From: Florian Westphal <fw@strlen.de>
To: Pavel Skripkin <paskripkin@gmail.com>
Cc: syzbot <syzbot+649e339fa6658ee623d3@syzkaller.appspotmail.com>,
coreteam@netfilter.org, davem@davemloft.net, fw@strlen.de,
kadlec@netfilter.org, kuba@kernel.org,
linux-kernel@vger.kernel.org, netdev@vger.kernel.org,
netfilter-devel@vger.kernel.org, pablo@netfilter.org,
syzkaller-bugs@googlegroups.com
Subject: Re: [syzbot] KASAN: use-after-free Write in nft_ct_tmpl_put_pcpu
Date: Mon, 9 Aug 2021 22:39:16 +0200 [thread overview]
Message-ID: <20210809203916.GP607@breakpoint.cc> (raw)
In-Reply-To: <cdb5f0c9-1ad9-dd9d-b24d-e127928ada98@gmail.com>
Pavel Skripkin <paskripkin@gmail.com> wrote:
> I think, there a missing lock in this function:
>
> for_each_possible_cpu(cpu) {
> ct = per_cpu(nft_ct_pcpu_template, cpu);
> if (!ct)
> break;
> nf_ct_put(ct);
> per_cpu(nft_ct_pcpu_template, cpu) = NULL;
>
> }
>
> Syzbot hit a UAF in nft_ct_tmpl_put_pcpu() (*), but freed template should be
> NULL.
>
> So I suspect following scenario:
>
>
> CPU0: CPU1:
> = per_cpu()
> = per_cpu()
>
> nf_ct_put
> per_cpu = NULL
> nf_ct_put()
> * UAF *
Yes and no. The above is fine since pcpu will return different pointers
for cpu 0 and 1.
The race is between two different net namespaces that race when
changing nft_ct_pcpu_template_refcnt.
This happens since
commit f102d66b335a417d4848da9441f585695a838934
netfilter: nf_tables: use dedicated mutex to guard transactions
Before this, all transactions were serialized by a global mutex,
now we only serialize transactions in the same netns.
Its probably best to add
DEFINE_MUTEX(nft_ct_pcpu_mutex) and then acquire that when we need to
inc/dec the nft_ct_pcpu_template_refcnt so we can't have two distinct
cpus hitting a zero refcount.
Would you send a patch for this?
Thanks.
next prev parent reply other threads:[~2021-08-09 20:39 UTC|newest]
Thread overview: 8+ messages / expand[flat|nested] mbox.gz Atom feed top
2021-08-07 13:44 [syzbot] KASAN: use-after-free Write in nft_ct_tmpl_put_pcpu syzbot
2021-08-07 20:50 ` syzbot
2021-08-09 19:22 ` Pavel Skripkin
2021-08-09 20:39 ` Florian Westphal [this message]
2021-08-09 21:16 ` Pavel Skripkin
2021-08-09 21:40 ` Florian Westphal
2021-08-10 3:18 ` syzbot
2021-08-10 2:59 ` syzbot
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20210809203916.GP607@breakpoint.cc \
--to=fw@strlen.de \
--cc=coreteam@netfilter.org \
--cc=davem@davemloft.net \
--cc=kadlec@netfilter.org \
--cc=kuba@kernel.org \
--cc=linux-kernel@vger.kernel.org \
--cc=netdev@vger.kernel.org \
--cc=netfilter-devel@vger.kernel.org \
--cc=pablo@netfilter.org \
--cc=paskripkin@gmail.com \
--cc=syzbot+649e339fa6658ee623d3@syzkaller.appspotmail.com \
--cc=syzkaller-bugs@googlegroups.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).