netfilter-devel.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* [PATCH v2 nf] netfilter: nf_queue: don't assume sk is full socket
@ 2022-02-25 13:02 Florian Westphal
  2022-02-28  2:46 ` Eric Dumazet
  0 siblings, 1 reply; 3+ messages in thread
From: Florian Westphal @ 2022-02-25 13:02 UTC (permalink / raw)
  To: netfilter-devel; +Cc: Florian Westphal, Oleksandr Natalenko

There is no guarantee that state->sk refers to a full socket.

If refcount transitions to 0, sock_put calls sk_free which then ends up
with garbage fields.

I'd like to thank Oleksandr Natalenko and Jiri Benc for considerable
debug work and pointing out state->sk oddities.

Fixes: ca6fb0651883 ("tcp: attach SYNACK messages to request sockets instead of listener")
Tested-by: Oleksandr Natalenko <oleksandr@redhat.com>
Signed-off-by: Florian Westphal <fw@strlen.de>
---
 v2: fix build failure with CONFIG_INET=n.
 No difference for CONFIG_INET=y build.

 net/netfilter/nf_queue.c | 11 ++++++++++-
 1 file changed, 10 insertions(+), 1 deletion(-)

diff --git a/net/netfilter/nf_queue.c b/net/netfilter/nf_queue.c
index 6d12afabfe8a..5ab0680db445 100644
--- a/net/netfilter/nf_queue.c
+++ b/net/netfilter/nf_queue.c
@@ -46,6 +46,15 @@ void nf_unregister_queue_handler(void)
 }
 EXPORT_SYMBOL(nf_unregister_queue_handler);
 
+static void nf_queue_sock_put(struct sock *sk)
+{
+#ifdef CONFIG_INET
+	sock_gen_put(sk);
+#else
+	sock_put(sk);
+#endif
+}
+
 static void nf_queue_entry_release_refs(struct nf_queue_entry *entry)
 {
 	struct nf_hook_state *state = &entry->state;
@@ -54,7 +63,7 @@ static void nf_queue_entry_release_refs(struct nf_queue_entry *entry)
 	dev_put(state->in);
 	dev_put(state->out);
 	if (state->sk)
-		sock_put(state->sk);
+		nf_queue_sock_put(state->sk);
 
 #if IS_ENABLED(CONFIG_BRIDGE_NETFILTER)
 	dev_put(entry->physin);
-- 
2.34.1


^ permalink raw reply related	[flat|nested] 3+ messages in thread

* Re: [PATCH v2 nf] netfilter: nf_queue: don't assume sk is full socket
  2022-02-25 13:02 [PATCH v2 nf] netfilter: nf_queue: don't assume sk is full socket Florian Westphal
@ 2022-02-28  2:46 ` Eric Dumazet
  2022-02-28  3:10   ` Florian Westphal
  0 siblings, 1 reply; 3+ messages in thread
From: Eric Dumazet @ 2022-02-28  2:46 UTC (permalink / raw)
  To: Florian Westphal, netfilter-devel; +Cc: Oleksandr Natalenko


On 2/25/22 05:02, Florian Westphal wrote:
> There is no guarantee that state->sk refers to a full socket.
>
> If refcount transitions to 0, sock_put calls sk_free which then ends up
> with garbage fields.
>
> I'd like to thank Oleksandr Natalenko and Jiri Benc for considerable
> debug work and pointing out state->sk oddities.
>
> Fixes: ca6fb0651883 ("tcp: attach SYNACK messages to request sockets instead of listener")
> Tested-by: Oleksandr Natalenko <oleksandr@redhat.com>
> Signed-off-by: Florian Westphal <fw@strlen.de>
> ---
>   v2: fix build failure with CONFIG_INET=n.
>   No difference for CONFIG_INET=y build.
>
>   net/netfilter/nf_queue.c | 11 ++++++++++-
>   1 file changed, 10 insertions(+), 1 deletion(-)
>
> diff --git a/net/netfilter/nf_queue.c b/net/netfilter/nf_queue.c
> index 6d12afabfe8a..5ab0680db445 100644
> --- a/net/netfilter/nf_queue.c
> +++ b/net/netfilter/nf_queue.c
> @@ -46,6 +46,15 @@ void nf_unregister_queue_handler(void)
>   }
>   EXPORT_SYMBOL(nf_unregister_queue_handler);
>   
> +static void nf_queue_sock_put(struct sock *sk)
> +{
> +#ifdef CONFIG_INET
> +	sock_gen_put(sk);
> +#else
> +	sock_put(sk);
> +#endif
> +}
> +
>   static void nf_queue_entry_release_refs(struct nf_queue_entry *entry)
>   {
>   	struct nf_hook_state *state = &entry->state;
> @@ -54,7 +63,7 @@ static void nf_queue_entry_release_refs(struct nf_queue_entry *entry)
>   	dev_put(state->in);
>   	dev_put(state->out);
>   	if (state->sk)
> -		sock_put(state->sk);
> +		nf_queue_sock_put(state->sk);
>   
>   #if IS_ENABLED(CONFIG_BRIDGE_NETFILTER)
>   	dev_put(entry->physin);


OK but it looks like there might be an orthogonal bug.

The sock_hold() side seems suspect, because there is no guarantee

that sk_refcnt is not already 0.

Not sure how netfilter would react with stats->sk set to NULL ?

diff --git a/net/netfilter/nf_queue.c b/net/netfilter/nf_queue.c
index 
6d12afabfe8a35069f5355ceb57e8147cf59d187..46da92e3bb436ceaec8f9339fc5be7a9c372ce64 
100644
--- a/net/netfilter/nf_queue.c
+++ b/net/netfilter/nf_queue.c
@@ -93,8 +93,9 @@ void nf_queue_entry_get_refs(struct nf_queue_entry *entry)

         dev_hold(state->in);
         dev_hold(state->out);
-       if (state->sk)
-               sock_hold(state->sk);
+
+       if (state->sk && !refcount_inc_not_zero(&state->sk->sk_refcnt))
+               state->sk = NULL;

  #if IS_ENABLED(CONFIG_BRIDGE_NETFILTER)
         dev_hold(entry->physin);


^ permalink raw reply	[flat|nested] 3+ messages in thread

* Re: [PATCH v2 nf] netfilter: nf_queue: don't assume sk is full socket
  2022-02-28  2:46 ` Eric Dumazet
@ 2022-02-28  3:10   ` Florian Westphal
  0 siblings, 0 replies; 3+ messages in thread
From: Florian Westphal @ 2022-02-28  3:10 UTC (permalink / raw)
  To: Eric Dumazet; +Cc: Florian Westphal, netfilter-devel, Oleksandr Natalenko

Eric Dumazet <eric.dumazet@gmail.com> wrote:
> > +		nf_queue_sock_put(state->sk);
> >   #if IS_ENABLED(CONFIG_BRIDGE_NETFILTER)
> >   	dev_put(entry->physin);
> 
> 
> OK but it looks like there might be an orthogonal bug.
> 
> The sock_hold() side seems suspect, because there is no guarantee
> 
> that sk_refcnt is not already 0.

Ugh.  Looks like we also need skb_sk_is_prefetched() check and then
take care of skb->sk too if its not owned by skb destructor.

> Not sure how netfilter would react with stats->sk set to NULL ?

Its passed as arg to dst_output() later so I think its fine.

^ permalink raw reply	[flat|nested] 3+ messages in thread

end of thread, other threads:[~2022-02-28  3:10 UTC | newest]

Thread overview: 3+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2022-02-25 13:02 [PATCH v2 nf] netfilter: nf_queue: don't assume sk is full socket Florian Westphal
2022-02-28  2:46 ` Eric Dumazet
2022-02-28  3:10   ` Florian Westphal

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).