 2 +-
>  1 file changed, 1 insertion(+), 1 deletion(-)
> 
> diff --git a/net/sched/cls_api.c b/net/sched/cls_api.c
> index 8e47e5355be6..4f648af8cfaa 100644
> --- a/net/sched/cls_api.c
> +++ b/net/sched/cls_api.c
> @@ -97,7 +97,7 @@ tcf_exts_miss_cookie_base_alloc(struct tcf_exts *exts, struct tcf_proto *tp,
>  
>  	err = xa_alloc_cyclic(&tcf_exts_miss_cookies_xa, &n->miss_cookie_base,
>  			      n, xa_limit_32b, &next, GFP_KERNEL);
> -	if (err)
> +	if (err < 0)
>  		goto err_xa_alloc;
>  
>  	exts->miss_cookie_node = n;

Thanks for fixing.
Reviewed-by: Michal Swiatkowski <michal.swiatkowski@linux.intel.com>

The same thing is done in devlink_rel_alloc() (net/devlink/core.c). I am
not sure if it can lead to NULL pointer dereference as here.

Thanks,
Michal

> -- 
> 2.43.5

^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: [PATCH net] net/sched: cls_api: fix error handling causing NULL dereference
  2025-02-14 12:43 ` Michal Swiatkowski
@ 2025-02-14 14:21   ` Pierre Riteau
  2025-02-14 14:38     ` Pierre Riteau
  0 siblings, 1 reply; 5+ messages in thread
From: Pierre Riteau @ 2025-02-14 14:21 UTC (permalink / raw)
  To: Michal Swiatkowski; +Cc: netdev

On Fri, 14 Feb 2025 at 13:46, Michal Swiatkowski
<michal.swiatkowski@linux.intel.com> wrote:
>
> On Thu, Feb 13, 2025 at 11:36:10PM +0100, Pierre Riteau wrote:
> > tcf_exts_miss_cookie_base_alloc() calls xa_alloc_cyclic() which can
> > return 1 if the allocation succeeded after wrapping. This was treated as
> > an error, with value 1 returned to caller tcf_exts_init_ex() which sets
> > exts->actions to NULL and returns 1 to caller fl_change().
> >
> > fl_change() treats err == 1 as success, calling tcf_exts_validate_ex()
> > which calls tcf_action_init() with exts->actions as argument, where it
> > is dereferenced.
> >
> > Example trace:
> >
> > BUG: kernel NULL pointer dereference, address: 0000000000000000
> > CPU: 114 PID: 16151 Comm: handler114 Kdump: loaded Not tainted 5.14.0-503.16.1.el9_5.x86_64 #1
> > RIP: 0010:tcf_action_init+0x1f8/0x2c0
> > Call Trace:
> >  tcf_action_init+0x1f8/0x2c0
> >  tcf_exts_validate_ex+0x175/0x190
> >  fl_change+0x537/0x1120 [cls_flower]
> >
> > Fixes: 80cd22c35c90 ("net/sched: cls_api: Support hardware miss to tc action")
> > Signed-off-by: Pierre Riteau <pierre@stackhpc.com>
> > ---
> >  net/sched/cls_api.c | 2 +-
> >  1 file changed, 1 insertion(+), 1 deletion(-)
> >
> > diff --git a/net/sched/cls_api.c b/net/sched/cls_api.c
> > index 8e47e5355be6..4f648af8cfaa 100644
> > --- a/net/sched/cls_api.c
> > +++ b/net/sched/cls_api.c
> > @@ -97,7 +97,7 @@ tcf_exts_miss_cookie_base_alloc(struct tcf_exts *exts, struct tcf_proto *tp,
> >
> >       err = xa_alloc_cyclic(&tcf_exts_miss_cookies_xa, &n->miss_cookie_base,
> >                             n, xa_limit_32b, &next, GFP_KERNEL);
> > -     if (err)
> > +     if (err < 0)
> >               goto err_xa_alloc;
> >
> >       exts->miss_cookie_node = n;
>
> Thanks for fixing.
> Reviewed-by: Michal Swiatkowski <michal.swiatkowski@linux.intel.com>
>
> The same thing is done in devlink_rel_alloc() (net/devlink/core.c). I am
> not sure if it can lead to NULL pointer dereference as here.
>
> Thanks,
> Michal

Thanks for the review. I also checked other occurrences under net/ and
wanted to investigate this one. It looks like it could produce a
similar result.

In devlink_rel_alloc(), if xa_alloc_cyclic() returns 1, we execute
kfree(rel); return ERR_PTR(err);
In caller devlink_rel_nested_in_add(), we would assign the value 1 to
rel, check IS_ERR(rel) - which should be false? - and dereference rel
at: rel->devlink_index = devlink->index;

Should I update the patch to cover both issues?

^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: [PATCH net] net/sched: cls_api: fix error handling causing NULL dereference
  2025-02-14 14:21   ` Pierre Riteau
@ 2025-02-14 14:38     ` Pierre Riteau
  0 siblings, 0 replies; 5+ messages in thread
From: Pierre Riteau @ 2025-02-14 14:38 UTC (permalink / raw)
  To: Michal Swiatkowski; +Cc: netdev

On Fri, 14 Feb 2025 at 15:21, Pierre Riteau <pierre@stackhpc.com> wrote:
>
> On Fri, 14 Feb 2025 at 13:46, Michal Swiatkowski
> <michal.swiatkowski@linux.intel.com> wrote:
> >
> > On Thu, Feb 13, 2025 at 11:36:10PM +0100, Pierre Riteau wrote:
> > > tcf_exts_miss_cookie_base_alloc() calls xa_alloc_cyclic() which can
> > > return 1 if the allocation succeeded after wrapping. This was treated as
> > > an error, with value 1 returned to caller tcf_exts_init_ex() which sets
> > > exts->actions to NULL and returns 1 to caller fl_change().
> > >
> > > fl_change() treats err == 1 as success, calling tcf_exts_validate_ex()
> > > which calls tcf_action_init() with exts->actions as argument, where it
> > > is dereferenced.
> > >
> > > Example trace:
> > >
> > > BUG: kernel NULL pointer dereference, address: 0000000000000000
> > > CPU: 114 PID: 16151 Comm: handler114 Kdump: loaded Not tainted 5.14.0-503.16.1.el9_5.x86_64 #1
> > > RIP: 0010:tcf_action_init+0x1f8/0x2c0
> > > Call Trace:
> > >  tcf_action_init+0x1f8/0x2c0
> > >  tcf_exts_validate_ex+0x175/0x190
> > >  fl_change+0x537/0x1120 [cls_flower]
> > >
> > > Fixes: 80cd22c35c90 ("net/sched: cls_api: Support hardware miss to tc action")
> > > Signed-off-by: Pierre Riteau <pierre@stackhpc.com>
> > > ---
> > >  net/sched/cls_api.c | 2 +-
> > >  1 file changed, 1 insertion(+), 1 deletion(-)
> > >
> > > diff --git a/net/sched/cls_api.c b/net/sched/cls_api.c
> > > index 8e47e5355be6..4f648af8cfaa 100644
> > > --- a/net/sched/cls_api.c
> > > +++ b/net/sched/cls_api.c
> > > @@ -97,7 +97,7 @@ tcf_exts_miss_cookie_base_alloc(struct tcf_exts *exts, struct tcf_proto *tp,
> > >
> > >       err = xa_alloc_cyclic(&tcf_exts_miss_cookies_xa, &n->miss_cookie_base,
> > >                             n, xa_limit_32b, &next, GFP_KERNEL);
> > > -     if (err)
> > > +     if (err < 0)
> > >               goto err_xa_alloc;
> > >
> > >       exts->miss_cookie_node = n;
> >
> > Thanks for fixing.
> > Reviewed-by: Michal Swiatkowski <michal.swiatkowski@linux.intel.com>
> >
> > The same thing is done in devlink_rel_alloc() (net/devlink/core.c). I am
> > not sure if it can lead to NULL pointer dereference as here.
> >
> > Thanks,
> > Michal
>
> Thanks for the review. I also checked other occurrences under net/ and
> wanted to investigate this one. It looks like it could produce a
> similar result.
>
> In devlink_rel_alloc(), if xa_alloc_cyclic() returns 1, we execute
> kfree(rel); return ERR_PTR(err);
> In caller devlink_rel_nested_in_add(), we would assign the value 1 to
> rel, check IS_ERR(rel) - which should be false? - and dereference rel
> at: rel->devlink_index = devlink->index;
>
> Should I update the patch to cover both issues?

Nevermind, I see you already posted a patch in the meantime. Thanks.

^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: [PATCH net] net/sched: cls_api: fix error handling causing NULL dereference
  2025-02-13 22:36 [PATCH net] net/sched: cls_api: fix error handling causing NULL dereference Pierre Riteau
  2025-02-14 12:43 ` Michal Swiatkowski
@ 2025-02-15 17:30 ` patchwork-bot+netdevbpf
  1 sibling, 0 replies; 5+ messages in thread
From: patchwork-bot+netdevbpf @ 2025-02-15 17:30 UTC (permalink / raw)
  To: Pierre Riteau; +Cc: netdev

Hello:

This patch was applied to netdev/net.git (main)
by Jakub Kicinski <kuba@kernel.org>:

On Thu, 13 Feb 2025 23:36:10 +0100 you wrote:
> tcf_exts_miss_cookie_base_alloc() calls xa_alloc_cyclic() which can
> return 1 if the allocation succeeded after wrapping. This was treated as
> an error, with value 1 returned to caller tcf_exts_init_ex() which sets
> exts->actions to NULL and returns 1 to caller fl_change().
> 
> fl_change() treats err == 1 as success, calling tcf_exts_validate_ex()
> which calls tcf_action_init() with exts->actions as argument, where it
> is dereferenced.
> 
> [...]

Here is the summary with links:
  - [net] net/sched: cls_api: fix error handling causing NULL dereference
    https://git.kernel.org/netdev/net/c/071ed42cff4f

You are awesome, thank you!
-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/patchwork/pwbot.html



^ permalink raw reply	[flat|nested] 5+ messages in thread

end of thread, other threads:[~2025-02-15 17:29 UTC | newest]

Thread overview: 5+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2025-02-13 22:36 [PATCH net] net/sched: cls_api: fix error handling causing NULL dereference Pierre Riteau
2025-02-14 12:43 ` Michal Swiatkowski
2025-02-14 14:21   ` Pierre Riteau
2025-02-14 14:38     ` Pierre Riteau
2025-02-15 17:30 ` patchwork-bot+netdevbpf

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).