* [PATCH net] net/sched: cls_api: fix error handling causing NULL dereference
@ 2025-02-13 22:36 Pierre Riteau
2025-02-14 12:43 ` Michal Swiatkowski
2025-02-15 17:30 ` patchwork-bot+netdevbpf
0 siblings, 2 replies; 5+ messages in thread
From: Pierre Riteau @ 2025-02-13 22:36 UTC (permalink / raw)
To: netdev; +Cc: Pierre Riteau
tcf_exts_miss_cookie_base_alloc() calls xa_alloc_cyclic() which can
return 1 if the allocation succeeded after wrapping. This was treated as
an error, with value 1 returned to caller tcf_exts_init_ex() which sets
exts->actions to NULL and returns 1 to caller fl_change().
fl_change() treats err == 1 as success, calling tcf_exts_validate_ex()
which calls tcf_action_init() with exts->actions as argument, where it
is dereferenced.
Example trace:
BUG: kernel NULL pointer dereference, address: 0000000000000000
CPU: 114 PID: 16151 Comm: handler114 Kdump: loaded Not tainted 5.14.0-503.16.1.el9_5.x86_64 #1
RIP: 0010:tcf_action_init+0x1f8/0x2c0
Call Trace:
tcf_action_init+0x1f8/0x2c0
tcf_exts_validate_ex+0x175/0x190
fl_change+0x537/0x1120 [cls_flower]
Fixes: 80cd22c35c90 ("net/sched: cls_api: Support hardware miss to tc action")
Signed-off-by: Pierre Riteau <pierre@stackhpc.com>
---
net/sched/cls_api.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/net/sched/cls_api.c b/net/sched/cls_api.c
index 8e47e5355be6..4f648af8cfaa 100644
--- a/net/sched/cls_api.c
+++ b/net/sched/cls_api.c
@@ -97,7 +97,7 @@ tcf_exts_miss_cookie_base_alloc(struct tcf_exts *exts, struct tcf_proto *tp,
err = xa_alloc_cyclic(&tcf_exts_miss_cookies_xa, &n->miss_cookie_base,
n, xa_limit_32b, &next, GFP_KERNEL);
- if (err)
+ if (err < 0)
goto err_xa_alloc;
exts->miss_cookie_node = n;
--
2.43.5
^ permalink raw reply related [flat|nested] 5+ messages in thread
* Re: [PATCH net] net/sched: cls_api: fix error handling causing NULL dereference
2025-02-13 22:36 [PATCH net] net/sched: cls_api: fix error handling causing NULL dereference Pierre Riteau
@ 2025-02-14 12:43 ` Michal Swiatkowski
2025-02-14 14:21 ` Pierre Riteau
2025-02-15 17:30 ` patchwork-bot+netdevbpf
1 sibling, 1 reply; 5+ messages in thread
From: Michal Swiatkowski @ 2025-02-14 12:43 UTC (permalink / raw)
To: Pierre Riteau; +Cc: netdev
On Thu, Feb 13, 2025 at 11:36:10PM +0100, Pierre Riteau wrote:
> tcf_exts_miss_cookie_base_alloc() calls xa_alloc_cyclic() which can
> return 1 if the allocation succeeded after wrapping. This was treated as
> an error, with value 1 returned to caller tcf_exts_init_ex() which sets
> exts->actions to NULL and returns 1 to caller fl_change().
>
> fl_change() treats err == 1 as success, calling tcf_exts_validate_ex()
> which calls tcf_action_init() with exts->actions as argument, where it
> is dereferenced.
>
> Example trace:
>
> BUG: kernel NULL pointer dereference, address: 0000000000000000
> CPU: 114 PID: 16151 Comm: handler114 Kdump: loaded Not tainted 5.14.0-503.16.1.el9_5.x86_64 #1
> RIP: 0010:tcf_action_init+0x1f8/0x2c0
> Call Trace:
> tcf_action_init+0x1f8/0x2c0
> tcf_exts_validate_ex+0x175/0x190
> fl_change+0x537/0x1120 [cls_flower]
>
> Fixes: 80cd22c35c90 ("net/sched: cls_api: Support hardware miss to tc action")
> Signed-off-by: Pierre Riteau <pierre@stackhpc.com>
> ---
> net/sched/cls_api.c | 2 +-
> 1 file changed, 1 insertion(+), 1 deletion(-)
>
> diff --git a/net/sched/cls_api.c b/net/sched/cls_api.c
> index 8e47e5355be6..4f648af8cfaa 100644
> --- a/net/sched/cls_api.c
> +++ b/net/sched/cls_api.c
> @@ -97,7 +97,7 @@ tcf_exts_miss_cookie_base_alloc(struct tcf_exts *exts, struct tcf_proto *tp,
>
> err = xa_alloc_cyclic(&tcf_exts_miss_cookies_xa, &n->miss_cookie_base,
> n, xa_limit_32b, &next, GFP_KERNEL);
> - if (err)
> + if (err < 0)
> goto err_xa_alloc;
>
> exts->miss_cookie_node = n;
Thanks for fixing.
Reviewed-by: Michal Swiatkowski <michal.swiatkowski@linux.intel.com>
The same thing is done in devlink_rel_alloc() (net/devlink/core.c). I am
not sure if it can lead to NULL pointer dereference as here.
Thanks,
Michal
> --
> 2.43.5
^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: [PATCH net] net/sched: cls_api: fix error handling causing NULL dereference
2025-02-14 12:43 ` Michal Swiatkowski
@ 2025-02-14 14:21 ` Pierre Riteau
2025-02-14 14:38 ` Pierre Riteau
0 siblings, 1 reply; 5+ messages in thread
From: Pierre Riteau @ 2025-02-14 14:21 UTC (permalink / raw)
To: Michal Swiatkowski; +Cc: netdev
On Fri, 14 Feb 2025 at 13:46, Michal Swiatkowski
<michal.swiatkowski@linux.intel.com> wrote:
>
> On Thu, Feb 13, 2025 at 11:36:10PM +0100, Pierre Riteau wrote:
> > tcf_exts_miss_cookie_base_alloc() calls xa_alloc_cyclic() which can
> > return 1 if the allocation succeeded after wrapping. This was treated as
> > an error, with value 1 returned to caller tcf_exts_init_ex() which sets
> > exts->actions to NULL and returns 1 to caller fl_change().
> >
> > fl_change() treats err == 1 as success, calling tcf_exts_validate_ex()
> > which calls tcf_action_init() with exts->actions as argument, where it
> > is dereferenced.
> >
> > Example trace:
> >
> > BUG: kernel NULL pointer dereference, address: 0000000000000000
> > CPU: 114 PID: 16151 Comm: handler114 Kdump: loaded Not tainted 5.14.0-503.16.1.el9_5.x86_64 #1
> > RIP: 0010:tcf_action_init+0x1f8/0x2c0
> > Call Trace:
> > tcf_action_init+0x1f8/0x2c0
> > tcf_exts_validate_ex+0x175/0x190
> > fl_change+0x537/0x1120 [cls_flower]
> >
> > Fixes: 80cd22c35c90 ("net/sched: cls_api: Support hardware miss to tc action")
> > Signed-off-by: Pierre Riteau <pierre@stackhpc.com>
> > ---
> > net/sched/cls_api.c | 2 +-
> > 1 file changed, 1 insertion(+), 1 deletion(-)
> >
> > diff --git a/net/sched/cls_api.c b/net/sched/cls_api.c
> > index 8e47e5355be6..4f648af8cfaa 100644
> > --- a/net/sched/cls_api.c
> > +++ b/net/sched/cls_api.c
> > @@ -97,7 +97,7 @@ tcf_exts_miss_cookie_base_alloc(struct tcf_exts *exts, struct tcf_proto *tp,
> >
> > err = xa_alloc_cyclic(&tcf_exts_miss_cookies_xa, &n->miss_cookie_base,
> > n, xa_limit_32b, &next, GFP_KERNEL);
> > - if (err)
> > + if (err < 0)
> > goto err_xa_alloc;
> >
> > exts->miss_cookie_node = n;
>
> Thanks for fixing.
> Reviewed-by: Michal Swiatkowski <michal.swiatkowski@linux.intel.com>
>
> The same thing is done in devlink_rel_alloc() (net/devlink/core.c). I am
> not sure if it can lead to NULL pointer dereference as here.
>
> Thanks,
> Michal
Thanks for the review. I also checked other occurrences under net/ and
wanted to investigate this one. It looks like it could produce a
similar result.
In devlink_rel_alloc(), if xa_alloc_cyclic() returns 1, we execute
kfree(rel); return ERR_PTR(err);
In caller devlink_rel_nested_in_add(), we would assign the value 1 to
rel, check IS_ERR(rel) - which should be false? - and dereference rel
at: rel->devlink_index = devlink->index;
Should I update the patch to cover both issues?
^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: [PATCH net] net/sched: cls_api: fix error handling causing NULL dereference
2025-02-14 14:21 ` Pierre Riteau
@ 2025-02-14 14:38 ` Pierre Riteau
0 siblings, 0 replies; 5+ messages in thread
From: Pierre Riteau @ 2025-02-14 14:38 UTC (permalink / raw)
To: Michal Swiatkowski; +Cc: netdev
On Fri, 14 Feb 2025 at 15:21, Pierre Riteau <pierre@stackhpc.com> wrote:
>
> On Fri, 14 Feb 2025 at 13:46, Michal Swiatkowski
> <michal.swiatkowski@linux.intel.com> wrote:
> >
> > On Thu, Feb 13, 2025 at 11:36:10PM +0100, Pierre Riteau wrote:
> > > tcf_exts_miss_cookie_base_alloc() calls xa_alloc_cyclic() which can
> > > return 1 if the allocation succeeded after wrapping. This was treated as
> > > an error, with value 1 returned to caller tcf_exts_init_ex() which sets
> > > exts->actions to NULL and returns 1 to caller fl_change().
> > >
> > > fl_change() treats err == 1 as success, calling tcf_exts_validate_ex()
> > > which calls tcf_action_init() with exts->actions as argument, where it
> > > is dereferenced.
> > >
> > > Example trace:
> > >
> > > BUG: kernel NULL pointer dereference, address: 0000000000000000
> > > CPU: 114 PID: 16151 Comm: handler114 Kdump: loaded Not tainted 5.14.0-503.16.1.el9_5.x86_64 #1
> > > RIP: 0010:tcf_action_init+0x1f8/0x2c0
> > > Call Trace:
> > > tcf_action_init+0x1f8/0x2c0
> > > tcf_exts_validate_ex+0x175/0x190
> > > fl_change+0x537/0x1120 [cls_flower]
> > >
> > > Fixes: 80cd22c35c90 ("net/sched: cls_api: Support hardware miss to tc action")
> > > Signed-off-by: Pierre Riteau <pierre@stackhpc.com>
> > > ---
> > > net/sched/cls_api.c | 2 +-
> > > 1 file changed, 1 insertion(+), 1 deletion(-)
> > >
> > > diff --git a/net/sched/cls_api.c b/net/sched/cls_api.c
> > > index 8e47e5355be6..4f648af8cfaa 100644
> > > --- a/net/sched/cls_api.c
> > > +++ b/net/sched/cls_api.c
> > > @@ -97,7 +97,7 @@ tcf_exts_miss_cookie_base_alloc(struct tcf_exts *exts, struct tcf_proto *tp,
> > >
> > > err = xa_alloc_cyclic(&tcf_exts_miss_cookies_xa, &n->miss_cookie_base,
> > > n, xa_limit_32b, &next, GFP_KERNEL);
> > > - if (err)
> > > + if (err < 0)
> > > goto err_xa_alloc;
> > >
> > > exts->miss_cookie_node = n;
> >
> > Thanks for fixing.
> > Reviewed-by: Michal Swiatkowski <michal.swiatkowski@linux.intel.com>
> >
> > The same thing is done in devlink_rel_alloc() (net/devlink/core.c). I am
> > not sure if it can lead to NULL pointer dereference as here.
> >
> > Thanks,
> > Michal
>
> Thanks for the review. I also checked other occurrences under net/ and
> wanted to investigate this one. It looks like it could produce a
> similar result.
>
> In devlink_rel_alloc(), if xa_alloc_cyclic() returns 1, we execute
> kfree(rel); return ERR_PTR(err);
> In caller devlink_rel_nested_in_add(), we would assign the value 1 to
> rel, check IS_ERR(rel) - which should be false? - and dereference rel
> at: rel->devlink_index = devlink->index;
>
> Should I update the patch to cover both issues?
Nevermind, I see you already posted a patch in the meantime. Thanks.
^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: [PATCH net] net/sched: cls_api: fix error handling causing NULL dereference
2025-02-13 22:36 [PATCH net] net/sched: cls_api: fix error handling causing NULL dereference Pierre Riteau
2025-02-14 12:43 ` Michal Swiatkowski
@ 2025-02-15 17:30 ` patchwork-bot+netdevbpf
1 sibling, 0 replies; 5+ messages in thread
From: patchwork-bot+netdevbpf @ 2025-02-15 17:30 UTC (permalink / raw)
To: Pierre Riteau; +Cc: netdev
Hello:
This patch was applied to netdev/net.git (main)
by Jakub Kicinski <kuba@kernel.org>:
On Thu, 13 Feb 2025 23:36:10 +0100 you wrote:
> tcf_exts_miss_cookie_base_alloc() calls xa_alloc_cyclic() which can
> return 1 if the allocation succeeded after wrapping. This was treated as
> an error, with value 1 returned to caller tcf_exts_init_ex() which sets
> exts->actions to NULL and returns 1 to caller fl_change().
>
> fl_change() treats err == 1 as success, calling tcf_exts_validate_ex()
> which calls tcf_action_init() with exts->actions as argument, where it
> is dereferenced.
>
> [...]
Here is the summary with links:
- [net] net/sched: cls_api: fix error handling causing NULL dereference
https://git.kernel.org/netdev/net/c/071ed42cff4f
You are awesome, thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/patchwork/pwbot.html
^ permalink raw reply [flat|nested] 5+ messages in thread
end of thread, other threads:[~2025-02-15 17:29 UTC | newest]
Thread overview: 5+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2025-02-13 22:36 [PATCH net] net/sched: cls_api: fix error handling causing NULL dereference Pierre Riteau
2025-02-14 12:43 ` Michal Swiatkowski
2025-02-14 14:21 ` Pierre Riteau
2025-02-14 14:38 ` Pierre Riteau
2025-02-15 17:30 ` patchwork-bot+netdevbpf
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).