netfilter-devel.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* [PATCH] netfilter: add missing NULL pointer check
@ 2015-10-27  2:10 Munehisa Kamata
  2015-10-28  2:44 ` Pablo Neira Ayuso
  0 siblings, 1 reply; 2+ messages in thread
From: Munehisa Kamata @ 2015-10-27  2:10 UTC (permalink / raw)
  To: netfilter-devel
  Cc: msw, aliguori, pablo, kaber, kadlec, davem, Munehisa Kamata

Commit 8b13eddfdf04cbfa561725cfc42d6868fe896f56 ("netfilter: refactor NAT
redirect IPv4 to use it from nf_tables") has introduced a trivial logic
change which can result in the following crash.

BUG: unable to handle kernel NULL pointer dereference at 0000000000000030
IP: [<ffffffffa033002d>] nf_nat_redirect_ipv4+0x2d/0xa0 [nf_nat_redirect]
PGD 3ba662067 PUD 3ba661067 PMD 0
Oops: 0000 [#1] SMP
Modules linked in: ipv6(E) xt_REDIRECT(E) nf_nat_redirect(E) xt_tcpudp(E) iptable_nat(E) nf_conntrack_ipv4(E) nf_defrag_ipv4(E) nf_nat_ipv4(E) nf_nat(E) nf_conntrack(E) ip_tables(E) x_tables(E) binfmt_misc(E) xfs(E) libcrc32c(E) evbug(E) evdev(E) psmouse(E) i2c_piix4(E) i2c_core(E) acpi_cpufreq(E) button(E) ext4(E) crc16(E) jbd2(E) mbcache(E) dm_mirror(E) dm_region_hash(E) dm_log(E) dm_mod(E)
CPU: 0 PID: 2536 Comm: ip Tainted: G            E   4.1.7-15.23.amzn1.x86_64 #1
Hardware name: Xen HVM domU, BIOS 4.2.amazon 05/06/2015
task: ffff8800eb438000 ti: ffff8803ba664000 task.ti: ffff8803ba664000
RIP: 0010:[<ffffffffa033002d>]  [<ffffffffa033002d>] nf_nat_redirect_ipv4+0x2d/0xa0 [nf_nat_redirect]
RSP: 0018:ffff8803cfc039c8  EFLAGS: 00010286
RAX: 0000000000000000 RBX: ffff8803ba4c9400 RCX: 0000000000000000
RDX: 0000000000000000 RSI: ffff8803ba4c94c0 RDI: ffff8803bb204000
RBP: ffff8803cfc039f8 R08: ffff8803be069000 R09: ffff8803ba4c9400
R10: ffff8803ba4c94a0 R11: ffffffffa02e3ad8 R12: ffff8803bdb2f3ce
R13: ffff8803be069000 R14: ffff8803ba4c94a0 R15: ffff8803be076600
FS:  00007f94bf8ee740(0000) GS:ffff8803cfc00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000030 CR3: 00000003bdcaf000 CR4: 00000000001406f0
Stack:
 ffffffff00000000 0000000000000246 0000002000000002 ffff8803ba4c9400
 ffff8803bdb2f3ce ffff8803be069000 ffff8803cfc03a08 ffffffffa0334065
 ffff8803cfc03b48 ffffffffa02e2e99 00008803cfc03a48 0000000000000000
Call Trace:
 <IRQ>
 [<ffffffffa0334065>] redirect_tg4+0x15/0x20 [xt_REDIRECT]
 [<ffffffffa02e2e99>] ipt_do_table+0x2b9/0x5e1 [ip_tables]
 [<ffffffffa0328045>] iptable_nat_do_chain+0x25/0x30 [iptable_nat]
 [<ffffffffa031777d>] nf_nat_ipv4_fn+0x13d/0x1f0 [nf_nat_ipv4]
 [<ffffffffa0328020>] ? iptable_nat_ipv4_fn+0x20/0x20 [iptable_nat]
 [<ffffffffa031785e>] nf_nat_ipv4_in+0x2e/0x90 [nf_nat_ipv4]
 [<ffffffffa03280a5>] iptable_nat_ipv4_in+0x15/0x20 [iptable_nat]
 [<ffffffff81449137>] nf_iterate+0x57/0x80
 [<ffffffff814491f7>] nf_hook_slow+0x97/0x100
 [<ffffffff814504d4>] ip_rcv+0x314/0x400
 [<ffffffff81402302>] ? reqsk_fastopen_remove+0x102/0x160
 [<ffffffff8144fa50>] ? inet_del_offload+0x40/0x40
 [<ffffffff81416243>] __netif_receive_skb_core+0x6c3/0x9a0
 [<ffffffff81416538>] __netif_receive_skb+0x18/0x60
 [<ffffffff814165a3>] netif_receive_skb_internal+0x23/0x90
 [<ffffffff814171e8>] napi_gro_receive+0xc8/0x100
 [<ffffffff813b2d94>] xennet_poll+0x934/0xbb0
 [<ffffffff813862c6>] ? add_interrupt_randomness+0x176/0x1e0
 [<ffffffff814169f9>] net_rx_action+0x159/0x340
 [<ffffffff8106db94>] __do_softirq+0xe4/0x270
 [<ffffffff814e267c>] do_softirq_own_stack+0x1c/0x30
 <EOI>
 [<ffffffff8106ddc5>] do_softirq+0x55/0x60
 [<ffffffff8106de5b>] __local_bh_enable_ip+0x8b/0xa0
 [<ffffffff814e0830>] _raw_spin_unlock_bh+0x20/0x50
 [<ffffffff813b43ce>] xennet_open+0x11e/0x180
 [<ffffffff8141934f>] __dev_open+0xbf/0x140
 [<ffffffff81419661>] __dev_change_flags+0xa1/0x160
 [<ffffffff81419749>] dev_change_flags+0x29/0x60
 [<ffffffff81426a42>] do_setlink+0x2d2/0x7c0
 [<ffffffff81177500>] ? zone_statistics+0x80/0xa0
 [<ffffffff81177500>] ? zone_statistics+0x80/0xa0
 [<ffffffff8142812f>] rtnl_newlink+0x51f/0x8d0
 [<ffffffff81427cf9>] ? rtnl_newlink+0xe9/0x8d0
 [<ffffffff81425855>] rtnetlink_rcv_msg+0x95/0x250
 [<ffffffff81161d72>] ? get_page_from_freelist+0x4f2/0x950
 [<ffffffff8140472e>] ? __alloc_skb+0x7e/0x1d0
 [<ffffffff814257c0>] ? rtnetlink_rcv+0x40/0x40
 [<ffffffff81446a91>] netlink_rcv_skb+0xc1/0xe0
 [<ffffffff814257ac>] rtnetlink_rcv+0x2c/0x40
 [<ffffffff81446136>] netlink_unicast+0xf6/0x200
 [<ffffffff8144665c>] netlink_sendmsg+0x41c/0x670
 [<ffffffff813fb49d>] sock_sendmsg+0x3d/0x50
 [<ffffffff813fbdbf>] ___sys_sendmsg+0x28f/0x2a0
 [<ffffffff811a7935>] ? alloc_pages_vma+0xb5/0x200
 [<ffffffff81167d9b>] ? lru_cache_add_active_or_unevictable+0x2b/0xa0
 [<ffffffff8118789a>] ? handle_mm_fault+0xbba/0x1770
 [<ffffffff811df42f>] ? dentry_free+0x5f/0xa0
 [<ffffffff813fc6a2>] __sys_sendmsg+0x42/0x80
 [<ffffffff813fc6f2>] SyS_sendmsg+0x12/0x20
 [<ffffffff814e0b6e>] system_call_fastpath+0x12/0x71

unsigned int
nf_nat_redirect_ipv4(struct sk_buff *skb,
...
{
...
		rcu_read_lock();
		indev = __in_dev_get_rcu(skb->dev);
		if (indev != NULL) {
			ifa = indev->ifa_list;
			newdst = ifa->ifa_local; <---
		}
		rcu_read_unlock();
...
}

Before the commit, 'ifa' had been always checked before access. After the
commit, however, it could be accessed even if it's NULL. Interestingly,
this was once fixed in 2003.

http://marc.info/?l=netfilter-devel&m=106668497403047&w=2

In addition to the original one, we have seen the crash when packets that
need to be redirected somehow arrive on an interface which hasn't been
yet fully configured.

This change just reverts the logic to the old behavior to avoid the crash.

Signed-off-by: Munehisa Kamata <kamatam@amazon.com>
---
 net/netfilter/nf_nat_redirect.c | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/net/netfilter/nf_nat_redirect.c b/net/netfilter/nf_nat_redirect.c
index 97b75f9..d438698 100644
--- a/net/netfilter/nf_nat_redirect.c
+++ b/net/netfilter/nf_nat_redirect.c
@@ -55,7 +55,7 @@ nf_nat_redirect_ipv4(struct sk_buff *skb,
 
 		rcu_read_lock();
 		indev = __in_dev_get_rcu(skb->dev);
-		if (indev != NULL) {
+		if (indev && indev->ifa_list) {
 			ifa = indev->ifa_list;
 			newdst = ifa->ifa_local;
 		}
-- 
2.6.2


^ permalink raw reply related	[flat|nested] 2+ messages in thread

* Re: [PATCH] netfilter: add missing NULL pointer check
  2015-10-27  2:10 [PATCH] netfilter: add missing NULL pointer check Munehisa Kamata
@ 2015-10-28  2:44 ` Pablo Neira Ayuso
  0 siblings, 0 replies; 2+ messages in thread
From: Pablo Neira Ayuso @ 2015-10-28  2:44 UTC (permalink / raw)
  To: Munehisa Kamata
  Cc: netfilter-devel, msw, aliguori, kaber, kadlec, davem,
	Arturo Borrero Gonzalez

On Mon, Oct 26, 2015 at 07:10:52PM -0700, Munehisa Kamata wrote:
> Commit 8b13eddfdf04cbfa561725cfc42d6868fe896f56 ("netfilter: refactor NAT
> redirect IPv4 to use it from nf_tables") has introduced a trivial logic
> change which can result in the following crash.

This seems to have accidentally slipped through while adding redirect
support for nf_tables.

Applied, thanks.

^ permalink raw reply	[flat|nested] 2+ messages in thread

end of thread, other threads:[~2015-10-28  2:37 UTC | newest]

Thread overview: 2+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2015-10-27  2:10 [PATCH] netfilter: add missing NULL pointer check Munehisa Kamata
2015-10-28  2:44 ` Pablo Neira Ayuso

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).