* [PATCH 1/2 v2] netfilter: nf_tables: fix loop checking with end interval elements @ 2014-02-07 16:29 Pablo Neira Ayuso 2014-02-07 16:29 ` [PATCH 2/2 v2] netfilter: nf_tables: fix oops when using gotos Pablo Neira Ayuso 0 siblings, 1 reply; 3+ messages in thread From: Pablo Neira Ayuso @ 2014-02-07 16:29 UTC (permalink / raw) To: netfilter-devel; +Cc: kaber Fix access to uninitialized data for end interval elements. The element data part is uninitialized in interval end elements. Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org> --- v2: don't remove inline from nft_chain_stats. net/netfilter/nf_tables_api.c | 3 +++ 1 file changed, 3 insertions(+) diff --git a/net/netfilter/nf_tables_api.c b/net/netfilter/nf_tables_api.c index d0c790e3e..adce01e 100644 --- a/net/netfilter/nf_tables_api.c +++ b/net/netfilter/nf_tables_api.c @@ -2998,6 +2998,9 @@ static int nf_tables_loop_check_setelem(const struct nft_ctx *ctx, const struct nft_set_iter *iter, const struct nft_set_elem *elem) { + if (elem->flags & NFT_SET_ELEM_INTERVAL_END) + return 0; + switch (elem->data.verdict) { case NFT_JUMP: case NFT_GOTO: -- 1.7.10.4 ^ permalink raw reply related [flat|nested] 3+ messages in thread
* [PATCH 2/2 v2] netfilter: nf_tables: fix oops when using gotos 2014-02-07 16:29 [PATCH 1/2 v2] netfilter: nf_tables: fix loop checking with end interval elements Pablo Neira Ayuso @ 2014-02-07 16:29 ` Pablo Neira Ayuso 2014-02-07 16:34 ` Patrick McHardy 0 siblings, 1 reply; 3+ messages in thread From: Pablo Neira Ayuso @ 2014-02-07 16:29 UTC (permalink / raw) To: netfilter-devel; +Cc: kaber Fix an oops if you use the "goto" operation, you will end up in non-base chain with no counters and no default policy. Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org> --- v2: recover inline to nft_chain_stats. net/netfilter/nf_tables_core.c | 11 ++++++++--- 1 file changed, 8 insertions(+), 3 deletions(-) diff --git a/net/netfilter/nf_tables_core.c b/net/netfilter/nf_tables_core.c index 0d879fc..13fecde 100644 --- a/net/netfilter/nf_tables_core.c +++ b/net/netfilter/nf_tables_core.c @@ -67,18 +67,24 @@ struct nft_jumpstack { int rulenum; }; -static inline void +static inline int nft_chain_stats(const struct nft_chain *this, const struct nft_pktinfo *pkt, struct nft_jumpstack *jumpstack, unsigned int stackptr) { struct nft_stats __percpu *stats; const struct nft_chain *chain = stackptr ? jumpstack[0].chain : this; + /* You can reach this through goto chain */ + if (!(chain->flags & NFT_BASE_CHAIN)) + return NF_ACCEPT; + rcu_read_lock_bh(); stats = rcu_dereference(nft_base_chain(chain)->stats); __this_cpu_inc(stats->pkts); __this_cpu_add(stats->bytes, pkt->skb->len); rcu_read_unlock_bh(); + + return nft_base_chain(chain)->policy; } enum nft_trace { @@ -209,12 +215,11 @@ next_rule: rulenum = jumpstack[stackptr].rulenum; goto next_rule; } - nft_chain_stats(chain, pkt, jumpstack, stackptr); if (unlikely(pkt->skb->nf_trace)) nft_trace_packet(pkt, chain, ++rulenum, NFT_TRACE_POLICY); - return nft_base_chain(chain)->policy; + return nft_chain_stats(chain, pkt, jumpstack, stackptr); } EXPORT_SYMBOL_GPL(nft_do_chain); -- 1.7.10.4 ^ permalink raw reply related [flat|nested] 3+ messages in thread
* Re: [PATCH 2/2 v2] netfilter: nf_tables: fix oops when using gotos 2014-02-07 16:29 ` [PATCH 2/2 v2] netfilter: nf_tables: fix oops when using gotos Pablo Neira Ayuso @ 2014-02-07 16:34 ` Patrick McHardy 0 siblings, 0 replies; 3+ messages in thread From: Patrick McHardy @ 2014-02-07 16:34 UTC (permalink / raw) To: Pablo Neira Ayuso; +Cc: netfilter-devel On Fri, Feb 07, 2014 at 05:29:58PM +0100, Pablo Neira Ayuso wrote: > Fix an oops if you use the "goto" operation, you will end up in > non-base chain with no counters and no default policy. > > Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org> > --- > v2: recover inline to nft_chain_stats. > > net/netfilter/nf_tables_core.c | 11 ++++++++--- > 1 file changed, 8 insertions(+), 3 deletions(-) > > diff --git a/net/netfilter/nf_tables_core.c b/net/netfilter/nf_tables_core.c > index 0d879fc..13fecde 100644 > --- a/net/netfilter/nf_tables_core.c > +++ b/net/netfilter/nf_tables_core.c > @@ -67,18 +67,24 @@ struct nft_jumpstack { > int rulenum; > }; > > -static inline void > +static inline int > nft_chain_stats(const struct nft_chain *this, const struct nft_pktinfo *pkt, > struct nft_jumpstack *jumpstack, unsigned int stackptr) > { > struct nft_stats __percpu *stats; > const struct nft_chain *chain = stackptr ? jumpstack[0].chain : this; > > + /* You can reach this through goto chain */ > + if (!(chain->flags & NFT_BASE_CHAIN)) > + return NF_ACCEPT; > + > rcu_read_lock_bh(); > stats = rcu_dereference(nft_base_chain(chain)->stats); > __this_cpu_inc(stats->pkts); > __this_cpu_add(stats->bytes, pkt->skb->len); > rcu_read_unlock_bh(); > + > + return nft_base_chain(chain)->policy; > } > > enum nft_trace { > @@ -209,12 +215,11 @@ next_rule: > rulenum = jumpstack[stackptr].rulenum; > goto next_rule; > } > - nft_chain_stats(chain, pkt, jumpstack, stackptr); > > if (unlikely(pkt->skb->nf_trace)) > nft_trace_packet(pkt, chain, ++rulenum, NFT_TRACE_POLICY); > > - return nft_base_chain(chain)->policy; > + return nft_chain_stats(chain, pkt, jumpstack, stackptr); I think we should just inline the function manually, it doesn't help readability to have it take care of goto-specific cases and handle verdicts/policies. Also, what about NFT_TRACE_POLICY for the goto case? Should be generate a message even through there is no policy? ^ permalink raw reply [flat|nested] 3+ messages in thread
end of thread, other threads:[~2014-02-07 16:34 UTC | newest] Thread overview: 3+ messages (download: mbox.gz follow: Atom feed -- links below jump to the message on this page -- 2014-02-07 16:29 [PATCH 1/2 v2] netfilter: nf_tables: fix loop checking with end interval elements Pablo Neira Ayuso 2014-02-07 16:29 ` [PATCH 2/2 v2] netfilter: nf_tables: fix oops when using gotos Pablo Neira Ayuso 2014-02-07 16:34 ` Patrick McHardy
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox; as well as URLs for NNTP newsgroup(s).